DNS
SNMP
DHCP
ICMP
To map an IP address to a MAC address
To map a MAC address to an IP address
To route data from one network to another
To configure IP addresses dynamically
Wide Area Net
Wide Access Network
Wide Area Network
Wide Access Net
Spoofing
Ransomware
Phishing
Keylogging
Subnetting
MAC address filtering
VLAN
CSMA/CD
Bus Topology
Ring Topology
Star Topology
Mesh Topology
121.12.12.248
130.12.12.248
128.12.12.248
129.12.12.248
To divide the network into subnetworks
To allocate IP addresses
To provide a default gateway
To encrypt data
Ethernet
Wi-Fi
Fiber optics
Bluetooth
Cutoff frequency
Low frequencies
upper high frequencies
None of the mentioned
IP/Netmask
IP/Subnet
IP/Router
IP/DNS
Internet
Botnet
Telnet
D-net
Translating IP addresses to domain names
Converting domain names to IP addresses
Assigning IP addresses to devices
Storing user passwords
255.0.0.0
255.255.255.0
255.255.0.0
255.255.255.255
Bandwidth
Latency
Packet size
All of the above
structure and behaviour of a computer system as observed by the developer
structure and behaviour of a computer system as observed by the user
structure of a computer system as observed by the developer
None of the above
They require a centralized server
They can be less secure than client-server networks
They are more difficult to set up
They have limited scalability
Active receiver
Ethernet LAN
Microwaves
To identify the physical location of a device on the network
To establish a connection between two devices on the network
To uniquely identify network interfaces
To encrypt data for secure transmission
Private key encryption
Public key encryption
Symmetric key encryption
Hybrid encryption
The amount of data that can be transmitted in a fixed amount of time
The time taken to send a message from one point to another
The speed at which the data packets are received
The delay between data transmission and reception
IP
HTTP
TCP
10Mbps
20Mbps
30Mbps
40Mbps
Hyper terminal tracing program
Hypertext tracing protocol
Hypertext transfer protocol
Hypertext transfer program
transpositional ciphers
substitution ciphers
both (a) and (b)
none of the mentioned
Star
Ring
Tree
Binary
Encrypting data transmissions
Blocking unauthorized access to a network
Managing cryptographic keys
Monitoring network traffic for malware
Error detection and correction
Routing
Flow control
Framing
Complex Instruction Set Computer
Computer Integrated Sequential Compiler
Complex Instruction Sequential Compilation
Complete Instruction Sequential Compilation
/24
/16
/32
/8
The Internet exclusively uses wired connections.
The Internet is limited to communication within a single organization.
The Internet is a globally interconnected network of networks.
The Internet is controlled by a single centralized authority.
Encryption of data
To transmit faster
To detect errors
To identify the user
Checksum
Hashing
Encryption
Hamming Code
Application Layer
Network layer
Data Link Layer
Transport
Computer Security
Information Security
Network Security
None of these
Faster data transmission
Easier network management
Reduced cost of hardware
Larger bandwidth allocation
block cipher
stream cipher
bit cipher
Latch
Shift register
Memory extension
Cache
Domain Name System
Data Network Service
Digital Networking Server
Dynamic Naming Service
443
80
22
21
300.200.100.50
192.168.1.1
10.0.0.1
Protocol
URL
E-mail address
ICQ
Define protocols for cellular networks
Specify protocols for wired Ethernet networks
Establish guidelines for satellite communication
Standardize protocols for local area wireless networks
Sender
Receiver
Sender and Receiver
None of the these
Router
Switch
Multiplexer
Modem
Bus
Mesh
It decreases the efficiency of data transmission
It involves combining multiple signals into a single transmission medium
It can only be used in analog communication systems
It reduces the complexity of the network
UDP
IGMP