VUsolutions Transferred to AchiKhasi.com
From December 2011, this blog www.VUsolutions.blogspot.com is transferred to http://achikhasi.com/vu/ . So, you may visit http://achikhasi.com/vu/ for latest study related help.
Monday, July 12, 2010
Posted In
eng
Edit This
'Dot com or Doubt com?' Is the information given on different websites credible or incredible?
Solution:-
Dot com: All the information written by professionals on different websites is authenticated and credible. And that information can be about their products, companies, industries, institutes or can also be about some one's personality. The websites containing the information of their product or institutes mostly create their own official websites, which are credible.
Doubt com: The information given on forums, or any other website where, the members (not only managers) are allowed to write or edit the web page, such websites are not credible. There is doubt on them rather those information given on such websites is authenticated or not, the reason is those articles are not written by professionals, but those information can be included in ideas part.
Please do make changes in these assignment otherwise every one who copy this assignment as it is will awarded zero marks
Monday, July 12, 2010
Posted In
CS and IT
Edit This
Question # 1 of 10 ( Start time: 04:33:55 PM )
________ encapsulates IP datagram as data area in hardware frame.
Select correct option:
Network Interface Layer
Datalink Layer
Network Layer
None of the given
CS610-Computer network
Question # 2 of 10 ( Start time: 04:35:26 PM ) Total Marks: 1
________ field is used to identify a specific path through the network
Select correct option:
FLOW LABEL
TRAFFIC CLASS
Both a and b
none of the given
Question # 3 of 10 ( Start time: 04:36:51 PM ) Total Marks: 1
IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120
none of the given
Question # 4 of 10 ( Start time: 04:38:19 PM ) Total Marks: 1
Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.
Answer(48bit)
Select correct option:
Question # 5 of 10 ( Start time: 04:39:45 PM ) Total Marks: 1
For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.
Select correct option:
Efficiency
Security
Accuracy
Anomalies
Question # 6 of 10 ( Start time: 04:41:15 PM ) Total Marks: 1
_______ is a technique used to Limit datagram size to small MTU of any network
Select correct option:
Segmentation
Fragmentation
Encapsulation
none of the given
Question # 7 of 10 ( Start time: 04:42:37 PM ) Total Marks: 1
Class A mask is 255.0.0.0 which is used for ______
Select correct option:
Unicasting
Multicasting
Subnetting
All of the given
Question # 8 of 10 ( Start time: 04:44:08 PM ) Total Marks: 1
When one computer sends an ARP message to another the message travels inside the hardware frame. Technically, placing a message inside a frame for transport is not called encapsulation.
Select correct option:
True
False
Question # 9 of 10 ( Start time: 04:45:12 PM ) Total Marks: 1
Which one of these is not a main feature of connectionless service:
Select correct option:
It includes extension of LAN abstraction.
It has universal addressing and the data is delivered in packets frames), each with a header.
It combines collection of physical networks into a single virtual network.
It has universal addressing and the data is delivered in packets frames), without a header.
Question # 10 of 10 ( Start time: 04:46:42 PM ) Total Marks: 1
Which protocol is used to test different tools.
Select correct option:
ICMP
IGMP
TCP/IP
none of the given
Question # 1 of 10 ( Start time: 04:49:54 PM ) Total Marks: 1
________ message is sent in response to incoming datagrams with problems.
Select correct option:
TCP/IP
IGMP
ICMP
none of the given
Question # 2 of 10 ( Start time: 04:50:45 PM ) Total Marks: 1
Which one is NOT the function of ping program
Select correct option:
Traceability
Reach ability
Both a and b
None of the given
Question # 3 of 10 ( Start time: 04:52:14 PM ) Total Marks: 1
IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120
none of the given
Question # 4 of 10 ( Start time: 04:52:32 PM ) Total Marks: 1
A datagram cannot be larger than ________ of a network over which it is sent.
Select correct option:
MTU
Size
IP header
None of the given
Question # 5 of 10 ( Start time: 04:52:55 PM ) Total Marks: 1
The Source can configure outgoing datagram’s to avoid _________
Select correct option:
Segmentation
Defragmentation
Fragmentation
None of the given
Question # 6 of 10 ( Start time: 04:54:24 PM ) Total Marks: 1
Which one of these is not a main feature of connectionless service:
Select correct option:
It includes extension of LAN abstraction.
It has universal addressing and the data is delivered in packets frames), each with a header.
It combines collection of physical networks into a single virtual network.
It has universal addressing and the data is delivered in packets frames), without a header.
Question # 7 of 10 ( Start time: 04:55:27 PM ) Total Marks: 1
Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the ____________ Transmission Unit.
Select correct option:
Least
Maximum
Fragment
Frame
Question # 8 of 10 ( Start time: 04:56:40 PM ) Total Marks: 1
_____ Protocol provides error reporting mechanism.
Select correct option:
IGMP
SNMP
ICMP
none of the given
Question # 9 of 10 ( Start time: 04:57:51 PM ) Total Marks: 1
_______ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6
Question # 10 of 10 ( Start time: 04:58:56 PM ) Total Marks: 1
MTU Stands for _______
Select correct option:
Mininum transmission unit
Maximum transmission unit
Multicast transmission unit
None of the given