adplus-dvertising
frame-decoration

Question

Match the following:

List – I                                    List - II
a. Physical Layer                     i. Allow resources to network access
b. Datalink Layer                     ii. Move packets from one destination to other
c. Network Layer                      iii. Process to process message delivery
d. Transport Layer                   iv. Transmission of bit stream
e. Application Layer                v. Formation of frames

Codes:
      a   b   c    d   e

a.

iv   v   ii   iii    i

b.

v   iv   i    ii    iii

c.

i    iii   ii   v    iv

d.

i    ii   iv   iii   v

Answer: (a).iv   v   ii   iii    i

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Match the following: List – I                                    List - II a. Physical Layer                     i. Allow resources to network access b. Datalink...

Similar Questions

Discover Related MCQs

Q. Object Request Broker (ORB) is

I. A software program that runs on the client as well as on the application server.
II. A software program that runs on the client side only.
III. A software program that runs on the application server, where most of the components reside.

Q. A software agent is defined as

I. A software developed for accomplishing a given task.
II. A computer program which is capable of acting on behalf of the user in order to accomplish a given computational task.
III. An open source software for accomplishing a given task.

Q. A file is downloaded in a home computer using a 56 kbps MODEM connected to an Internet Service Provider. If the download of file completes in 2 minutes, what is the maximum size of data downloaded?

Q. In ................ CSMA protocol, after the station finds the line idle, it sends or refrains from sending based on the outcome of a random number generator.

Q. Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one-to-many?

Q. What is the maximum length of CAT-5 UTP cable in Fast Ethernet network?

Q. The ................ is a set of standards that defines how a dynamic web document should be written, how input data should be supplied to the program, and how the output result should be used.

Q. The count-to-infinity problem is associated with

Q. Suppose a file of 10,000 characters is to be sent over a line at 2400 bps. Assume that the data is sent in frames. Each frame consists of 1000 characters and an overhead of 48 bits per frame. Using synchronous transmission, the total overhead time is ..............

Q. Which of the following is the size of Network bits and Host bits of Class A of IP address?

Q. Which of the following field of the TCP header tells how many bytes may be sent starting at the byte acknowledged ?

Q. Which of the following is a bit rate of an 8-PSK signal having 2500 Hz bandwidth ?

Q. Match the following :

(a) UDP             (i) Message Transfer Protocol
(b) OSPF           (ii) Bit-oriented Protocol
(c) SMTP           (iii) Interior Gateway Routing Protocol
(d) HDLC           (iv) Connectionless Transport Protocol

Codes :
      (a)   (b)  (c)  (d)

Q. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224. What is the subnet address ?

Q. If the data unit is 111111 and the divisor is 1010. In CRC method, what is the dividend at the transmission before division ?

Q. If user A wants to send an encrypted message to user B. The plain text of A is encrypted with the .................

Q. A ............... can forward or block packets based on the information in the network layer and transport layer header.

Q. Which of the following addresses is used to deliver a message to the correct application program running on a host?

Q. In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text.

Q. In classful addressing, the IP address 190.255.254.254 belongs to