Question
List – I List - II
a. Physical Layer i. Allow resources to network access
b. Datalink Layer ii. Move packets from one destination to other
c. Network Layer iii. Process to process message delivery
d. Transport Layer iv. Transmission of bit stream
e. Application Layer v. Formation of frames
Codes:
a b c d e
a.
iv v ii iii i
b.
v iv i ii iii
c.
i iii ii v iv
d.
i ii iv iii v
Posted under UGC NET computer science question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Match the following: List – I List - II a. Physical Layer i. Allow resources to network access b. Datalink...
Similar Questions
Discover Related MCQs
Q. Object Request Broker (ORB) is
I. A software program that runs on the client as well as on the application server.
II. A software program that runs on the client side only.
III. A software program that runs on the application server, where most of the components reside.
View solution
Q. A software agent is defined as
I. A software developed for accomplishing a given task.
II. A computer program which is capable of acting on behalf of the user in order to accomplish a given computational task.
III. An open source software for accomplishing a given task.
View solution
Q. A file is downloaded in a home computer using a 56 kbps MODEM connected to an Internet Service Provider. If the download of file completes in 2 minutes, what is the maximum size of data downloaded?
View solution
Q. In ................ CSMA protocol, after the station finds the line idle, it sends or refrains from sending based on the outcome of a random number generator.
View solution
Q. Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one-to-many?
View solution
Q. What is the maximum length of CAT-5 UTP cable in Fast Ethernet network?
View solution
Q. The ................ is a set of standards that defines how a dynamic web document should be written, how input data should be supplied to the program, and how the output result should be used.
View solution
Q. The count-to-infinity problem is associated with
View solution
Q. Suppose a file of 10,000 characters is to be sent over a line at 2400 bps. Assume that the data is sent in frames. Each frame consists of 1000 characters and an overhead of 48 bits per frame. Using synchronous transmission, the total overhead time is ..............
View solution
Q. Which of the following is the size of Network bits and Host bits of Class A of IP address?
View solution
Q. Which of the following field of the TCP header tells how many bytes may be sent starting at the byte acknowledged ?
View solution
Q. Which of the following is a bit rate of an 8-PSK signal having 2500 Hz bandwidth ?
View solution
Q. Match the following :
(a) UDP (i) Message Transfer Protocol
(b) OSPF (ii) Bit-oriented Protocol
(c) SMTP (iii) Interior Gateway Routing Protocol
(d) HDLC (iv) Connectionless Transport Protocol
Codes :
(a) (b) (c) (d)
View solution
Q. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224. What is the subnet address ?
View solution
Q. If the data unit is 111111 and the divisor is 1010. In CRC method, what is the dividend at the transmission before division ?
View solution
Q. If user A wants to send an encrypted message to user B. The plain text of A is encrypted with the .................
View solution
Q. A ............... can forward or block packets based on the information in the network layer and transport layer header.
View solution
Q. Which of the following addresses is used to deliver a message to the correct application program running on a host?
View solution
Q. In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text.
View solution
Q. In classful addressing, the IP address 190.255.254.254 belongs to
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!