OS & CN QuizContentsQuiz 01 OS2Quiz 02 OS5Quiz 03 OS7Quiz 04
OS9Quiz 05 OS12Quiz 01 CN15Quiz 02 CN17Quiz 03 CN19Quiz 04 CN22
Quiz 01 OSWhich of these statements about address space are not
true?Select one:a. Address space is the abstraction that is
referenced to the set of addresses a processb. None of othersc.
Address space is decoupled from the physical
memory_________________________________________________________________________Which
of these statements about files are true?Select one or more:a. File
is a collection of related informationb. File is an abstraction of
data stored on HDDc. File provides a place to keep files or a way
of grouping file togetherd. File includes block special tiles and
character special
files_________________________________________________________________________Which
of these statements about address space are true?Select one or
more:a. Address space is the abstraction that is referenced to the
set of addresses a processb. Address space is a space contain the
address of variablesc. Address space is decoupled from the physical
memory_________________________________________________________________________Server
OS serves multiple users at once over a network and allow the users
to share --------- and ------------ resourcesSelect one:a.
Hardware, firmwareb. Hardware, softwarec. Software, firmwared.
Firmware,
hardware_________________________________________________________________________Symbian,
Palm, Windows Mobile, Windows CE are ---------Select one:a.
Handheld OSb. Multiprocessor OSc. PC OSd. Mainframe
OS_________________________________________________________________________Which
of these statements about files are not true?Select one:a. File is
an abstraction of data stored on HDDb. File provides a place to
keep files or a way of grouping files togetherc. File contains
correlated information: path name, root directory, file descriptor,
Mourited file system, special file, a piped. File includes block
special files and character special
files_________________________________________________________________________Embedded
OS is located in -----------Select one:a. DISKb. RAMc. BIOSd.
ROM_________________________________________________________________________------------systems
are used in time-critical environments where reliability is key and
data must be processed within a strict time limitSelect one:a.
Embeddedb. Real-timec. Hybridd.
Interactive_________________________________________________________________________MainframeOS
offers 3 kinds of services -----------Select one:a. Batch,
time-sharing, schedulerb. Real-time, batch, time-sharingc.
Real-time, time sharing, protectiond. Transaction processing,
batch,
time-sharing_________________________________________________________________________------------------
process routine job without interactive user presentSelect one:a.
Transaction processing systemsb. Time sharing systemsc. Batch
systemsd. Real-time
systems_________________________________________________________________________----------------
runs on systems that have many CPUs (multi-processors, multi-cores,
multi-chips)Select one:a. Multiprocessor OSb. Embedded OSc. PC OSd.
Server
OS_________________________________________________________________________Which
of these statements about processes are not true?Select one or
more:a. In modern OS, only single process exists at timeb. Process
table stores all the information of processesc. Process is a
program on diskd. Associated with each process is its file and
directorye. Associated with each process is set of resources such
as executable code, data, stack, CPU registers value, and other
information needing to run a
program_________________________________________________________________________Which
of these statements about processes are true?Select one or more:a.
A program in executionb. Process table stores all the information
of processesc. Associated with each process is set of resources
such as executable code, data, stack, CPU registers value, and
other information needing to run a programd. A program on diske.
Associated with each process is its file and
directory_________________________________________________________________________-------------
serves multiple users at once over a network and allow the users to
share hardware and software resourcesSelect one:a. Mainframe OSb.
PC OSc. Server OSd. Multiprocessor
OS_________________________________________________________________________Real-time
system has ----------- and -------------- real-time system
typesSelect one or more:a. Paperb. Softc. Firmd.
Hard_________________________________________________________________________------------
offers 3 kinds of services: batch, transaction processing,
timesharingSelect one:a. PC OSb. Mainframe OSc. Server OSd.
Multiprocessor
OS_________________________________________________________________________Allow
multiple remote users to run jobs on the computer at onceSelect
one:a. Real-time systemsb. Batch systemsc. Time sharing systemsd.
Transaction processing
systems_________________________________________________________________________Handling
large numbers of small requestsSelect one:a. Real-time systemsb.
Time sharing systemsc. Batch systemsd. Transaction processing
systems_________________________________________________________________________----------
supports with dozens of programs started up at the boot timeSelect
one:a. Multi-schedulingb. Multi-processorc. Multi-cored.
