Question
a.
FIN
b.
RST
c.
SYN
d.
PSH
Posted under UGC NET computer science question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which of the following control fields in TCP header is used to specify whether the sender has no more data to transmit?
Similar Questions
Discover Related MCQs
Q. Which are the two modes of IP security?
View solution
Q. A message "COMPUTERNETWORK" encrypted (ignore quotes) using columnar transposition cipher with a key "LAYER". The encrypted message is :
View solution
Q. Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to sample the signal at twice the highest frequency (two samples per hertz). What is the bit rate required, if it is assumed that each sample requires 8 bits?
View solution
Q. The maximum payload of a TCP segment is :
View solution
Q. In a binary Hamming Code the number of check digits is r then number of message digits is equal to :
View solution
Q. In a digital transmission, the receiver clock is 0.1 percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is 1 Mbps?
View solution
Q. Match the following cryptographic algorithms with their design issues:
List-I List-II
a. DES i. Message Digest
b. AES ii. Public Key
c. RSA iii. 56-bit key
d. SHA-1 iv. 128-bit key
Codes:
a b c d
View solution
Q. Ten signals, each requiring 3000 Hz, are multiplexed on to a single channel using FDM. How much minimum bandwidth is required for the multiplexed channel ? Assume that the guard bands are 300 Hz wide.
View solution
Q. A terminal multiplexer has six 1200 bps' terminals and 'n' 300 bps terminals connected to it. If the outgoing line is 9600 bps, what is the value of n ?
View solution
Q. Which of the following is used in the options field of IPv4 ?
View solution
Q. Which layers of the OSI reference model are host-to-host layers ?
View solution
Q. A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle ?
View solution
Q. Four bits are used for packed sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size ?
View solution
Q. A Multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate ?
View solution
Q. In a fully connected mesh network with 10 computers, total ______ number of cables are required and ____ number of ports are required for each device.
View solution
Q. In TCP/IP reference model, the job of ____ layer is to permit hosts to inject packets into any network and travel them independently to the destination.
View solution
Q. If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be:
View solution
Q. Optical fiber uses reflection to guide light through a channel, in which angle of incedence is _______ the critical angle.
View solution
Q. An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as ..............
View solution
Q. Match the following Layers and Protocols for a user browsing with SSL:
a. Application layer i. TCP
b. Transport layer ii. IP
c. Network layer iii. PPP
d. Datalink layer iv. HTTP
Codes: a b c d
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!