Flow control
Error detection and correction
Segmentation and reassembly
Packet routing
Time-To-Live (TTL)
Destination Address
Source Address
Checksum
To identify the data rate of the network
To encrypt the wireless data
To control access to the router
To uniquely identify a wireless network
Hashing
Encryption
Hamming Code
Routing packets from source to destination
Process-to-process delivery
Synchronization between devices
Internet
Botnet
Telnet
D-net
Bandwidth is always higher than throughput
Bandwidth and throughput are the same
Bandwidth defines the theoretical maximum data rate, while throughput is the actual data rate achieved
Throughput is always higher than bandwidth
Higher data transfer rates
Reduced susceptibility to noise
Greater compatibility with modern devices
Lower power consumption
Active receiver
Passive receiver
Both of the mentioned
None of the mentioned
Translating IP addresses to domain names
Converting domain names to IP addresses
Assigning IP addresses to devices
Storing user passwords
121.12.12.248
130.12.12.248
128.12.12.248
129.12.12.248
68000
ASUS firebird
IA-32
ARM
DNS
SNMP
DHCP
ICMP
Routing
Data link control
End-to-end communication and error recovery
Network addressing
Wireless Protected Access
Wired Protected Access
Wi-Fi Protected Access
Wireless Private Access
Ensuring secure encryption of data transmitted over the Internet.
Establishing physical connections between devices on the Internet.
Assigning unique addresses to devices and facilitating packet routing.
Controlling access to Internet resources through user authentication.
Encryption of data
To transmit faster
To detect errors
To identify the user
443
80
53
25
TCP
UDP
IGMP
Combining multiple signals into a single transmission medium
Assigning different frequencies to each channel
Dividing the transmission time into fixed intervals
Utilizing different modulation techniques for each channel
The Internet exclusively uses wired connections.
The Internet is limited to communication within a single organization.
The Internet is a globally interconnected network of networks.
The Internet is controlled by a single centralized authority.
32 bits
64 bits
128 bits
256 bits
22
21
It immediately retransmits the frame.
It sends a jam signal to inform other devices of the collision.
It waits for a random amount of time before retransmitting.
It increases the transmission power to avoid collisions.
Bus Topology
Ring Topology
Star Topology
Mesh Topology
Host to host
Application
Network Access
Computer Security
Information Security
Network Security
None of these
300.200.100.50
192.168.1.1
10.0.0.1
255.255.255.255
Firewall
Gateway
Router
Virus checker
IP
HTTP
0.0.0.0
127.0.0.1
0.255.255.255
Star
Ring
Tree
Binary
To increase the speed of data transmission
To reduce latency in the network
To encrypt data for secure transmission
To divide the available bandwidth into multiple channels
Ethernet LAN
Microwaves
RSA algorithm
Diffie-Hellman algorithm
Electronic code book algorithm
11 Mbps
54 Mbps
100 Mbps
600 Mbps
Software
Protocol
Hardware
Ethernet
Wi-Fi
Fiber optics
Bluetooth
It decreases the efficiency of data transmission
It involves combining multiple signals into a single transmission medium
It can only be used in analog communication systems
It reduces the complexity of the network
Spoofing
Ransomware
Phishing
Keylogging
structure and behaviour of a computer system as observed by the developer
structure and behaviour of a computer system as observed by the user
structure of a computer system as observed by the developer
None of the above
transpositional ciphers
substitution ciphers
both (a) and (b)
none of the mentioned
Define protocols for cellular networks
Specify protocols for wired Ethernet networks
Establish guidelines for satellite communication
Standardize protocols for local area wireless networks
Sender
Receiver
Sender and Receiver
None of the these
To identify the physical location of a device on the network
To establish a connection between two devices on the network
To uniquely identify network interfaces
Bandwidth
Latency
Packet size
All of the above
Wired environment
WiFi
All of the mentioned
OSPF