Multi-programming_________________________________________________________________________Quiz
02 OSHow much time is reasonable for the quantum in Round-Robin
algorithm?Select one:a. 46 msecb. 16 msecc. 64 msecd. 128
msec_________________________________________________________________________Which
statement is correct?Select one:a. Process and thread are similarb.
A thread can create many processesc. A process can create many
threadsd. A process can only own a
thread_________________________________________________________________________In
which situation does race condition occur?Select one:a. Two threads
in a process update their stacksb. Two threads in a process modify
a global variablec. Two processes communicate using socketd. A
parent process creates a child
process_________________________________________________________________________In
a batch system, scheduling by SJF is provably better than FCFS if
-------------Select one:a. Process requests come simultaneously and
Turnaround time is longerb. Process requests come simultaneously
and Turnaround time is shorterc. Process requests come consequently
and Turnaround time is shorterd. Process requests come consequently
and Turnaround time is
longer_________________________________________________________________________If
a process finishes a time interval with CPU, its state switches
------------Select one:a. From blocked to readyb. From running to
blockedc. From running to readyd. From ready to
running_________________________________________________________________________Two
or more processes accessing to a shared memory is an example of
-----------Select one:a. Mutual exclusionb. Interprocess
communicationc. Race conditiond. Critical
region_________________________________________________________________________Which
system requires pre-emptive scheduling algorithm?Select one:a.
Interactive systemsb. Quantum systemsc. All of the othersd. Batch
systems_________________________________________________________________________What
happen if 2 processes have same priority in the Priority scheduling
algorithm?Select one:a. Serve the process that has shorter burst
time first, let the process that has longer burst time waitb. None
of the othersc. Use Priority-inheritance solution.d. Serve the
process that comes first, let the process that comes later
wait_________________________________________________________________________Which
event cannot cause process creation?Select one:a. A running process
creates a set of threadsb. A running process performs a process
creation system callc. An operating system initializes a serviced.
A user executes a
program_________________________________________________________________________Which
event causes process involuntary termination?Select one:a. Error
exitb. Fatal errorc. Fatal exitd. Kill
exit_________________________________________________________________________Which
statement is correct?Select one:a. Shortest process next is
advantageous for long jobsb. Round-robin with high quantum is
advantageous for long jobsc. Shortest job first is advantageous for
long jobsd. First come first serve is advantageous for short
jobs_________________________________________________________________________Which
of the following is the benefit of thread?Select one:a.
Synchronizationb. All of the othersc. Dependenced. Resource
sharing_________________________________________________________________________All
threads in a process shareSelect one:a. Address spaceb. Registerc.
Program counterd.
Stack_________________________________________________________________________Choose
the correct solution(s) for the process synchronization
problemsSelect one:a. Busy waitingb. Semaphorec. Sleep and Wakeupd.
All of the
others_________________________________________________________________________Quiz
03 OSMemory compaction is a mechanism to ----------Select one:a.
Increase virtual memory sizeb. Reduce memory fragmentationc. Load a
page into memory due to page faultd. Replace a page by another page
for a
process_________________________________________________________________________A
page table entry does not provide information about
------------Select one:a. What page frame number isb. What page
size isc. Whether a page is modified or notd. Whether a page is
present in memory or
not_________________________________________________________________________How
many linear address spaces does paging provide?Select one:a.
Maximum RAM spaceb. Unlimitedc. 1024d.
1_________________________________________________________________________What
happen if there is no memory abstraction?Select one:a. Only one
program can write to the memoryb. A program can prevent others to
access memoryc. Programs physical memory could be accessed by
othersd. Only one program can read the memory while others can
write_________________________________________________________________________What
is the problem of swapping memory?Select one:a. All of the othersb.
Difficult to know where to allocate a programc. Difficult to know
how to monitor a memory holed. Difficult to know how much memory
should be allocated for a
program_________________________________________________________________________In
a swapping system, memory consists of the following block sizes in
memory order: 12KB, 20 KB, 7KB, 9KB, 5KB, and 11KB. Which block is
taken for a request of 10KB using the best fit algorithm?Select
one:a. 20KBb. 12KBc. 9KBd.
