1 Adda247 No. 1 APP for Banking & SSC Preparation Website: bankersadda.com sscadda.com store.adda247.com
|
|
- Noel Ira Phelps
- 5 years ago
- Views:
Transcription
1 1 Adda247 No. 1 APP for Banking & SSC Preparation
2 Q1. Which TCP/IP transport layer protocol is faster? (a) ICMP-because it is connection-oriented (b) TCP-because it is connected-oriented (c) UDP-because it is connection-less (d) IP-because it is connection-less Q2. In OSI Model which layer is responsible for Encryption & Decryption of data? (a) Physical (b) Data Link (c) Presentation (d) Session (e) Application Q3. IP address is belongs to which class? (a) A (b) B (c) C (d) D (e) E Q4. Which of the following is a single communication channel that is shared by all the users on the network? (a) Point-to-Point (b) Broadcast Network (c) Protocol (d) PAN Q5. Which type of network consists set of switches connected by physical links? (a) Circuit Switched Network (b) Datagram Network (c) Virtual Circuit Network (d) All of these Q6. What are the three types of addresses in IPV6? (a) Class A, Class B, Class C (b) Unicast, anycast, multicast (c) Unicast, datacast, multicast (d) Unicast, dualcast, multicast 2 Adda247 No. 1 APP for Banking & SSC Preparation
3 Q7. Which of the following is commonly used between hosts on the Internet to exchange routing information? (a) HTTP (b) EGP (c) UDP (d) SMTP (e) IGP Q8. Which of the following layer is Network Support layer? (a) Session layer (b) Presentation layer (c) Application layer (d) Both (b) and (c) (e) Data Link Layer Q9. Which of the following service is responsible for changing the source IP address of a packet to the IP address of the public interface on the router. (a) NAT (b) SMTP (c) DHCP (d) HTTP (e) UDP Q10. Which of the following protocol uses both TCP and UDP? (a) HTTP (b) SMTP (c) TELNET (d) DNS (e) FTP Q11. In which protocol, the sender sends one frame and then waits for an acknowledgement before proceeding? (a) Sliding window (b) Stop and wait (c) Frame buffer (d) IP (e) Routing Protocol Q12. What is true about the MAC address? (a) Used to identify networks (b) Defined at the Network layer (c) Unique for every networked device in the world (d) Identical to the IP address (e) All are true 3 Adda247 No. 1 APP for Banking & SSC Preparation
4 Q13. Which of the following protocol is used for securing connections between network application clients and servers over an insecure network? (a) SSL (b) BGP (c) UDP (d) HTTP (e) IGP Q14. Which protocol is used to sending mail? (a) HTTP (b) IMAP (c) SMTP (d) IP (e) ICMP Q15. An accountant office has four employees. They have four computers and two printers. What kind of network would you suggest they install? (a) Client server network (b) Peer-to peer network (c) Intranet (d) MAN (e) None of the above Q16. In which clause tuple variables are define in SQL? (a) Like clause (b) Group BY clause (c) Where clause (d) From clause (e) All of the above Q17. Which of the following allows you to specify multiple values in a WHERE clause? (a) Between (b) In (c) Like (d) Joins (e) Insert Q18. Which transaction property ensure that multiple transactions can occur concurrently without leading to inconsistency of database state? (a) Consistency (b) Isolation (c) Durability (d) Atomicity (e) Not any property ensures the transaction independency 4 Adda247 No. 1 APP for Banking & SSC Preparation
5 Q19. Which of the following allows to create complex entities from existing entities and relationships? (a) Specialization (b) Generalization (c) Aggregation (d) Inheritance (e) Encapsulation Q20. which of the following is a view of the database that appears to an application program? (a) Tuple (b) Instance (c) Subschema (d) Relation (e) Virtual Table Q21. 'REVOKE' command is used in which category of SQL statement? (a) DCL (b) TCL (c) DML (d) DDL Q22. Which clause is used to specify condition while retrieving data from table in SQL? (a) WHERE (b) LIKE (c) HAVING (d) Group By (e) Select Q23. Derived attribute in E-R Diagram represented by: (a) Rectangle (b) Diamond (c) Ellipse (d) Double Ellipse (e) Dashed Ellipse Q24. Which of the following type of anomalies are not found in relational database? (a) Insertion Anomalies (b) Deletion Anomalies (c) Update Anomalies (d) Create Anomalies 5 Adda247 No. 1 APP for Banking & SSC Preparation
6 Q25. Which normal form is considered suitable for design a normal relational database? (a) 1 NF (b) 2 NF (c) 3 NF (d) 4 NF (e) 5 NF Q26. How can you return all the records from a table named "Student" sorted descending by "FirstName", in SQL? (a) SELECT * FROM Student ORDER BY FirstName DESC (b) SELECT * FROM Student SORT BY 'FirstName'DESC (c) SELECT * FROM Student ORDER FirstName DESC (d) SELECT * FROM Student SORT 'FirstName'DESC (e) SELECT ALL FROM Student ORDER FirstName DESC Q27. The ability to modify the internal schema without causing any change to the external schema: (a) Physical data independence (b) Logical data independence (c) External data independence (d) Both Physical and External data independence Q28. Which key is representing relationship between tables? (a) Primary Key (b) Secondary Key (c) Foreign Key (d) None of these (e) All of these Q29. Which level of database architecture representing total view of database? (a) Conceptual view (b) Internal view (c) External view (d) Physical view Q30. Which operator is used to select values within a range? (a) BETWEEN (b) RANGE (c) WITHIN (d) JOINS (e) UNION 6 Adda247 No. 1 APP for Banking & SSC Preparation
