To identify the physical location of a device on the network
To establish a connection between two devices on the network
To uniquely identify network interfaces
To encrypt data for secure transmission
The Internet and WWW are the same thing.
WWW is a regional subset of the Internet.
The Internet is a collection of websites, while WWW is the technology that enables data transfer over the Internet.
The Internet is a global network infrastructure, while WWW is a system of interlinked hypertext documents accessed via the Internet.
Unshielded twisted pair
Optical fiber
Coaxial cable
Microwave
TCP
ICMP
UDP
IGMP
To identify the data rate of the network
To encrypt the wireless data
To control access to the router
To uniquely identify a wireless network
Physical layer
Data Link layer
Transport layer
Application layer
Subnetting
MAC address filtering
VLAN
CSMA/CD
Sender
Receiver
Sender and Receiver
None of the these
Latch
Shift register
Memory extension
Cache
Phishing
Denial-of-service attack
SQL injection
Man-in-the-middle attack
Application Layer
Network layer
Data Link Layer
Transport
Ethernet
IP
HTTP
MX record
CNAME record
A record
PTR record
Filtering
Encoding
Switching
None of the mentioned
transpositional ciphers
substitution ciphers
both (a) and (b)
none of the mentioned
Simplex
Half Duplex
Full Duplex
Double Duplex
Hyper terminal tracing program
Hypertext tracing protocol
Hypertext transfer protocol
Hypertext transfer program
DHCP
FTP
DNS
SNMP
Industrial Software Organisation
Industrial Standards Organisation
International Software Organisation
International Standards Organisation
Wireless Protected Access
Wired Protected Access
Wi-Fi Protected Access
Wireless Private Access
The total number of packets sent over the network
The amount of data loss during transmission
The signal strength between two nodes
The amount of time data spends in transit
L=n*5
L=n-2
L=n-1
L=n*8
Flow control
Error detection and correction
Segmentation and reassembly
Packet routing
The Internet exclusively uses wired connections.
The Internet is limited to communication within a single organization.
The Internet is a globally interconnected network of networks.
The Internet is controlled by a single centralized authority.
Wide Area Net
Wide Access Network
Wide Area Network
Wide Access Net
UDP traffic
TCP traffic
Both of the mentioned
block cipher
stream cipher
bit cipher
2.4Gbps
5Gbps
2.4GHz
5GHz
Routing
Data link control
End-to-end communication and error recovery
Network addressing
443
80
53
25
To establish a connection
To terminate a connection
To transmit data
To check for errors in data
SMTP
It specifies the total length of the TCP segment
It indicates the length of the TCP header in 32-bit words
It denotes the maximum segment size that can be transmitted
It identifies the TCP version being used
802.11
802.5
802.4
802.2
255.0.0.0
255.255.255.0
255.255.0.0
255.255.255.255
Telnet
Active receiver
Ethernet LAN
Microwaves
To indicate the start of a data frame
To provide redundancy for error correction
To detect errors in transmitted data
To ensure the confidentiality of the data
Ensuring secure encryption of data transmitted over the Internet.
Establishing physical connections between devices on the Internet.
Assigning unique addresses to devices and facilitating packet routing.
Controlling access to Internet resources through user authentication.
Protocol
URL
E-mail address
ICQ
To map an IP address to a MAC address
To map a MAC address to an IP address
To route data from one network to another
To configure IP addresses dynamically
Dual Host
OSI
proxy
The amount of data that can be transmitted in a fixed amount of time
The time taken to send a message from one point to another
The speed at which the data packets are received
The delay between data transmission and reception
WEP
WPA
WEP2
WPA2
68000
ASUS firebird
IA-32
ARM
22
121.12.12.248
130.12.12.248
128.12.12.248
129.12.12.248
Filtering packets based on port numbers
Translating domain names to IP addresses
Determining the best path for forwarding packets to their destination
Establishing secure connections between hosts
Routing packets from source to destination
Process-to-process delivery
Synchronization between devices
High level of security
Scalability limitations
Ease of setup and maintenance
Centralized control over resources