Transport layer receives data in the form of? A. Packets B. Byte streams C. Bits stream D. both packet and Byte stream

1 Answer

Answer :

B. Byte streams 

Related questions

Description : Data in network layer is transferred in the form of ____________ A. Layers B. Packets C. Bytes D. Bits

Last Answer : B. Packets 

Description : The network layer is considered as the _______? A. Backbone B. packets C. Bytes D. bits 

Last Answer : A. Backbone  

Description : ___ layer perform the host addressing and packet routing. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : C. Network layer 

Description : Network layer protocol exits in_____? A. Host B. Switches C. Packets D. Bridges

Last Answer : A. Host  

Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes

Last Answer : A. Checksum 

Description : ______________ is useful for time-sensitive application that have very small data units to exchange and do not want the overhead of connection setup. A. TCP B. UDP C. Transport layer D. None of the above.

Last Answer : B. UDP 

Description : The ___ protocols define how the applications interface with the lower layer protocol to send the data over the network. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : A. Application layer 

Description : _____________ layer protocols determine how the data is physically sent over the network’s physical layer or medium. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : D. Link layer 

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly

Last Answer : A. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly

Last Answer : all UDP packets are treated independently by transport layer

Description : Which layer is called a port layer in OSI model? a. Session b. Application c. Presentation d. Transport

Last Answer : a. Session

Description : Which transport layer protocols is used by DHCP? a. RSVP b. TCP c. DCCP d. UDP

Last Answer : d. UDP

Description : Security based connection is provided by which layer? A. Application layer B. Transport layer C. Session layer D. Network layer

Last Answer : D. Network layer 

Description : ____________ protocols provide end to end message transfer capability independent of the underlying network. A. Network layer B. Transport layer C. Application layer D. Link layer 

Last Answer : B. Transport layer 

Description : ______ layer is responsible for sending of IP datagrams from the source network to the destination network. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : The correct answer is: C. Network layer The network layer is responsible for routing and forwarding IP datagrams from the source network to the destination network. It provides logical addressing ... at the network layer include IP (Internet Protocol) and ICMP (Internet Control Message Protocol).

Description : In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................ (1) 2 bytes (2) 1 byte (3) 4 bytes (4) 5 bytes

Last Answer : (4) 5 bytes 

Description : Which is the part of Data Link Layer: a. LLC b. MAC c. Both a and b d. None of these

Last Answer : c. Both a and b

Description : ____ is a data-centric middleware standard for device-to-device and machine-to-machine communication. A. Data Distribution Serviced (DDS) B. Advance Message Queuing Protocol (AMQP) C. Extensible Messaging and Presence Protocol (XMPP) D. Message Queue Telemetry Transport (MQTT)

Last Answer : A. Data Distribution Serviced (DDS) 

Description : What is size of the IPv6 Address? A. 32 bits B. 64 bits C. 128 bits D. 256 bits

Last Answer : C. 128 bits 

Description : Which one out of these is not a data link layer technology: a. Bluetooth b. UART c. WIFI d. HTTP

Last Answer : d. HTTP

Description : Which one out of these is not a data link layer technology? A. Bluetooth B. UART C. Wi-Fi D. HTTP

Last Answer : D. HTTP 

Description : The network layer is concerned with __________ of data. a. bits b. frames c. packets d. bytes

Last Answer : c. packets

Description : The network layer encapsulates the data into _______of data. A. bits B. frames C. packets D. bytes

Last Answer : C. packets

Description : The network layer is concerned with __________ of data. a) bits b) frames c) packets d) bytes

Last Answer : c) packets

Description : The layer that transmits data in the form of bit streams using electrical and mechanicalsystems is in the OSI model. a. Physical layer b. Transport Layer c. Network Layer d. Data Link Layer

Last Answer : a. Physical layer

Description :  TCP and UDP are called? A. Application protocols B. Session protocols C. Transport protocols D. Network protocols