7 Q31. Which of the following is used to transfer data intended for a peripheral device into a disk so that it can be transmitted to the peripheral device at a more suitable time or in bulk? (a) Virtual programming (b) Multi programming (c) Caching (d) Multitasking (e) Spooling Q32. What are the ways of dealing with deadlock? (a) Deadlock prevention (b) Deadlock recovery (c) Deadlock detection (d) All of the above (e) Deadlock breakup. Q33. What is Multiprogramming system? (a) it is easier to develop than single programming systems (b) it executes each job faster (c) it executes more jobs in the same time (d) it is used only on large main frame computers Q34. A direct Memory Access (DMA) transfer implies: (a) Direct transfer of data between memory and accumulator (b) Direct transfer of data between memory and I/O devise without the use of microprocessor (c) Transfer of data exclusively within microprocessor registers (d) A fast transfer of data between microprocessor and I/O devices Q35. What is use of "touch" command in Linux? (a) create a file (b) remove a file (c) Show the manual page (d) Show home directory (e) Copy files Q36. Which of the following is the time interval between the submission and completion of job? (a) Waiting time (b) Turnaround time (c) Throughput (d) Response time (e) Seek time 7 Adda247 No. 1 APP for Banking & SSC Preparation
8 Q37. What is Optimal Page Replacement algorithm? (a) Replace the page that will not be used for a long time (b) Replace the page that has been used for a long time (c) Replace the Page that has not been used for a long time (d) Replace Page not in memory (e) Used to extract page in main memory Q38. What is effect of thrashing in CPU utilization? (a) Increase CPU utilization (b) Decrease CPU utilization (c) Keeps constant (d) NO effect on CPU Q39. Which of the following is true about compaction in operating system? (a) It is a technique for overcoming fatal error (b) It is a page management technique (c) It helps to solve the problem of fragmentation (d) Allocate the address of physical memory Q40. Banker's Algorithm is used for: (a) Deadlock Detection (b) Deadlock Prevention (c) Deadlock Avoidance (d) Page Scheduling (e) CPU Scheduling Q41. The processes that are residing in main memory and are ready and waiting to execute are kept on a list called: (a) job queue (b) ready queue (c) execution queue (d) process queue (e) priority queue Q42. Which of the following is the time between a command request and the beginning of a response? (a) Throughput (b) Waiting time (c) Response time (d) Turnaround time (e) Beginning time 8 Adda247 No. 1 APP for Banking & SSC Preparation
9 Q43. Which of the following is the condition of mutual exclusion occurrence? (a) It occurs between two disjoint processes that do not interact (b) among processes that share resources (c) among processes that do not use the same resource (d) process holding a resource. Q44. What is Dirty Bit in operating system? (a) page with corrupted data (b) wrong page in the memory (c) page that is modified after being loaded into cache memory (d) page that is less frequently accessed Q45. Which of the following UNIX command is used to remove or delete files? (a) rm (b) mv (c) cp (d) lpr (e) man Q46. Which of the following is not an antivirus? (a) Bitdefender (b) Kaspersky (c) Cobian (d) F-secure (e) Avira Q47. Which of the following is the combination of public and private cloud? (a) Business cloud (b) Space cloud (c) Rackspace cloud (d) Hybrid cloud (e) Commodity cloud Q48. In which debugging technique, when an error has occurred, one needs to start tracing the program backward one step at a time evaluating the values of all variables until the cause of error is found? (a) Cause Elimination (b) Program Slicing (c) Backtracking (d) Brute Force Method 9 Adda247 No. 1 APP for Banking & SSC Preparation
10 Q49. Which of the following maintenance strategies involves performing maintenance before problems occur to avoid breakdowns and disruptions? (a) Perfective Maintenance (b) Corrective Maintenance (c) Adaptive Maintenance (d) Preventive Maintenance (e) Breakdown Maintenance Q50. Which of the following malicious software that can change its code and signature patterns with each iteration? (a) Keylogger (b) Mutation Engine (c) Morris worm (d) Metamorphic Virus (e) Stealth Virus Q51. In which type of SQL join returns all the rows from left table combine with the matching rows of the right table (a) Inner join (b) Left outer join (c) Right outer join (d) Full join (e) Self join Q52. An accountant office has four employees. They have four computers and two printers. What kind of network would you suggest they install? (a) Client server network (b) Peer-to peer network (c) Intranet (d) MAN (e) None of the above Q53. Which of the following is the process of taking control over an existing session between a client and a server? (a) IP spoofing (b) Replay attack (c) Session hijacking (d) WarDriving (e) Backdoor 10 Adda247 No. 1 APP for Banking & SSC Preparation
