logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Networking See What Others Are Saying!
  • Question
  • Which of the following technique is used for fragment?


  • Options
  • A. a technique used in best-effort delivery systems to avoid endlessly looping packets
  • B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
  • C. one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
  • D. All of the above
  • E. None of the above

  • Correct Answer
  • one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size 


  • More questions

    • 1. The application layer of a network

    • Options
    • A. establishes, maintains, and terminates virtual circuits
    • B. defines the user's port into the network
    • C. consists of software being run on the computer connected to the network
    • D. All of the above
    • E. None of the above
    • Discuss
    • 2. One of the three most common types of payment systems is the

    • Options
    • A. pinion fund transaction system
    • B. travel expense reimbursement system
    • C. accounts payable system
    • D. All of the above
    • E. None of the above
    • Discuss
    • 3. The combination of the top-down and the bottom-up approach may be referred to as an

    • Options
    • A. integrative approach
    • B. interpretive approach
    • C. interactive approach
    • D. both b and c
    • E. None of the above
    • Discuss
    • 4. In SQL, the CREATE VIEW command is used

    • Options
    • A. to recompile view
    • B. to define a view of one or more tables or views
    • C. to recompile a table
    • D. to create a trigger
    • E. None of the above
    • Discuss
    • 5. A computer that handles resource sharing and network management in a local area network. Select the best fit for answer:

    • Options
    • A. Network Server
    • B. Virtual Private Network
    • C. Network operating system
    • D. OSI
    • Discuss
    • 6. An-owner-member set in the CODASYL specifications may have

    • Options
    • A. only one owner but many owner occurrences
    • B. only one member but many member occurrence
    • C. more than one member but only one occurrence per member
    • D. All of the above
    • E. None of the above
    • Discuss
    • 7. Operating system functions may include

    • Options
    • A. input/output control
    • B. virtual storage
    • C. multiprogramming
    • D. All of the above
    • E. None of the above
    • Discuss
    • 8. Sophisticated report generators can

    • Options
    • A. print row-oriented reports
    • B. perform arithmetic operations
    • C. selectively retrieve and print portions of a list
    • D. All of the above
    • E. None of the above
    • Discuss
    • 9. What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?

    • Options
    • A. Handshaking
    • B. Modem options
    • C. Protocol
    • D. Duplexing
    • E. None of the above
    • Discuss
    • 10. To which phase of SDLC, is file conversion related?

    • Options
    • A. System Implementation
    • B. System analysis
    • C. System development
    • D. System design
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment