Services provided by application layer? A. Web chat B. Error control C. Connection services D. Congestion control

1 Answer

Answer :

A. Web chat 

Related questions

Description : Which services are provided by transport layer? a. Error control b. Connection service c. Connection less service d. Congestion control

Last Answer : a. Error control

Description : Security based connection is provided by which layer? A. Application layer B. Transport layer C. Session layer D. Network layer

Last Answer : D. Network layer 

Description : ______________ is useful for time-sensitive application that have very small data units to exchange and do not want the overhead of connection setup. A. TCP B. UDP C. Transport layer D. None of the above.

Last Answer : B. UDP 

Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes

Last Answer : A. Checksum 

Description : What are the functions of the transport layer? a. Multiplexing/ Demultiplexing b. Connection less Services c. Connection oriented service d. Congestion control

Last Answer : a. Multiplexing/ Demultiplexing

Description : Which layer is called a port layer in OSI model? a. Session b. Application c. Presentation d. Transport

Last Answer : a. Session

Description : The ___ protocols define how the applications interface with the lower layer protocol to send the data over the network. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : A. Application layer 

Description : ____________ protocols provide end to end message transfer capability independent of the underlying network. A. Network layer B. Transport layer C. Application layer D. Link layer 

Last Answer : B. Transport layer 

Description : ___ layer perform the host addressing and packet routing. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : C. Network layer 

Description : ______ layer is responsible for sending of IP datagrams from the source network to the destination network. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : The correct answer is: C. Network layer The network layer is responsible for routing and forwarding IP datagrams from the source network to the destination network. It provides logical addressing ... at the network layer include IP (Internet Protocol) and ICMP (Internet Control Message Protocol).

Description : _____________ layer protocols determine how the data is physically sent over the network’s physical layer or medium. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : D. Link layer 

Description : Which one of the following is not a function of network layer? a. routing b. inter-networking c. congestion control d. error contro

Last Answer : d. error control

Description : Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control d) error control

Last Answer : d) error control

Description : How power supply is done to RPi? A. USB connection B. Internal battery C. Charger D. Adapter

Last Answer : A. USB connection 

Description :  ___ is a stateful communication model and server is aware of all open connection. A. Request-Response B. Publish-Subscriber C. Push-Pull D. Exclusive Pair

Last Answer : D. Exclusive Pair 

Description :  _____ is a bi-directional, fully duplex communication model that uses a persistent connection between client and server. A. Request-Response B. Publish-Subscriber C. Push-Pull D. Exclusive Pair

Last Answer : D. Exclusive Pair 

Description : ____________ refers to establish a proper connection between all the things of IOT. A. Connectivity B. Analyzing C. Sensing D. Active Engagement

Last Answer : A. Connectivity 

Description : The main importance of ARM micro-processors is providing operation with ______ A. Low cost and low power consumption B. Higher degree of multi-tasking C. Lower error or glitches D. Efficient memory management

Last Answer : A. Low cost and low power consumption 

Description : Which is the part of Data Link Layer: a. LLC b. MAC c. Both a and b d. None of these

Last Answer : c. Both a and b

Description : Which transport layer protocols is used by DHCP? a. RSVP b. TCP c. DCCP d. UDP

Last Answer : d. UDP

Description : Which one out of these is not a data link layer technology: a. Bluetooth b. UART c. WIFI d. HTTP

Last Answer : d. HTTP

Description : Network layer protocol exits in_____? A. Host B. Switches C. Packets D. Bridges

Last Answer : A. Host  

Description : The network layer consists of which hardware devices? A. Router B. Bridges C. Switches D. All of the above 

Last Answer : D. All of the above  

Description : The network layer is considered as the _______? A. Backbone B. packets C. Bytes D. bits 

Last Answer : A. Backbone  

Description : Transport layer receives data in the form of? A. Packets B. Byte streams C. Bits stream D. both packet and Byte stream

Last Answer : B. Byte streams 

Description : Data in network layer is transferred in the form of ____________ A. Layers B. Packets C. Bytes D. Bits

Last Answer : B. Packets 

Description : Which one out of these is not a data link layer technology? A. Bluetooth B. UART C. Wi-Fi D. HTTP

