Skip to main content

Healthcare Systems Article Category

Medical Factors Which make it The most effective  just by Sejal Kakadiya  Medicine and health agencies with now consentrate on top quality, charge together with great satisfaction health of their solutions. These are typically that support beams which a lot of these agencies redefine the direction they trade. The following really results in thrilled clients.  How come Serious Treatment Direction Can be a Trend Inside Medicine and health Sector  just by Steven Orange  A whole lot of North american healthcare systems' options are generally about that direction together with procedure with serious circumstances. Direction with serious health conditions which include diabetes, excessive circulation demand, cardiovascular disease, together with hypothyroidism can be a vital component of easiest treatment healthcare provider's succeed. Inside standard product, that general practitioner spots someone on an automobile accident with treatment, inspects that condition ...

Interview Questions on Network Layer in OSI Model set-1


1) The ......... provides two well-defined classes of services, namely connectionless and connection oriented services to the numerous nodes or hosts communicating through subnet.

A. physical layer

B. data link layer

C. network layer

D. transport layer


2) In computer networking the term .......... refers to selecting paths in a computer network along which to send data.

A. routing

B. inter-networking

C. internal organization

D. congestion control


3) ............ Routing algorithms do not base their routing decisions on measurements or estimates of the current traffic and topology.

A. Static or Non-adaptive

B. Static or adaptive

C. Dynamic or Non-adaptive

D. Dynamic or adaptive


4) ............. Routing algorithm in contrast change their routing decisions to reflect changes in topology and usually the traffic as well.

A. Static or Non-adaptive

B. Static or adaptive

C. Dynamic or Non-adaptive

D. Dynamic or adaptive


5) ........... is also a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on.

A. Shortest Path Algorithm

B. Flooding

C. Distance Vector Routing

D. Hierarchical Routing


6) .......... is basically a vector that keeps track of best known distance to each destination and which line to use to get there.

A. Shortest Path Algorithm

B. Flooding

C. Distance Vector Routing

D. Hierarchical Routing


7) In addresses for .......... networks, the first 16 bits specify a particular network, and the last 16 bits specify a particular host.

A. class A

B. class C

C. class B

D. class D


8) In .......... , the routers are divided into regions. Each router knows all details about how to route packets to destinations within its own region.

A. Shortest Path Algorithm

B. Link state Routing

C. Distance Vector Routing

D. Hierarchical Routing


9) In .......... , each node uses as its fundamental data a map of the network in the form of a graph.

A. Shortest Path Algorithm

B. Link state Routing

C. Distance Vector Routing

D. Hierarchical Routing


10) ......... protocols are simple and efficient in small networks, and require little, if any management.

A. Shortest Path Algorithm

B. Link state Routing

C. Distance Vector Routing

D. Hierarchical Routing



11) In ........... routing algorithm, each router knows all details about how to route packets to destinations within its own region. But does not have any idea about internal structure of other regions.

A. Shortest Path Algorithm

B. Link state Routing

C. Distance Vector Routing

D. Hierarchical Routing


12) The set of optimal routers from source to a given destination from a tree rooted at the destination called a ........ tree.

A. sink

B. optimal

C. rooted

D. routing


13) .......... is a simple mathematical computation used to check for bit-level errors in the IPV4 header.

A. Identification

B. Protocol

C. Checksum

D. Time-to-Live(TTL)


14) The number of network segments on which the datagram is allowed to travel before a router should discard it is called .......

A. Identification

B. Protocol

C. Checksum

D. Time-to-Live(TTL)


15) .......... is an identifier of the upper-layer protocol to which the IPV4 payload must be passed.

A. Identification

B. Protocol

C. Checksum

D. Time-to-Live(TTL)


16) The IPV4 address of the intermediate or final destination of the IPV4 packet is called .......

A. Source IP Address

B. Destination IP Address

C. Identification

D. Checksum


17) .......... type of IPV4 address is assigned to all network interfaces located on a subnet, used for one-to-everyone on a subnet communication.

A. Unicast

B. Multicast

C. Broadcast

D. Anycast


18) The ......... header field of IPV6 indicates the number of likes on which the packet is allowed to travel before being discarded by a router.

A. Source Address

B. Destination Address

C. Next Header

D. Hop Limit


19) ......... is an identifier for either the IPV6 extension header immediately following the IPV6 header or an upper layer protocol, such as ICMPv6, TCP or UDP.

A. Source Address

B. Destination Address

C. Next Header

D. Hop Limit


20) The internet addresses are ......... bits in length in IPV4 addressing scheme.

A. 16

B. 64

C. 32

D. 48



Answers:


1) C. network layer
2) A. routing  
3) A. Static or Non-adaptive
4) D. Dynamic or adaptive
5) B. Flooding 
6) C. Distance Vector Routing
7) C. class B
8) D. Hierarchical Routing
9) B. Link state Routing
10) C. Distance Vector Routing
11) D. Hierarchical Routing
12) A. sink
13) C. Checksum
14) D. Time-to-Live(TTL)
15) B. Protocol
16) B. Destination IP Address
17) C. Broadcast
18) D. Hop Limit
19) C. Next Header
20) C. 32


Related Posts: 

For more MCQ's on Computer Networks: Click Here

Comments

Popular posts from this blog

Solved MCQ of Computer Security set -1

1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity 2. In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity 3. The type of threats on the security of a computer system or network are …………………….. i) Interruption                   ii) Interception                  iii) Modification iv) Creation                         v) Fabrication A) i, ii, iii and iv only B) ii, iii, iv and v only C) i, ii, iii and v only D) All i, ii, iii, iv and v 4. Whi...

Solved MCQ for IT Officer Exam Part-2

SWIFT Logo (Photo credit: Wikipedia ) 1. SWIFT stands for: A) Society for Worldwide Interbank Financial Telecommunication B) Society for Worldwide International Financial Telecommunication C) Society for Worldwide Interbank Financial Transmission D) Society for Worldwide Interbank Financial Transfer 2. Which one is the correct statement? A) XML is a technology used only on the internet. B) XML is a programming language. C) XML is highly suitable data exchange between two different systems. D) XML is scripting language. 3. Decision support systems usually A) serve managers interested in weekly, monthly and yearly results, not day-to-day activities. B) help managers make decisions that are unique, rapidly changing and not easily specified in advance. C) provide managers with a generalized computing and telecommunications capacity that can be applied to a changing array of problems. D) perform and record the daily routine transactions necessary to the conduct of business. 4. Identifying...

Solved MCQ on Fundamental of C Language set-7

1) 'C' allows a three way transfer of control with the help of A. Unary Operator B. Relational Operator C. Ternary Operator D. Comparison Operator 2) Operators have hierarchy. It is used to know which operator .... A. is most important B. is used first C. is faster D. operators on large numbers 3) The statement that transfers control to the beginning of the loop is called .. A. break statement B. exit statement C. continue statement D. goto statement 4) C programming language was developed by .. A. Dennis Ritche B. Ken Thompson C. Bill Gates D. Peter Norton 5) The value that follows the keyword CASE may only be A. constants B. variable C. number D. semicolon 6) In a C language 'a' represents ... A. a digit B. an integer C. a character D. a word 7) The statement which is used to terminate the control from the loop is A. break B. continue C. goto D. exit 8) The continue command cannot be used with .... A. for B. switch C. do D. while 9) A self contained block of statement...