Top Banner
OS & CN Quiz Contents Quiz 01 OS.........................................................2 Quiz 02 OS.........................................................5 Quiz 03 OS.........................................................7 Quiz 04 OS.........................................................9 Quiz 05 OS........................................................12 Quiz 01 CN........................................................15 Quiz 02 CN........................................................17 Quiz 03 CN........................................................19 Quiz 04 CN........................................................22
37
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript

OS & CN QuizContentsQuiz 01 OS2Quiz 02 OS5Quiz 03 OS7Quiz 04 OS9Quiz 05 OS12Quiz 01 CN15Quiz 02 CN17Quiz 03 CN19Quiz 04 CN22

Quiz 01 OSWhich of these statements about address space are not true?Select one:a. Address space is the abstraction that is referenced to the set of addresses a processb. None of othersc. Address space is decoupled from the physical memory_________________________________________________________________________Which of these statements about files are true?Select one or more:a. File is a collection of related informationb. File is an abstraction of data stored on HDDc. File provides a place to keep files or a way of grouping file togetherd. File includes block special tiles and character special files_________________________________________________________________________Which of these statements about address space are true?Select one or more:a. Address space is the abstraction that is referenced to the set of addresses a processb. Address space is a space contain the address of variablesc. Address space is decoupled from the physical memory_________________________________________________________________________Server OS serves multiple users at once over a network and allow the users to share --------- and ------------ resourcesSelect one:a. Hardware, firmwareb. Hardware, softwarec. Software, firmwared. Firmware, hardware_________________________________________________________________________Symbian, Palm, Windows Mobile, Windows CE are ---------Select one:a. Handheld OSb. Multiprocessor OSc. PC OSd. Mainframe OS_________________________________________________________________________Which of these statements about files are not true?Select one:a. File is an abstraction of data stored on HDDb. File provides a place to keep files or a way of grouping files togetherc. File contains correlated information: path name, root directory, file descriptor, Mourited file system, special file, a piped. File includes block special files and character special files_________________________________________________________________________Embedded OS is located in -----------Select one:a. DISKb. RAMc. BIOSd. ROM_________________________________________________________________________------------systems are used in time-critical environments where reliability is key and data must be processed within a strict time limitSelect one:a. Embeddedb. Real-timec. Hybridd. Interactive_________________________________________________________________________MainframeOS offers 3 kinds of services -----------Select one:a. Batch, time-sharing, schedulerb. Real-time, batch, time-sharingc. Real-time, time sharing, protectiond. Transaction processing, batch, time-sharing_________________________________________________________________________------------------ process routine job without interactive user presentSelect one:a. Transaction processing systemsb. Time sharing systemsc. Batch systemsd. Real-time systems_________________________________________________________________________---------------- runs on systems that have many CPUs (multi-processors, multi-cores, multi-chips)Select one:a. Multiprocessor OSb. Embedded OSc. PC OSd. Server OS_________________________________________________________________________Which of these statements about processes are not true?Select one or more:a. In modern OS, only single process exists at timeb. Process table stores all the information of processesc. Process is a program on diskd. Associated with each process is its file and directorye. Associated with each process is set of resources such as executable code, data, stack, CPU registers value, and other information needing to run a program_________________________________________________________________________Which of these statements about processes are true?Select one or more:a. A program in executionb. Process table stores all the information of processesc. Associated with each process is set of resources such as executable code, data, stack, CPU registers value, and other information needing to run a programd. A program on diske. Associated with each process is its file and directory_________________________________________________________________________------------- serves multiple users at once over a network and allow the users to share hardware and software resourcesSelect one:a. Mainframe OSb. PC OSc. Server OSd. Multiprocessor OS_________________________________________________________________________Real-time system has ----------- and -------------- real-time system typesSelect one or more:a. Paperb. Softc. Firmd. Hard_________________________________________________________________________------------ offers 3 kinds of services: batch, transaction processing, timesharingSelect one:a. PC OSb. Mainframe OSc. Server OSd. Multiprocessor OS_________________________________________________________________________Allow multiple remote users to run jobs on the computer at onceSelect one:a. Real-time systemsb. Batch systemsc. Time sharing systemsd. Transaction processing systems_________________________________________________________________________Handling large numbers of small requestsSelect one:a. Real-time systemsb. Time sharing systemsc. Batch systemsd. Transaction processing systems_________________________________________________________________________---------- supports with dozens of programs started up at the boot timeSelect one:a. Multi-schedulingb. Multi-processorc. Multi-cored. Multi-programming_________________________________________________________________________Quiz 02 OSHow much time is reasonable for the quantum in Round-Robin algorithm?Select one:a. 46 msecb. 