11KB_________________________________________________________________________Global
page replacement policy --------------Select one:a. Uses the
first-in-first-out page for replacementb. Uses a page belonging to
the same process for replacementc. Uses the least recently used
page for replacementd. Uses a page belonging to another process for
replacement_________________________________________________________________________Which
statement is incorrect for a page?Select one:a. A page can be
relocated to a different chunk of physical address during
operationb. A page is mapped to a contiguous chunk of physical
addressc. A page is a contiguous chunk of virtual addressd. A page
can get various sizes in an operating
system_________________________________________________________________________The
replacement policy replaces the page that has not been referenced
for the longest timeSelect one:a. Least recently used (LRU)
policyb. Clock policyc. Optimal policyd. First in first out (FIFO)
policy_________________________________________________________________________Which
technique requires the programmer to be aware that it is being
used?Select one:a. Not Recently Usedb. Least Recently Usedc. Pure
Segmentationd.
Paging_________________________________________________________________________What
is the best fit to allocate free memory to programs?Select one:a.
Search entire list, find the hole close to the actual sizeb. Search
entire list, finds the hole has the largest sizec. None of the
othersd. Search entire list, finds the hole match with the actual
size_________________________________________________________________________Using
virtual memory allows -------------Select one:a. Fewer programs to
be executed at the same timeb. More programs to be executed at the
same timec. More complex programs to be executed at the same timed.
Smaller programs to be executed at the same
time_________________________________________________________________________The
worst fit algorithm allocates memory to a request by
-------------------Select one:a. Choosing the first available
memory block that is large enough from the location of the last
placementb. Choosing the largest available memory blockc. Choosing
the memory block that is closest in size to the requestd. Choosing
the first available memory block that is large enough from the
beginning of the
memory_________________________________________________________________________Quiz
04 OSThe 775 mode of a file in UNIX indicates
----------------Select one:a. This file has read and execute
permissions for all usersb. This file has read permissions for all
users, execute permissions for group owner, and write permission
for file ownerc. This file has read, write and execute permissions
for file owner onlyd. This file has read and execute permissions
for all users and write permission for file
owner_________________________________________________________________________Calls
to modify file content based on file descriptor such as read() or
write() on Unix are referred to as ---------------------Select
one:a. Function callsb. Procedure callsc. System callsd. User
calls_________________________________________________________________________A
--------------- is created when a user opens an account to access
the computer system.Select one:a. Directoryb. Volumec. MFDd.
Subdirectory_________________________________________________________________________Allocating
a single set of blocks with the first block and length to a file at
the time of creating is referred to as --------------Select one:a.
i-node allocationb. contiguous allocationc. link list allocationd.
chained
allocation_________________________________________________________________________Step
01. MBR locates the active partition, reads in its boot block and
executes itStep 02. The computer is booted, the BIOS reads in and
executes the MBRStep 03. The program in boot block loads the OS
contained in that partitionMechanism of booted computer isSelect
one:a. 2, 3, 1b. None of othersc. 1, 2, 3d. 3, 2,
1_________________________________________________________________________A
symbolic link in a file system on Unix is -----------------Select
one:a. A file copied to appear in more than one directoryb. A
directory to store special filesc. A name created to point to a
file naming another filed. A file created to provide a backup of
another
file_________________________________________________________________________The
purpose of an extension is to ------------Select one:a. Identify
the type of fileb. Identify the file sizec. Identify the file
ownerd. Identify the directory in which the file is
stored_________________________________________________________________________-------------
allocation allows files to use any storage space available on the
disk.Select one:a. Add-on storageb. Noncontiguous storagec.
Contiguous storaged. Fragmented
storage_________________________________________________________________________The
File Manager is in charge of the systems -------------
components.Select one:a. Electronicb. Physicalc. Datad.
Software_________________________________________________________________________File
descriptor of the standard error by default is an integer value
---------------Select one:a. 2b. 3c. 1d.
0_________________________________________________________________________Which
one is not file structure?Select one:a. Sequence of bytesb.
Sequence of recordsc. Tree structured. Star
structure_________________________________________________________________________When
using random access files, the program used to store the data
follows a set of instructions, called a ------------- algorithm,
that transforms each key into a number, the records logical
address.Select one:a. Lookupb. Groupingc. Translationd.
Hashing_________________________________________________________________________The
files type includes -------------Select one:a. Regular,
Directories, Character Specialb. Regular, Binary, Character
Special, CD-ROMc. Regular, Directories, Character Special, Block
Speciald. Regular, Directories, Character Special, Device
Driver_________________________________________________________________________Which
of these statements about the Linked List Allocation are
true?Select one or more:a. First word of each block is used as
pointer to the next one and the rest of the block is for datab. The
amount of data storage in a block is not a power of two because the
pointer takes up a few bytesc. Random access is extremely slowd.
