In Internet, …………. is responsible for handling the address of destination computer. -Technology

1 Answer

Answer :

Internet protocol

Related questions

Description : __________ app calculate traffic and instruct in order to find the quickest route to user's destination. :- a) Google Music b) Google Maps c) Both a and b D) None of these -Technology

Last Answer : b) Google Maps

Description : In 1-address format how many address is used both as source as well as destination: a. b. 9 a 1 2 3 4

Last Answer : 1

Description : If an Ethernet destination address is08:07:06:05:44:33, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove

Last Answer : unicast

Description : f an Ethernet destination address is07:01:02:03:04:05, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove

Last Answer : multicast

Description : The _______ address in theheader ofa packet in adatagram network normally remains thesame during the entire journeyof the packet. A) source B) destination C) local D) none of the above

Last Answer : destination

Description : In IPv6, the _______ field inthe baseheader and thesender IP address combineto indicate aunique path identifier for aspecific flow of data. A) flow label B) nextheader C) hoplimit D) destination IP address

Last Answer : flow label

Description : In _______forwarding, the full IP address of a destination isgiven in the routing table. A) next-hop B) network-specific C) host-specific D) default

Last Answer : host-specific

Description : In the TCP/IP protocol suite, which one of the following is NOT part of the IP header? a. Fragment Offset b. Source IP address c. Destination IP address d. Destination port number

Last Answer : d. Destination port number

Description : In virtual circuit network each packet contains ___________ a. full source and destination address b. a short VC number c. only source address d. only destination address

Last Answer : b. a short VC number

Description : Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address ? a. Hub b. Modem c. Switch d. Gateway

Last Answer : c. Switch

Description : The program used to determine the round trip delay between a workstation and a destination address is a. Tracert b. Traceroute c. Ping d. Pop

Last Answer : b. Traceroute

Description : Each IP address can identify the ………... or ………... of IP packets. A. source, destination B. length, size C. source, length D. Size , destination

Last Answer : A. source, destination

Description : In virtual circuit network each packet contains ___________ A. full source and destination address B. a short VC number C. only source address D. only destination address

Last Answer : B. a short VC number

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1) Application layer Firewall 2) Packet Filtering Firewall 3) Router enhanced firewall 4) IP enabled firewall

Last Answer : 2) Packet Filtering Firewall

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 Application layer Firewall 2 Packet Filtering Firewall 3 Router enhanced firewall 4 IP enabled firewall

Last Answer : 2 Packet Filtering Firewall

Description : When using access lists, what does a Cisco router check first? * To see if the packet is routable or bridgeable * The destination address * The source address * The packet contents

Last Answer : Correct answer: A The first thing checked is to see if the packet is routable or bridgeable. If it is not, the packet will be dropped.

Description : Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply? * ICMP * UDP * TCP * TFTP

Last Answer : Correct answer: A ICMP (Internet Control Message Protocol) is a network layer internet protocol described in RFC # 792. ICMP reports IP packet information such as destination Unreachable, Time ... Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply.

Description : Assume a two address format specified as source, destination. Examine the following sequence of instruction and explain the addressing modes used and the operation done in every instruction?

Last Answer : 1. Move (R5) +, R0 2. Add (R5) +, R0. 3. Move (R0), (R5) 4. Move 16(R5), R3 5. Add #40, R5

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : The ______ layer is responsible for the movementof a signal from its optical source to its optical destination. A) section B) line C) path D) photonic

Last Answer : line

Description : ______ layer is responsible for sending of IP datagrams from the source network to the destination network. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : The correct answer is: C. Network layer The network layer is responsible for routing and forwarding IP datagrams from the source network to the destination network. It provides logical addressing ... at the network layer include IP (Internet Protocol) and ICMP (Internet Control Message Protocol).

Description : IP address is given to every computer for its unique identification. -Technology

Last Answer : True An IP address serves two principal functions:1. Host or network interface identification2. Location addressing

Description : FTP is responsible for downloading …………. from computer network. -Technology

Last Answer : FTP is responsible for downloading files from the computer network.

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : When hovering over a link, the link destination does not show up in the status bar.