16 msecc. 64 msecd. 128 msec_________________________________________________________________________Which statement is correct?Select one:a. Process and thread are similarb. A thread can create many processesc. A process can create many threadsd. A process can only own a thread_________________________________________________________________________In which situation does race condition occur?Select one:a. Two threads in a process update their stacksb. Two threads in a process modify a global variablec. Two processes communicate using socketd. A parent process creates a child process_________________________________________________________________________In a batch system, scheduling by SJF is provably better than FCFS if -------------Select one:a. Process requests come simultaneously and Turnaround time is longerb. Process requests come simultaneously and Turnaround time is shorterc. Process requests come consequently and Turnaround time is shorterd. Process requests come consequently and Turnaround time is longer_________________________________________________________________________If a process finishes a time interval with CPU, its state switches ------------Select one:a. From blocked to readyb. From running to blockedc. From running to readyd. From ready to running_________________________________________________________________________Two or more processes accessing to a shared memory is an example of -----------Select one:a. Mutual exclusionb. Interprocess communicationc. Race conditiond. Critical region_________________________________________________________________________Which system requires pre-emptive scheduling algorithm?Select one:a. Interactive systemsb. Quantum systemsc. All of the othersd. Batch systems_________________________________________________________________________What happen if 2 processes have same priority in the Priority scheduling algorithm?Select one:a. Serve the process that has shorter burst time first, let the process that has longer burst time waitb. None of the othersc. Use Priority-inheritance solution.d. Serve the process that comes first, let the process that comes later wait_________________________________________________________________________Which event cannot cause process creation?Select one:a. A running process creates a set of threadsb. A running process performs a process creation system callc. An operating system initializes a serviced. A user executes a program_________________________________________________________________________Which event causes process involuntary termination?Select one:a. Error exitb. Fatal errorc. Fatal exitd. Kill exit_________________________________________________________________________Which statement is correct?Select one:a. Shortest process next is advantageous for long jobsb. Round-robin with high quantum is advantageous for long jobsc. Shortest job first is advantageous for long jobsd. First come first serve is advantageous for short jobs_________________________________________________________________________Which of the following is the benefit of thread?Select one:a. Synchronizationb. All of the othersc. Dependenced. Resource sharing_________________________________________________________________________All threads in a process shareSelect one:a. Address spaceb. Registerc. Program counterd. Stack_________________________________________________________________________Choose the correct solution(s) for the process synchronization problemsSelect one:a. Busy waitingb. Semaphorec. Sleep and Wakeupd. All of the others_________________________________________________________________________Quiz 03 OSMemory compaction is a mechanism to ----------Select one:a. Increase virtual memory sizeb. Reduce memory fragmentationc. Load a page into memory due to page faultd. Replace a page by another page for a process_________________________________________________________________________A page table entry does not provide information about ------------Select one:a. What page frame number isb. What page size isc. Whether a page is modified or notd. Whether a page is present in memory or not_________________________________________________________________________How many linear address spaces does paging provide?Select one:a. Maximum RAM spaceb. Unlimitedc. 