CS355
!Which comparison operators is used in JavaScript to check for non-equality by both datatype and underlying value?
!==
What is the standard form for calling a jQuery function to perform an action on selected elements?
$(selector).action()
Which is not a valid "combinator" (selector operator) in CSS?
& (ampersand)
Which is true of Interior Gateway Protocol (IGP) compared to an Exterior Gateway Protocol (EGP)
(EGP only tells the connectivity. IGP uses routing metrics, can be used to determine the shortest way to reach something.) (Set of routers, share info more freely with each other, reluctant to share into outside) !!IGPs report more detailed routing information than EGPs
!What best describes the primary difference between Ethernet cables (CAT -n)?
(Frequency Amplitude Phase) SPEED
HTTP status code with it's meaning
(XX is a placeholder for two decimal digits) 1XX - informational 2XX - success 3XX - redirection 4XX - client error 5XX - server error
In HTML, which other list tag exists besides <ol> and <ul>?
<dl> defines a definition list
Which HTML tag would have as an attribute an "href" to an external "cascading style sheet" (CSS)?
<link>
How do you style tags with class MYCLASS to have text color of red?
.MYCLASS{color:red}
Given a subnet mask of 255.255.252.0, how man hosts are vailable in the subnet?
1022
How many hexadecimal zeros are replaced by the "zero-compression" in the IPv6 address ABCD:ABCD:ABCD:ABCD::ABCD?
12
How many networks are allowed under In IPv4 addressing Class A?
128(2^7)
!How many bits are in a port address (used as part of a socket address)?
16
Assuming CIDR for IPv4, a network mask of 255.255.255.192, and reserving subnet all-zeroes and all-ones for special purposes, how many other addresses remain within this subnet to allocate to host computers?
192=11000000, the last 6 bits are free to use except 00000000 and 11111111, so is it 62!
!How many octets are in a port address?
2
How many bytes are in a port address?
2 bytes (16bits)
!What are the respective number of synchronization (SYN) and acknowledgement (ACK) requests sent during the establishing of a three-way handshake?
2, 2
How many Hexadecimal digits are missing due to zero compression in the IPv6 address A1B2:C3D4:E5F6
20
What class is the "classful" IPv4 address is 226.227.228.229?
226=1110 --> Class D
What is the IP address associate with a subnet mask of "/28"
255.255.255.240
In IPv4 addressing, how many networks are allowed under class C?
2^21
!Following Base64 conversion used to convert non-ASCII data into ASCII data, how many ASCII characters will be produced from an original 24 bits of non-ASCII data?
3
!Assuming CIDR for IPv4, a subnet mask of 27, and reserving subnet all zeroes and all ones for special purposes, how many ordinary addresses remain within this subnet to allocate to host computers?
30
How many bits are in a standard MAC address?
48
Suppose that an IPv6 address has a subnet id with 16 bits. How many are in its global routing prefix?
48
Suppose that an IPv6 address has a subnet id with 16 bits. How many bits are in its global routing prefix?
48
What is the total number of bits in an (IPv4) socket address?
48
How many bits and hexadecimal digits are respectively in a traditional MAC address?
48 (bits) and 12 (hexadecimal)
Given a subnet of 255.255.254.0, how many hosts are available in the subnet?
510
How many HTTP GET requests are required to get an HTML file with 1 CSS, 1 JavaScript, and 3 JPEG images
6
How many HTTP GET requests are required to get an HTML file with 1 css, 1 JavaScript, and 3 JPEG images
6
If there were a total of 24 synchronization (SYN) requests over a set of started and gracefully shutdown connections, how many connections were there?
6
How many bytes are in a MAC address?
6 bytes (48bits)
!Suppose that an IPv6 address has a global (site) prefix of 48 bits. How many bits are in its interface ID?
64
Suppose that an IPv6 address has a subnet id with 16 bits. How many bits are in its interface id?
64.0
Assuming the classical grid view, if one div tag has class "col-5" and the other has class "col-3", what percentage of the screen do they take up together?
67.0
Assuming the classical grid view, if one div tag has class "col-4" and the other has class "col-5", what percentage of the screen do they take up together?
75
How many octets does a UDP datagram header contain?
8
Which of the following comparison operators are invalid in JavaScript?
<> <== >==
Which HTML element does not also have a closing tag?
<br>, <img>, <meta>,<input>
Suppose that two IPv4 addresses 10.1051.69 and 10.105.1.91 both belong to the same network and share a network mask M. Which is not a valid value for M?
