CS355

¡Supera tus tareas y exámenes ahora con Quizwiz!

!Which comparison operators is used in JavaScript to check for non-equality by both datatype and underlying value?

!==

What is the standard form for calling a jQuery function to perform an action on selected elements?

$(selector).action()

Which is not a valid "combinator" (selector operator) in CSS?

& (ampersand)

Which is true of Interior Gateway Protocol (IGP) compared to an Exterior Gateway Protocol (EGP)

(EGP only tells the connectivity. IGP uses routing metrics, can be used to determine the shortest way to reach something.) (Set of routers, share info more freely with each other, reluctant to share into outside) !!IGPs report more detailed routing information than EGPs

!What best describes the primary difference between Ethernet cables (CAT -n)?

(Frequency Amplitude Phase) SPEED

HTTP status code with it's meaning

(XX is a placeholder for two decimal digits) 1XX - informational 2XX - success 3XX - redirection 4XX - client error 5XX - server error

In HTML, which other list tag exists besides <ol> and <ul>?

<dl> defines a definition list

Which HTML tag would have as an attribute an "href" to an external "cascading style sheet" (CSS)?

<link>

How do you style tags with class MYCLASS to have text color of red?

.MYCLASS{color:red}

Given a subnet mask of 255.255.252.0, how man hosts are vailable in the subnet?

1022

How many hexadecimal zeros are replaced by the "zero-compression" in the IPv6 address ABCD:ABCD:ABCD:ABCD::ABCD?

12

How many networks are allowed under In IPv4 addressing Class A?

128(2^7)

!How many bits are in a port address (used as part of a socket address)?

16

Assuming CIDR for IPv4, a network mask of 255.255.255.192, and reserving subnet all-zeroes and all-ones for special purposes, how many other addresses remain within this subnet to allocate to host computers?

192=11000000, the last 6 bits are free to use except 00000000 and 11111111, so is it 62!

!How many octets are in a port address?

2

How many bytes are in a port address?

2 bytes (16bits)

!What are the respective number of synchronization (SYN) and acknowledgement (ACK) requests sent during the establishing of a three-way handshake?

2, 2

How many Hexadecimal digits are missing due to zero compression in the IPv6 address A1B2:C3D4:E5F6

20

What class is the "classful" IPv4 address is 226.227.228.229?

226=1110 --> Class D

What is the IP address associate with a subnet mask of "/28"

255.255.255.240

In IPv4 addressing, how many networks are allowed under class C?

2^21

!Following Base64 conversion used to convert non-ASCII data into ASCII data, how many ASCII characters will be produced from an original 24 bits of non-ASCII data?

3

!Assuming CIDR for IPv4, a subnet mask of 27, and reserving subnet all zeroes and all ones for special purposes, how many ordinary addresses remain within this subnet to allocate to host computers?

30

How many bits are in a standard MAC address?

48

Suppose that an IPv6 address has a subnet id with 16 bits. How many are in its global routing prefix?

48

Suppose that an IPv6 address has a subnet id with 16 bits. How many bits are in its global routing prefix?

48

What is the total number of bits in an (IPv4) socket address?

48

How many bits and hexadecimal digits are respectively in a traditional MAC address?

48 (bits) and 12 (hexadecimal)

Given a subnet of 255.255.254.0, how many hosts are available in the subnet?

510

How many HTTP GET requests are required to get an HTML file with 1 CSS, 1 JavaScript, and 3 JPEG images

6

How many HTTP GET requests are required to get an HTML file with 1 css, 1 JavaScript, and 3 JPEG images

6

If there were a total of 24 synchronization (SYN) requests over a set of started and gracefully shutdown connections, how many connections were there?

6

How many bytes are in a MAC address?

6 bytes (48bits)

!Suppose that an IPv6 address has a global (site) prefix of 48 bits. How many bits are in its interface ID?

64

Suppose that an IPv6 address has a subnet id with 16 bits. How many bits are in its interface id?

64.0

Assuming the classical grid view, if one div tag has class "col-5" and the other has class "col-3", what percentage of the screen do they take up together?

67.0

Assuming the classical grid view, if one div tag has class "col-4" and the other has class "col-5", what percentage of the screen do they take up together?

75

How many octets does a UDP datagram header contain?

8

Which of the following comparison operators are invalid in JavaScript?

<> <== >==

Which HTML element does not also have a closing tag?

<br>, <img>, <meta>,<input>

Suppose that two IPv4 addresses 10.1051.69 and 10.105.1.91 both belong to the same network and share a network mask M. Which is not a valid value for M?

