Description : In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to. (A) identification (B) fragment offset (C) time to live (D) header checksum
Last Answer : (A) identification
Description : Unspecified address......................of IPV6 address is equivalent to the IPV4 unspecified address 0.0.0.0. A) (: : 1) B) (: : ) C) (: : 0) D) (1 : : )
Last Answer : B) (: : )
Description : Loopback address ....................... of IPv6 address is equivalent to the IPV4 loopback address 127.0.0.1. A) (: : 1) B) (: : ) C) (: : 0) D) (1 : : )
Last Answer : A) (: : 1)
Description : Unspecified address ………………….. of IPV6 address is equivalent to the IPV4 unspecified address 0.0.0.0. A) (: : 1) B) (: : ) C) (: : 0) D) (1 : : )
Description : Loopback address ……………………. of IPv6 address is equivalent to the IPV4 loopback address 127.0.0.1. A) (: : 1) B) (: : ) C) (: : 0) D) (1 : : )
Description : IPv4 and IPv6 are addresses used to identify computers on the internet. Find the correct statement out of the following: (A) Number of bits required for IPv4 address is more than number of bits required for ... of bits required for IPv6 address. (D) Number of bits required for IPv4 address is 64.
Last Answer : (C) Number of bits required for IPv4 address is less than number of bits required for IPv6 address.
Description : Which of the following fields in IPv4 datagram is not related to fragmentation? (A) Type of service (B) Fragment offset (C) Flags (D) Identification
Last Answer : (A) Type of service
Description : Which of the stamp initiates the routing process in DTS?
Last Answer : SIGNED
Description : Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii
Last Answer : B) i, and ii only
Description : Which is the main function of transport layer? A) Node to node delivery B) End to end delivery C) Synchronization d) Updating and maintaining routing tables
Last Answer : B) End to end delivery
Description : When a mobile telephone physically moves from one to another cell, the base station transfers ownership to the cell getting strongest signal. This process is known as................. (A) handoff (B) mobile switching (C) mobile routing (D) cell switching
Last Answer : (A) handoff
Description : In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for a three layer hierarchy? (A) 10 clusters, 24 regions and 20 routers (B ... (C) 16 clusters, 12 regions and 25 routers (D) 15 clusters, 16 regions and 20 routers
Last Answer : (D) 15 clusters, 16 regions and 20 routers Rooters minimum, then regions minimum, then clusters minimum.
Description : Which of the following algorithms is not a broadcast routing algorithm ? (A) Flooding (B) Multidestination routing (C) Reverse path forwarding (D) All of the above
Last Answer : (D) All of the above
Description : Consider a subnet with 720 routers. If a three-level hierarchy is choosen with eight clusters, each containing 9 regions of 10 routers, then total number of entries in the routing table is ................... (A) 25 (B) 27 (C) 53 (D) 72
Last Answer : Answer: A Explanation: Each router needs 10 entries for local routers, 8 entries for routing to other regions within its own cluster, and 7 entries for distant clusters, for a total of 25 entries.
Description : Which of the following is not a congestion policy at network layer? (A) Flow Control Policy (B) Packet Discard Policy (C) Packet Lifetime Management Policy (D) Routing Algorithm
Last Answer : (A) Flow Control Policy
Description : In link state routing algorithm after construction of link state packets, new routes are computed using: (1) DES algorithm (2) Dijkstra's algorithm (3) RSA algorithm (4) Packets
Last Answer : Answer: 2
Description : Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ........... (1) automatically (2) by server (3) by exchanging information with neighbour nodes. (4) with back up database
Last Answer : Answer: 3
Description : Which of the following concurrency protocol ensures both conflict serializability and freedom from deadlock ? (a) 2-phase Locking (b) Time stamp - ordering (A) Both (a) and (b) (B) (a) only (C) (b) only (D) Neither (a) nor (b)
Last Answer : (C) (b) only
Description : In the following graph, discovery time stamps and finishing time stamps of Depth First Search (DFS) are shown as x/y where x is discovery time stamp and y is finishing time stamp. It shows which of the following depth first forest? (A ... {a,b,e} {f,g} {c,d} {h} (D) {a,b,c,d} {e,f,g} {h}
Last Answer : Answer: A
Description : A software design is highly modular if : (A) cohesion is functional and coupling is data type. (B) cohesion is coincidental and coupling is data type. (C) cohesion is sequential and coupling is content type. (D) cohesion is functional and coupling is stamp type.
Last Answer : (A) cohesion is functional and coupling is data type.
Description : In IPv4 header, an HLEN value of decimal 10 means _______ A. there are 10 bytes of options B. there are 40 bytes of options C. there are 10 bytes in the header D. there are 40 bytes in the header
Last Answer : D. there are 40 bytes in the header
Description : In IPv4, which field or bit value unambiguously identifies thedatagram as a fragment? A) Donot fragment bit ?0 B) More Fragment bit ?0 C) Fragment offset = 1000 D) noneof the above
Last Answer : Fragment offset = 1000
Description : An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true? A) Thedo not fragment bit is set to 1 for all three datagrams. B) The more fragment bit ... Theidentification fieldis the same for all three datagrams. D) Theoffset field is thesame for all three datagrams
Last Answer : Theidentification fieldis the same for all three datagrams.