91 in binary is 01011011 69 in binary is 01000101 !!ANSWER IS E!! The options were: (A) 255.255.255.0 (B) 255.255.255.128 (C) 255.255.255.192 (D) 255.255.255.224 (E) 255.255.255.240 Didn't understand and couldn't find the answer so here is a similar question. If you know the answer/understand please modify the card! Gotten from geeks for geeks https://www.geeksforgeeks.org/computer-networks-set-4-2/ 2) Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respectively and they both use the same netmask N. Which of the values of N given below should not be used if A and B should belong to the same network? (A) 255.255.255.0 (B) 255.255.255.128( C) 255.255.255.192 (D) 255.255.255.224 (D)The last octets of IP addresses of A and B are 113 (01110001) and 91 (01011011). The netmask in option (D) has first three bits set in last octet. If netmask has first 3 bits set, then these bits nmust be same in A and B, but that is not the case. In simple words, we can say option (D) is not a valid netmask because doing binary '&' of it with addresses of A and B doesn't give the same network address. It must be same address as A and B are on same network. See this for more details.
The explanation with the letter in the ACID acronym for database transactions
A - transaction is treated as a single unit which either succeeds completely or fails completely C - each transaction brings the database from one valid state to another I - each transaction prevents concurrent access that would interfere with teh results D - each transaction will endure even after the system failures
What does the "Address Resolution Protocol" aim to determine?
A mac address associated with the given IP address
!Which are components of the SSP protocol: AUTH (A), CONN (C), LOG (L), TRANS (T)?
A, C, T
Which notation is used by SNMP's Management Information Base to store information from requests and replies?
ACN - Abstract Syntax Notation
Let "A ⊂ B" denote "A is encapsulated inside B". Which best represents the relationship between an Application Message (AM), IP Datagram (IP), and User Datagram (UP)?
AM in UP in IP
Which SQL keyword should be used to have the database generate the primary keys?
AUTOINCREMENT
Desired goal with the SQL command
Add a row to a table - INSERT Retrieve rows from a table - SELECT -DROP
!What does the "Reverse Address Resolution Protocol" aim to determine?
An IP address associated with a given MAC address
!Which best describes IP in IP tunneling?
An encrypted datagram is encapsulated in another unencrypted datagram This is what it says in the notes, not sure if this is the right answer but the notes don't say anything about encryption so... This works well when the group is geographically dispersed - a few members at each of a few sites. A router at each site is configured to know about other sites. When the router receives one of the datagrams for the group, it forwards it via hardware multicast locally. It then consults its configuration information and sends a copy to each remote site on its list - using IP-in-IP tunneling, to encapsulate the multicast datagrams in unicast datagrams.
What is the purpose of a "source encoder"?
Compresses data from analog or digital into a format of transmission
Which layers use logical rather than physical connections?
Application (Presentation) Internet/Network Transport
OSI Model
Application, Presentation, Session, Transport, Network, Data Link, Physical
Which are features specifically of "transaction processing" in a database?
Atomicity - each transaction is treated as a single unit, which either succeeds completely ("committed") or fails completely ("rolled back") Consistency - each transaction brings the database from one valid state to another, all rules such as constraints and triggers are followed Isolation - each transaction prevents concurrent access that would interfere with the results, i.e. it should behave as if it were run sequentially Durability - results of each transaction will endure even after system failures such as power outages and crashes (data must be stored in non-volatile memory)
Which class does the classful address 146.132.128.116 belong?
B
SQL keywords with their purpose
BETWEEN - check if column value is within a range IN - check if column value matches any value within a list LIKE - check if column value matches string pattern EXISTS - check if subquery returns any rows NOT NULL- check if column value is present
Dynamic Host Configuration Protocol extends the ideas of which other protocol?
Bootstrap Protocol (BOOTP) (DHCP) - boots up get the ip
Both true of HTTP and HTTPS
Both use reliable delivery Both use the public internet (as opposed to leased curcuits) Both support IPv4 addresses
Which Bootstrap construct is used to help record user-navigation?
Breadcrumbs
To what class does the IP address 200.201.202.203 belong?
C
Of the above five segments used in an SSH packet, which one features redundancy for error-detection purposes?
CRC - cyclic redundancy check used to check if data is valid, doesn't get encrypted
Which commands are part of the SQL Data Definition Language?