Internal and External fragmentation are
generated_________________________________________________________________________The
1^(st) block in each partition is called ----------Select one:a.
Super blockb. MBRc. Boot blockd. Free
block_________________________________________________________________________The
requirements for long-term information storage are
--------------Select one or more:a. Multiple processes must be able
to access the information concurrentlyb. The information must be
survived the termination of process using itc. All of othersd. It
must be possible to store a very large amount of
address_________________________________________________________________________-----------
are special files with listings of filenames and their
attributes.Select one:a. Programsb. Databasesc. Directoriesd. Data
files_________________________________________________________________________The
file systems function are -------------Select one or more:a.
Mapping files onto address spaceb. Hiding the complexity of storage
hardware devicesc. None of othersd. Providing the users a uniform
logical view of the information stored on these
devices_________________________________________________________________________System
calls for managing directories exclude ----------Select one:a.
Opendirb. Linkc. Seedd.
Unlink_________________________________________________________________________A
UNIX or Linux system might identify a file as:
/usr/imfst/flynn/inventory.doc. What represents the root directory
is ------------.Select one:a. usrb. /c. flynnd.
imfst_________________________________________________________________________The
files structure includes -------------Select one:a. unstructured
sequence of bytes, binary sequence, treeb. unstructured sequence of
bytes, text, treec. unstructured sequence of bytes, random, treed.
unstructured sequence of bytes, record sequence,
tree_________________________________________________________________________As
long as users refer to files in the ------------- directory, they
can access their files without entering the complete name from the
highest level to the lowest.Select one:a. homeb. workingc.
defaultd.
root_________________________________________________________________________On
magnetic disks, files can be organized in one of three ways;
-------------Select onea. sequential, direct, or indexed
sequentialb. indexed direct, indexed indirect, or randomc.
sequential, random, or indirectd. sequential, indirect, or
direct_________________________________________________________________________----------
are having one directory containing all filesSelect one:a.
Mono-Level Directory Systemsb. Multi-Level Directory Systemsc.
Single-Level Directory Systemsd. Hierarchical Directory SystemsQuiz
05 OSThe controllers job to convert the --------- into a block of
bytes and perform any ---------- necessarySelect one:a. Error
correction / serial bit streamb. Serial byte stream / interruptc.
Interrupt / serial byte streamd. Serial bit stream / error
correction_________________________________________________________________________Without
DMA, the ----------- is responsible for the physical movement of
data between main memory and the device.Select one:a. CPUb. Memory
controllerc. Busd.
Disk_________________________________________________________________________I
/ O devices are ------------Select one:a. Video card, compact flash
card, Ethernet card, wireless cardb. SATA disk drive, mainboard,
SCSI disk, modemc. CD-ROM, USB, monitor, scannerd. Keyboard, mouse,
printer, RAM
memory_________________________________________________________________________Which
statement is incorrect for device driver?Select one:a. Device
driver normally operates as a part of the operating system kernelb.
Device driver is device control register and device data bufferc.
Device driver is generally written by the devices manufacturer and
delivered along with the deviced. Device driver is some
device-specific code for controlling a
device_________________________________________________________________________A
disk queue with requests for I/O blocks on cylinders in orders: 10,
22, 20, 2, 40, 6, 38. Assume that the disk head is initially at
cylinder 18 and the head move downward. How many cylinders does
Total head movement move when the elevator algorithms are
used?Select one:a. 62b. 54c. 144d.
60_________________________________________________________________________Of
the three components of access time in a movable-head Disk Arm
Scheduling Algorithms, ------------ is the longest.Select one:a.
Delay timeb. Search timec. Seek timed. Transfer
time_________________________________________________________________________-------------
control the transfer of information between the disk drives and the
rest of the computer system.Select one:a. System controllersb. Disk
drive controllersc. Disk drive interfacesd. System
interfaces_________________________________________________________________________I/O
software is typically organized in four layers as followingSelect
one:a. Program counter handlers, device drivers, device-independent
operating system software, user-level I/O softwareb. Interrupt
handlers, system-level I/O software, device-independent operating
system software, user-level I/O softwarec. Interrupt handlers,
device drivers, device-independent operating system software,
user-level I/O softwared. Interrupt handlers, device drivers,
device-independent operating system software, system-level I/O
software_________________________________________________________________________------------
devices are assigned to only one job at a time.Select one:a.
