Objective bits - MLR Institute

MLR
Institute of Technology
ELECTRONICS AND COMMUNICATION ENGINEERING
UNIT-1
OBJECTIVE QUESTIONS
The _______ is the physical path over which a message travels.
A)
Protocol
B)
Medium
C)
Signal
D)
All the above
2.Which topology requires a central controller or hub?
A)
Mesh
B)
Star
C)
Bus
D)
Ring
3.Which topology requires a multipoint connection?
A)
Mesh
B)
Star
C)
Bus
D)
Ring
4.Communication between a computer and a keyboard involves ______________
transmission.
A)
simplex
B)
half-duplex
C)
full-duplex
D)
automatic
5.This was the first network.
A)
CSNET
B)
NSFNET
C)
ANSNET
D)
ARPANET
6.Which organization has authority over interstate and international commerce in the
communications field?
A)
ITU-T
B)
IEEE
C)
FCC
D)
ISOC
7._______ is the protocol suite for the current Internet.
A)
TCP/IP
B)
NCP
C)
UNIX
D)
ACM
8.There are ______________ Internet service providers.
A)
local
B)
regional
C)
national and international
D)
all of the above
9.The Internet model consists of _______ layers.
A)
Three
B)
Five
C)
Seven
D)
Eight
10.The process-to-process delivery of the entire message is the responsibility of the
_______ layer.
A)
Network
B)
Transport
C)
Application
D)
Physical
Mail services are available to network users through the _______ layer.
A)
Data link
B)
Physical
C)
Transport
D)
Application
11.The _______ layer changes bits into electromagnetic signals.
A)
Physical
B)
Data link
C)
Transport
D)
None of the above
12.Why was the OSI model developed?
A)
Manufacturers disliked the TCP/IP protocol suite.
B)
The rate of data transfer was increasing exponentially
C)
Standards were needed to allow any two systems to communicate
D)
None of the above
In the OSI model, as a data packet moves from the lower to the upper layers,
headers are _______.
A)
added
B)
removed
C)
rearranged
D)
modified
13.When a host on network A sends a message to a host on network B, which address
does the router look at?
A)
port
B)
logical
C)
physical
D)
none of the above
14.The ______ layer is responsible for moving frames from one hop (node) to the next.
A)
physical
B)
data link
C)
transport
D)
none of the above
15.The Internetworking Protocol (IP) is a ________ protocol.
A)
reliable
B)
connection-oriented
C)
both a and b
D)
none of the above
16.A port address in TCP/IP is ______ bits long.
A)
32
B)
48
C)
16
D)
none of the above
17.The session, presentation, and application layers are the ____ support layers.
A)
user
B)
network
C)
both (a) and (b)
D)
neither (a) nor (b)
18.TCP/IP is a ______ hierarchical protocol suite developed ____ the OSI model.
A)
seven-layer; before
B)
five-layer; before
C)
six-layer; before
D)
five-layer; after
19.The ____ address uniquely defines a host on the Internet.
A)
physical
B)
IP
C)
port
D)
specific
20.The ________ address, also known as the link address, is the address of a node as
defined by its LAN or WAN.
A)
physical
B)
IP
C)
port
D)
specific
UNIT-2
.Unipolar, bipolar, and polar encoding are types of _______ encoding.
A)
line
B)
block
C)
NRZ
D)
Manchester
2.PCM is an example of _______ conversion.
A)
digital-to-digital
B)
digital-to-analog
C)
analog-to-analog
D)
analog-to-digital
3.If the frequency spectrum of a signal has a bandwidth of 500 Hz with the highest
frequency at 600 Hz, what should be the sampling rate, according to the Nyquist
theorem?
A)
200 samples/s
B)
500 samples/s
C)
1000 samples/s
D)
1200 samples/s
4.Block coding can help in _______ at the receiver.
A)
Synchronization
B)
Error detection
C)
Attenuation
D)
(a) and (b)
5.In _______ transmission, a start bit and a stop bit frame a character byte.
A)
asynchronous serial
B)
synchronous serial
C)
parallel
D)
(a) and (b)
6.The data rate is sometimes called the ___ rate.
A)
baud
B)
bit
C)
signal
D)
none of the abov
7.ASK, PSK, FSK, and QAM are examples of ________ conversion.