CREATE - is used to create the database or its objects (like table, index, function, views, store procedure and triggers). DROP - is used to delete objects from the database. ALTER-is used to alter the structure of the database. (means to change) TRUNCATE-is used to remove all records from a table, including all spaces allocated for the records are removed. COMMENT -is used to add comments to the data dictionary. RENAME -is used to rename an object existing in the database
Which is not a valid datatype in JavaScript?
Character
Which is not one of the seven basic data types in JavaScript?
Character (They are - var, string, number, boolean, null, undefined, object)
Which type of issue would Internet Control Message Protocol (ICMP) not report on?
Checksum problem - don't know where send to
What class is the "classful" IPv4 address is 226.227.228.229?
Class D because class D starting address is 224.0.0.0 and ending address is 255.255.255.255, it falls within the range
What did designers do in order to accommodate both large and small networks in an IP address?
Classful IP addressing
In a client-server architecture, which can initiate a connection?
Client
Which goal is relatively deemphasized according to the "SOA Manifesto"
Client specific optimizations provide services that are useful to large numbers of people
Which methods apply to the client-side of the "socket" process?
Close, connect, receive, send
Using the Bootstrap grid-model, and assuming a screen width of at least 576 pixels, what portion of the width of the screen will A and B together take up?
Col-sm-3 and col-sm-5 → total is 12 column model → 8/12=2/3
Stream paradigm
Connection-oriented 1 to 1 communication Send sequences of individual bytes Arbitrary length Transfer Used by Most Applications Uses TCP
What are the characteristic of the "stream paradigm"?
Connection-oriented 1-to-1 communication Send sequences of individual bytes Arbitrary length transfer Used by most applications uses" Transmission control protocol
What is "STP", discussed in class?
Copper Wire - Shielded Twist Pair
Media type with cooresponding signal
Copper wire - electrical Fiber-Optic - light pulse Wireless - radio wave
!What class is the classful addressing 230.255.255.255?
D
!How does a client identify the server with which it wishes to communicate: domain name (DN), IP address (IP), medium access control (MAC)?
DN
Which higher level protocol can use either TCP or UDP as its next layer protocols?
DNS
TCP/IP Layer with the Protocol Data Unit
Data Link - Frame Application - Message Physical - Bits Internet - Packet Transport - Segment
In JavaScript Object Notation (JSON), a value may not be which of the following data types?
Date, Undefined, Function
Which fields does a forwarding table need to contain?
Destination IP network address Mask that encodes the prefix/suffix boundary of the Destination network address IP address of a next hop to send packets to that destination network
Which is true of JSON?
More concise than XML Supports arrays
Which field is the least likely to appear in the header of a UDP datagram?
Domain Name
To which class does the IPPv4 address 240:230:220:210 belong?
E
!Which is NOT true of an Exterior Gateway Protocol (EGP) , compared to an Interior Gateway Protocol (IGP)?
EGP's report more detailed routing than information than IGPs
Which are characteristics of the primary key in a database?
Each row should have one It should be unique It should not be null
Which best describes "IP-in-IP Tunneling"?
Encapsulate one IP datagram in another Encrypt one an put it in another (can't encrypt header - won't know where to go)
ITU's FCAPS model for network management
F- Fault Detection C- Configuration A - Accounting P - Performance S - Security
In a SQL SELECT statement, what is the typical sequence of the FROM (F), ORDER BY (O), and WHERE (W) keywords?
FROM, WHERE, ORDER BY
Which protocol uses more than one port for its standard behavior?
FTP
Protocol with default port
FTP - 20 and 21 HTTP - 80 SMTP - 25 SSH - 22 HTTPS - 443
True or false: == in javascript checks that it is equal value and equal type.
False - === does that
True or False: The Server may terminate after interacting with a client?
False - Opposite (The client may terminate after interacting with a server)
Light pulses are used as the signal for which type of physical medium?
Fiber - Optic
For which protocol are 20/21 the standard ports?
File Transfer Protocol (FTP)
Which are not goals of firewalls?
Firewall goal - Keep things in (that need to be protected) and out (that will harm)
How many classes is the IPv4 "classful" addressing divided into?
Five classes
Which are approaches to Multicast Datagram Forwarding?
Flood-and-prune Configuration-and-tunneling Core-based discovery
Which are valid SQL constraints?
Foreign Key, Check, Unique, Default
How many octets are in IPv4 and IPv6 addresses respectively?
