Skip to main content

Healthcare Systems Article Category

Medical Factors Which make it The most effective  just by Sejal Kakadiya  Medicine and health agencies with now consentrate on top quality, charge together with great satisfaction health of their solutions. These are typically that support beams which a lot of these agencies redefine the direction they trade. The following really results in thrilled clients.  How come Serious Treatment Direction Can be a Trend Inside Medicine and health Sector  just by Steven Orange  A whole lot of North american healthcare systems' options are generally about that direction together with procedure with serious circumstances. Direction with serious health conditions which include diabetes, excessive circulation demand, cardiovascular disease, together with hypothyroidism can be a vital component of easiest treatment healthcare provider's succeed. Inside standard product, that general practitioner spots someone on an automobile accident with treatment, inspects that condition ...

Objective Questions on Transport Layer in OSI Model set-1

                    
1) The .......... is responsible for end to end delivery, segmentation and concatenation.

A. Physical layer

B. Data Link layer

C. Network layer

D. Transport layer


2) .......... needs ports or service access points.

A. Physical layer

B. Data Link layer

C. Network layer

D. Transport layer


3) The task of ............... is to provide reliable, cost effective transport of data from source machine to destination machine.

A. Network Layer

B. Transport Layer

C. Presentation Layer

D. Application Layer


4) The hardware and/or software within the transport layer which does the work of making use of the services provided by the network layer is called as .........

A. transport media

B. transport device

C. transport entity

D. network transporter


5) .......... measures the number of bytes of user data transferred per second, measured over some time interval. It is measured separately for each direction.

A. Throughput

B. Transit delay

C. Protection

D. Resilience


6) ............ is the time between a message being sent by the transport user on the source machine and its being receive by the transport user on the destination machine.

A. Throughput

B. Transit delay

C. Protection

D. Resilience


7) The time difference between the instant at which a transport connection is requested and the instant at which it is confirmed is called as ........

A. Connection establishment delay

B. Transit delay

C. Protection delay

D. Priority delay


8) The message sent from transport entity to transport entity is called as ..........

A. transport data unit

B. transport display data unit

C. transport protocol data unit

D. transport protocol display unit


9) ........ are designed for the protocols like ICMP or OSPF, because these protocols are not use either stream packets or datagram sockets.

A. Berkeley sockets

B. Stream sockets

C. Datagram sockets

D. Raw sockets


10) .......... is designed for the connectionless protocol such as User Datagram Protocol(UDP).

A. Berkeley socket

B. Stream socket

C. Datagram socket

D. Raw socket


11) ............ is designed for the connection oriented protocol such as Transmission Control Protocol(TCP).

A. Berkeley socket

B. Stream socket

C. Datagram socket

D. Raw socket


12) ............ is used to implement the transport layer services between the two transport entities.

A. Transport service

B. Transport protocol

C. Transport address

D. Transport control


13) Which of the following is/are the tasks of transport protocols.

A. Error control

B. Sequencing

C. Flow control

D. All of the above


14) The internet uses universal port numbers for services and these numbers are called as .......

A. Well known port numbers

B. Fixed port numbers

C. Standard port numbers

D. Ephemeral port numbers


15) In the internet model, the client program defines itself with a port number which is chosen randomly. This number is called as .......

A. Well known port numbers

B. Fixed port numbers

C. Standard port numbers

D. Ephemeral port numbers


16) The port numbers ........... are known as well known ports and they are reserved for standard circuits.

A. below 1024

B. above 1024

C. below 2048

D. below 512


17) In the TCP segment header, .......... is a 32-bit number identifying the current position of the first data byte in the segment within the entire byte stream for the TCP connection.

A. serial number

B. current number

C. sequence number

D. acknowledgement number


18) In the TCP segment header, .......... is a 32-bit number identifying the next data byte the sender expects from the receiver.

A. serial number

B. current number

C. sequence number

D. acknowledgement number


19) A ........ is a special type of file handle, which is used by a process to request network services from the operating system.

A. socket

B. handler

C. requester

D. protocol


20) ........ is an optional 16-bit one's complement of the one's complement sum of a pseudo-IP header, the UDP header, and the UDP data.

A. Congestion

B. Checksum

C. Pseudosum

D. Headersum

Answers:


1) D. Transport layer
2) D. Transport layer
3) B. Transport Layer
4) C. transport entity
5) A. Throughput
6) B. Transit delay
7) A. Connection establishment delay
8) C. transport protocol data unit
9) D. Raw sockets
10) C. Datagram socket
11) B. Stream socket
12) B. Transport protocol
13) D. All of the above
14) A. Well known port numbers
15) D. Ephemeral port numbers  
16) A. below 1024
17) C. sequence number
18) D. acknowledgement number
19) A. socket
20) B. Checksum


Related Posts:

For more MCQ's on Computer Networks: Click Here

Comments

Popular posts from this blog

Solved MCQ of Computer Security set -1

1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity 2. In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity 3. The type of threats on the security of a computer system or network are …………………….. i) Interruption                   ii) Interception                  iii) Modification iv) Creation                         v) Fabrication A) i, ii, iii and iv only B) ii, iii, iv and v only C) i, ii, iii and v only D) All i, ii, iii, iv and v 4. Whi...

Solved MCQ for IT Officer Exam Part-2

SWIFT Logo (Photo credit: Wikipedia ) 1. SWIFT stands for: A) Society for Worldwide Interbank Financial Telecommunication B) Society for Worldwide International Financial Telecommunication C) Society for Worldwide Interbank Financial Transmission D) Society for Worldwide Interbank Financial Transfer 2. Which one is the correct statement? A) XML is a technology used only on the internet. B) XML is a programming language. C) XML is highly suitable data exchange between two different systems. D) XML is scripting language. 3. Decision support systems usually A) serve managers interested in weekly, monthly and yearly results, not day-to-day activities. B) help managers make decisions that are unique, rapidly changing and not easily specified in advance. C) provide managers with a generalized computing and telecommunications capacity that can be applied to a changing array of problems. D) perform and record the daily routine transactions necessary to the conduct of business. 4. Identifying...

Solved MCQ on Fundamental of C Language set-7

1) 'C' allows a three way transfer of control with the help of A. Unary Operator B. Relational Operator C. Ternary Operator D. Comparison Operator 2) Operators have hierarchy. It is used to know which operator .... A. is most important B. is used first C. is faster D. operators on large numbers 3) The statement that transfers control to the beginning of the loop is called .. A. break statement B. exit statement C. continue statement D. goto statement 4) C programming language was developed by .. A. Dennis Ritche B. Ken Thompson C. Bill Gates D. Peter Norton 5) The value that follows the keyword CASE may only be A. constants B. variable C. number D. semicolon 6) In a C language 'a' represents ... A. a digit B. an integer C. a character D. a word 7) The statement which is used to terminate the control from the loop is A. break B. continue C. goto D. exit 8) The continue command cannot be used with .... A. for B. switch C. do D. while 9) A self contained block of statement...