Staticb. Dedicatedc. Sharedd.
Virtual_________________________________________________________________________Which
one is not a property of a precise interrupt?Select one:a. No
instruction beyond the one pointed to by the PC has been executedb.
The execution state of the instruction pointed to by the PC is
knownc. All instructions before the one pointed to by the PC have
partially executedd. The PC (Program Counter) is saved in a known
place_________________________________________________________________________Which
DVD format provides the largest storage capacity?Select one:a.
Dual-layer, single-sidedb. Single-layer, single-sidedc.
Single-layer, double-sidedd. Dual-layer,
double-sided_________________________________________________________________________Mapping
all the control registers into the memory space allows
-------------Select one:a. The CPU to communicate with the control
register and the device data buffersb. Processes to communicate
with their threadsc. Processes to communicate with other
processesd. The CPU to communicate with the RAM memory and
processes_________________________________________________________________________Quiz
01 CNWhich of the following can not a host?Select one:a. PDAb.
Computerc. Routerd.
Smartphone_________________________________________________________________________Which
layer interprets the meaning of data?Select one:a. Presentationb.
Sessionc. Data linkd.
Transport_________________________________________________________________________Which
method is not about switching?Select one:a. Frequency Division
Multiplexingb. Packet Switchingc. Transmission Rated. Time Division
Multiplexing_________________________________________________________________________What
statement is incorrect about protocols?Select one:a. Protocols
define order of messages in networkb. All communication activity in
network governed by protocolsc. Protocols define format of messages
in networkd. Protocols define communication between a human to
another
human_________________________________________________________________________What
is the reason that UDP is best effort data delivery protocol?Select
one:a. UDP try to send packets as fast as it canb. UDP does not
setup the connection before sending messagesc. All of the othersd.
UDP sends packets without checking whether the packets arrives to
the receiver or
not_________________________________________________________________________Two
main elements related to network-core functions areSelect one:a.
Forwarding table and queueing algorithmb. Output link algorithm and
forwarding algorithmc. Routing algorithm and forwarding tabled.
Routing algorithm and queueing
algorithm_________________________________________________________________________Store
and forward technique that entire packet must arrive at router
before it can be transmitted on next link exists inSelect one:a.
Circuit switchingb. None of circuit switching and package
switchingc. Both of circuit switching and package switchingd.
Package
switching_________________________________________________________________________The
fourth layer in OSI network model is ----------Select one:a.
Transportb. Applicationc. Networkd.
Session_________________________________________________________________________In
the transmission delay calculation t = L/R, what is R?Select one:a.
Link bandwidth of the linkb. Time to process at routerc. Speed of
switchingd. Propagation speed in
medium_________________________________________________________________________The
data that the Network layer processes is called ---------Select
one:a. Segmentb. Framec. Messaged.
Datagram_________________________________________________________________________What
is maximum data rate for fiber cable?Select one:a. 100Gbpsb.
10Gbpsc. 100Mbpsd.
1Gbps_________________________________________________________________________Sources
of packet delay does not includeSelect one:a. Processing time at
nodeb. Waiting time on lossc. Propagation time on mediumd. Waiting
time in
buffer_________________________________________________________________________In
OSI model, as data packet moves from the lower to the upper layer
header are ---------Select one:a. Addedb. Modifiedc. Removedd.
Rearranged_________________________________________________________________________Network
protocols defineSelect one:a. Connection configuration and message
order between network entitiesb. Routing information and algorithm
in networksc. Message format and action taken on message
transmissiond. Communication link configuration and packet
forwarding_________________________________________________________________________Packet
loss and delay are usually caused bySelect one:a. Low packet
arrival rate and small output link capacityb. High packet arrival
rate and large output link capacityc. Low packet arrival rate and
large output link capacityd. High packet arrival rate and small
output link
capacity_________________________________________________________________________Quiz
02 CN------------ is a protocol to transfer file to / from remote
host using client / server model.Select one:a. FTPb. HTTPc. SSHd.
Telnet_________________________________________________________________________-------------
is a protocol to deliver / store email to / on receivers
server.Select one:a. SMTPb. IMAPc. HTTPd.
POP3_________________________________________________________________________What
is the characteristic of a network application?Select one:a.
Connect routers to end systems.b. Run on routers.c. Help routers
find end systems.d. Run on end
systems._________________________________________________________________________------------
is an HTTP method that allows users to upload input data to
server.Select one:a. DOWNLOAD methodb. POST methodc. SHOW methodd.