1024d. 1_________________________________________________________________________What happen if there is no memory abstraction?Select one:a. Only one program can write to the memoryb. A program can prevent others to access memoryc. Programs physical memory could be accessed by othersd. Only one program can read the memory while others can write_________________________________________________________________________What is the problem of swapping memory?Select one:a. All of the othersb. Difficult to know where to allocate a programc. Difficult to know how to monitor a memory holed. Difficult to know how much memory should be allocated for a program_________________________________________________________________________In a swapping system, memory consists of the following block sizes in memory order: 12KB, 20 KB, 7KB, 9KB, 5KB, and 11KB. Which block is taken for a request of 10KB using the best fit algorithm?Select one:a. 20KBb. 12KBc. 9KBd. 11KB_________________________________________________________________________Global page replacement policy --------------Select one:a. Uses the first-in-first-out page for replacementb. Uses a page belonging to the same process for replacementc. Uses the least recently used page for replacementd. Uses a page belonging to another process for replacement_________________________________________________________________________Which statement is incorrect for a page?Select one:a. A page can be relocated to a different chunk of physical address during operationb. A page is mapped to a contiguous chunk of physical addressc. A page is a contiguous chunk of virtual addressd. A page can get various sizes in an operating system_________________________________________________________________________The replacement policy replaces the page that has not been referenced for the longest timeSelect one:a. Least recently used (LRU) policyb. Clock policyc. Optimal policyd. First in first out (FIFO) policy_________________________________________________________________________Which technique requires the programmer to be aware that it is being used?Select one:a. Not Recently Usedb. Least Recently Usedc. Pure Segmentationd. Paging_________________________________________________________________________What is the best fit to allocate free memory to programs?Select one:a. Search entire list, find the hole close to the actual sizeb. Search entire list, finds the hole has the largest sizec. None of the othersd. Search entire list, finds the hole match with the actual size_________________________________________________________________________Using virtual memory allows -------------Select one:a. Fewer programs to be executed at the same timeb. More programs to be executed at the same timec. More complex programs to be executed at the same timed. Smaller programs to be executed at the same time_________________________________________________________________________The worst fit algorithm allocates memory to a request by -------------------Select one:a. Choosing the first available memory block that is large enough from the location of the last placementb. Choosing the largest available memory blockc. Choosing the memory block that is closest in size to the requestd. Choosing the first available memory block that is large enough from the beginning of the memory_________________________________________________________________________Quiz 04 OSThe 775 mode of a file in UNIX indicates ----------------Select one:a. This file has read and execute permissions for all usersb. This file has read permissions for all users, execute permissions for group owner, and write permission for file ownerc. This file has read, write and execute permissions for file owner onlyd. This file has read and execute permissions for all users and write permission for file owner_________________________________________________________________________Calls to modify file content based on file descriptor such as read() or write() on Unix are referred to as ---------------------Select one:a. Function callsb. Procedure callsc. System callsd. User calls_________________________________________________________________________A --------------- is created when a user opens an account to access the computer system.Select one:a. Directoryb. Volumec. MFDd. Subdirectory_________________________________________________________________________Allocating a single set of blocks with the first block and length to a file at the time of creating is referred to as --------------Select one:a. i-node allocationb. contiguous allocationc. link list allocationd. chained allocation_________________________________________________________________________Step 01. MBR locates the active partition, reads in its boot block and executes itStep 02. The computer is booted, the BIOS reads in and executes the MBRStep 03. The program in boot block loads the OS contained in that partitionMechanism of booted computer isSelect one:a. 2, 3, 1b. None of othersc. 1, 2, 3d. 3, 2, 1_________________________________________________________________________A symbolic link in a file system on Unix is -----------------Select one:a. A file copied to appear in more than one directoryb. A directory to store special filesc. A name created to point to a file naming another filed. A file created to provide a backup of another file_________________________________________________________________________The purpose of an extension is to ------------Select one:a. Identify the type of fileb. Identify the file sizec. Identify the file ownerd. Identify the directory in which the file is stored_________________________________________________________________________------------- allocation allows files to use any storage space available on the disk.Select one:a. Add-on storageb. Noncontiguous storagec. Contiguous storaged. Fragmented storage_________________________________________________________________________The File Manager is in charge of the systems ------------- components.Select one:a. Electronicb. Physicalc. Datad. Software_________________________________________________________________________File descriptor of the standard error by default is an integer value ---------------Select one:a. 2b. 3c. 1d. 0_________________________________________________________________________Which one is not file structure?Select one:a. Sequence of bytesb. Sequence of recordsc. Tree structured. Star structure_________________________________________________________________________When using random access files, the program used to store the data follows a set of instructions, called a ------------- algorithm, that transforms each key into a number, the records logical address.Select one:a. Lookupb. Groupingc. Translationd. Hashing_________________________________________________________________________The files type includes -------------Select one:a. Regular, Directories, Character Specialb. Regular, Binary, Character Special, CD-ROMc. Regular, Directories, Character Special, Block Speciald. Regular, Directories, Character Special, Device Driver_________________________________________________________________________Which of these statements about the Linked List Allocation are true?Select one or more:a. First word of each block is used as pointer to the next one and the rest of the block is for datab. The amount of data storage in a block is not a power of two because the pointer takes up a few bytesc. Random access is extremely slowd. Internal and External fragmentation are generated_________________________________________________________________________The 1^(st) block in each partition is called ----------Select one:a. Super blockb. MBRc. Boot blockd. Free block_________________________________________________________________________The requirements for long-term information storage are --------------Select one or more:a. Multiple processes must be able to access the information concurrentlyb. The information must be survived the termination of process using itc. All of othersd. It must be possible to store a very large amount of address_________________________________________________________________________----------- are special files with listings of filenames and their attributes.Select one:a. Programsb. Databasesc. Directoriesd. Data files_________________________________________________________________________The file systems function are -------------Select one or more:a. Mapping files onto address spaceb. Hiding the complexity of storage hardware devicesc. None of othersd. Providing the users a uniform logical view of the information stored on these devices_________________________________________________________________________System calls for managing directories exclude ----------Select one:a. Opendirb. Linkc. Seedd. Unlink_________________________________________________________________________A UNIX or Linux system might identify a file as: /usr/imfst/flynn/inventory.doc. What represents the root directory is ------------.Select one:a. usrb. /c. flynnd. imfst_________________________________________________________________________The files structure includes -------------Select one:a. unstructured sequence of bytes, binary sequence, treeb. unstructured sequence of bytes, text, treec. unstructured sequence of bytes, random, treed. unstructured sequence of bytes, record sequence, tree_________________________________________________________________________As long as users refer to files in the ------------- directory, they can access their files without entering the complete name from the highest level to the lowest.Select one:a. homeb. workingc. defaultd. root_________________________________________________________________________On magnetic disks, files can be organized in one of three ways; -------------Select onea. sequential, direct, or indexed sequentialb. indexed direct, indexed indirect, or randomc. sequential, random, or indirectd. sequential, indirect, or direct_________________________________________________________________________---------- are having one directory containing all filesSelect one:a. Mono-Level Directory Systemsb. Multi-Level Directory Systemsc. Single-Level Directory Systemsd. Hierarchical Directory SystemsQuiz 05 OSThe controllers job to convert the --------- into a block of bytes and perform any ---------- necessarySelect one:a. Error correction / serial bit streamb. Serial byte stream / interruptc. Interrupt / serial byte streamd. Serial bit stream / error correction_________________________________________________________________________Without DMA, the ----------- is responsible for the physical movement of data between main memory and the device.Select one:a. CPUb. Memory controllerc. Busd. Disk_________________________________________________________________________I / O devices are ------------Select one:a. Video card, compact flash card, Ethernet card, wireless cardb. SATA disk drive, mainboard, SCSI disk, modemc. CD-ROM, USB, monitor, scannerd. Keyboard, mouse, printer, RAM memory_________________________________________________________________________Which statement is incorrect for device driver?Select one:a. Device driver normally operates as a part of the operating system kernelb. Device driver is device control register and device data bufferc. Device driver is generally written by the devices manufacturer and delivered along with the deviced. Device driver is some device-specific code for controlling a device_________________________________________________________________________A disk queue with requests for I/O blocks on cylinders in orders: 10, 22, 20, 2, 40, 6, 38. Assume that the disk head is initially at cylinder 18 and the head move downward. How many cylinders does Total head movement move when the elevator algorithms are used?Select one:a. 62b. 54c. 144d. 60_________________________________________________________________________Of the three components of access time in a movable-head Disk Arm Scheduling Algorithms, ------------ is the longest.Select one:a. Delay timeb. Search timec. Seek timed. Transfer time_________________________________________________________________________------------- control the transfer of information between the disk drives and the rest of the computer system.Select one:a. System controllersb. Disk drive controllersc. Disk drive interfacesd. System