CS101
532
CS201
225
CS301
232
CS302
174
CS304
192
CS401
224
CS402
258
CS403
228
CS408
113
CS411
121
CS502
249
CS504
268
CS601
679
CS604
381
CS605
261
CS607
184
CS609
230
CS610
300
CS614
100
CS703
65
Code | Question | Option A | Option B | Option C | Option D | Answer | |
---|---|---|---|---|---|---|---|
CS601 | Tunneling Is A Technique In Which The Ip Datagram Is First And Then | Encapsulated In Another Datagram; Encrypted | Encrypted; Encapsulated In Another Datagram | Authenticated; Encrypted | Encrypted; Authenticated | B | |
CS601 | Udp And Tcp Are Both Layer Protocols | Physical | Data Link | Network | Transport | D | |
CS601 | Udp Needs The Address To Deliver The User Datagram To The Correct Application Program | Application | Internet | Physical | Port | D | |
CS601 | Unipolar Bipolar And Polar Encoding Are Types Of Encoding | Block | Line | Nrz | Manchester | B | |
CS601 | Updates For A Satellites Coordinates Can Be Obtained On The Www. This Is Probably A(N) Document | Passive | Dynamic | Active | Static | B | |
CS601 | Urgent Data Require The Urgent Pointer Field As Well As The Urg Bit In The Field | Sequence Number | Control | Offset | Reserved | B | |
CS601 | Uses Multicast Link State Routing Concepts To Create Source-Based Trees | Dvmrp | Cbt | Bvd | Mospf | D | |
CS601 | Using The Shannon Formula To Calculate The Data Rate For A Given Channel If C = B Then __________ | The Signal Is Equal To The Noise | The Signal Is Less Than The Noise | The Signal Is Greater Than The Noise | Not Enough Information Is Given To Answer The Question | A | |
CS601 | Vlan Technology Divides A Lan Into Groups | Multiplexed | Framed | Physical | Logical | D | |
CS601 | Voice Over Ip Is A(N) __________ Audio/Video Application | Interactive | Streaming Stored | Streaming Live | None Of The Above | A | |
CS601 | Was Designed As An Alternative To The T-1 Line | Vdsl | Sdsl | Hdsl | Adsl | C | |
CS601 | Wavelength Is __________ Proportional To Propagation Speed And __________ Proportional To Period | Directly; Directly | Inversely; Directly | Directly; Inversely | Inversely; Inversely | A | |
CS601 | We Use A Cryptography Method In Which The Character Z Always Substitutes For The Character G. This Is Probably | Polyalphabetic Substitution | Transpositional | Monoalphabetic Substitution | None Of The Above | C | |
CS601 | We Use An Cryptography Method In Which The Plaintext Aaaaaa Becomes The Ciphertext Bcdefg. This Is Probably | Monoalphabetic Substitution | Transposition | Polyalphabetic Substitution | None Of The Above | C | |
CS601 | What Are The Components Of A Browser? | Controller Client Program Interpreter | Retrieval Method Host Computer Path Name | Hypertext Hypermedia Html | All The Above | A | |
CS601 | What Does The Url Need To Access A Document? | Path Name | Host Computer | Retrieval Method | All The Above | D | |
CS601 | What Is Needed To Determine The Number Of The Last Byte Of A Fragment? | Identification Number | Offset Number | Total Length | (B) And © | D | |
CS601 | What Is Present In All Hdlc Control Fields? | N(R) | N(S) | Code Bits | P/F Bit | D | |
CS601 | What Is The Bandwidth Of A Signal That Ranges From 40 Khz To 4 Mhz? | 3.96 Mhz | 36 Mhz | 360 Khz | 396 Khz | A | |
CS601 | What Is The Basic Access Method For Wireless Lans As Defined By Ieee 802.11? | Llc | Pcf | Dcf | Bfd | C |