Chapter 10: Data Communication and Internet Services (Set-6)

In a standard communication setup, the device that receives the data is called the

A Sender node
B Medium path
C Protocol rule
D Receiver node

In data communication, the “medium” refers to

A Message content
B Sender device
C Transmission path
D Receiver device

Which mode fits a keyboard sending input to a computer in one direction only

A Simplex mode
B Half-duplex mode
C Full-duplex mode
D Session mode

A telephone call is an example of

A Simplex mode
B Full-duplex mode
C One-way mode
D Broadcast mode

A walkie-talkie system is a classic example of

A Full-duplex mode
B Simplex mode
C Half-duplex mode
D Packet mode

The term “bandwidth” mainly means

A Maximum channel capacity
B File storage size
C Packet header size
D Number of routers

Network speed is usually expressed in

A Pages per minute
B Volts per meter
C Inches per second
D Bits per second

Noise in data communication refers to

A Higher bandwidth
B Faster routing
C Unwanted interference
D Data compression

Attenuation means

A Signal strength loss
B Signal encryption
C Address mapping
D Packet routing

Modulation is used to

A Store cookies
B Assign IP address
C Carry data on wave
D Create DNS records

The OSI model consists of

A Four layers
B Seven layers
C Three layers
D Two layers

The OSI layer responsible for routing is

A Physical layer
B Session layer
C Presentation layer
D Network layer

The OSI layer that uses frames and MAC addresses is

A Transport layer
B Application layer
C Data Link layer
D Session layer

Which OSI layer provides end-to-end delivery services like reliability and sequencing

A Transport layer
B Network layer
C Physical layer
D Data Link layer

The TCP/IP model is commonly described as

A Seven layers
B Two layers
C Four layers
D Ten layers

IP is mainly responsible for

A Email reading
B Logical addressing
C Web page styling
D File compression

TCP is best known for providing

A Name resolution
B IP assignment
C Wireless modulation
D Reliable delivery

UDP is best known for being

A Encrypted protocol
B Routing algorithm
C Connectionless transport
D File transfer tool

HTTP is primarily used for

A Web page transfer
B Email sending
C IP address leasing
D Domain name storage

HTTPS provides HTTP with

A DHCP service
B DNS caching
C TLS security
D FTP control

TLS is used to provide

A IP routing tables
B Encryption and integrity
C DHCP leasing
D MAC addressing

A URL is best described as

A Router hardware ID
B Email user name
C Web resource address
D DNS zone file

The HTTP method used to fetch a resource is usually

A GET method
B POST method
C DELETE method
D PUT method

The HTTP method commonly used to submit form data is

A GET method
B TRACE method
C HEAD method
D POST method

HTTP status code 404 means

A Success
B Redirected
C Not found
D Unauthorized

HTTP status code 200 means

A OK success
B Not found
C Server error
D Forbidden

A web cookie mainly stores

A IP routing rules
B Cable noise level
C Small browser data
D FTP port mapping

DNS stands for and mainly provides

A File transfer service
B Name to IP
C Email encryption
D Dynamic bandwidth

DHCP is mainly used for

A Web page hosting
B Email synchronization
C File upload service
D Automatic IP assignment

A DHCP lease refers to

A Temporary IP assignment
B Permanent domain mapping
C Fixed MAC address
D Encrypted tunnel key

The default gateway is typically the

A DNS server address
B Email server name
C Router IP address
D MAC address list

A subnet mask helps identify

A Network and host parts
B Email account settings
C Browser cookie data
D File upload size

FTP is mainly used for

A Web encryption
B Name resolution
C File transfer
D IP assignment

The default FTP control port is

A Port 80
B Port 443
C Port 25
D Port 21

Port 80 is commonly used by

A HTTP service
B HTTPS service
C FTP service
D DNS service

Port 443 is commonly used by

A HTTP service
B POP3 service
C HTTPS service
D SMTP service

SMTP is used for

A Receiving email
B Sending email
C Web browsing
D IP leasing

POP3 is used mainly to

A Send emails
B Encrypt traffic
C Assign IPs
D Download emails

IMAP is used mainly to

A Assign gateway
B Transfer files
C Sync mailbox
D Resolve names

Ping is used to

A Test reachability
B Send email
C Upload file
D Assign IP

Traceroute is used to

A Create cookies
B Show path hops
C Encrypt data
D Assign DNS

A proxy server can

A Create MAC address
B Change subnet mask
C Forward and filter
D Increase attenuation

A VPN mainly creates

A Encrypted tunnel
B DNS record list
C DHCP address pool
D FTP user account

NAT allows multiple devices to

A Increase signal strength
B Remove TCP headers
C Share one public IP
D Disable routing

A MAC address is

A Website domain name
B Internet speed unit
C DNS cache entry
D Hardware interface ID

An ISP provides

A DHCP encryption
B Internet access
C TCP sequencing
D DNS spoofing

Web hosting provides

A Server space online
B Dynamic IP only
C MAC address tools
D Noise reduction devices

VoIP refers to

A Video over IP only
B File transfer mode
C Voice over internet
D DNS security method

Data packets are used because they

A Remove all noise
B Replace protocols
C Stop attenuation
D Improve efficient transfer

Encapsulation means

A Deleting data fields
B Wrapping data with headers
C Blocking IP packets
D Reducing bandwidth

Leave a Reply

Your email address will not be published. Required fields are marked *