A)
digital-to-digital
B)
digital-to-analog
C)
analog-to-analog
D)
analog-to-digital
8.Which multiplexing technique transmits analog signals?
A)
FDM
B)
TDM
C)
WDM
D)
(a) and (c)
9.In synchronous TDM, for n signal sources of the same data rate, each frame
contains _______ slots.
A)
n
B)
n+1
C)
n-1
D)
0 to n
10.________ can be achieved by using multiplexing; ______ can be achieved by
using spreading.
A)
Efficiency; privacy and antijamming
B)
Privacy and antijamming; efficiency
C)
Privacy and efficiency; antijamming
D)
Efficiency and antijamming; privacy
11.The ______ technique expands the bandwidth of a signal by replacing each
data bit with n bits.
A)
FDM
B)
DSSS
C)
FHSS
D)
TDM
12.In fiber optics, the signal is _______ waves.
A)
light
B)
radio
C)
infrared
D)
very low-frequency
13.Radio waves are _________.
A)
omnidirectional
B)
unidirectional
C)
bidirectional
D)
none of the above
14.Microwaves are _________.
A)
omnidirectional
B)
unidirectional
C)
bidirectional
D)
none of the above
15.Traditionally, _____ methods of switching have been important.
A)
four
B)
three
C)
five
D)
six
16.Packet-switched networks can also be divided into ______subcategories:
virtual-circuit networks and datagram networks
A)
four
B)
three
C)
two
D)
five
17.In __________, each packet is treated independently of all others.
A)
datagram switching
B)
circuit switching
C)
frame switching
D)
none of the above
18.In a one-stage space division switch, if N = 200, the number of crosspoints is
______.
A)
10,000
B)
20,000
C)
40,000
D)
30,000
19.The network layer in the Internet is designed as a __________ network.
A)
virtual-circuit
B)
datagram
C)
circuit-switched
D)
none of the above
20._______ is suitable for businesses that require comparable upstream and
downstream data rates.
A)
VDSL
B)
ADSL
C)
SDSL
D)
(a) and (b)
