UDP
IP
TCP
HTTP
The number of bits transferred per second
The frequency of the carrier wave
The number of errors corrected per second
The speed of the modem
Host to host
Application
Internet
Network Access
transpositional ciphers
substitution ciphers
both (a) and (b)
none of the mentioned
443
80
53
25
Error detection and correction
Routing
Flow control
Framing
They require a centralized server
They can be less secure than client-server networks
They are more difficult to set up
They have limited scalability
Wide Area Net
Wide Access Network
Wide Area Network
Wide Access Net
Private key encryption
Public key encryption
Symmetric key encryption
Hybrid encryption
The Internet and WWW are the same thing.
WWW is a regional subset of the Internet.
The Internet is a collection of websites, while WWW is the technology that enables data transfer over the Internet.
The Internet is a global network infrastructure, while WWW is a system of interlinked hypertext documents accessed via the Internet.
L=n*5
L=n-2
L=n-1
L=n*8
Spoofing
Ransomware
Phishing
Keylogging
WEP
WPA
WEP2
WPA2
Computer Security
Information Security
Network Security
None of these
121.12.12.248
130.12.12.248
128.12.12.248
129.12.12.248
Translating IP addresses to domain names
Converting domain names to IP addresses
Assigning IP addresses to devices
Storing user passwords
Decentralized network structure
Centralized control
Requires dedicated servers
Clients rely on servers for resources
300.200.100.50
192.168.1.1
10.0.0.1
255.255.255.255
Application Layer
Network layer
Data Link Layer
Transport
The total number of packets sent over the network
The amount of data loss during transmission
The signal strength between two nodes
The amount of time data spends in transit
Encryption of data
To transmit faster
To detect errors
To identify the user
Domain Name System
Data Network Service
Digital Networking Server
Dynamic Naming Service
The amount of data that can be transmitted in a fixed amount of time
The time taken to send a message from one point to another
The speed at which the data packets are received
The delay between data transmission and reception
The Internet exclusively uses wired connections.
The Internet is limited to communication within a single organization.
The Internet is a globally interconnected network of networks.
The Internet is controlled by a single centralized authority.
Industrial Software Organisation
Industrial Standards Organisation
International Software Organisation
International Standards Organisation
Ethernet
Wi-Fi
Fiber optics
Bluetooth
Define protocols for cellular networks
Specify protocols for wired Ethernet networks
Establish guidelines for satellite communication
Standardize protocols for local area wireless networks
Bandwidth is always higher than throughput
Bandwidth and throughput are the same
Bandwidth defines the theoretical maximum data rate, while throughput is the actual data rate achieved
Throughput is always higher than bandwidth
Subnetting
MAC address filtering
VLAN
CSMA/CD
Router
Hub
Repeater
Switch
Multiplexer
Modem
22
ACK
FIN
SYN
RST
Bandwidth
Latency
Packet size
All of the above
Filtering packets based on port numbers
Translating domain names to IP addresses
Determining the best path for forwarding packets to their destination
Establishing secure connections between hosts
ICMP
IGMP
File sharing
Database management
Peer-to-peer connection
Web hosting
Higher data transfer rates
Reduced susceptibility to noise
Greater compatibility with modern devices
Lower power consumption
Physical Layer
Transport Layer
Presentation Layer
/24
/16
/32
/8
ARP
DHCP
RARP
Latch
Shift register
Memory extension
Cache
2.4Gbps
5Gbps
2.4GHz
5GHz
10Mbps
20Mbps
30Mbps
40Mbps
Wired environment
WiFi
Ethernet LAN
All of the mentioned
Software
Protocol
Hardware
Physical
Network
Data Link
Star
Ring
Tree
Binary
To identify the physical location of a device on the network
To establish a connection between two devices on the network
To uniquely identify network interfaces
To encrypt data for secure transmission