Four octets in IPv4 (32/8=4), and sixteen octets in IPv6 (128/8=16)
If an application sends UDP data that exceeds the Maximum Transmission Unit (MTU), what will the IP protocol do?
Fragment It
Which IP addresses generally appear in the header of an IPv6 packet: source (S), intermediate (I), destination (D)?
Source and destination
What is the three level hierarchy for IPv6 addressing?
Global routing subnet ID Host
Which organization defines the services and protocols of the upper layers of the TCP/IP Internet model?
IETF (IEEE - data communications)
Which protocol primarily uses UDP for transport?
IGP, EGP, BGP (DNS - higher up than UDP - does not have to be reliable ------ANSWER FOR THE TEST MOST PROBABLY)
At the Transport Layer, how does a client identify the server with which it wishes to communicate: domain name (DN), IP address (IP), port (P)?
IP Address, Port (DNS)
In Network Address Translation (NAT), which IP address needs to get replaced?
IP source on outgoing datagram and IP destination on incoming datagram
"Zero Compression", as discussed in class, is associated with which of the following concepts?
IPv6
Which addressing scheme facilitates "Auto-Configuration" to obtain a host id?
IPv6 - 128 bits
In addition to caching, which technique(s) is/are used for domain-name lookup? authentication resolution (AR), iterative resolution (IR), recursive resolution (RR)
IR and RR
Organization with it's function
ISO - developed OSI model of internet W3c - regulates standards such as HTML CSS and XML ICANN - maintain namespaces and numerical spaces of the internet IEEE - maintain standards for low - level such as wired and wireless connections IETF - promote voluntary standards such as the TCP/IP protocol suite
When are NAPT systems used?
In residences and small businesses - way of running a network while sharing a single IP address
HTML styling from highest to lowest priority
Inline styling, internal stylesheet, external stylesheet, browser default
What does the Dynamic Host Configuration Protocol (DHCP) do?
It allows a new unknown computer to join a network and be assigned an IP address from a pool of addresses maintained for that purpose
Which is not characteristic of "Simple API for XML" (SAX)?
It supports random-access to the document
Which is not true of the Transmission Control Protocol (TCP)?
It's connections are physical
What does the sender need to specify when sending a packet across the internet?
It's own IP address The address of the intended recipient
!The notion of having intense off-site developer/user conferences to define requirements is most associated with which development model?
JAD
"Jitter" most commonly refers to variance in which of the following?
Latency
Which data compression schemes are "lossless": Run Compression (RC), Huffman Coding (HC), Lempel-Ziv-Welch (LZW)?
Lempel-Ziv-Welch (LZW) (dictionary), Run Compression, and Huffman encoding-statistic
Consider the following activities related to sending e-mail: m1 = checking email in a web browser, m2 = send an email from a mail client to mail server; m3 = download an email from mailbox server to a mail client;. Which is an applicable protocol for each activity?
M1, going to the account, is HTTP M2, client to server, is SMTP M3, download, is POP
Which architectural pattern is commonly used for developing interfaces that divide an application into three interconnected parts?
MVC (model view controller)
!In Network Address and Port Translation (NAPT), which best describes the information used in an attempt to identify he local destination address?
Source IP and Destination Port (look at the port and what devices are on there)
What is the data unit most associated with the application layer?
Message
!Which term is the most synonymous with "channel sharing"?
Multiplexing
Which term is most synonymous with "channel-sharing"?
Multiplexing is the way information from multiple sources is combined for transmission over a shared medium
Given a destination address (D), a network prefix (N), and an address mask (M) - all with the same number of bits - which comparison should be used to determine whether the destination lies on the network? (Let | denote OR, and let & denote AND)
N==(D&M)
Which are a type of constraints in SQL?
NOT NULL - Ensures that a column cannot have a NULL value UNIQUE - Ensures that all values in a column are different PRIMARY KEY - A combination of a NOT NULL and UNIQUE. Uniquely identifies each row in a table FOREIGN KEY - Uniquely identifies a row/record in another table CHECK - Ensures that all values in a column satisfies a specific condition DEFAULT - Sets a default value for a column when no value is specified INDEX - Used to create and retrieve data from the database very quickly
Which best describes the roles in the Simple Network Management Protocol (SNMP)?
Network managers are clients and network agents are severs
Compression method to general category
Null (or zero) compression - Run length encoding Huffman Coding - Frequency based compression Lempel Ziv - Dictionary Based compression
Which is not characteristic of the "stream paradigm"?
