Description : Data in network layer is transferred in the form of ____________ A. Layers B. Packets C. Bytes D. Bits
Last Answer : B. Packets
Description : The network layer is considered as the _______? A. Backbone B. packets C. Bytes D. bits
Last Answer : A. Backbone
Description : ___ layer perform the host addressing and packet routing. A. Application layer B. Transport layer C. Network layer D. Link layer
Last Answer : C. Network layer
Description : Network layer protocol exits in_____? A. Host B. Switches C. Packets D. Bridges
Last Answer : A. Host
Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes
Last Answer : A. Checksum
Description : ______________ is useful for time-sensitive application that have very small data units to exchange and do not want the overhead of connection setup. A. TCP B. UDP C. Transport layer D. None of the above.
Last Answer : B. UDP
Description : The ___ protocols define how the applications interface with the lower layer protocol to send the data over the network. A. Application layer B. Transport layer C. Network layer D. Link layer
Last Answer : A. Application layer
Description : _____________ layer protocols determine how the data is physically sent over the network’s physical layer or medium. A. Application layer B. Transport layer C. Network layer D. Link layer
Last Answer : D. Link layer
Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly
Last Answer : a. all UDP packets are treated independently by transport layer
Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____
Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly
Last Answer : A. all UDP packets are treated independently by transport layer
Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly
Last Answer : all UDP packets are treated independently by transport layer
Description : Which layer is called a port layer in OSI model? a. Session b. Application c. Presentation d. Transport
Last Answer : a. Session
Description : Which transport layer protocols is used by DHCP? a. RSVP b. TCP c. DCCP d. UDP
Last Answer : d. UDP
Description : Security based connection is provided by which layer? A. Application layer B. Transport layer C. Session layer D. Network layer
Last Answer : D. Network layer
Description : ____________ protocols provide end to end message transfer capability independent of the underlying network. A. Network layer B. Transport layer C. Application layer D. Link layer
Last Answer : B. Transport layer
Description : ______ layer is responsible for sending of IP datagrams from the source network to the destination network. A. Application layer B. Transport layer C. Network layer D. Link layer
Last Answer : The correct answer is: C. Network layer The network layer is responsible for routing and forwarding IP datagrams from the source network to the destination network. It provides logical addressing ... at the network layer include IP (Internet Protocol) and ICMP (Internet Control Message Protocol).
Description : In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................ (1) 2 bytes (2) 1 byte (3) 4 bytes (4) 5 bytes
Last Answer : (4) 5 bytes
Description : Which is the part of Data Link Layer: a. LLC b. MAC c. Both a and b d. None of these
Last Answer : c. Both a and b
Description : ____ is a data-centric middleware standard for device-to-device and machine-to-machine communication. A. Data Distribution Serviced (DDS) B. Advance Message Queuing Protocol (AMQP) C. Extensible Messaging and Presence Protocol (XMPP) D. Message Queue Telemetry Transport (MQTT)
Last Answer : A. Data Distribution Serviced (DDS)
Description : What is size of the IPv6 Address? A. 32 bits B. 64 bits C. 128 bits D. 256 bits
Last Answer : C. 128 bits
Description : Which one out of these is not a data link layer technology: a. Bluetooth b. UART c. WIFI d. HTTP
Last Answer : d. HTTP
Description : Which one out of these is not a data link layer technology? A. Bluetooth B. UART C. Wi-Fi D. HTTP
Last Answer : D. HTTP
Description : The network layer is concerned with __________ of data. a. bits b. frames c. packets d. bytes
Last Answer : c. packets
Description : The network layer encapsulates the data into _______of data. A. bits B. frames C. packets D. bytes
Last Answer : C. packets
Description : The network layer is concerned with __________ of data. a) bits b) frames c) packets d) bytes
Last Answer : c) packets