91 in binary is 01011011 69 in binary is 01000101 !!ANSWER IS E!! The options were: (A) 255.255.255.0 (B) 255.255.255.128 (C) 255.255.255.192 (D) 255.255.255.224 (E) 255.255.255.240 Didn't understand and couldn't find the answer so here is a similar question. If you know the answer/understand please modify the card! Gotten from geeks for geeks https://www.geeksforgeeks.org/computer-networks-set-4-2/ 2) Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respectively and they both use the same netmask N. Which of the values of N given below should not be used if A and B should belong to the same network? (A) 255.255.255.0 (B) 255.255.255.128( C) 255.255.255.192 (D) 255.255.255.224 (D)The last octets of IP addresses of A and B are 113 (01110001) and 91 (01011011). The netmask in option (D) has first three bits set in last octet. If netmask has first 3 bits set, then these bits nmust be same in A and B, but that is not the case. In simple words, we can say option (D) is not a valid netmask because doing binary '&' of it with addresses of A and B doesn't give the same network address. It must be same address as A and B are on same network. See this for more details.

The explanation with the letter in the ACID acronym for database transactions

A - transaction is treated as a single unit which either succeeds completely or fails completely C - each transaction brings the database from one valid state to another I - each transaction prevents concurrent access that would interfere with teh results D - each transaction will endure even after the system failures

What does the "Address Resolution Protocol" aim to determine?

A mac address associated with the given IP address

!Which are components of the SSP protocol: AUTH (A), CONN (C), LOG (L), TRANS (T)?

A, C, T

Which notation is used by SNMP's Management Information Base to store information from requests and replies?

ACN - Abstract Syntax Notation

Let "A ⊂ B" denote "A is encapsulated inside B". Which best represents the relationship between an Application Message (AM), IP Datagram (IP), and User Datagram (UP)?

AM in UP in IP

Which SQL keyword should be used to have the database generate the primary keys?

AUTOINCREMENT

Desired goal with the SQL command

Add a row to a table - INSERT Retrieve rows from a table - SELECT -DROP

!What does the "Reverse Address Resolution Protocol" aim to determine?

An IP address associated with a given MAC address

!Which best describes IP in IP tunneling?

An encrypted datagram is encapsulated in another unencrypted datagram This is what it says in the notes, not sure if this is the right answer but the notes don't say anything about encryption so... This works well when the group is geographically dispersed - a few members at each of a few sites. A router at each site is configured to know about other sites. When the router receives one of the datagrams for the group, it forwards it via hardware multicast locally. It then consults its configuration information and sends a copy to each remote site on its list - using IP-in-IP tunneling, to encapsulate the multicast datagrams in unicast datagrams.

What is the purpose of a "source encoder"?

Compresses data from analog or digital into a format of transmission

Which layers use logical rather than physical connections?

Application (Presentation) Internet/Network Transport

OSI Model

Application, Presentation, Session, Transport, Network, Data Link, Physical

Which are features specifically of "transaction processing" in a database?

Atomicity - each transaction is treated as a single unit, which either succeeds completely ("committed") or fails completely ("rolled back") Consistency - each transaction brings the database from one valid state to another, all rules such as constraints and triggers are followed Isolation - each transaction prevents concurrent access that would interfere with the results, i.e. it should behave as if it were run sequentially Durability - results of each transaction will endure even after system failures such as power outages and crashes (data must be stored in non-volatile memory)

Which class does the classful address 146.132.128.116 belong?

B

SQL keywords with their purpose

BETWEEN - check if column value is within a range IN - check if column value matches any value within a list LIKE - check if column value matches string pattern EXISTS - check if subquery returns any rows NOT NULL- check if column value is present

Dynamic Host Configuration Protocol extends the ideas of which other protocol?

Bootstrap Protocol (BOOTP) (DHCP) - boots up get the ip

Both true of HTTP and HTTPS

Both use reliable delivery Both use the public internet (as opposed to leased curcuits) Both support IPv4 addresses

Which Bootstrap construct is used to help record user-navigation?

Breadcrumbs

To what class does the IP address 200.201.202.203 belong?

C

Of the above five segments used in an SSH packet, which one features redundancy for error-detection purposes?

CRC - cyclic redundancy check used to check if data is valid, doesn't get encrypted

Which commands are part of the SQL Data Definition Language?