interfaces_________________________________________________________________________I/O software is typically organized in four layers as followingSelect one:a. Program counter handlers, device drivers, device-independent operating system software, user-level I/O softwareb. Interrupt handlers, system-level I/O software, device-independent operating system software, user-level I/O softwarec. Interrupt handlers, device drivers, device-independent operating system software, user-level I/O softwared. Interrupt handlers, device drivers, device-independent operating system software, system-level I/O software_________________________________________________________________________------------ devices are assigned to only one job at a time.Select one:a. Staticb. Dedicatedc. Sharedd. Virtual_________________________________________________________________________Which one is not a property of a precise interrupt?Select one:a. No instruction beyond the one pointed to by the PC has been executedb. The execution state of the instruction pointed to by the PC is knownc. All instructions before the one pointed to by the PC have partially executedd. The PC (Program Counter) is saved in a known place_________________________________________________________________________Which DVD format provides the largest storage capacity?Select one:a. Dual-layer, single-sidedb. Single-layer, single-sidedc. Single-layer, double-sidedd. Dual-layer, double-sided_________________________________________________________________________Mapping all the control registers into the memory space allows -------------Select one:a. The CPU to communicate with the control register and the device data buffersb. Processes to communicate with their threadsc. Processes to communicate with other processesd. The CPU to communicate with the RAM memory and processes_________________________________________________________________________Quiz 01 CNWhich of the following can not a host?Select one:a. PDAb. Computerc. Routerd. Smartphone_________________________________________________________________________Which layer interprets the meaning of data?Select one:a. Presentationb. Sessionc. Data linkd. Transport_________________________________________________________________________Which method is not about switching?Select one:a. Frequency Division Multiplexingb. Packet Switchingc. Transmission Rated. Time Division Multiplexing_________________________________________________________________________What statement is incorrect about protocols?Select one:a. Protocols define order of messages in networkb. All communication activity in network governed by protocolsc. Protocols define format of messages in networkd. Protocols define communication between a human to another human_________________________________________________________________________What is the reason that UDP is best effort data delivery protocol?Select one:a. UDP try to send packets as fast as it canb. UDP does not setup the connection before sending messagesc. All of the othersd. UDP sends packets without checking whether the packets arrives to the receiver or not_________________________________________________________________________Two main elements related to network-core functions areSelect one:a. Forwarding table and queueing algorithmb. Output link algorithm and forwarding algorithmc. Routing algorithm and forwarding tabled. Routing algorithm and queueing algorithm_________________________________________________________________________Store and forward technique that entire packet must arrive at router before it can be transmitted on next link exists inSelect one:a. Circuit switchingb. None of circuit switching and package switchingc. Both of circuit switching and package switchingd. Package switching_________________________________________________________________________The fourth layer in OSI network model is ----------Select one:a. Transportb. Applicationc. Networkd. Session_________________________________________________________________________In the transmission delay calculation t = L/R, what is R?Select one:a. Link bandwidth of the linkb. Time to process at routerc. Speed of switchingd. Propagation speed in medium_________________________________________________________________________The data that the Network layer processes is called ---------Select one:a. Segmentb. Framec. Messaged. Datagram_________________________________________________________________________What is maximum data rate for fiber cable?Select one:a. 100Gbpsb. 10Gbpsc. 100Mbpsd. 1Gbps_________________________________________________________________________Sources of packet delay does not includeSelect one:a. Processing time at nodeb. Waiting time on lossc. Propagation time on mediumd. Waiting time in buffer_________________________________________________________________________In OSI model, as data packet moves from the lower to the upper layer header are ---------Select one:a. Addedb. Modifiedc. Removedd. Rearranged_________________________________________________________________________Network protocols defineSelect one:a. Connection configuration and message order between network entitiesb. Routing information and algorithm in networksc. Message format and action taken on message transmissiond. Communication link configuration and packet forwarding_________________________________________________________________________Packet loss and delay are usually caused bySelect one:a. Low packet arrival rate and small output link capacityb. High packet arrival rate and large output link capacityc. Low packet arrival rate and large output link capacityd. High packet arrival rate and small output link capacity_________________________________________________________________________Quiz 02 