Description : The layer that transmits data in the form of bit streams using electrical and mechanicalsystems is in the OSI model. a. Physical layer b. Transport Layer c. Network Layer d. Data Link Layer
Last Answer : a. Physical layer
Description : TCP and UDP are called? A. Application protocols B. Session protocols C. Transport protocols D. Network protocols
Last Answer : C. Transport protocols
Description : MQTT stands for _____________ A. MQ Telemetry Things B. MQ Transport Telemetry C. MQ Transport Things D. MQ Telemetry Transport
Last Answer : D. MQ Telemetry Transport
Description : The ________is a network layer Internet protocol that provides message packets to report errors and other information regarding IP packet processing back to the source: a) Internet Control Message ... Standard Flexible Message Protocol c) Internet Dynamic Chartered Message Protocol d) None of These
Last Answer : a) Internet Control Message Protocol
Description : The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer
Last Answer : a) network layer
Description : The network layer consists of which hardware devices? A. Router B. Bridges C. Switches D. All of the above
Last Answer : D. All of the above
Description : Services provided by application layer? A. Web chat B. Error control C. Connection services D. Congestion control
Last Answer : A. Web chat
Description : _____________ is a collection of wired Ethernet standard for the link layer. A. IEEE 802.3 B. IEEE 802.11 C. IEEE 802.16 D. IEEE 802.15.4
Last Answer : A. IEEE 802.3
Description : Transport layer can identify the symptoms of overload nodes using _________ a. Flow control b. Traffic control c. Byte orientation d. Data integrity
Last Answer : b. Traffic control
Description : Properties of IoT devices. A. Sense B. Send and receive data C. Both A and B D. None of above
Last Answer : C. Both A and B
Description : Which of the following term describes PDU encapsulated at Transport Layer? a. Frame b. Packet c. Data d. Segment
Last Answer : d. Segment
Description : Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender? (A) Broadcasting (B) Unicasting (C) Packet Switching (D) Circuit Switching
Last Answer : (D) Circuit Switching
Description : The collection of data is achieved with ________ changes. A. Intelligence B. Connectivity C. Dynamic Nature D. Enormous Scale
Last Answer : C. Dynamic Nature
Description : The process of collecting, organizing and collecting large sets of data called as A. WSN B. Cloud Computing C. Big Data D. None of above
Last Answer : C. Big Data
Description : ____ is a transformative computing paradigm that involves delivering applications and services over the internet. A. WSN B. Cloud Computing C. Big Data D. None of above
Last Answer : B. Cloud Computing
Description : XMPP creates _________ identity. A. Device B. Email C. Message D. Data
Last Answer : A. Device
Description : MQTT is better than HTTP for sending and receiving data. A. True B. False
Last Answer : A. True
Description : IEEE 802.11 standards provide data rates ______________ A. 10 Gbit/s. B. 1 Gbit/s C. 1 Mb/s to up to 6.75 Gb/s D. 250 Kb/s
Last Answer : C. 1 Mb/s to up to 6.75 Gb/s
Description : The sensed data communicated ___________________. A. Cloud-based servers/storage. B. I/O interfaces. C. Internet connectivity. D. None of the above
Last Answer : A. Cloud-based servers/storage.
Description : Interconnection of Internet and computing devices embedded in everyday objects, enabling them to send and receive data is called_____________ A. Internet of Things B. Network Interconnection C. Object Determination D. None of these
Last Answer : A. Internet of Things
Description : Harvard architecture allows: A. Separate program and data memory B. Pipe-ling C. Complex architecture D. All of the mentioned
Last Answer : D. All of the mentioned
Description : Which architecture provides separate buses for program and data memory? A. Harvard architecture B. Von Neumann architecture C. None of the mentioned D. All of the mentioned
Last Answer : A. Harvard architecture
Description : A digital multi meter is an example of an embedded system for A. Data communication B. Monitoring C. Control D. All of these E. None of these
Last Answer : B. Monitoring
Description : What are the essential tight constraint/s related to the design metrics of an embedded system? A. Ability to fit on a single chip B. Low power consumption C. Fast data processing for real-time operations D .All of the above
Last Answer : D .All of the above