UNIT-3
1. When connection - oriented service is used, transfers have distinct phases
1. One
2. Two
3. Three
4. Four
2. The approach for DLL to break the bit stream up into discrete parts is _ _ _ _ _ _ _
_
1. Naming
2. Claiming
3. Charging
4. Framing
3. Data link layer provides service to _ _ _ _ _ _ _ _ _ _ layer
1. Transport
2. Application
3. Session
4. Network
4. Unacknowledged connection less service is adopted when _ _ _ _ _ _
1. Error rate is very low
2. Error rate is very high
3. Long length is required
4. short length is required
5. Each frame begins and ends with a special bit pattern called _ _ _ _ _ _ _ _
1. Char stuffing
2. Flag
3. Bit stuffing
4. Char count
6. The data link layer must use the service provided to it by the _ _ _ _ _ _ _ _ layer
1. Data link
2. Physical
3. Transport
4. Session
7. Which error detection method cannot detect a burst error?
1. VRC
2. LRC
3. CRC
4. Hamming code
8. The number of bit positions in which two code words differ is called
1. Checksum distance
2. Hamming distance
3. CRC distance
4. Parity distance
9. Computation of checksum is implemented in hardware using
1. Shift register
2. AND register
3. OR register
4. EX - OR register
10. In cyclic redundancy checking, what is the CRC?
1. The divisor
2. The quotient
3. The dividend
4. The remainder
11. In CRC there is no error if the remainder at the receiver is _ _ _ _ _ _ _ _ _ _ _ _.
1. Equal to the remainder at the sender
2. Zero
3. Non - zero
4. The quotient at the sender
12. Error detection is usually done in the _ _ _ _ _ _ _ _ _ layer of the OSI model
1. Physical
2. Data link
3. Network
4. Session
13. Which error detection method uses one's complement arithmetic?
1. VRC
2. LRC or HRC
3. CRC
4. Checksum
14. In cyclic redundancy checking, the divisor is _ _ _ _ _ _ _ _ the CRC
1. The same size as
2. One bit less than
3. One bit more than
4. Two bits more than
15. Which error detection method involves polynomials?
1. VRC
2. LRC
3. CRC
4. Checksum
16. In CRC the quotient at the sender _ _ _ _ _ _ _ _ _
1. Becomes the dividend at the receiver
2. Becomes the divisor at the receiver
3. Is discarded
4. Is the remainder
17. At the CRC generator, _ _ _ _ _ _ added to the data unit after the division process
1. 0s are
2. 1s are
3. The polynomial is
4. The CRC remainder is
18. What is present in all HDLC control fields?
1. P/F bit
2. N(R)
3. N (S)
4. Code bits
19. The shortest frame in HDLC protocol is usually the _ _ _ _ _ _ _ _ _ _ _ _ frame.
1. information
2. supervisory
3. management
4. unmanaged frame
20. HDLC is a _ _ _ _ _ _ _ _ _ _ protocol.
1. character - oriented
2. bit - oriented
3. byte - oriented
4. count – oriented
UNIT-4
1. CSMA/CD and token bus user choose _ _ _ _ _ _ bridge
1. Source routing bridge
2. Transparent bridge
3. Remote bridge
4. Selective Bridges
2. _ _ _ _ _ _ bridge operates in promiscuous mode
1. Transparent bridge
2. Selective flooding
3. Source Routing
4. Remote Bridges
3. In _ _ _ _ _ _ _ _ _ protocol the station transmits with a probability of 1 whenever it
finds the channel idle
1. 1 - persistent CSMA
2. p - persistent CSMA
3. non - persistent CSMA
4. ALOHA.
4. The channel efficiency of bit-map protocol at low load is _ _ _ _ _ _ _ _
1. d/(N+d)
2. d/(d+1)
3. d/(d+log2N)
4. N/(d+log2d)
5. The channel efficiency of bit-map protocol at high load is _ _ _ _ _ _ _ _
1. d/(N+d)
2. d/(d+1)
3. d/(d+log2N)
4. N/(d+log2d)
6. The channel efficiency of binary-countdown protocol is _ _ _ _ _ _
1. d/(N+d)
2. d/(d+1)
3. d/(d+log2N)
4. N/(d+log2d)
7. _ _ _ _ _ _ _ protocol is widely used on LAN in the MAC sub layer
1. CSMA
2. TCP
3. CSMA/CD
4. GSM
8. The first collision free protocol is _ _ _ _ _ _ _ _ _ _
1. Binary countdown
2. Basic bitmap
3. Reservation protocol
4. SAP
9. Multiple users share a common channel is called _ _ _ _ _ _ _ _ _
1. LAN
2. WAN
3. Contention
4. CSMA/CD
10. _ _ _ _ _ _ _ _ _ _system is used for ground based radio broadcasting.
1. Static channel allocation
2. Dynamic channel allocation
3. ALOHA
4. CSMA
11. Protocols in which stations listen for a carrier and act accordingly are _ _ _ _ _ _ _
_
1. ALOHA
2. Multiple access
3. Station Model
4. CSMA
12. Busy Waiting is found in _ _ _ _ _ _ _ _ _ _ _ _
1. ALOHA
2. Slotted ALOHA
3. 1-persistent CSMA
4. non-persistent CSMA
13. Contention Slots are not found in _ _ _ _ _ _ _ _ _
1. non-persistent CSMA
2. CSMA/CD
3. Bitmap
4. Binary Countdown
14. 802.3 base band systems use _ _ _ _ _ _ _ _ encoding.
1. Manchester
2. RZ
3. NRZ
4. RZ or NRZ
15. In 802.3, each frame starts with a _ _ _ _ _ _ _ _ of 7 bytes
1. SD
2. Preamble
3. ED
4. pad
16. In 802.3, the high order bit of the destination address is a '0' for _ _ _ _ _ _ _
addresses
1. Ordinary
2. Group
3. Broadcast
4. Unicast
17. In 802.3, the address consisting of all 1 bits is reserved for _ _ _ _ _ _ _ _
1. Unicast
2. Multicast
3. Broadcast
4. Ordinary
18. The _ _ _ _ _ _ _ _ standard describes the CSMA/CD protocol
1. IEEE 802.2
2. IEEE 802.3
3. IEEE 802.4
4. IEEE 802.5
19. Which IEEE 802 standard does not provide for a collision-free protocol?
1. 802.2
2. Bit map
3. 802.4
4. 802.5
20. In token bus, how does a station transmit data to the destination node?
1. By seizing token
2. By generating token
3. By releasing token
4. By releasing frame
UNIT-5
1. Which of the following is not an internetworking device?
1. Bridge
2. Repeater
3. Router
4. Cable
2. What type of bridge must have its address table entered manually?
1. Simple
2. Transparent
3. Multi port
4. Source routing
3. A bridge has access to the _ _ _ _ _ _ _ _ _ _ _ address of a station on the same
network.