CREATE - is used to create the database or its objects (like table, index, function, views, store procedure and triggers). DROP - is used to delete objects from the database. ALTER-is used to alter the structure of the database. (means to change) TRUNCATE-is used to remove all records from a table, including all spaces allocated for the records are removed. COMMENT -is used to add comments to the data dictionary. RENAME -is used to rename an object existing in the database

Which is not a valid datatype in JavaScript?

Character

Which is not one of the seven basic data types in JavaScript?

Character (They are - var, string, number, boolean, null, undefined, object)

Which type of issue would Internet Control Message Protocol (ICMP) not report on?

Checksum problem - don't know where send to

What class is the "classful" IPv4 address is 226.227.228.229?

Class D because class D starting address is 224.0.0.0 and ending address is 255.255.255.255, it falls within the range

What did designers do in order to accommodate both large and small networks in an IP address?

Classful IP addressing

In a client-server architecture, which can initiate a connection?

Client

Which goal is relatively deemphasized according to the "SOA Manifesto"

Client specific optimizations provide services that are useful to large numbers of people

Which methods apply to the client-side of the "socket" process?

Close, connect, receive, send

Using the Bootstrap grid-model, and assuming a screen width of at least 576 pixels, what portion of the width of the screen will A and B together take up?

Col-sm-3 and col-sm-5 → total is 12 column model → 8/12=2/3

Stream paradigm

Connection-oriented 1 to 1 communication Send sequences of individual bytes Arbitrary length Transfer Used by Most Applications Uses TCP

What are the characteristic of the "stream paradigm"?

Connection-oriented 1-to-1 communication Send sequences of individual bytes Arbitrary length transfer Used by most applications uses" Transmission control protocol

What is "STP", discussed in class?

Copper Wire - Shielded Twist Pair

Media type with cooresponding signal

Copper wire - electrical Fiber-Optic - light pulse Wireless - radio wave

!What class is the classful addressing 230.255.255.255?

D

!How does a client identify the server with which it wishes to communicate: domain name (DN), IP address (IP), medium access control (MAC)?

DN

Which higher level protocol can use either TCP or UDP as its next layer protocols?

DNS

TCP/IP Layer with the Protocol Data Unit

Data Link - Frame Application - Message Physical - Bits Internet - Packet Transport - Segment

In JavaScript Object Notation (JSON), a value may not be which of the following data types?

Date, Undefined, Function

Which fields does a forwarding table need to contain?

Destination IP network address Mask that encodes the prefix/suffix boundary of the Destination network address IP address of a next hop to send packets to that destination network

Which is true of JSON?

More concise than XML Supports arrays

Which field is the least likely to appear in the header of a UDP datagram?

Domain Name

To which class does the IPPv4 address 240:230:220:210 belong?

E

!Which is NOT true of an Exterior Gateway Protocol (EGP) , compared to an Interior Gateway Protocol (IGP)?

EGP's report more detailed routing than information than IGPs

Which are characteristics of the primary key in a database?

Each row should have one It should be unique It should not be null

Which best describes "IP-in-IP Tunneling"?

Encapsulate one IP datagram in another Encrypt one an put it in another (can't encrypt header - won't know where to go)

ITU's FCAPS model for network management

F- Fault Detection C- Configuration A - Accounting P - Performance S - Security

In a SQL SELECT statement, what is the typical sequence of the FROM (F), ORDER BY (O), and WHERE (W) keywords?

FROM, WHERE, ORDER BY

Which protocol uses more than one port for its standard behavior?

FTP

Protocol with default port

FTP - 20 and 21 HTTP - 80 SMTP - 25 SSH - 22 HTTPS - 443

True or false: == in javascript checks that it is equal value and equal type.

False - === does that

True or False: The Server may terminate after interacting with a client?

False - Opposite (The client may terminate after interacting with a server)

Light pulses are used as the signal for which type of physical medium?

Fiber - Optic

For which protocol are 20/21 the standard ports?

File Transfer Protocol (FTP)

Which are not goals of firewalls?

Firewall goal - Keep things in (that need to be protected) and out (that will harm)

How many classes is the IPv4 "classful" addressing divided into?

Five classes

Which are approaches to Multicast Datagram Forwarding?

Flood-and-prune Configuration-and-tunneling Core-based discovery

Which are valid SQL constraints?

Foreign Key, Check, Unique, Default

How many octets are in IPv4 and IPv6 addresses respectively?