11 Q54. If different properties and functions of a real-world entity is grouped or embedded into a single element, what is it called in OOP language? (a) Inheritance (b) Polymorphism (c) Abstraction (d) Encapsulation (e) Generalization Q55. Which keyword is used to define a scope where identifiers like variables, functions, classes, etc. are declared in C++? (a) namespace (b) mutable (c) long (d) while (e) int Q56. Which among the following is not a necessary condition for constructors? (a) Its name must be same as that of class (b) It must not have any return type (c) It must contain a definition body (d) It can contain arguments Q57. Which feature works with both Microsoft Explorer and Microsoft Edge and monitors websites, pages, and downloads for known issues? (a) Agent X (b) Blocker (c) Armenia (d) SmartScreen (e) None of there Q58. A free file storage and file sharing service provided by Microsoft when you sign up for a Microsoft account is: (a) OneDrive (b) Google Drive (c) icloud (d) AWS (e) D-cloud Q59. What is the correct HTML for inserting an image? (a) <image src="image.gif" alt="myimage"> (b) <img href="image.gif" alt="myimage"> (c) <img src="image.gif" alt="myimage"> (d) <img alt="myimage">image.gif</img> (e) <img sty= MyImage >img.gif</img> 11 Adda247 No. 1 APP for Banking & SSC Preparation
12 Q60. Which of the following cloud computing service allows user to subscribe to a software application and execute it online, rather than purchasing it to install on in-house computers? (a) IaaS (b) PaaS (c) CaaS (d) SaaS (e) EaaS Q61. Ethernet use which Topology? (a) Bus (b) Star (c) Ring (d) Both (a) and (b) (e) Mesh Q62. Default port for HTTP: (a) 23 (b) 80 (c) 21 (d) 25 (e) 30 Q63. What is the main protocol used to access data on WWW? (a) FTP (b) HTML (c) HTTP (d) SMTP (e) TFTP Q64. What is CIDR (Classless Inter Domain Routing)? (a) It is used in class C Networks (b) It is used in class B Networks (c) It is used in class A Networks (d) All of the above (e) only (b) and (c) Q65. DNS is defining at which layer of TCP/IP model? (a) Internet layer (b) Data link layer (c) Transport layer (d) Application layer (e) Both (a) and (c) 12 Adda247 No. 1 APP for Banking & SSC Preparation
13 Q66. Three-way hand shake method used in which of the following? (a) Connection establishment (b) Connection termination (c) Connection release (d) Path finding (e) packet forwarding Q67. In which type of switching technique whole message are transmitted at a time from source to destination? (a) Packet switching (b) Circuit switching (c) Message switching (d) Data switching (e) Key switching Q68. Which of the following protocol is used for remote terminal connection service? (a) TELNET (b) FTP (c) RARP (d) UDP (e) SMTP Q69. Circuit Switching takes place at which layer? (a) Transport layer (b) Application layer (c) Presentation layer (d) Physical layer (e) Data link layer Q70. SIP, DHCP and DNS are which layer protocol of OSI model? (a) Presentation layer (b) Transport layer (c) Application layer (d) Session layer (e) Network layer Q71. Which of the following is protocol data units of layer 2? (a) Bits (b) segments (c) Packets (d) Frames (e) Data 13 Adda247 No. 1 APP for Banking & SSC Preparation
14 Q72. Which of the following are the two mode of IP security? (a) Certificate and tunnel (b) Certificate and transport (c) Transport and tunnel (d) Security and phases (e) Encryption and security Q73. Which of the following OSI model layer is used for logical addressing? (a) Transport Layer (b) Application Layer (c) Network Layer (d) Session Layer (e) Physical Layer Q74. What is BGP in networking? (a) Balanced Gateway Protocol (b) Border Gateway Protocol (c) Broadband Gateway Protocol (d) Balanced Goal Protocol (e) Balanced Gate Protocol Q75. Default subnet mask of Class C IP address is: (a) (b) (c) (d) Q76. Which level of testing is evaluating the software/system compatibly with the business requirements? (a) Integration testing (b) System testing (c) Acceptance testing (d) Unit Testing (e) Evaluation Testing Q77. What is UML (Uniform Modeling Language)? (a) Designing technique (b) Testing technique (c) Maintenance technique (d) Delivery Technique (e) Debugging Technique 14 Adda247 No. 1 APP for Banking & SSC Preparation