1. Physical
2. Network
3. Service access point
4. Logical
4. In source routing bridges _ _ _ _ _ _ _ _ _ frame is used to discover the destination
1. Discovery
2. Control
3. Data
4. Acknowledgement
5. LAN's can be connected by a device called _ _ _ _ _ _ _ _ _ _
1. Routers
2. Modems
3. Ethernet card
4. Bridges
6. VLAN technology divides a LAN into ______ groups
a. Physical
b. Logical
c. Multiplexed
d. Framed
7. ATM multiplexes cells using _ _ _ _ _ _ _ _ _ _
1. Asynchronous FDM
2. Synchronous FDM
3. Asynchronous TDM
4. Synchronous TDM
8. In an ATM network, all cells belonging to a single message follow the same _ _ _ _
_ _ _ and remain in their original order until they reach their destination.
1. Transmission path
2. Virtual path
3. Virtual circuit
4. Virtual connection
9. In data communications, ATM is an acronym for
1. Automated Transfer Mode
2. Automatic Transfer Modulation
3. Automatic Transport Mode
4. Asynchronous Transfer Mode
10. Because ATM _ _ _ _ _ _ _ _ _ _ , which means that cells follow the same path,
the cells do not usually arrive out of order.
1. is asynchronous
2. is multiplexed
3. is a network
4. uses virtual circuit routing
UNIT-6
1. Adaptive routing algorithms get their information from _ _ _ _ _ _.
a) only from local environment
b) only from adjacent routers
c) from locally, adjacent, external routers
d) only from external routers
2. If the route from I to J is computed in advance, off line, and downloaded to the
routers when the network is booted is called as _ _ _ _ _ _ _ _ _ _ _.
a) Dynamic routing
b) Session routing
c) Temporary routing
d) Static routing
3. The router algorithm takes the decision to changes the route when _
a) router changes
b) topology changes
c) user changes
d) transmission time does not change
4. .If route from router I to router J is computed on line based on the current statistics,
then it is called as _ _ _ _ _ _ _ _ _ _ _.
a) Dynamic routing
b) Session routing
c) Temporary routing
d) . Static routing
5. _ _change their routing decisions to reflect changes in the topology.
a) Nonadaptive algorithms
b) Adaptive algorithms
c) Static algorithms
d) Recursive algorithms
6. . _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ do not base their routing decisions on
measurements or estimates of the current traffic and topology.
a) Nonadaptive algorithms
b) Adaptive algorithms
c) Static algorithms
d) Recursive algorithms
7. In Hierarchical routing for N router subnet, the optimal number of levels is _ _
a) log N
b) log(N - 1)
c) ln N
d) ln (N - 1)
8. In Hierarchical routing, the routers are divided into what is called as _ _ _ _ _
a) Zones
b) Cells
c) Regions
d) Blocks
9. The regions in Hierarchical routing are grouped in to _ _ _ _ _ _ _ _.
a) Zones
b) Cells
c) Regions
d) Blocks
10. The Clusters in Hierarchical routing are grouped in to _ _ _ _ _ _ _ _.
a) Zones
b) Cells
c) Regions
d) Blocks
11. Sending a packet to all destinations simultaneously is called _ _ _ _ _.
a) Multicasting
b) Unicasting
c) Telecasting
d) Broadcasting
12. A normal Flooding technique is an example of _ _ _ _ _ _ _ _ _ _.s
a) Multicasting
b) Unicasting
c) Telecasting
d) Broadcasting
13. Sending a message to a well defined group that are numerically large in size but
small compared to the network as a whole is called _ _ _ _ _ _ _ .