Four octets in IPv4 (32/8=4), and sixteen octets in IPv6 (128/8=16)

If an application sends UDP data that exceeds the Maximum Transmission Unit (MTU), what will the IP protocol do?

Fragment It

Which IP addresses generally appear in the header of an IPv6 packet: source (S), intermediate (I), destination (D)?

Source and destination

What is the three level hierarchy for IPv6 addressing?

Global routing subnet ID Host

Which organization defines the services and protocols of the upper layers of the TCP/IP Internet model?

IETF (IEEE - data communications)

Which protocol primarily uses UDP for transport?

IGP, EGP, BGP (DNS - higher up than UDP - does not have to be reliable ------ANSWER FOR THE TEST MOST PROBABLY)

At the Transport Layer, how does a client identify the server with which it wishes to communicate: domain name (DN), IP address (IP), port (P)?

IP Address, Port (DNS)

In Network Address Translation (NAT), which IP address needs to get replaced?

IP source on outgoing datagram and IP destination on incoming datagram

"Zero Compression", as discussed in class, is associated with which of the following concepts?

IPv6

Which addressing scheme facilitates "Auto-Configuration" to obtain a host id?

IPv6 - 128 bits

In addition to caching, which technique(s) is/are used for domain-name lookup? authentication resolution (AR), iterative resolution (IR), recursive resolution (RR)

IR and RR

Organization with it's function

ISO - developed OSI model of internet W3c - regulates standards such as HTML CSS and XML ICANN - maintain namespaces and numerical spaces of the internet IEEE - maintain standards for low - level such as wired and wireless connections IETF - promote voluntary standards such as the TCP/IP protocol suite

When are NAPT systems used?

In residences and small businesses - way of running a network while sharing a single IP address

HTML styling from highest to lowest priority

Inline styling, internal stylesheet, external stylesheet, browser default

What does the Dynamic Host Configuration Protocol (DHCP) do?

It allows a new unknown computer to join a network and be assigned an IP address from a pool of addresses maintained for that purpose

Which is not characteristic of "Simple API for XML" (SAX)?

It supports random-access to the document

Which is not true of the Transmission Control Protocol (TCP)?

It's connections are physical

What does the sender need to specify when sending a packet across the internet?

It's own IP address The address of the intended recipient

!The notion of having intense off-site developer/user conferences to define requirements is most associated with which development model?

JAD

"Jitter" most commonly refers to variance in which of the following?

Latency

Which data compression schemes are "lossless": Run Compression (RC), Huffman Coding (HC), Lempel-Ziv-Welch (LZW)?

Lempel-Ziv-Welch (LZW) (dictionary), Run Compression, and Huffman encoding-statistic

Consider the following activities related to sending e-mail: m1 = checking email in a web browser, m2 = send an email from a mail client to mail server; m3 = download an email from mailbox server to a mail client;. Which is an applicable protocol for each activity?

M1, going to the account, is HTTP M2, client to server, is SMTP M3, download, is POP

Which architectural pattern is commonly used for developing interfaces that divide an application into three interconnected parts?

MVC (model view controller)

!In Network Address and Port Translation (NAPT), which best describes the information used in an attempt to identify he local destination address?

Source IP and Destination Port (look at the port and what devices are on there)

What is the data unit most associated with the application layer?

Message

!Which term is the most synonymous with "channel sharing"?

Multiplexing

Which term is most synonymous with "channel-sharing"?

Multiplexing is the way information from multiple sources is combined for transmission over a shared medium

Given a destination address (D), a network prefix (N), and an address mask (M) - all with the same number of bits - which comparison should be used to determine whether the destination lies on the network? (Let | denote OR, and let & denote AND)

N==(D&M)

Which are a type of constraints in SQL?

NOT NULL - Ensures that a column cannot have a NULL value UNIQUE - Ensures that all values in a column are different PRIMARY KEY - A combination of a NOT NULL and UNIQUE. Uniquely identifies each row in a table FOREIGN KEY - Uniquely identifies a row/record in another table CHECK - Ensures that all values in a column satisfies a specific condition DEFAULT - Sets a default value for a column when no value is specified INDEX - Used to create and retrieve data from the database very quickly

Which best describes the roles in the Simple Network Management Protocol (SNMP)?

Network managers are clients and network agents are severs

Compression method to general category

Null (or zero) compression - Run length encoding Huffman Coding - Frequency based compression Lempel Ziv - Dictionary Based compression

Which is not characteristic of the "stream paradigm"?

One - to - many communication

Which method is not associated with the client-side of the "socket" process?