CN------------ is a protocol to transfer file to / from remote host using client / server model.Select one:a. FTPb. HTTPc. SSHd. Telnet_________________________________________________________________________------------- is a protocol to deliver / store email to / on receivers server.Select one:a. SMTPb. IMAPc. HTTPd. POP3_________________________________________________________________________What is the characteristic of a network application?Select one:a. Connect routers to end systems.b. Run on routers.c. Help routers find end systems.d. Run on end systems._________________________________________________________________________------------ is an HTTP method that allows users to upload input data to server.Select one:a. DOWNLOAD methodb. POST methodc. SHOW methodd. GET method_________________________________________________________________________Which of the following is hybrid of client-server and P2P?Select one:a. Skypeb. EBayc. DNSd. BitTorrente. Telnet_________________________________________________________________________A DNS query resolution mechanism that repeatedly sends a query to different servers is referred to as ------------ Select one:a. Semantic query resolutionb. Iterated query resolutionc. Keyword query resolutiond. Recursive query resolution_________________________________________________________________________Which statement is incorrect about peer-to-peer (P2P) networks?Select one:a. Peers directly connect to all other peers in a P2P networkb. Peers can join and leave a P2P network arbitrarilyc. File distribution on a P2P network is faster than on a client-server networkd. Peers can play roles of server and client in a P2P network_________________________________________________________________________How does the HTTP protocol implement caching?Select one:a. Using proxy serverb. Using cookiec. Using hidden inputd. Using client cachee. Using the If-modified-since header_________________________________________________________________________What can be used to identify the process?Select one:a. Both IP address of the host running the process and the port associated with that process.b. Process ID assigned by serverc. Name of the application running on the hostd. Port associated with that process_________________________________________________________________________What is the protocol used to obtain email from / to an email server?Select one:a. IMAPb. SNMPc. SMTPd. IGMP_________________________________________________________________________The ---------------- that together implement the DNS distributed database, store ------------------ for the hostname to IP address mappings.Select one:a. Root servers ------------ IP addressb. Root servers ------------ IP address and post numberc. Authoritative servers ------------ Entriesd. Name servers --------- Resource Recordse. Resource Records ------------- Name servers_________________________________________________________________________Assume the RTT 200ms, the transmission time of a Web object 10ms, how long does it take to download that object from a Web server to a client if using non-persistent HTTP?Select one:a. 210msb. 240msc. 420msd. 410mse. 220ms_________________________________________________________________________For what is a Telnet client used?Select one:a. To see the endpoints of your sessionsb. To see your IP address and configuration detailsc. To see the route an IP packet takes across multiple routersd. To issue commands to a remote server_________________________________________________________________________The client-server model significantly relies on -------------- infrastructure servers, the Peer-to-Peer model, instead, pairs of interminably connected peers, communicates ------------ with each otherSelect one:a. Usually-off ----------- directlyb. Always-off ----------- indirectlyc. Always-on ----------- directlyd. Usually-on ----------- directly_________________________________________________________________________What happen when you can connect to the FTP server by typing telnet 112.158.25.4.21 but you can not connect to the same FTP server by typing telnet ftp.example.com 21?Select one:a. No DNS configurationb. ADSL connection has problemc. All of the others.d. Server is shutdown_________________________________________________________________________Assume a website has only 5 different small images, using persistent HTTP, a client needs ---------- to be serverSelect one:a. 4 UDP connectionsb. A single TCP connectionc. Multiple TCP connectionsd. 4 TCP connections_________________________________________________________________________Which two protocols are used to control the transfer of web resources from a web server to a client browser?Select one:a. FTP, HTTPb. ASP, HTMLc. HTTP, HTTPSd. HTML, HTTPQuiz 03 CNRDT can be applicable with supporting of ---------Select one:a. UDPb. GBNc. FSMd. TCP_________________________________________________________________________------------ applications typically use -----------Select one:a. Elastic ------ DNSb. Loss-tolerant ------- UDPc. Loss-tolerant ------- TCPd. Elastic ------- HTTP_________________________________________________________________________Chose the application(s) where UDP protocol can be used?Select one or more:a. Webb. DNSc. Audio streamd. Video stream_________________________________________________________________________Which three features allow TCP to reliably and accurately track the transmission of data from source to destination?Select one:a. Encapsulation, session establishment, best effort deliveryb. None of the othersc. Flow control, session establishment, numbering and sequencingd. Encapsulation, flow control, connectionless services_________________________________________________________________________What