Last Answer : D. HTTP 

Description : _____________ is a collection of wired Ethernet standard for the link layer. A. IEEE 802.3 B. IEEE 802.11 C. IEEE 802.16 D. IEEE 802.15.4

Last Answer : A. IEEE 802.3 

Description : ____ is a transformative computing paradigm that involves delivering applications and services over the internet. A. WSN B. Cloud Computing C. Big Data D. None of above

Last Answer : B. Cloud Computing 

Description : Benefit of cloud computing services A. Fast B. Anywhere access C. Higher utilization D. All of the above

Last Answer : D. All of the above 

Description : ______ offering provides the tools and development environment to deploy applications on another vendor’s application. A. PaaS B. IaaS C. CaaS D. All of the mentioned

Last Answer : B. IaaS 

Description :  TCP and UDP are called? A. Application protocols B. Session protocols C. Transport protocols D. Network protocols

Last Answer : C. Transport protocols  

Description : ASIC stands for A. Application-System Integrated Circuits B. Application-Specific Integrated Circuits C. Application-System Internal Circuits D. Application-Specific Internal Circuits

Last Answer : B. Application-Specific Integrated Circuits 

Description : In Node MCU, MCU stands for_____. A. Micro Control Unit B. Micro Controller Unit C. Macro Control Unit D. Macro Controller Unit

Last Answer : B. Micro Controller Unit 

Description : A digital multi meter is an example of an embedded system for A. Data communication B. Monitoring C. Control D. All of these E. None of these

Last Answer : B. Monitoring 

Description : Security based connection is provided by which layer? a. Network layer b. Session layer c. Application layer d. Transport layer

Last Answer : d. Transport layer

Description : Congestion control can control traffic entry into a telecommunications network, so to avoid _________ a. Congestive connection b. Connection collapse c. Congestive collapse d. Collapse congestive

Last Answer : c. Congestive collapse

Description : The Network is overloaded with enormous data sent by many computers within the network. The inability of the network to deliver the data is termed as __________ . (1) Access control (2) Congestion (3) Error propagation (4) Deadlock

Last Answer : Congestion

Description : Which of the following is not a congestion policy at network layer? a. Flow Control Policy b. Packet Discard Policy c. Packet Lifetime Management Policy d. Routing Algorithm

Last Answer : a. Flow Control Policy

Description : Which of the following is not a congestion policy at network layer? (A) Flow Control Policy (B) Packet Discard Policy (C) Packet Lifetime Management Policy (D) Routing Algorithm

Last Answer : (A) Flow Control Policy

Description : Which IEEE standard is developed for CSMA/CD a. IEEE 802.1 b. IEEE 802.2 c. IEEE 802.3 d. IEEE 802.4

Last Answer : c. IEEE 802.3

Description : Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? a. ALOHA b. CSMA/CA c. CDMA d. none of the mentioned

Last Answer : b. CSMA/CA

Description : MQTT is: a. Based on client-server architecture b. Based on publish-subscribe architecture c. Based on both of the above d. Based on none of the above

Last Answer : b. Based on publish-subscribe architecture

Description : HTTP resources are located by a. unique resource locator b. unique resource identifier c. none of the mentioned d. uniform resource identifier

Last Answer : d. uniform resource identifier

Description : .Frequency band used by 802.11 ah standard is: a. 60 GHz b. 2.4 GHz c. Sub 1 GHz d. 5 GHz

Last Answer : c. Sub 1 GHz

Description : ____ sensor measure heat emitted by objects. A. Smoke Sensor B. Temperature Sensor C. IR Sensor D. Proximity Sensor

Last Answer : C. IR Sensor 

Description : ____ sensor is used for automatic door controls, automatic parking system, automated sinks, automated toilet flushers, hand dryers. A. Smoke Sensor B. Temperature Sensor C. IR Sensor D. Motion Sensor

Last Answer : D. Motion Sensor 

Description : The measurement of humidity is A. RH B. PH C. IC D. None of aboved

Last Answer : A. RH 

Description : ___ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and integratd circuits (ICs). A. Smoke Sensor B. Temperature Sensor C. IR Sensor D. Proximity Sensor

Last Answer : B. Temperature Sensor 

Description : ____detect the presence or absence of nearby object without any physical contact. A. Smoke Sensor B. Pressure Sensor C. IR Sensor D. Proximity Sensor

Last Answer : D. Proximity Sensor