GET
method_________________________________________________________________________Which
of the following is hybrid of client-server and P2P?Select one:a.
Skypeb. EBayc. DNSd. BitTorrente.
Telnet_________________________________________________________________________A
DNS query resolution mechanism that repeatedly sends a query to
different servers is referred to as ------------ Select one:a.
Semantic query resolutionb. Iterated query resolutionc. Keyword
query resolutiond. Recursive query
resolution_________________________________________________________________________Which
statement is incorrect about peer-to-peer (P2P) networks?Select
one:a. Peers directly connect to all other peers in a P2P networkb.
Peers can join and leave a P2P network arbitrarilyc. File
distribution on a P2P network is faster than on a client-server
networkd. Peers can play roles of server and client in a P2P
network_________________________________________________________________________How
does the HTTP protocol implement caching?Select one:a. Using proxy
serverb. Using cookiec. Using hidden inputd. Using client cachee.
Using the If-modified-since
header_________________________________________________________________________What
can be used to identify the process?Select one:a. Both IP address
of the host running the process and the port associated with that
process.b. Process ID assigned by serverc. Name of the application
running on the hostd. Port associated with that
process_________________________________________________________________________What
is the protocol used to obtain email from / to an email
server?Select one:a. IMAPb. SNMPc. SMTPd.
IGMP_________________________________________________________________________The
---------------- that together implement the DNS distributed
database, store ------------------ for the hostname to IP address
mappings.Select one:a. Root servers ------------ IP addressb. Root
servers ------------ IP address and post numberc. Authoritative
servers ------------ Entriesd. Name servers --------- Resource
Recordse. Resource Records ------------- Name
servers_________________________________________________________________________Assume
the RTT 200ms, the transmission time of a Web object 10ms, how long
does it take to download that object from a Web server to a client
if using non-persistent HTTP?Select one:a. 210msb. 240msc. 420msd.
410mse.
220ms_________________________________________________________________________For
what is a Telnet client used?Select one:a. To see the endpoints of
your sessionsb. To see your IP address and configuration detailsc.
To see the route an IP packet takes across multiple routersd. To
issue commands to a remote
server_________________________________________________________________________The
client-server model significantly relies on --------------
infrastructure servers, the Peer-to-Peer model, instead, pairs of
interminably connected peers, communicates ------------ with each
otherSelect one:a. Usually-off ----------- directlyb. Always-off
----------- indirectlyc. Always-on ----------- directlyd.
Usually-on -----------
directly_________________________________________________________________________What
happen when you can connect to the FTP server by typing telnet
112.158.25.4.21 but you can not connect to the same FTP server by
typing telnet ftp.example.com 21?Select one:a. No DNS
configurationb. ADSL connection has problemc. All of the others.d.
Server is
shutdown_________________________________________________________________________Assume
a website has only 5 different small images, using persistent HTTP,
a client needs ---------- to be serverSelect one:a. 4 UDP
connectionsb. A single TCP connectionc. Multiple TCP connectionsd.
4 TCP
connections_________________________________________________________________________Which
two protocols are used to control the transfer of web resources
from a web server to a client browser?Select one:a. FTP, HTTPb.
ASP, HTMLc. HTTP, HTTPSd. HTML, HTTPQuiz 03 CNRDT can be applicable
with supporting of ---------Select one:a. UDPb. GBNc. FSMd.
TCP_________________________________________________________________________------------
applications typically use -----------Select one:a. Elastic ------
DNSb. Loss-tolerant ------- UDPc. Loss-tolerant ------- TCPd.
Elastic -------
HTTP_________________________________________________________________________Chose
the application(s) where UDP protocol can be used?Select one or
more:a. Webb. DNSc. Audio streamd. Video
stream_________________________________________________________________________Which
three features allow TCP to reliably and accurately track the
transmission of data from source to destination?Select one:a.
Encapsulation, session establishment, best effort deliveryb. None
of the othersc. Flow control, session establishment, numbering and
sequencingd. Encapsulation, flow control, connectionless
services_________________________________________________________________________What
is the purpose of checksum code in UDP segment header?Select one:a.
To verify error in protocols segmentb. To verify error in headerc.
To verify error in datagramd. To verify error in IP
address_________________________________________________________________________What
is purpose of port in IP address?Select one:a. To determine what is
destination process socket at destination hostb. To determine what
channel is used at destination hostc. To know what memory is used
at destination hostd. To determine what cable is used at
destination
host_________________________________________________________________________Multiplexing
is capability of Transport Layer to --------------Select one:a.