One - to - many communication
Which method is not associated with the client-side of the "socket" process?
Only server listens
While of the following five consecutive segments are typically encrypted in an SSH packet? length (L), padding (P), type (T), data (D), CRC (C)?
P through CRC
Which is a valid HTTP request type?
POST, HEAD, TRACE, DELETE
Which is not a valid HTTP request type?
PUSH VIEW
Which command is not part of the SQL Data Definition Language?
Part of the language - table, view, create, alter, add, drop, trunc
In class, we used a Distributed Hash Table (DHT) in conjunction with which architectural model?
Peer - to - peer
What kind of address is used to identify the service?
Port ( if you see socket choose socket)
Special IPv4 address with the corresponding value:
Prefix and suffix all 0's - indicates this computer Prefix network, suffix all 0's - indicates network Prefix network, suffix all 1's - directed broadcast on specified net Prefix and suffix all 1's - limited broadcast on local net Prefix 127/8, suffix any - loopback for testing
What are the tiers of the 3-tier architecture?
Presentation Tier Application/business logic tier Data data tier
What is the purpose of the IP datagram header field "Time To Live (TTL)?
Prevent packet looping-represent the number of hops
Which is a type of constraint in SQL?
Primary Key, Foreign Key, Unique, Not Null, Check
Which best describes the use of keys for "authentication"?
Private key to encrypt, public key to decrypt
Which are the three primary roles in the Service Oriented Architecture?
Provider, Consumer, Broker
What is Secure Shell (SSH) used for?
Remote logging and file transfer
Which fields does a UDP datagram header contain?
Source port Destination port Message length Optional checksum
In the Stop-and-Wait flow-control protocol, what best describes the sender's (S) and receiver's (R) respective window sizes?
S=1, R=1
Which protocol provides multi-homing and redundant paths to increase resilience and reliability?
SCTP
Which transport layer protocol is used to support electronic mail?
SMTP
Which of the following is most likely to be associated with the Session layer of the Internet?
SQL
What are the respective goals of the Sliding Window (SW) and Congestion Control (CC) algorithms?
SW speeds up the data flow, CC slows down the data flow.
!Which attack mechanism is intended to exhaust a receiver's set of TCP connections?
SYN - flooding Denial of Service (DOS/DDOS - distributive denial of service which can do more and is harder to identify source)
What is used to handle the issues in the Transport Protocol?
Sequencing - used to handle duplicates and out of order delivery, assigns a number to each TCP packet so the receiver can handle duplicates and make sure that packets are in order Also uses: Resubmission - receiver sends acknowledgement and sender keeps track Avoid Replay - Assigns a unique identifier to each connection so that the receiver does not get a packet from an earlier connection and keep it and then later discard a packet with the same number and discard it
What are the roles or the Service-Oriented Architecture (SOA)?
Service provider Service broker Service requester/consumer locates entries in the broker registry using various operations and then binds to the service provider in order to invoke one of its web services
Which IP addresses generally appear in the header of an IPv6 datagram?
Source IP address, Destination IP address
In which software development model do developers start with smaller scale problems. explore issues and risk and gradually increase size and complexity?
Spiral
The 10-BASE-T and related Ethernet media primarily assume which network topology?
Star Topology
. Is this an example of static or dynamic routing? "The contents of the forwarding table remain unchanged unless an administrator modifies it"
Static routing
Which Transport Layer protocol is used to support the transfer of secure documents?
TCP
What was SSH originally designed to replace?
TELNET
Which feature of an XML file does not directly contribute to it being "well-formed"?
The structure matches a document-type-definition
Which best describes the division of bits in a MAC address of a network interface controller?
The prefix represents the manufacture (24) and the suffix represents the controller/device(24)
Which is true of public key cryptography?
The sender uses a public key to encrypt and the receiver uses a private key to decrypt
!Which is not a category of Fine-Grain Quality of Service (QoS)?
These are the Fine-Grain Quality Services:Constant Bit Rate (CBR) - data enters the flow at a fixed bit rate (e.g. digitized voice call at 64kbps)Variable Bit Rate (VBR) - data enters the flow at variable bit rate (within specified statistical bounds)Available Bit Rate (ABR) - flow agrees to use whatever bit rate is available at a given time Unspecified Bit Rate (UBR) - no bit rate is specified, application is satisfied with best-effort service
Which is not characteristic of a Virtual Private Network (VPN)?