Description : In IPv4, what is the lengthof the data field given an HLEN value of 12 and total length value of 40,000? A) 39,988 B) 40,012 C) 40,048 D) 39,952
Last Answer : 39,952
Description : In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400bytes? A) 428 B) 407 C) 107 D) 427
Last Answer : 428
Description : What is the size of the ‘total length’ field in IPv4 datagram? a. 4 bit b. 8 bit c. 16 bit d. 32 bit
Last Answer : c. 16 bit
Description : An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true? A. The do not fragment bit is set to 1 for all three datagrams. B. The more fragment bit is set to 0 ... field is the same for all three datagrams. D. The offset field is the same for all three datagrams
Last Answer : C. The identification field is the same for all three datagrams.
Description : In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400 bytes?
Description : In IPv4, service type of service in header field, first 3 bits are called ______ a) Type of service b) Code bits c) Sync bits d) Precedence bits
Last Answer : d) Precedence bits
Description : In version field of IPv4 header, when machine is using some other version of IPv4 then datagram is __________ a) Discarded b) Accepted c) Interpreted d) Interpreted incorrectly
Last Answer : a) Discarded
Description : If a teacher had to establish his credibility in evaluating answer sheets he must be Options: A) strict B) lenient C) objective D) prompt
Last Answer : C) objective
Description : Who has the least chance of becoming an effective teacher? Options: A) One who is a strict disciplinarian. B) One who knows his subject well C) One who has no interest in teaching. D) One who teaches moral values.
Last Answer : C) One who has no interest in teaching.
Description : Inclusive Education Options: A) celebrates diversity in the classroom B) encourages strict admission procedures C) includes indoctrination of facts D) includes teachers from marginalized groups
Last Answer : A) celebrates diversity in the classroom
Description : Learners display individual differences. So a teacher should Options: A) provide a variety of learning experiences B) enforce strict discipline C) increase number of tests D) insist on uniform pace of learning
Last Answer : A) provide a variety of learning experiences
Description : inside the classroom, before explaining the importance of topic, it is too important to Options: A) maintain strict discipline in the class B) get the attention of the students C) ask the students few questions from the last lecture D) all of the above
Last Answer : B) get the attention of the students
Description : The most important cause of failure for teacher lies in the area of: Options: A) Inter personal relationship B) Lack of command over the knowledge of the subject C) Verbal ability D) Strict handling of the students
Last Answer : B) Lack of command over the knowledge of the subject
Description : A teacher's major contribution towards the maximum self-realization of the student is affected through: Options: A) Constant fulfilment of the students' needs B) Strict control of class-room ... C) Sensitivity to students' needs, goals and purposes D) Strict reinforcement of academic standards
Last Answer : C) Sensitivity to students’ needs, goals and purposes
Description : The teacher's major contribution towards the maximum self-realization of the child is best affected through Options: A) Constant fulfilment of the child's needs B) Strict control of class-room ... C) Sensitivity to pupil needs, goals and purposes D) Strict reinforcement of a academic standards
Last Answer : C) Sensitivity to pupil needs, goals and purposes
Description : Which of the following is the best statement of the relationship of intelligence to delinquency? Options: A) Dull children are most likely to be apprehended and appear to be more often delinquent B) ... ad the imbeciles D) Delinquency is not a product of intelligence as much as of other factors
Last Answer : B) Dull children appear more frequently delinquent because they tend to come from slum areas where strict law enforcement prevails
Description : If a girl student prefers you beyond the ethical limits then how would you control your own emotions? Options: A) You will try to sublimate her emotions, as she is passing through the ... relish her emotionality D) You will have in mind the similar emotions but afraid of social dignity
Last Answer : A) You will try to sublimate her emotions, as she is passing through the adolescent stage
Description : Which of the following statements is most correct? A. For small companies, long-term debt is the principal source of external financing. B. Current assets of the typical manufacturing firm account ... the financial manager to make a decision and not address the issue again for several months.
Last Answer : B. Current assets of the typical manufacturing firm account for over half of its total assets.
Description : The Multicast Open Shortest Path First (MOSPF)protocol is an extension of the OSPF protocol that uses multicast routing to create source-based trees. The protocol is basedon _______ routing. A) distancevector B) link state C) path vector D) none of the above
Last Answer : link state
Description : Multicast link state routing uses the _______ tree approach. A) source-based B) group-shared C) a or b D) none of the above
Last Answer : source-based
Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way
Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Description : Which algorithm is used to decide the path to transfer the packets from source to destination? (1) Routing (2) Pathing (3) Selecting (4) Directing
Last Answer : Routing
Description : Which of the options can be made using the rubber stamp shown in the figure?
Last Answer : B, C
Description : Given the following statements: (a) Strategic value of data mining is time stamping (b) Information collection is an expensive process in building an expert system. Which of the following options is correct ? (A) Both (a) and (b) ... true (C) (a) is true, (b) is false (D) (a) is false, (b) is true
Last Answer : (B) Both (a) and (b) are true
Description : In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now, consider the following two statements: I. A mode of 641 (octal) means that the owner can read and write the file, other ... (B) Only II is correct (C) Both I and II are correct (D) Both I and II are incorrect
Last Answer : (C) Both I and II are correct
Description : Given the following statements: (a) To implement Abstract Data Type, a programming language require a syntactic unit to encapsulate type definition. (b) To implement ADT, a programming language requires some primitive operations that are ... (b) and (c) are false. (D) (a), (b) and (c) are true.
Last Answer : (D) (a), (b) and (c) are true.
Description : Consider the following two statements : (a) Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse. (b) Data scrubling is a process of rejecting data from data warehouse to create ... true (C) Both (a) and (b) are false (D) Both (a) and (b) are true
Last Answer : (A) (a) is true, (b) is false