Last Answer : answer:For what it's worth -- I'm also using Firefox 2.0.0.4 and the link destination shows up fine on my browser's status bar when I hover over a link. I'm on a Win XP machine. I wonder if hiding then unhiding your status bar will help "jump start" it. Other than that, I'm afraid I'm at a loss.

Description : ………………….. is responsible for converting the higher level protocol addresses (IP addresses) to physical network addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)

Description : ........ is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : D) Internet Control Message Protocol (ICMP)

Description : ........... is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)

Description : An IP address is a string of ……….. numbers separated by periods. -Technology

Last Answer : (b) An IP address consists of 4 numbers separated by periods.

Description : The address of location of the document on WWW is called ……….. . -Technology

Last Answer : The address of location of the document on WWW is called URL.

Description : Domain name .mil describes military address. -Technology

Last Answer : True It is according to domain names.

Description : The refers to the database that stores the information related to the name and address of the recipients. (a) Main document -Technology

Last Answer : (c) Data source is used to store the recipient’s information related to name and address while using mail merge.

Description : Soham has clicked on the cell residing at the intersection of first row and ninth column. What will be the address of the selected cell? -Technology

Last Answer : First row and ninth column address will be II.

Description : First row and ninth column address will be II. -Technology

Last Answer : There are two methods of adding a new worksheet iasm Excel workbook; Insert worksheet tab at the bor >m and Insert button on cells group under Home tab.

Description : Cell address $5 in a formula means (a) it is a mixed reference -Technology

Last Answer : (b) $ sign in a formula need to add before row number and column letter for absolute referencing.

Description : While entering a formula, cell address B$5 represents (a) Absolute Referencing -Technology

Last Answer : (b) It represents mixed reference because we are using $ sign before 5 only. Hence, as we will drag this only B will change but 5 will remain the same.

Description : Address of the cell at 10th column and 30th row is ……………… -Technology

Last Answer : Address of the cell at the 10th column and 30th row is J30.

Description : In …………….. referencing, the relative address of the cell gets adjust with respect to the current cell. -Technology

Last Answer : In relative referencing, the relative address of the cell gets adjust with respect to the current cell.

Description : Write one example each of URL and IP address. -Technology

Last Answer : Example of URL → http: // www. microsoft. com Example of IP address → 192.168.0.0

Description : It is responsible for all numerical and logical calculations. (a) CPU (b) CU (c) MU (d) ALU -Technology

Last Answer : (d) ALU is a digital circuit in which numerical and logical operations are defined.

Description : The person who responsible for researching, planning and recommending software and systems to meet the requirements of the user/organisation is called -Technology

Last Answer : (b) A system analyst is responsible for researching, planning and recommending software and systems choices to meet an organisation’s business requirements.

Description : When internet data leaves your campus, it normallygoes toa(n) ______ before moving towardits destination. A) Internet backbone B) Networkaccesspoint C) Base station D) Communication system

Last Answer : Networkaccesspoint

Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.

Last Answer : c. Prevent packets from looping indefinitely

Description : computer is used to type documents, send E_mail and browse the Internet. It is very useful to us. (i) What are the basic parts of a computer? -Technology

Last Answer : (i) Hardware, software, data and information.(ii) Accuracy, speed, diligence and reliability.

Description : Downloading of files means transferring files from host computer to the Internet. -Technology

Last Answer : False Downloading of files means transferring of files from an Internet to your computer.

Description : Ishan, a trainee in a multinational bank has just got his first official computer with internet facility in his office. -Technology

Last Answer : Malware is a computer software which is specifically designed with malicious intention generally to disrupt, damage, or gain authorized access to a computer system. It can be of various ... of Antivirus software and regular PC scanDo not click on unknown or suspicious linksAvoid pirated software

Description : Post harvest Technology optimum in (a) Losses in handling (c) Cost reduction (b) Losses in packaging (d) All

Last Answer : All

Description : A digital document issued to a Website by a certification authority on the Internet is called ______ -Technology

Last Answer : A digital document issued to a Website by a certification authority on the Internet is called Digital Certificate Explanation : A digital certificate is an electronic file that is issued by a certification authority to Websites.