a) Multicasting
b) Unicasting
c) Telecasting
d) Broadcasting
14. An IP address consist of _________ bits
a. 4
b. 8
c. 32
d. Any of the above
15. Identify the class of IP address 191.1.2.3
a. Class A
b. Class B
c. Class C
d. Class D
16. A subnet mask in class B can have _______ 1s with the remaining bits 0s.
a. Nine
b. Fourteen
c. Seventeen
d. Three
17. On a network that uses Nat, the _________ has a translation table.
a. Switch
b. Router
c. Server
d. None of the above
18. In IPv6, the _______ field in the base hearder restricts the lifetime of a datagram.
a. Version
b. Priority
c. Next-Header
d. Hop limit
19. ___________ is a multicast routing protocol using source-based trees.
a. DVRMP
b. MOSPF
c. CBT
d. (a) and (b)
20. ____________ is a multicasting application.
a. Teleconferencing
b. Distance learning
c. Information dissemination
d. All the above
UNIT-7
1. What type of addressing is specifically used by the transport layer?
a. station address
b. application program port address
c. dialog address
d. network address
2. Which of the following functionalities must be implemented by a transport protocol
over and above the network protocol?
a. Recovery from packet losses
b. Detection of duplicate packets
c. Packet delivery in the correct order
d. End to end connectivity
3. The TCP sockets are assigned address using _ _ _ _ _ _ _ _ _ _ _ _ primitive.
a. LISTEN
b. ACCEPT
c. BIND
d. CONNECT
4. SEND and RECEIVE primitives are called as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
primitives.
a. blocking
b. non blocking
c. data transfer
d. error control
5. CONNECT and DISCONNECT primitives are called as _ _ _ _ _ _ _ _ _ _ _ _ _ _
_ _ _ primitives. [11M03]
a. blocking
b. non blocking
c. data transfer
d. error control
6. Transport protocol data units(TPDUs) are contained in _ _ _ _ _ _ _ _ _ _ _ _ _ .
a. protocol
b. frame
c. program
d. packet
7. Which of the following layer is transport service provider?
a. network
b. transport
c. session
d. application
8. The transport layer performs the same types of functions as the _ _ _ _ _ _ _ _ _ _ _
_ _ _ _ _ layer. [11S03]
a. session
b. network
c. data link
d. physical
9. The end points of a transport connection are called _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ .
a. TSAPs
b. AAL - SAPs
c. NSAPs
d. PSAPs
10. In transport layer, End to End delivery is the movement of data from _ _ _ _ _ _ _
____.
a. one station to the next station
b. one network to the other network
c. source to destination
d. one router to another router
11. Which of the following are session layer check points?
a. allow just a portion of a file to be resent
b. detect and recover errors
c. control the addition of headers
d. are involved in dialog control
12. The function of the transport layer ensuring that all pieces of a transmission arrive
at the destination, not just some of them is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ .
a. Duplication control
b. Sequence control
c. Loss control
d. Error control
13. If either of the communicating device can ask for disconnection by sending
DISCONNECT REQUEST TPDU to the other, and immediately disconnect without
waiting for acknowledgement is called _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ .
a. Graceful disconnection
b. Abrupt disconnection
c. Greedy disconnection
d. Random disconnection
14. The type of disconnection in which three way handshake protocol is used is _ _ _
_ _ _ _ _ _ . [12M02]
a. Graceful disconnection
b. Abrupt disconnection
c. Greedy disconnection
d. Random disconnection
15. 8. The parameter which gives the probability of the transport layer itself
spontaneously terminating a connection due to internal problems is called
a. protection
b. resilience
c. option negotiation
d. transfer failure
16. A single transport layer connection split and connects the different network
connections is called _ _ _ _ _ _ _ _ _ _ _ .
a. Upward multiplexing
b. Downward multiplexing
c. Congestion control
d. Flow control
17. Error control is needed at the transport layer because of potential errors occurring
________________.
a. from transmission line noise
b. in routers
c. from out-of-sequence delivery
d. from packet loss
18. If two identical packets arrive at the destination, then _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_ _ _ _ _ _ _ _ control is not functioning.
a. Error
b. Sequence
c. Loss
d. Duplication
19. _ _ _ _ _ _ _ _ _ _ _ _ _ _ type of multiplexing are used by transport layer to
improve transmission efficiency.