These are the characteristics of VPN:Increased latency due to trips across Internet between VPN routers.Decreased throughput because of the use of the (slower) Internet instead of a high-speed LAN. Increased overhead and fragmentation resulting from the use of tunneling
What is the total number of synchronizations (SYN) and acknowledgements (ACK) in a three-way handshake for creating a connection?
To create a TCP connection: send SYN->receive SYN, send SYN+ACK->receive SYN+ACK, send ACK->receive ACK 4
For which "protocol data unit" is "Segment" another name?
Transport
TCP/IP model with corresponding addressing
Transport - Port Network - IP Address Data Link - MAC Address
Which are components of SSH
Transport Layer Protocol Authentication Protocol Connection Protocol
Which are components of SSH?
Transport-Layer Protocol Authentication Protocol Connection Protocol
True or False: A Framework gives you a set of functions/Modules/Api's but it changes your code on the structural or architectural level?
True
Which best describes the relationship of JavaScript and TypeScript?
TypeScript is syntactic superset of Javascript
Let "A ⊂ B" denote "A is encapsulated inside B". Which best represents the relationship between an Frame(F), IP Datagram (IP), and User Datagram (UP)?
U in I in F
!Which protocol does not belong to the Application layer of the TCP/IP model?
UDP
Which is least likely to be associated with the session layer of the internet?
UDP (found in the transport layer)
Which protocol(s) should be considered "Best Effort Delivery"
UDP, IP
What are the three types of IPv6 Addressing?
Unicast Multicast Anycast
Which terms describe the User Datagram Protocol (UDP)?
Unreliable, connectionless, Message Oriented, End to End
What are the pros of using Dynamic Application Development (DAD)?
Users see software development process Deliverables are provided quickly close working relationship between developers and end-users
When is it appropriate to use UDP?
When streaming audio or video - since it doesn't matter if an occasional packet is lost
!Which is not a common data communication standard for wireless media?
WiNie
Which organization is primarily concerned with protocols for low-power digital radio devices such as for home automation?
Zigbee
What is UTP, as discussed in class?
a medium of unprotected wires divided into groups
Which type of issue would Internet Control Message Protocol (ICMP) not report on?
checksum problem
Which term does not describe the User Data Protocol (UDP)?
connection - oriented
Which term does not describe the User Datagram Protocol (UDP)?
connection oriented
Which term does not describe UDP?
connection-oriented
In JavaScript Object Notation (JSON), a value many not be which of the following data types?
date
Which cannot be used to specify a color in CSS?
decimal number
!Which is not a valid method of communicating with the user via the browser in JavaScript?
deliver
!What is the purpose of the "channel encoder"?
detects and corrects transmission errors (redundancy)
!At the application layer, how does a client identify the server with which it wishes to communicate: domain name (DN), IP address (IP), medium access control (MAC)?
domain name (DN)
Consider the following piece of a CSS file referenced by an HTML file. For what is x (without any accompanying symbols) a placeholder? x {color: green}
element
In the CSS snippet "x {color: blue}', what does x represent (when x is not accompanied by any symbol?
element
Which is not a type of <input> tag in HTML?
form
!Which object is not part of the Document Object Model (DOM)?
history
!What will happen when executing the following lines of JavaScript code? (1) var x; (2) var x; (3) x = 4; (4) x = "Java";
it will run all four lines without error
Which method/functionality is not associated with the client-side of the "socket" process?
listen
Which are true of fiber optic cable media?
low noise immunity high bandwidth requires special handling
!Which is not a reserved word in JavaScript?
main
Which best describes the use of IPv4 class D addresses?
multicast
In a datagram Forwarding Table, which columns must be found: A = destination address, H = next hop, M = network mask, N = destination network address?
next hop, network mask, destination network address If multiple matches - take longest prefix
Which feature of XML does not directly contribute to it being well-formed?
the structure matches a document type definition
Which are valid list tags in HTML?
ol ul
Which is not a characteristic of the "stream paradigm"?
one to many communication
Which is not a valid value of the name attribute in an HTML <meta> tag?
protocol
!Which IP addresses generally appear in an IPv4 datagram header: source (S), intermediate (I), destination (D)?
source and destination
What best describes the difference between categories of Ethernet cables (CAT-n)?
speed
Which is not a referencing object in the Document Object Model (DOM)?
tag