Skip to main content

Healthcare Systems Article Category

Medical Factors Which make it The most effective  just by Sejal Kakadiya  Medicine and health agencies with now consentrate on top quality, charge together with great satisfaction health of their solutions. These are typically that support beams which a lot of these agencies redefine the direction they trade. The following really results in thrilled clients.  How come Serious Treatment Direction Can be a Trend Inside Medicine and health Sector  just by Steven Orange  A whole lot of North american healthcare systems' options are generally about that direction together with procedure with serious circumstances. Direction with serious health conditions which include diabetes, excessive circulation demand, cardiovascular disease, together with hypothyroidism can be a vital component of easiest treatment healthcare provider's succeed. Inside standard product, that general practitioner spots someone on an automobile accident with treatment, inspects that condition ...

Solved MCQ of Network Architecture set-1


1. ............................ specifies a complete set of rules for the connections and interactions of its physical and logical components for providing and utilizing communication services.

MCQ of Network Architecture
Mapa mental do TCP/IP (Photo credit: Wikipedia)
A) Computer Architecture

B) Communication Architecture

C) Network Architecture

D) Internet Architecture



2. The two most important network architecture or reference model are ...............

i) Layered reference model

ii) OSI reference model

iii) DSL reference model

iv) TCP/IP reference model


A) i and ii

B) ii and iii

C) iii and iv

D) ii and iv




3. The Open System Interconnection(OSI) reference model includes ................... layers.

A) five

B) six

C) seven

D) eight



4. ..................... is used to manage and synchronize conversation between two systems.

A) Physical Layer

B) Data Link Layer

C) Session Layer

D) Transport Layer



5. Which of the following is not the function of physical layer?

A) Converting the digital bits into electrical signal

B) Detecting and correcting errors

C) Defining voltages and data rates needed for transmission.

D) Activating, maintaining and deactivating the physical connection




6. ...................... divides the outgoing messages into packets and assembles incoming packets into messages for the higher levels.

A) Physical Layer

B) Data Link Layer

C) Network Layer

D) Transport Layer



7. The TCP/IP reference model was used earlier by ....................., before being used in the Internet.

A) ARPANET

B) PARPANET

C) USDNET

D) DODNET



8. Which of the following are True for TCP/IP reference model?

i) The TCP protocol divide large message into a sequence of packets into an IP packet.


ii) The IP protocol is used to put a message into packet.

iii) It is necessary for all the packets in a single message to take the same route each time it is sent.

iv) The packets are passed from one network to another until they reach their destination.

A) i and iv only

B) i, ii and iv only

C) i, ii and iii only

D) All i, ii, iii and iv



9. Which of the following is not the layer of TCP/IP model?

A) Internet Layer

B) Application Layer

C) Transport Layer

D) Presentation Layer



10. State whether the following statements are True or False.

i) In TCP/IP model transport layer guarantees delivery of packets.

ii) Network layer of OSI model provides both connectionless and connection oriented service.

iv) The TCP/IP model does not fit any other protocol stack.

A) i-True, ii-False, iii-False

B) i-False, ii-True, iii-True

C) i-False, ii-False, iii-True

D) i-True, ii-True, iii-False




Answers:




1. ............................ specifies a complete set of rules for the connections and interactions of its physical and logical components for providing and utilizing communication services.

C) Network Architecture


2. The two most important network architecture or reference model are ...............

i) Layered reference model

ii) OSI reference model

iii) DSL reference model

iv) TCP/IP reference model

D) ii and iv


3. The Open System Interconnection(OSI) reference model includes ................... layers.

C) seven


4. ..................... is used to manage and synchronize conversation between two systems.

C) Session Layer


5. Which of the following is not the function of physical layer?

B) Detecting and correcting errors


6. ...................... divides the outgoing messages into packets and assembles incoming packets into messages for the higher levels.

C) Network Layer


7. The TCP/IP reference model was used earlier by ....................., before being used in the Internet.

A) ARPANET


8. Which of the following are True for TCP/IP reference model?

i) The TCP protocol divide large message into a sequence of packets into an IP packet.

ii) The IP protocol is used to put a message into packet.

iii) It is necessary for all the packets in a single message to take the same route each time it is sent.

iv) The packets are passed from one network to another until they reach their destination.

B) i, ii and iv only


9. Which of the following is not the layer of TCP/IP model?

D) Presentation Layer


10. State whether the following statements are True or False.

i) In TCP/IP model transport layer guarantees delivery of packets.

ii) Network layer of OSI model provides both connectionless and connection oriented service.

iii) The TCP/IP model does not fit any other protocol stack.

B) i-False, ii-True, iii-True




Related Posts:


Comments

Popular posts from this blog

Solved MCQ on Fundamental of C Language set-7

1) 'C' allows a three way transfer of control with the help of A. Unary Operator B. Relational Operator C. Ternary Operator D. Comparison Operator 2) Operators have hierarchy. It is used to know which operator .... A. is most important B. is used first C. is faster D. operators on large numbers 3) The statement that transfers control to the beginning of the loop is called .. A. break statement B. exit statement C. continue statement D. goto statement 4) C programming language was developed by .. A. Dennis Ritche B. Ken Thompson C. Bill Gates D. Peter Norton 5) The value that follows the keyword CASE may only be A. constants B. variable C. number D. semicolon 6) In a C language 'a' represents ... A. a digit B. an integer C. a character D. a word 7) The statement which is used to terminate the control from the loop is A. break B. continue C. goto D. exit 8) The continue command cannot be used with .... A. for B. switch C. do D. while 9) A self contained block of statement...

Healthcare Systems Article Category

Medical Factors Which make it The most effective  just by Sejal Kakadiya  Medicine and health agencies with now consentrate on top quality, charge together with great satisfaction health of their solutions. These are typically that support beams which a lot of these agencies redefine the direction they trade. The following really results in thrilled clients.  How come Serious Treatment Direction Can be a Trend Inside Medicine and health Sector  just by Steven Orange  A whole lot of North american healthcare systems' options are generally about that direction together with procedure with serious circumstances. Direction with serious health conditions which include diabetes, excessive circulation demand, cardiovascular disease, together with hypothyroidism can be a vital component of easiest treatment healthcare provider's succeed. Inside standard product, that general practitioner spots someone on an automobile accident with treatment, inspects that condition ...

Solved MCQ of Computer Security set -1

1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity 2. In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity 3. The type of threats on the security of a computer system or network are …………………….. i) Interruption                   ii) Interception                  iii) Modification iv) Creation                         v) Fabrication A) i, ii, iii and iv only B) ii, iii, iv and v only C) i, ii, iii and v only D) All i, ii, iii, iv and v 4. Whi...