Forward sockets packages throughb. Handle one sockets package to
sendc. Handle multiple sockets packages to sendd. Split sockets
packages to
send_________________________________________________________________________What
are main different aspects between Transport Layer and Network
Layer?Select one:a. Physical communicationb. Logical
communicationc. Target objects in communicationd. Destination host
in
communication_________________________________________________________________________How
many basic protocols supported by Transport Layer?Select one:a. 1b.
3c. 4d.
2_________________________________________________________________________Which
statement is correct about protocols in Transport Layer?Select
one:a. UCP is connectionless transport protocolb. TCP is
connectionless transport protocolc. TCP is connection-oriented
transport protocold. UCP is connection-oriented transport
protocol_________________________________________________________________________Host
A and B are communicating over a TCP connection, host A sends to
host B the first segment with size 105 bytes, sequence number 600,
the source port 1028, the destination port 80. What is the ACK
number, the source port number, the destination port number in the
ACK segment sent by host B to host A?Select one:a. ACK number: 700,
source port: 80, destination port: 1028b. ACK number: 705, source
port: 80, destination port: 1028c. ACK number: 705, source port:
1028, destination port: 80d. ACK number: 706, source port: 1028,
destination port:
80_________________________________________________________________________What
is a disadvantage of using a connection-oriented protocol such as
TCP?Select one:a. Packet acknowledgement may add overhead.b. The
application layer must assume responsibility for correct sequencing
of the data packets.c. Loss or duplication of data packets is more
likely to occur.d. All of the
others_________________________________________________________________________In
Congestion avoidance of TCP flow control, if timeout occurs while
the current congestion window size is 16, the congestion window
will ------------Select one:a. Reduce to 1b. Reduce to 8c. Reduce
to 0d. Remain
16_________________________________________________________________________In
Reliable Data Transfer 3.0, given 1 Gbps link, 15 ms prop, delay,
16000 bit packet, calculate UsenderSelect one:a. 0.0027b. 0.0053c.
0.00027d.
0.00533_________________________________________________________________________Quiz
04 CNWhich one is NOT an IP address?Select one:a. 235.222.1.1b.
30.80.80.80c. 54.258.255.1d.
90.190.200.0_________________________________________________________________________How
big is an IPv6 Internet address?Select one:a. 20 octetsb. 32
bytesc. 128 bytesd. 128 bitse. 32
bits_________________________________________________________________________What
information in IP header is used to route packet in router?Select
one:a. Destination Address fieldb. Destination Address and Source
Address fieldsc. Destination Address, Source Address, and Protocol
fieldsd. Source Address
field_________________________________________________________________________A
----------- routing table is updated periodically using one of the
adaptive routing protocols.Select one:a. Hierarchicalb. Staticc.
Dynamicd.
Deterministic_________________________________________________________________________Which
statement is correct about router?Select one:a. All interfaces have
the same IP address.b. Interfaces does not have IP addresses at
all.c. Each interface to have a routing table.d. Each interface to
have an unique IP
address._________________________________________________________________________In
IP Header, HL field value of decimal 10 means ----------.Select
one:a. There are 10 bytes in the header.b. None of the above.c.
There are 40 bytes of options.d. There are 40 bytes in the
header.e. There are 10 bytes of
options._________________________________________________________________________What
does the time-to-live field (8 bits) do in an IP header?Select
one:a. Sets frame priorityb. Prevents infinite loopingc. Records
the transmission time for tracert functionsd. Error checkinge.
Frame sequence
numbering_________________________________________________________________________When
you use the ping command to send ICMP message across a network,
whats the request / reply pair you will see?Select one:a. SYN
request and ACK replyb. Echo off and Echo onc. ICMP hold and ICMP
sendd. Echo request and Echo
reply_________________________________________________________________________If
the fragment offset has a value of 100 and fragment flag=0, it
means that -------.Select one:a. None of the above.b. The datagram
has not been fragmented.c. The datagram is 100 bytes in size.d.
This is the last fragment.e. The first byte of the datagram is byte
100._________________________________________________________________________Which
of the following is a private IP address?Select one:a. 12.0.0.1b.
172.20.14.36c. 168.172.19.39d. 190.168.0.2e.
172.33.194.30_________________________________________________________________________