Last Answer : C. Transport protocols  

Description : MQTT stands for _____________ A. MQ Telemetry Things B. MQ Transport Telemetry C. MQ Transport Things D. MQ Telemetry Transport

Last Answer : D. MQ Telemetry Transport 

Description : The ________is a network layer Internet protocol that provides message packets to report errors and other information regarding IP packet processing back to the source: a) Internet Control Message ... Standard Flexible Message Protocol c) Internet Dynamic Chartered Message Protocol d) None of These

Last Answer : a) Internet Control Message Protocol

Description : The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer

Last Answer : a) network layer

Description : The network layer consists of which hardware devices? A. Router B. Bridges C. Switches D. All of the above 

Last Answer : D. All of the above  

Description : Services provided by application layer? A. Web chat B. Error control C. Connection services D. Congestion control

Last Answer : A. Web chat 

Description : _____________ is a collection of wired Ethernet standard for the link layer. A. IEEE 802.3 B. IEEE 802.11 C. IEEE 802.16 D. IEEE 802.15.4

Last Answer : A. IEEE 802.3 

Description : Transport layer can identify the symptoms of overload nodes using _________ a. Flow control b. Traffic control c. Byte orientation d. Data integrity

Last Answer : b. Traffic control

Description : Properties of IoT devices. A. Sense B. Send and receive data C. Both A and B D. None of above

Last Answer : C. Both A and B  

Description : Which of the following term describes PDU encapsulated at Transport Layer? a. Frame b. Packet c. Data d. Segment

Last Answer : d. Segment

Description : Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender? (A) Broadcasting (B) Unicasting (C) Packet Switching (D) Circuit Switching

Last Answer : (D) Circuit Switching

Description : The collection of data is achieved with ________ changes. A. Intelligence B. Connectivity C. Dynamic Nature D. Enormous Scale

Last Answer : C. Dynamic Nature 

Description : The process of collecting, organizing and collecting large sets of data called as A. WSN B. Cloud Computing C. Big Data D. None of above

Last Answer : C. Big Data 

Description : ____ is a transformative computing paradigm that involves delivering applications and services over the internet. A. WSN B. Cloud Computing C. Big Data D. None of above

Last Answer : B. Cloud Computing 

Description : XMPP creates _________ identity. A. Device B. Email C. Message D. Data

Last Answer : A. Device 

Description : MQTT is better than HTTP for sending and receiving data. A. True B. False

Last Answer : A. True 

Description : IEEE 802.11 standards provide data rates ______________ A. 10 Gbit/s. B. 1 Gbit/s C. 1 Mb/s to up to 6.75 Gb/s D. 250 Kb/s

Last Answer : C. 1 Mb/s to up to 6.75 Gb/s 

Description : The sensed data communicated ___________________. A. Cloud-based servers/storage. B. I/O interfaces. C. Internet connectivity. D. None of the above

Last Answer : A. Cloud-based servers/storage. 

Description : Interconnection of Internet and computing devices embedded in everyday objects, enabling them to send and receive data is called_____________ A. Internet of Things B. Network Interconnection C. Object Determination D. None of these 

Last Answer : A. Internet of Things 

Description : Harvard architecture allows: A. Separate program and data memory B. Pipe-ling C. Complex architecture D. All of the mentioned

Last Answer : D. All of the mentioned 

Description : Which architecture provides separate buses for program and data memory? A. Harvard architecture B. Von Neumann architecture C. None of the mentioned D. All of the mentioned

Last Answer : A. Harvard architecture 

Description : A digital multi meter is an example of an embedded system for A. Data communication B. Monitoring C. Control D. All of these E. None of these

Last Answer : B. Monitoring 

Description : What are the essential tight constraint/s related to the design metrics of an embedded system? A. Ability to fit on a single chip B. Low power consumption C. Fast data processing for real-time operations D .All of the above

Last Answer : D .All of the above