Chapter 10: Data Communication and Internet Services (Set-7)

In a communication system, the “sender” is the device that

A Receives the data
B Generates the data
C Stores the data
D Blocks the data

In data communication, the “receiver” is the device that

A Creates the message
B Encrypts the medium
C Routes the protocol
D Accepts the message

A “protocol” in networking is best described as

A Cable thickness value
B Device brand name
C Rules for exchange
D Data storage method

Which data flow mode supports only one-way communication from source to destination

A Simplex communication
B Half-duplex communication
C Full-duplex communication
D Multi-duplex communication

Which mode allows both directions, but one device transmits at a time

A Simplex mode
B Full-duplex mode
C Half-duplex mode
D Broadcast mode

Full-duplex communication means

A Both send simultaneously
B Only receive data
C Only send data
D One-way communication

Bandwidth refers to the

A Total data stored
B Maximum data capacity
C Number of devices
D Password strength level

Transmission speed commonly means

A Pages per minute
B Volts per second
C Bits per second
D Inches per minute

Noise is best defined as

A Unwanted signal disturbance
B Higher network speed
C Strong encryption method
D Router address list

Attenuation in a cable means

A Signal becomes encrypted
B DNS becomes faster
C IP becomes static
D Signal becomes weaker

Modulation is mainly used to

A Assign IP address
B Create DNS zones
C Carry data on carrier
D Transfer email files

The OSI model has

A Seven layers
B Four layers
C Five layers
D Two layers

The OSI layer responsible for physical transmission of bits is

A Transport layer
B Session layer
C Physical layer
D Application layer

In OSI, MAC addressing is mainly handled at

A Network layer
B Data Link layer
C Presentation layer
D Session layer

The OSI layer that performs routing between networks is

A Network layer
B Physical layer
C Data Link layer
D Presentation layer

TCP/IP model is commonly shown as

A Seven layers
B Three layers
C One layer
D Four layers

Encapsulation means

A Removing all headers
B Blocking all traffic
C Adding protocol headers
D Increasing noise level

IP is mainly used for

A Addressing and routing
B Encrypting web pages
C Sending email content
D Assigning IP leases

TCP is mainly used when applications need

A Unreliable fast delivery
B Reliable delivery
C Domain name mapping
D Dynamic address leasing

UDP is commonly used for

A Guaranteed delivery
B DNS zone transfers
C Low-latency traffic
D Server authentication

HTTP is used primarily for

A Web communication
B Email sending
C IP leasing
D File encryption

HTTPS differs from HTTP by adding

A DHCP addressing
B DNS caching
C TLS encryption
D UDP delivery

A URL contains information like

A RAM and CPU
B Protocol and domain
C MAC and TTL
D Cache and lease

HTTP GET is mainly used to

A Assign an IP
B Upload mail files
C Create DNS records
D Retrieve a resource

HTTP POST is mainly used to

A Submit data
B Resolve names
C Trace routing path
D Change subnet mask

HTTP status 200 means

A Page missing
B Forbidden access
C Request successful
D Server error

HTTP status 404 means

A Request successful
B Resource not found
C Temporary redirect
D Authentication required

Cookies are mainly used to

A Store small state
B Increase bandwidth
C Reduce attenuation
D Replace DNS servers

DNS is mainly used to

A Transfer files
B Send emails
C Map names to IPs
D Encrypt web pages

DHCP is mainly used to

A Assign IP settings
B Encrypt data traffic
C Create web pages
D Transfer email files

A DHCP lease is

A Permanent IP record
B DNS alias mapping
C Secure web certificate
D Time-limited assignment

Default gateway is used when the destination is

A Inside same subnet
B Only DNS server
C Outside local network
D Only FTP server

A subnet mask helps determine

A Local vs remote
B Browser cookie size
C Email server port
D VPN tunnel key

FTP is mainly used for

A Web browsing
B File transfer
C IP assignment
D Name resolution

FTP control connection uses

A Port 21
B Port 25
C Port 80
D Port 443

SMTP is used to

A Receive email
B Browse websites
C Send email
D Assign IPs

POP3 is mainly used to

A Download email
B Send email
C Encrypt web traffic
D Assign DNS records

IMAP is mainly used to

A Upload web pages
B Assign IP pools
C Trace network path
D Sync email

Ping command is used to

A Create domains
B Transfer files
C Check connectivity
D Encrypt traffic

Traceroute command is used to

A Assign IP lease
B Show route hops
C Store cookies
D Send mail

A proxy server often helps with

A Filtering and caching
B Modulation of signals
C Assigning MAC IDs
D Increasing attenuation

A VPN mainly provides

A Faster DNS resolution
B Secure encrypted tunnel
C Automatic IP leasing
D TCP sequencing only

NAT is commonly used to

A Remove all headers
B Stop packet routing
C Share public IP
D Create DNS zones

A MAC address identifies

A Network interface card
B Website domain name
C Internet speed unit
D DNS cache memory

An ISP mainly provides

A DNS record writing
B FTP password storage
C TCP congestion control
D Internet connectivity

Web hosting is best described as

A Encrypting web traffic
B Assigning IP leases
C Storing site on server
D Routing DNS packets

VoIP means

A Voice over IP
B Video over IP
C Files over IP
D DNS over IP

Data packets are used so networks can

A Remove all noise
B Route efficiently
C Avoid protocols
D Stop attenuation

A well-known port is typically in range

A 1024 to 2000
B 2000 to 4000
C 0 to 1023
D 4000 to 6000

A protocol suite refers to

A Group of protocols
B Type of modem
C Cable connector type
D Single server address

Leave a Reply

Your email address will not be published. Required fields are marked *