Only server listens

While of the following five consecutive segments are typically encrypted in an SSH packet? length (L), padding (P), type (T), data (D), CRC (C)?

P through CRC

Which is a valid HTTP request type?

POST, HEAD, TRACE, DELETE

Which is not a valid HTTP request type?

PUSH VIEW

Which command is not part of the SQL Data Definition Language?

Part of the language - table, view, create, alter, add, drop, trunc

In class, we used a Distributed Hash Table (DHT) in conjunction with which architectural model?

Peer - to - peer

What kind of address is used to identify the service?

Port ( if you see socket choose socket)

Special IPv4 address with the corresponding value:

Prefix and suffix all 0's - indicates this computer Prefix network, suffix all 0's - indicates network Prefix network, suffix all 1's - directed broadcast on specified net Prefix and suffix all 1's - limited broadcast on local net Prefix 127/8, suffix any - loopback for testing

What are the tiers of the 3-tier architecture?

Presentation Tier Application/business logic tier Data data tier

What is the purpose of the IP datagram header field "Time To Live (TTL)?

Prevent packet looping-represent the number of hops

Which is a type of constraint in SQL?

Primary Key, Foreign Key, Unique, Not Null, Check

Which best describes the use of keys for "authentication"?

Private key to encrypt, public key to decrypt

Which are the three primary roles in the Service Oriented Architecture?

Provider, Consumer, Broker

What is Secure Shell (SSH) used for?

Remote logging and file transfer

Which fields does a UDP datagram header contain?

Source port Destination port Message length Optional checksum

In the Stop-and-Wait flow-control protocol, what best describes the sender's (S) and receiver's (R) respective window sizes?

S=1, R=1

Which protocol provides multi-homing and redundant paths to increase resilience and reliability?

SCTP

Which transport layer protocol is used to support electronic mail?

SMTP

Which of the following is most likely to be associated with the Session layer of the Internet?

SQL

What are the respective goals of the Sliding Window (SW) and Congestion Control (CC) algorithms?

SW speeds up the data flow, CC slows down the data flow.

!Which attack mechanism is intended to exhaust a receiver's set of TCP connections?

SYN - flooding Denial of Service (DOS/DDOS - distributive denial of service which can do more and is harder to identify source)

What is used to handle the issues in the Transport Protocol?

Sequencing - used to handle duplicates and out of order delivery, assigns a number to each TCP packet so the receiver can handle duplicates and make sure that packets are in order Also uses: Resubmission - receiver sends acknowledgement and sender keeps track Avoid Replay - Assigns a unique identifier to each connection so that the receiver does not get a packet from an earlier connection and keep it and then later discard a packet with the same number and discard it

What are the roles or the Service-Oriented Architecture (SOA)?

Service provider Service broker Service requester/consumer locates entries in the broker registry using various operations and then binds to the service provider in order to invoke one of its web services

Which IP addresses generally appear in the header of an IPv6 datagram?

Source IP address, Destination IP address

In which software development model do developers start with smaller scale problems. explore issues and risk and gradually increase size and complexity?

Spiral

The 10-BASE-T and related Ethernet media primarily assume which network topology?

Star Topology

. Is this an example of static or dynamic routing? "The contents of the forwarding table remain unchanged unless an administrator modifies it"

Static routing

Which Transport Layer protocol is used to support the transfer of secure documents?

TCP

What was SSH originally designed to replace?

TELNET

Which feature of an XML file does not directly contribute to it being "well-formed"?

The structure matches a document-type-definition

Which best describes the division of bits in a MAC address of a network interface controller?

The prefix represents the manufacture (24) and the suffix represents the controller/device(24)

Which is true of public key cryptography?

The sender uses a public key to encrypt and the receiver uses a private key to decrypt

!Which is not a category of Fine-Grain Quality of Service (QoS)?

These are the Fine-Grain Quality Services:Constant Bit Rate (CBR) - data enters the flow at a fixed bit rate (e.g. digitized voice call at 64kbps)Variable Bit Rate (VBR) - data enters the flow at variable bit rate (within specified statistical bounds)Available Bit Rate (ABR) - flow agrees to use whatever bit rate is available at a given time Unspecified Bit Rate (UBR) - no bit rate is specified, application is satisfied with best-effort service

Which is not characteristic of a Virtual Private Network (VPN)?

