Question
a.
1’s complement sum of 16 bit words in the header without data field
b.
2’s complement sum of 16 bit words in the header without data field
c.
1’s complement sum of 16 bit words in the header including data field
d.
2’s complement sum of 16 bit words in the header including data field
Posted under UGC NET computer science question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. In an IP packet, header checksum computes:
Similar Questions
Discover Related MCQs
Q. A TCP server must prepare to accept a connection attempt from a TCP client by calling the function:
View solution
Q. DHCP stands for:
View solution
Q. Hidden terminals in a wireless network may cause:
View solution
Q. In a CDMA system, a code for a certain system should have:
View solution
Q. Vignere Cipher is a kind of:
View solution
Q. A point to point link that supports data flowing in only one direction at a time
View solution
Q. A networking device used to connect similar types of LANs
View solution
Q. Not an example of a network debugging utility:
View solution
Q. A secure protocol for personal emails:
View solution
Q. A technique in which system resources are shared among multiple users:
View solution
Q. The number of bits that can be transmitted over a network in a certain period of time:
View solution
Q. A network topology that combines features of linear bus and star topology:
View solution
Q. The science and art of breaking ciphers
View solution
Q. Process of mapping a network interface IP address to its hardware address:
View solution
Q. The local area network technology used in Ethernet
View solution
Q. Match the following Secret Key Algorithms (List I) with Corresponding Key Lengths (List II) and choose the correct answer from the code given below:
List I List II
(a) Blowfish (i) 128 – 256 bits
(b) DES (ii) 128 bits
(c) IDEA (iii) 1 - 448 bits
(d) RC5 (iv) 56 bits
View solution
Q. The four byte IP address consists of
View solution
Q. Consider ISO-OSI network architecture reference model. Session layer of this model offers dialog control, token management and .................. as services.
View solution
Q. Which of the following statement/s is/are true?
(i) Firewalls can screen traffic going into or out of an organization.
(ii) Virtual private networks can stimulate an old leased network to provide certain desirable properties.
Choose the correct answer from the code given below:
View solution
Q. A host is connected to a department network which is part of a university network. The university network, in turn, is part of the Internet. The largest network, in which the Ethernet address of the host is unique, is
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!