is the purpose of checksum code in UDP segment header?Select one:a. To verify error in protocols segmentb. To verify error in headerc. To verify error in datagramd. To verify error in IP address_________________________________________________________________________What is purpose of port in IP address?Select one:a. To determine what is destination process socket at destination hostb. To determine what channel is used at destination hostc. To know what memory is used at destination hostd. To determine what cable is used at destination host_________________________________________________________________________Multiplexing is capability of Transport Layer to --------------Select one:a. Forward sockets packages throughb. Handle one sockets package to sendc. Handle multiple sockets packages to sendd. Split sockets packages to send_________________________________________________________________________What are main different aspects between Transport Layer and Network Layer?Select one:a. Physical communicationb. Logical communicationc. Target objects in communicationd. Destination host in communication_________________________________________________________________________How many basic protocols supported by Transport Layer?Select one:a. 1b. 3c. 4d. 2_________________________________________________________________________Which statement is correct about protocols in Transport Layer?Select one:a. UCP is connectionless transport protocolb. TCP is connectionless transport protocolc. TCP is connection-oriented transport protocold. UCP is connection-oriented transport protocol_________________________________________________________________________Host A and B are communicating over a TCP connection, host A sends to host B the first segment with size 105 bytes, sequence number 600, the source port 1028, the destination port 80. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A?Select one:a. ACK number: 700, source port: 80, destination port: 1028b. ACK number: 705, source port: 80, destination port: 1028c. ACK number: 705, source port: 1028, destination port: 80d. ACK number: 706, source port: 1028, destination port: 80_________________________________________________________________________What is a disadvantage of using a connection-oriented protocol such as TCP?Select one:a. Packet acknowledgement may add overhead.b. The application layer must assume responsibility for correct sequencing of the data packets.c. Loss or duplication of data packets is more likely to occur.d. All of the others_________________________________________________________________________In Congestion avoidance of TCP flow control, if timeout occurs while the current congestion window size is 16, the congestion window will ------------Select one:a. Reduce to 1b. Reduce to 8c. Reduce to 0d. Remain 16_________________________________________________________________________In Reliable Data Transfer 3.0, given 1 Gbps link, 15 ms prop, delay, 16000 bit packet, calculate UsenderSelect one:a. 0.0027b. 0.0053c. 0.00027d. 0.00533_________________________________________________________________________Quiz 04 CNWhich one is NOT an IP address?Select one:a. 235.222.1.1b. 30.80.80.80c. 54.258.255.1d. 90.190.200.0_________________________________________________________________________How big is an IPv6 Internet address?Select one:a. 20 octetsb. 32 bytesc. 128 bytesd. 128 bitse. 32 bits_________________________________________________________________________What information in IP header is used to route packet in router?Select one:a. Destination Address fieldb. Destination Address and Source Address fieldsc. Destination Address, Source Address, and Protocol fieldsd. Source Address field_________________________________________________________________________A ----------- routing table is updated periodically using one of the adaptive routing protocols.Select one:a. Hierarchicalb. Staticc. Dynamicd. Deterministic_________________________________________________________________________Which statement is correct about router?Select one:a. All interfaces have the same IP address.b. Interfaces does not have IP addresses at all.c. Each interface to have a routing table.d. Each interface to have an unique IP address._________________________________________________________________________In IP Header, HL field value of decimal 10 means ----------.Select one:a. There are 10 bytes in the header.b. None of the above.c. There are 40 bytes of options.d. There are 40 bytes in the header.e. There are 10 bytes of options._________________________________________________________________________What does the time-to-live field (8 bits) do in an IP header?Select one:a. Sets frame priorityb. Prevents infinite loopingc. Records the transmission time for tracert functionsd. Error checkinge. Frame sequence numbering_________________________________________________________________________When you use the ping command to send ICMP message across a network, whats the request / reply pair you will see?Select one:a. SYN request and ACK replyb. Echo off and Echo onc. ICMP hold and ICMP sendd. Echo request and Echo reply_________________________________________________________________________If the fragment offset has a value of 100 and fragment flag=0, it means that -------.Select one:a. None of the above.b. The datagram has not been fragmented.c. The datagram is 100 bytes in size.d. This is the last fragment.e. The first byte of the datagram is byte 100._________________________________________________________________________Which of the following is a private IP address?Select one:a. 12.0.0.1b. 172.20.14.36c. 168.172.19.39d. 190.168.0.2e. 172.33.194.30_________________________________________________________________________