15 Q78. Which of the following software development model is also referred as Linear Sequential Model? (a) Spiral Model (b) Iterative Model (c) Waterfall Model (d) Incremental Model (e) V-Model Q79. Which is not a software life cycle model? (a) Waterfall model (b) Spiral model (c) Prototyping model (d) Capability maturity model (e) V-model Q80. Acceptance tests are normally conducted by the: (a) developer (b) end users (c) test team (d) systems engineers Q81. What are the qualities of good software? (a) Reliability (b) Correctness (c) Efficiency (d) Portability (e) All of the above Q82. If user participation is available, which model is to be chosen? (a) Waterfall (b) Iterative enhancement model (c) Spiral model (d) RAD model (e) V-model Q83. In which debugging technique, when an error has occurred, one needs to start tracing the program backward one step at a time evaluating the values of all variables until the cause of error is found? (a) Cause Elimination (b) Program Slicing (c) Backtracking (d) Brute Force Method 15 Adda247 No. 1 APP for Banking & SSC Preparation
16 Q84. Which of the following maintenance strategies involves performing maintenance before problems occur to avoid breakdowns and disruptions? (a) Perfective Maintenance (b) Corrective Maintenance (c) Adaptive Maintenance (d) Preventive Maintenance (e) Breakdown Maintenance Q85. Which phase is not available in software life cycle? (a) Coding (b) Testing (c) Maintenance (d) Abstraction (e) None of the above Q86. Which of the following is testing is also known as clear box testing? (a) White box testing (b) Black box testing (c) Grey box testing (d) Behavioral testing Q87. Alpha testing is done by: (a) Customer (b) Tester (c) Developer (d) All of the above (e) Only (a) and (b) Q88. Which one is the most important feature of spiral model? (a) Quality management (b) Risk management (c) Performance management (d) Efficiency management (e) Cost management Q89. Which process is the examination and alteration of a system to reconstitute it in a new form? (a) Software reengineering (b) Software reverse engineering (c) Software forward engineering (d) Software testing (e) Software costing 16 Adda247 No. 1 APP for Banking & SSC Preparation
17 Q90. Regression testing in primarily related to which type of testing? (a) Functional testing (b) Data flow testing (c) Development testing (d) Maintenance testing Q91. Which of the following is used to obtain information about a professor with name pankaj? (a) (b) (c) (d) (e) Q92. How can you change "Tripathi" into "Purohit" in the "LastName" column in the Persons table? (a) MODIFY Persons SET LastName='Tripathi' INTO LastName='Purohit (b) MODIFY Persons SET LastName='Purohit' WHERE LastName='Tripathi' (c) UPDATE Persons SET LastName='Tripathi' INTO LastName='Purohit' (d) UPDATE Persons SET LastName='Purohit' WHERE LastName='Tripathi' (e) CREATE Person SET LastName= Purohit WHERE LastName= Tripathi Q93. In which type of SQL join returns all the rows from left table combine with the matching rows of the right table? (a) Inner join (b) Left outer join (c) Right outer join (d) Full join (e) Self join Q94. In E-R Diagram, total participation in entities is represented by which of the following shape? (a) Double Rectangle (b) Eclipse (c) Diamond (d) Double line (e) Double eclipse Q95. Which SQL operator allows you to specify multiple values in a WHERE clause? (a) Between (b) Select (c) Joins (d) In (e) Like 17 Adda247 No. 1 APP for Banking & SSC Preparation
18 Q96. In SQL server, indexes are organized as: (a) List (b) Array (c) Queue (d) B-tree (e) Stack Q97. Which of the following is a condition created within a database or data storage technology in which the same piece of data is stored in two separate places? (a) Data Enumeration (b) Data Iteration (c) Data Concurrency (d) Data Redundancy (e) Data Sufficiency Q98. What does the SYSDATE function Contain: (a) Only Current Date (b) Only Current Time (c) Both Current Date and Current Time (d) Only Hours of Time (e) Only month Q99. By which of the following statements, we can undo all the updates performed on the transaction? (a) Undo (b) Commit (c) Rollback (d) Replace (e) Reverse Q100. What is OLTP? (a) Operating Limit Transaction Processing (b) Operation Line Transaction Processing (c) On-line Transaction Processing (d) Online Termination processing (e) Operation Line Termination Processing Q101. Which of the following is not a DDL command? (a) CREATE (b) ALTER (c) DROP (d) UPDATE (e) TRUNCATE Q102. Checkpoints are a part of which of the following measures? (a) Recovery measure (b) Security measure (c) Concurrency measure (d) Authorized measure (e) Design measures 18 Adda247 No. 1 APP for Banking & SSC Preparation
