Skip to main content

Healthcare Systems Article Category

Medical Factors Which make it The most effective  just by Sejal Kakadiya  Medicine and health agencies with now consentrate on top quality, charge together with great satisfaction health of their solutions. These are typically that support beams which a lot of these agencies redefine the direction they trade. The following really results in thrilled clients.  How come Serious Treatment Direction Can be a Trend Inside Medicine and health Sector  just by Steven Orange  A whole lot of North american healthcare systems' options are generally about that direction together with procedure with serious circumstances. Direction with serious health conditions which include diabetes, excessive circulation demand, cardiovascular disease, together with hypothyroidism can be a vital component of easiest treatment healthcare provider's succeed. Inside standard product, that general practitioner spots someone on an automobile accident with treatment, inspects that condition ...

Solved MCQ on TCP/IP and UDP in Computer Networks set-1


1) TCP is a .......... protocol.

A. stream-oriented

B. message-oriented

C. block-oriented

D. packet-oriented


2) Which of the following is not the layer of TCP/IP protocol.

A. Physical layer

B. link layer

C. network layer

D. transport layer.


3) TCP groups a number of bytes together into a packet called a ....

A. user datagram

B. segment

C. datagram

D. packet


4) The .......... of TCP/IP protocol is responsible for figuring out how to get data to its destination.

A. application layer

B. link layer

C. network layer

D. transport layer.


5) TCP is a(n) ........... transport protocol.

A. protocol delivery

B. reliable

C. best-effort delivery

D. effortless delivery


6) ......... is the protocol that hides the underlying physical network by creating a virtual network view.

A. Internet Protocol(IP)

B. Internet Control Message Protocol(ICMP)

C. Address Resolution Protocol(ARP)

D. Bootstrap Protocol(BOOTP)


7) To use the services of UDP, we need ......... socket addresses.

A. four

B. two

C. three

D. four


8) Which of the following is not the name of Regional Internet Registries(RIR) to administer the network number portion of IP address.

A. American Registry for Internet Numbers(ARIN)

B. Reseaux IP Europeans(RIPE)

C. Europeans Registry for Internet Numbers(ERIN)

D. Asia Pacific Network Information Center(APNIC)


9) UDP packets are called .......

A. user datagrams

B. segments

C. frames

D. packets


10) ............ addresses use 21 bits for the and 8 bits for the portion of the IP address for TCP/IP network.

A. Class A

B. Class B

C. Class C

D. Class D


11) UDP packets have fixed-size header of .......... bytes.

A. 16

B. 8

C. 32

D. 64


12) .......... messages are never sent in response to datagrams with a broadcast or a multicast destination address.

A. ICMP

B. ARP

C. IP

D. BOOTP


13) TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is number of the ....... byte carried in that segment.

A. first

B. last

C. middle

D. zero


14) .......... is responsible for converting the higher level protocol address (IP addresses) to physical network addresses.

A. Internet Protocol(IP)

B. Internet Control Message Protocol(ICMP)

C. Address Resolution Protocol(ARP)

D. Bootstrap Protocol(BOOTP)


15) UDP and TCP are both ......... layer protocols.

A. data link

B. network

C. transport

D. interface


16) ........... is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from upper layer.

A. TCP

B. UDP

C. IP

D. ARP


17) Which of the following functions does UDP perform?

A. Process-to-process communication

B. Host-to-host communication

C. End-to-end reliable data delivery

D. Interface-to-interface communication.


18) A port address in TCP/IP is .........bits long.

A. 32

B. 48

C. 16

D. 64


19) When the IP layer of a receiving host receives a datagram, .....

A. delivery is complete

B. a transport layer protocol takes over

C. a header is added

D. a session layer protocol takes over


20) TCP/IP is a .......... hierarchical protocol suite developed before the OSI model.

A. seven-layer

B. five-layer

C. six-layer

D. four-layer



Answers:


1) A. stream-oriented
2) A. Physical layer
3) B. segment
4) C. network layer
5) B. reliable
6) A. Internet Protocol(IP)
7) B. two
8) C. Europeans Registry for Internet Numbers(ERIN)
9) A. user datagrams
10) C. Class C
11) B. 8
12) A. ICMP
13) A. first
14) C. Address Resolution Protocol(ARP)
15) C. transport
16) B. UDP
17) A. Process-to-process communication
18) C. 16
19) B. a transport layer protocol takes over
20) B. five-layer



Related Posts:

For more MCQ's on Computer Networks: Click Here


Comments

Popular posts from this blog

Solved MCQ on Fundamental of C Language set-7

1) 'C' allows a three way transfer of control with the help of A. Unary Operator B. Relational Operator C. Ternary Operator D. Comparison Operator 2) Operators have hierarchy. It is used to know which operator .... A. is most important B. is used first C. is faster D. operators on large numbers 3) The statement that transfers control to the beginning of the loop is called .. A. break statement B. exit statement C. continue statement D. goto statement 4) C programming language was developed by .. A. Dennis Ritche B. Ken Thompson C. Bill Gates D. Peter Norton 5) The value that follows the keyword CASE may only be A. constants B. variable C. number D. semicolon 6) In a C language 'a' represents ... A. a digit B. an integer C. a character D. a word 7) The statement which is used to terminate the control from the loop is A. break B. continue C. goto D. exit 8) The continue command cannot be used with .... A. for B. switch C. do D. while 9) A self contained block of statement...

Solved MCQ of Computer Security set -1

1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity 2. In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity 3. The type of threats on the security of a computer system or network are …………………….. i) Interruption                   ii) Interception                  iii) Modification iv) Creation                         v) Fabrication A) i, ii, iii and iv only B) ii, iii, iv and v only C) i, ii, iii and v only D) All i, ii, iii, iv and v 4. Whi...

How to create a Simple calculator Using HTML and JavaScript

Here are the steps to create a simple calculator using HTML and JavaScript which can evaluate simple arithmetic on integer numbers. Two types of inputs text and button are used here on a table within a form element and OnClick event was used to insert button values on the screen or to evaluate the numbers. Steps to create a Simple calculator Using HTML and JavaScript 1. At first Insert a <form> element within <body> tag. 2. Create a table using <table> .....</table> tag. 3. Insert two types of Input text and button within table data of table row using <tr><td>....</td></tr> tag. 4. Assign OnClick event for all the buttons having numbers and arithmetic operators. 5. Give blank value for Clear(C) button. 6. Use eval() function to evaluate the numbers on OnClick event of equal to sign button. Full HTML code for a Simple HTML calculator <html> <head></head> <body> <h3>Simple Calculator</h3> <br/> <...