Host to host
Application
Internet
Network Access
DHCP
FTP
DNS
SNMP
UDP traffic
TCP traffic
Both of the mentioned
None of the mentioned
Unshielded twisted pair
Optical fiber
Coaxial cable
Microwave
Industrial Software Organisation
Industrial Standards Organisation
International Software Organisation
International Standards Organisation
802.11
802.5
802.4
802.2
Ensuring secure encryption of data transmitted over the Internet.
Establishing physical connections between devices on the Internet.
Assigning unique addresses to devices and facilitating packet routing.
Controlling access to Internet resources through user authentication.
Software
Protocol
Hardware
None of these
Decentralized network structure
Centralized control
Requires dedicated servers
Clients rely on servers for resources
To identify the physical location of a device on the network
To establish a connection between two devices on the network
To uniquely identify network interfaces
To encrypt data for secure transmission
Firewall
Gateway
Router
Virus checker
255.0.0.0
255.255.255.0
255.255.0.0
255.255.255.255
To map an IP address to a MAC address
To map a MAC address to an IP address
To route data from one network to another
To configure IP addresses dynamically
Domain Name System
Data Network Service
Digital Networking Server
Dynamic Naming Service
Subnetting
MAC address filtering
VLAN
CSMA/CD
To specify the length of the segment
To terminate the connection
To indicate errors in the segment
To identify the next byte expected from the sender
ICMP
Spoofing
Ransomware
Phishing
Keylogging
Complex Instruction Set Computer
Computer Integrated Sequential Compiler
Complex Instruction Sequential Compilation
Complete Instruction Sequential Compilation
Hub
Repeater
Switch
Multiplexer
Modem
68000
ASUS firebird
IA-32
ARM
Wide Area Net
Wide Access Network
Wide Area Network
Wide Access Net
To increase the speed of data transmission
To reduce latency in the network
To divide the available bandwidth into multiple channels
Encryption of data
To transmit faster
To detect errors
To identify the user
Active receiver
Passive receiver
The amount of data that can be transmitted in a fixed amount of time
The time taken to send a message from one point to another
The speed at which the data packets are received
The delay between data transmission and reception
Error detection and correction
Routing
Flow control
Framing
Collision Detection and Retransmission (CDR)
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Token passing mechanism
Packet switching
The Internet and WWW are the same thing.
WWW is a regional subset of the Internet.
The Internet is a collection of websites, while WWW is the technology that enables data transfer over the Internet.
The Internet is a global network infrastructure, while WWW is a system of interlinked hypertext documents accessed via the Internet.
Physical layer
Data Link layer
Transport layer
Application layer
Bus
Tree
Mesh
Star
TCP
UDP
IGMP
Time-To-Live (TTL)
Destination Address
Source Address
Checksum
121.12.12.248
130.12.12.248
128.12.12.248
129.12.12.248
High level of security
Scalability limitations
Ease of setup and maintenance
Centralized control over resources
Denial-of-service attack
SQL injection
Man-in-the-middle attack
Wi-Fi Protected Access
Wireless Protected Access
Wired Protected Access
Wireless Private Access
It specifies the total length of the TCP segment
It indicates the length of the TCP header in 32-bit words
It denotes the maximum segment size that can be transmitted
It identifies the TCP version being used
11 Mbps
54 Mbps
100 Mbps
600 Mbps
Bandwidth is always higher than throughput
Bandwidth and throughput are the same
Bandwidth defines the theoretical maximum data rate, while throughput is the actual data rate achieved
Throughput is always higher than bandwidth
0.0.0.0
127.0.0.1
0.255.255.255
L=n*5
L=n-2
L=n-1
L=n*8
WEP
WPA
WEP2
WPA2
Hashing
Encryption
Hamming Code
Higher data transfer rates
Reduced susceptibility to noise
Greater compatibility with modern devices
Lower power consumption
Multiplexing
Segmentation
File sharing
Database management
Peer-to-peer connection
Web hosting
Denial-of-Service (DoS)
Physical
Network
Data Link
Transport