19 Q103. Which of the following concepts is applicable with respect of 2 NF? (a) Full functional dependency (b) Partial dependency (c) Transitive dependency (d) None- transitive dependency Q104. How to convert weak entity set to strong entity set? (a) Using aggregation (b) Adding appropriate attributes (c) Using generalization (d) Normalization Q105. The ability to modify the internal schema without causing any change to the external scheme: (a) Physical data independence (b) Logical data independence (c) External data independence (d) Both Physical and External data independence Q106. Which feature in Object Oriented Programming allows reusing code? (a) Polymorphism (b) Inheritance (c) Encapsulation (d) Data hiding (e) Recursion Q107. What would be the worst run time complexity of queue and dequeue operations, if queue is implemented using arrays? (a) O(n), O(n) (b) O(n), O(1) (c) O(1), O(n) (d) O(1), O(1) Q108. What is the work of compiler? (a) A program that programs into memory and prepares them for execution (b) A program that automates the translation of assembly language into machine language (c) Program that accepts a program written in a high-level language and produces an object program (d) A program that appears to execute a source program as if it were machine language (e) A program that translates a high- level program line-by-line to machine language. 19 Adda247 No. 1 APP for Banking & SSC Preparation
20 Q109. By which statement you can force immediate termination of a loop, by passing the conditional expression and any remaining code in the body of the loop. (a) Break (b) Continue (c) Terminate (d) Loop Close (e) Return Q110. Which of the following tag is used to link the URL? (a) <a> (b) <style> (c) <link> (d) <hyperlink> (e) <b> Q111. Which of the following is an online cloud storage service from Microsoft? (a) MicroDrive (b) OneDrive (c) CloudDrive (d) WindowsDrive Q112. Which of the following sorting algorithm is best if a list is already sorted? (a) Insertion sort (b) Quick Sort (c) Merge Sort (d) Heap sort (e) Bubble Sort Q113. Which of the following HTTP error message shows when server is currently unavailable? (a) 503 (b) 404 (c) 406 (d) 400 (e) 202 Q114. Which of the following phase produce intermediate representations of the source program in compiler design? (a) Lexical Analyzer (b) Syntax Analyzer (c) Semantic Analyzer (d) Intermediate code generator (e) Machine Independent code optimiser 20 Adda247 No. 1 APP for Banking & SSC Preparation
21 Q115. Which of the following register holds the address of memory where CPU wants to read or write data. (a) I/O address register (b) Memory buffer register (c) Memory address register (d) Program counter (e) Flag register Q116. What is FPGA? (a) Field Programmable Gate Array (b) Forward Programmable Gate Array (c) Forward Parallel Gate Array (d) Field Parallel Gate Array (e) Field Parallel Game Array Q117. Which data structure is used to implement priority queue? (a) Array (b) List (c) Heap (d) All of the mentioned (e) Only (b) and (c) Q118. An assembler that runs on one machine but produces machine code for another machine is called: (a) Simulator (b) Emulator (c) Cross assembler (d) Boot-strap loader (e) Native code compiler Q119. Amazon Web Services is which type of cloud computing distribution model? (a) Software as a service (b) Platform as a service (c) Infrastructure as a service (d) Communication as a service Q120. Which of the following is java web server? (a) Apache Tomcat (b) Jetty (c) Resin (d) Oracle iplanet (e) All of the above 21 Adda247 No. 1 APP for Banking & SSC Preparation
1 Adda247 No. 1 APP for Banking & SSC Preparation Website: bankersadda.com sscadda.com store.adda247.com
1 Adda247 No. 1 APP for Banking & SSC Preparation Solutions S1. Ans.(c) Sol. UDP is faster because it is connectionless and need not wait for connection setup and acknowledgement. S2. Ans.(c) Sol. presentation
More information1 Adda247 No. 1 APP for Banking & SSC Preparation Website:store.adda247.com
1 Adda247 No. 1 APP for Banking & SSC Preparation Q1. When you visit certain website, spyware may be automatically downloaded. This is called: (a) Logic bomb (b) Drive-by download (c) Virus (d) Drive-in
More informationIBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper
IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper 1. The tracks on a disk which can be accused without repositioning the R/W heads is (A) Surface (B) Cylinder (C) Cluster 2. Which
More informationCOMPUTER MCQs. 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory
COMPUTER MCQs 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory 4)virtual memory 5) None of the above 2. The component is used by the data analyst to create
More informationROYAL INSTITUTE OF INFORMATION & MANAGEMENT
ROYAL INSTITUTE OF INFORMATION & MANAGEMENT BASICS NETWORKING CHAPTER 1 Networking Basics to Networking Advantages of Networking Types of Network 1 Local Area Network (LAN) LAN features Basic LAN components
More informationHands-On TCP/IP Networking
Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationInterconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1
Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol
More informationIntroduction to TCP/IP
Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP
More informationCopyleft 2005, Binnur Kurt. Objectives
1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe
More informationChapter 8. Network Troubleshooting. Part II
Chapter 8 Network Troubleshooting Part II CCNA4-1 Chapter 8-2 Network Troubleshooting Review of WAN Communications CCNA4-2 Chapter 8-2 WAN Communications Function at the lower three layers of the OSI model.
More informationIntroduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University
Introduction to Computer Science William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Chapter 4: Networking and the Internet No one owns the Internet, and only one
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationDr. Babasaheb Ambedkar Open University
Enrollment Number : Dr. Babasaheb Ambedkar Open University Term End Examination January - 2015 Course : BCA Numerical Code: 0065 Subject Code : BCA 301 Numerical Code: 0530 Subject : Introduction to Computer
More informationSyllabus for Computer Science General Part I
Distribution of Questions: Part I Q1. (Compulsory: 20 marks). Any ten questions to be answered out of fifteen questions, each carrying two marks (Group A 3 questions, Group B, Group C and Group D 4 questions
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationChapter 4 The Internet
Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More informationIdentify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)
Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking
More informationSolved MCQ of Computer networking. Set-1
Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of
More informationChapter 7. Local Area Network Communications Protocols
Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate
More informationAssignment - 1 Chap. 1 Wired LAN s
Assignment - 1 Chap. 1 Wired LAN s 1. (1 Mark) 1. Draw the frame format of Ethernet. 2. What is unicast, multicast and broadcast address? 3. State the purpose of CRC field. 2. (5 Marks) 1. Explain how
More informationAcknowledgments. Part One - Introduction to the TCP/IP Protocol
Illustrated TCP/IP by Matthew G. Naugle Wiley Computer Publishing, John Wiley & Sons, Inc. ISBN: 0471196568 Pub Date: 11/01/98 Acknowledgments Part One - Introduction to the TCP/IP Protocol Chapter 1 -
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols
More informationChapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0
Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 10 Chapter 10 - Sections & Objectives 10.1 Application Layer Protocols Explain the operation of the application
More informationSYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers.
Contents i SYLLABUS osmania university UNIT - I CHAPTER - 1 : INTRODUCTION Data Communication, Network Topologies : LAN, WAN, MAN, Types : Bus, Star, Ring, Hybrid, Line Configurations, Reference Models
More informationa. It will output It s NOT Rover b. Class Main should be changed to the following (bold characters show the changes)
May 2015 Computing Advanced Paper 1 Question 1 a. It will output It s NOT Rover b. Class Main should be changed to the following (bold characters show the changes) public class Main public static void
More informationII B.Sc(IT) [ BATCH] IV SEMESTER CORE: RELATIONAL DATABASE MANAGEMENT SYSTEM - 412A Multiple Choice Questions.
Dr.G.R.Damodaran College of Science (Autonomous, affiliated to the Bharathiar University, recognized by the UGC)Re-accredited at the 'A' Grade Level by the NAAC and ISO 9001:2008 Certified CRISL rated
More informationChapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
More informationUniversity of Southern California EE450: Introduction to Computer Networks
University of Southern California EE450: Introduction to Computer Networks Catalog Description Network architectures; Layered protocols, Network service interface; Local Networks; long-haul Networks; Internal
More informationLecture-4. TCP/IP-Overview:
Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationJianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.
Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ. Email: jh_zhang@hdu.edu.cn Copyright 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet
More informationTCP/IP Protocol Suite and IP Addressing
TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under
More informationChapter 12 Network Protocols
Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)
More informationWeek. Lecture Topic day (including assignment/test) 1 st 1 st Introduction to Module 1 st. Practical
Name of faculty: Gaurav Gambhir Discipline: Computer Science Semester: 6 th Subject: CSE 304 N - Essentials of Information Technology Lesson Plan Duration: 15 Weeks (from January, 2018 to April, 2018)
More informationChapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.
Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area
More informationUniversity of Baghdad College of Science Department of Computer Science األسم الكامل: High Diploma Qualification Exam Date: 13 Aug Time: 3 hrs.
University of Baghdad College of Science Department of Computer Science األسم الكامل: High Diploma Qualification Exam Date: 13 Aug. 2015 Time: 3 hrs. Notes: Answer All Questions. Answer in English. It
More informationChapter 4: Networking and the Internet. Copyright 2015 Pearson Education, Inc.
Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols 4.5 Security 4-2 Network Classifications
More informationm ~~I Rt'6"'lcl ati1j4#11'" ~ silttli71 h1 ~
m ~~I Rt'6"'lcl ati1j4#11'" ~ silttli71 h1 ~ Rt'6q'1"'d~(+1 -,~~oh, ~, ffar. SREE CHITRA TIRUNAL INSTITUTE FOR MEDICAL SCIENCES AND TECHNOLOGY Thlruvananthapuram 695 011, Kerala, India. (An Institute of
More informationQUESTION BANK EVEN SEMESTER
Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff
More informationQUESTION BANK UNIT-I
DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Subject Code: CS1302 Subject Name: Computer Networks Year/ Sem: III / V UNIT-I 1. What is multicast? What is the difference between unicast and multicast?
More informationEntrance exam - Informatics
Entrance exam - Informatics Name and Surname fill in the field Application No. Test Sheet No. 15 Algorithms and data structures 1 Which of the listed data structures is most suitable (w.r.t. time and memory
More informationApplication Layer Network Layer
Application Layer 1. What is job of Application Layer? 2. Which protocol is used at Application Layer? 3. What is DNS? How is works? 4. What protocols used is email? 5. Where to use SMTP protocol? 6. Where
More informationSQL Interview Questions
SQL Interview Questions SQL stands for Structured Query Language. It is used as a programming language for querying Relational Database Management Systems. In this tutorial, we shall go through the basic
More informationEEC-684/584 Computer Networks
EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking
More informationNetworking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ
Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking
More informationComputer Networks (Introduction to TCP/IP Protocols)
Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of
More informationIP Protocols. ALTTC/Oct
IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can
More informationRAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY
RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.
More informationINFORMATION TECHNOLOGY
[DMSIT 01] M.Sc. (Previous) DEGREE EXAMINATION, DEC 2013 First Year INFORMATION TECHNOLOGY Paper I BASICS OF INFORMATION TECHNOLOGY Time : 3 hours Max. Marks : 75 Section A (3x15 = 45) Answer any THREE
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationData about data is database Select correct option: True False Partially True None of the Above
Within a table, each primary key value. is a minimal super key is always the first field in each table must be numeric must be unique Foreign Key is A field in a table that matches a key field in another
More informationData Communication and Network. Introducing Networks
Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect
More informationECE4110 Internetwork Programming. Introduction and Overview
ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?
More informationCompTIA Network+ Course
CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency
More informationCIS 21 Final Study Guide. Final covers ch. 1-20, except for 17. Need to know:
CIS 21 Final Study Guide Final covers ch. 1-20, except for 17. Need to know: I. Amdahl's Law II. Moore s Law III. Processes and Threading A. What is a process? B. What is a thread? C. Modes (kernel mode,
More informationITEC 3800 Data Communication and Network. Introducing Networks
ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You
More informationSection 1.1: Networking Overview
Section 1.1: Networking Overview This section provides an introduction to networking. Students will become familiar with the following aspects of a network: Components of a network o Computers o Transmission
More informationChapter 14: Introduction to Networking
Chapter 14: Introduction to Networking Complete CompTIA A+ Guide to PCs, 6e How different networks are wired (or wireless) How to identify common network cables How Ethernet works About the OSI and TCP/IP
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationAeronautical Systems Center
Aeronautical Systems Center Internet Protocol (IP) version 6 (converting from version 4) 20 June 2007 Dennis Ludwig ASC/XRAI DSN: 785-7887 Dennis.ludwig@wpafb.af.mil IPv6 Presentation: Objectives 1. To
More informationCCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means
More informationBVRIT HYDERABAD College of Engineering for Women Department of Information Technology. Hand Out
BVRIT HYDERABAD College of Engineering for Women Department of Information Technology Hand Out Subject Name: Prepared by: Computer Networks Dipali Pattanayak,Assistant Professor, IT Year and Sem, Department:
More information1 Adda247 No. 1 APP for Banking & SSC Preparation Website:store.adda247.com
1 Adda247 No. 1 APP for Banking & SSC Preparation Q1. Transmission control protocol is: (a) connection oriented protocol (b) uses a three way handshake to establish a connection (c) receives data from
More informationCCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols
CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services
More information1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?
95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model
More informationComputer Communication & Networks / Data Communication & Computer Networks Week # 03
Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home
More informationSIR C.R.REDDY COLLEGE OF ENGINEERING, ELURU DEPARTMENT OF INFORMATION TECHNOLOGY LESSON PLAN
SIR C.R.REDDY COLLEGE OF ENGINEERING, ELURU DEPARTMENT OF INFORMATION TECHNOLOGY LESSON PLAN SUBJECT: IT 4.1.2 NETWORK PROTOCOLS CLASS: 4/4 B.Tech., I - SEMESTER, A.Y.2017-18 INSTRUCTOR: Sri N. Prasad
More informationFaculty of Science and IT Course title. Pre-requisite/corequisite
Faculty Course number Faculty of Science and IT 022242 Department Course title Computer Science Network Protocols Number of credit hours 3 Pre-requisite/corequisite Computer network Brief course description.