These are the characteristics of VPN:Increased latency due to trips across Internet between VPN routers.Decreased throughput because of the use of the (slower) Internet instead of a high-speed LAN. Increased overhead and fragmentation resulting from the use of tunneling

What is the total number of synchronizations (SYN) and acknowledgements (ACK) in a three-way handshake for creating a connection?

To create a TCP connection: send SYN->receive SYN, send SYN+ACK->receive SYN+ACK, send ACK->receive ACK 4

For which "protocol data unit" is "Segment" another name?

Transport

TCP/IP model with corresponding addressing

Transport - Port Network - IP Address Data Link - MAC Address

Which are components of SSH

Transport Layer Protocol Authentication Protocol Connection Protocol

Which are components of SSH?

Transport-Layer Protocol Authentication Protocol Connection Protocol

True or False: A Framework gives you a set of functions/Modules/Api's but it changes your code on the structural or architectural level?

True

Which best describes the relationship of JavaScript and TypeScript?

TypeScript is syntactic superset of Javascript

Let "A ⊂ B" denote "A is encapsulated inside B". Which best represents the relationship between an Frame(F), IP Datagram (IP), and User Datagram (UP)?

U in I in F

!Which protocol does not belong to the Application layer of the TCP/IP model?

UDP

Which is least likely to be associated with the session layer of the internet?

UDP (found in the transport layer)

Which protocol(s) should be considered "Best Effort Delivery"

UDP, IP

What are the three types of IPv6 Addressing?

Unicast Multicast Anycast

Which terms describe the User Datagram Protocol (UDP)?

Unreliable, connectionless, Message Oriented, End to End

What are the pros of using Dynamic Application Development (DAD)?

Users see software development process Deliverables are provided quickly close working relationship between developers and end-users

When is it appropriate to use UDP?

When streaming audio or video - since it doesn't matter if an occasional packet is lost

!Which is not a common data communication standard for wireless media?

WiNie

Which organization is primarily concerned with protocols for low-power digital radio devices such as for home automation?

Zigbee

What is UTP, as discussed in class?

a medium of unprotected wires divided into groups

Which type of issue would Internet Control Message Protocol (ICMP) not report on?

checksum problem

Which term does not describe the User Data Protocol (UDP)?

connection - oriented

Which term does not describe the User Datagram Protocol (UDP)?

connection oriented

Which term does not describe UDP?

connection-oriented

In JavaScript Object Notation (JSON), a value many not be which of the following data types?

date

Which cannot be used to specify a color in CSS?

decimal number

!Which is not a valid method of communicating with the user via the browser in JavaScript?

deliver

!What is the purpose of the "channel encoder"?

detects and corrects transmission errors (redundancy)

!At the application layer, how does a client identify the server with which it wishes to communicate: domain name (DN), IP address (IP), medium access control (MAC)?

domain name (DN)

Consider the following piece of a CSS file referenced by an HTML file. For what is x (without any accompanying symbols) a placeholder? x {color: green}

element

In the CSS snippet "x {color: blue}', what does x represent (when x is not accompanied by any symbol?

element

Which is not a type of <input> tag in HTML?

form

!Which object is not part of the Document Object Model (DOM)?

history

!What will happen when executing the following lines of JavaScript code? (1) var x; (2) var x; (3) x = 4; (4) x = "Java";

it will run all four lines without error

Which method/functionality is not associated with the client-side of the "socket" process?

listen

Which are true of fiber optic cable media?

low noise immunity high bandwidth requires special handling

!Which is not a reserved word in JavaScript?

main

Which best describes the use of IPv4 class D addresses?

multicast

In a datagram Forwarding Table, which columns must be found: A = destination address, H = next hop, M = network mask, N = destination network address?

next hop, network mask, destination network address If multiple matches - take longest prefix

Which feature of XML does not directly contribute to it being well-formed?

the structure matches a document type definition

Which are valid list tags in HTML?

ol ul

Which is not a characteristic of the "stream paradigm"?

one to many communication

Which is not a valid value of the name attribute in an HTML <meta> tag?

protocol

!Which IP addresses generally appear in an IPv4 datagram header: source (S), intermediate (I), destination (D)?

source and destination

What best describes the difference between categories of Ethernet cables (CAT-n)?

speed

Which is not a referencing object in the Document Object Model (DOM)?

tag


Conjuntos de estudio relacionados

Ch.10 Preparing Effective Visual Aids

View Set

BIOL220 Development: Reproduction

View Set

Chp 20 Financing the Real Estate Transaction

View Set

翰林-104(下)-BOOK 2-文法選擇(第三次月考) $$$

View Set