a. upward
b. downward
c. horizontal
d. vertical
20. Multiplexing of different transport connections onto the same network connection
is called _ _ _ _ _ _ _ _ _ _ _ _ _ .
a. Upward multiplexing
b. Downward multiplexing
c. Congestion control
d. Flow control
KEY
1)b 2) d 3) c 4) a 5) b 6) b 7) a 8) c 9) a 10) c
11) a 12) c 13) b 14) a 15) b 16) b 17) b 18)d 19)a 20)a
UNIT-8
1. In cryptography the following uses transposition ciphers and the keyword is LAYER. Encrypt
the following message(spaces are omitted during encryption) WELCOME TO NETWORK
SECURITY! [16D01]
a. WMEKREETSILTWETCOOCYONRU!
b. EETSICOOCYWMEKRONRU!LTWET
c. LTWETONRU!WMEKRCOOCYEETSI
d. ONRU!COOCYLTWETEETSIWMEKR
2. The length of the key in one time pad method is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [16D02]
a. Random
b. Fixed
c. 64
d. 56
3. An example of public key algorithm is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [16M01]
a. RSA
b. DES
c. IREA
d. RC5
4. Caeser cipher is represented as _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [16M02]
a. C = (p + 3) mod 3
b. C = (p + 26) mod 3
c. C = (p - 3) mod 26
d. C = (p + 3) mod 26
5. The security service that no party to a contract can later deny having sent it is _ _ _ _ _ _ _ _ .
[16M03]
a. Integrity
b. Confidentiality
c. Authenticity
d. Nonrepudiation
6. Number of rounds in Data Encryption Standard algorithm [16S01]
7.
8.
9.
10.
11.
12.
13.
14.
a. 8 rounds
b. 12 rounds
c. 16 rounds
d. 24 rounds
Decryption and Encryption of data are the responsibility of which of the following layer
[16S02]
a. Session layer
b. Network layer
c. Transport layer
d. Presentation layer
The art of breaking ciphers is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [16S03]
a. cryptology
b. cryptography
c. cryptanalysis
d. crypting
The number of subkeys generated in IDEA algorithm are _ _ _ _ _ _ _ _ _ _ - [16S04]
a. 54
b. 48
c. 52
d. 50
Number of S - boxes used in DES algorithm is _ _ _ _ _ _ _ _ _ _ . [16S05]
a. 4
b. 8
c. 16
d. 32
What is the minimum number of DNS name servers, does each domain should posses?
[17D01]
a. 1
b. 2
c. 3
d. 4
To map a name onto an IP address, an application program calls a library procedure called the
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [17D02]
a. Scheduler
b. Resolver
c. Mapper
d. Encoder
The DNS name space is divided into nonoverlapping _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [17M01]
a. regions
b. blocks
c. divisions
d. zones
The domain name that ends with a period is called _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [17M02]
a. completed
15.
16.
17.
18.
19.
20.
b. incomplete
c. absolute
d. universal
In DNS, the resource records are presented in _ _ _ _ _ _ _ _ _ format. [17M03]
a. English
b. Hungarian
c. Unicode
d. ASCII
The components in the domain name space are separated by _ _ _ _ _ _ _ _ _ _ _ _ _ _ .
[17S01]
a. Comma
b. Dot
c. Colon
d. Semi colon
The number of characters usied in country domain is _ _ _ _ _ _ _ _ _ _ _ _ _ . [17S02]
a. 2
b. 3
c. 4
d. 5
DNS represents _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ structure. [17S03]
a. bus
b. loop
c. tree
d. ring
The generic domain for nonprofit organizations is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [17S04]
a. Com
b. Edu
c. Org
d. Net
When the resolver gives a domain name to DNS, what it gets back are the _ _ _ _ _ _ _ _ _ _ _ _
_ _ _ _ _ associated with that name. [17S05]
a. Resource records
b. IP records
c. Ethernet address
d. Port number
KEY
1) b 2) a 3) a 4) d 5) d 6) c 7) d 8) c 9) c 10) b 11) b 12) b 13) d 14) c 15) d 16) b 17) a 18) c
19) c 20) a