More informationChapter 1 Introduction
Chapter 1 Introduction A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More information20-CS Cyber Defense Overview Fall, Network Basics
20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter
More informationE-Commerce. Infrastructure I: Computer Networks
E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.
More informationExamination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS
Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered
More informationV SEMESTER DIPLOMA EXAMINATION, JANUARY-2013 COMPUTER NETWORKS Time: 3 Hours Max. Marks: 75
V SEMESTER DIPLOMA EXAMINATION, JANUARY-2013 COMPUTER NETWORKS Time: 3 Hours Max. Marks: 75 GROUP A : Answer any three questions. (Question No. 1 is compulsory) Q.1 Explain different types of network?
More informationCS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network
CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network Question No: 1( M a r k s: 1 ) A ---------- Relies on the hardware manufacturer to assign a unique physical
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.
223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency
More information(Computer Science & Engineering)
(Computer Science & Engineering) 1. The number of equivalence relations of the set { 1, 2, 3, 4} is a) 1 b) 16 c) 12 d) none of these 2. Cordiality of the set in {a, b, c}, {a,, d}, {, { }, { { } } } a)
More informationTCP/IP THE TCP/IP ARCHITECTURE
TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet
More informationB. the address of the data is supplied by the users C. there is no need for an address i.e. the data is used as an address
1. The part of machine level instruction, which tells the central processor what has to be done, is A. Operation code B. Address C. Locator D. Flip-Flop 2. Which of the following refers to the associative
More informationLecture 8. Network Layer (cont d) Network Layer 1-1
Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network
More informationCisco Interconnecting Cisco Networking Devices Part 1.
Cisco 100-105 Interconnecting Cisco Networking Devices Part 1 http://killexams.com/pass4sure/exam-detail/100-105 Question: 323 Refer to the exhibit. SwitchA receives the frame with the addressing shown.
More information06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322
1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet
More informationNetworking 101 By: Stefan Jagroop
Networking 101 By: Stefan Jagroop The Internet The Internet is governed by a series of protocols that form the rules for how communications should happen The Internet is a network of networks. There is
More informationMODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:
BSc.(Hons) Computer Science with Network Security BEng (Hons) Telecommunications Cohort: BCNS/17B/FT Examinations for 2017-2018 / Semester 2 Resit Examinations for BCNS/15A/FT, BTEL/15B/FT & BTEL/16B/FT
More informationDATA COMMUNICATION AND NETWORKS
DATA COMMUNICATION AND NETWORKS A/L Guide TERAN SUBASINGHE Data Communication What is data communication? Data Communication is a process of exchanging data or information between two or more devices along
More information«Computer Science» Requirements for applicants by Innopolis University
«Computer Science» Requirements for applicants by Innopolis University Contents Architecture and Organization... 2 Digital Logic and Digital Systems... 2 Machine Level Representation of Data... 2 Assembly
More informationThis course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N
CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT
More informationConfiguring NAT for High Availability
Configuring NAT for High Availability Last Updated: December 18, 2011 This module contains procedures for configuring Network Address Translation (NAT) to support the increasing need for highly resilient
More informationNetwork Protocols - Revision
Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4
More informationJAIPUR NATIONAL UNIVERSITY, JAIPUR
Paper Code: MCA - 101 Paper Title: Fundamental of Computer Master of Computer Application (MCA) (i) Differentiate between data and information. Which is more useful to the people and why? (ii) Explain
More informationM.C.A. DEGREE EXAMINATION, DEC First Year. Time : 03 Hours Maximum Marks : 75
(DMCA 101) M.C.A. DEGREE EXAMINATION, DEC. - 2012 First Year Paper - I : INFORMATION TECHNOLOGY Time : 03 Hours Maximum Marks : 75 Section - A Answer any Three of the following (3 15 = 45) 1) Define the
More informationMobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE
Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE COURSE TITLE ROUTING AND SWITCHING FUNDAMENTALS COURSE DURATION 16 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW In the
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationGeneral Important Protocols for Examination of IA Examination 2018
Protocol General Important Protocols for Examination of IA Examination 2018 DNS - Domain Name System - translates network address (such as IP addresses) into terms understood by humans (such as Domain
More informationSelected Sections of Applied Informatics
Selected Sections of Applied Informatics M.Sc. Marcin Koniak koniakm@wt.pw.edu.pl http://www2.wt.pw.edu.pl/~a.czerepicki Based on lecture: Dr inż. Andrzej Czerepicki a.czerepicki@wt.pw.edu.pl 2018 Lecture
More informationOSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK
OSI Model Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK What is OSI Model? Open Systems Interconnection Reference Model Developed in 1984 by the International Standards
More information