Quizwiz - Ace Your Homework & Exams, Now With ChatGPT AI (2024)

!Which comparison operators is used in JavaScript to check for non-equality by both datatype and underlying value?

!==

What is the standard form for calling a jQuery function to perform an action on selected elements?

$(selector).action()

Which is not a valid "combinator" (selector operator) in CSS?

& (ampersand)

Which is true of Interior Gateway Protocol (IGP) compared to an Exterior Gateway Protocol (EGP)

(EGP only tells the connectivity.IGP uses routing metrics, can be used to determine the shortest way to reach something.)(Set of routers, share info more freely with each other, reluctant to share into outside)!!IGPs report more detailed routing information than EGPs

!What best describes the primary difference between Ethernet cables (CAT -n)?

(FrequencyAmplitude Phase)SPEED

HTTP status code with it's meaning

(XX is a placeholder for two decimal digits)1XX - informational2XX - success3XX - redirection4XX - client error5XX - server error

In HTML, which other list tag exists besides <ol> and <ul>?

<dl> defines a definition list

Which HTML tag would have as an attribute an "href" to an external "cascading style sheet" (CSS)?

<link>

How do you style tags with class MYCLASS to have text color of red?

.MYCLASS{color:red}

Given a subnet mask of 255.255.252.0, how man hosts are vailable in the subnet?

1022

How many hexadecimal zeros are replaced by the "zero-compression" in the IPv6 address ABCD:ABCD:ABCD:ABCD::ABCD?

12

How many networks are allowed under In IPv4 addressing Class A?

128(2^7)

!How many bits are in a port address (used as part of a socket address)?

16

Assuming CIDR for IPv4, a network mask of 255.255.255.192, and reserving subnet all-zeroes and all-ones for special purposes,how many other addresses remain within this subnet to allocate to host computers?

192=11000000, the last 6 bits are free to use except 00000000 and 11111111, so is it 62!

!How many octets are in a port address?

2

How many bytes are in a port address?

2 bytes (16bits)

!What are the respective number of synchronization (SYN) and acknowledgement (ACK) requests sent during the establishing of athree-way handshake?

2, 2

How many Hexadecimal digits are missing due to zero compression in the IPv6 address A1B2:C3D4:E5F6

20

What class is the "classful" IPv4 address is 226.227.228.229?

226=1110 --> Class D

What is the IP address associate with a subnet mask of "/28"

255.255.255.240

In IPv4 addressing, how many networks are allowed under class C?

2^21

!Following Base64 conversion used to convert non-ASCII data into ASCII data, how many ASCII characters will be produced froman original 24 bits of non-ASCII data?

3

!Assuming CIDR for IPv4, a subnet mask of 27, and reserving subnet all zeroes and all ones for special purposes, how many ordinary addresses remain within this subnet to allocate to host computers?

30

How many bits are in a standard MAC address?

48

Suppose that an IPv6 address has a subnet id with 16 bits. How many are in its global routing prefix?

48

Suppose that an IPv6 address has a subnet id with 16 bits. How many bits are in its global routing prefix?

48

What is the total number of bits in an (IPv4) socket address?

48

How many bits and hexadecimal digits are respectively in a traditional MAC address?

48 (bits) and 12 (hexadecimal)

Given a subnet of 255.255.254.0, how many hosts are available in the subnet?

510

How many HTTP GET requests are required to get an HTML file with 1 CSS, 1 JavaScript, and 3 JPEG images

6

How many HTTP GET requests are required to get an HTML file with 1 css, 1 JavaScript, and 3 JPEG images

6

If there were a total of 24 synchronization (SYN) requests over a set of started and gracefully shutdown connections, how many connections were there?

6

How many bytes are in a MAC address?

6 bytes (48bits)

!Suppose that an IPv6 address has a global (site) prefix of 48 bits. How many bits are in its interface ID?

64

Suppose that an IPv6 address has a subnet id with 16 bits. How many bits are in its interface id?

64.0

Assuming the classical grid view, if one div tag has class "col-5" and the other has class "col-3", what percentage of the screen do they take up together?

67.0

Assuming the classical grid view, if one div tag has class "col-4" and the other has class "col-5", what percentage of the screen do they take up together?

75

How many octets does a UDP datagram header contain?

8

Which of the following comparison operators are invalid in JavaScript?

<> <== >==

Which HTML element does not also have a closing tag?

<br>, <img>, <meta>,<input>

Suppose that two IPv4 addresses 10.1051.69 and 10.105.1.91 both belong to the same network and share a network mask M. Which is not a valid value for M?

91 in binary is 0101101169 in binary is 01000101!!ANSWER IS E!!The options were: (A) 255.255.255.0(B) 255.255.255.128(C) 255.255.255.192(D) 255.255.255.224(E) 255.255.255.240Didn't understand and couldn't find the answer so here is a similar question. If you know the answer/understand please modify the card! Gotten from geeks for geeks https://www.geeksforgeeks.org/computer-networks-set-4-2/2) Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respectively and they both use the same netmask N. Which of the values of N given below should not be used if A and B should belong to the same network?(A) 255.255.255.0(B) 255.255.255.128(C) 255.255.255.192(D) 255.255.255.224(D)The last octets of IP addresses of A and B are 113 (01110001) and 91 (01011011). The netmask in option (D) has first three bits set in last octet. If netmask has first 3 bits set, then these bits nmust be same in A and B, but that is not the case. In simple words, we can say option (D) is not a valid netmask because doing binary '&' of it with addresses of A and B doesn't give the same network address. It must be same address as A and B are on same network. See this for more details.

The explanation with the letter in the ACID acronym for database transactions

A - transaction is treated as a single unit which either succeeds completely or fails completelyC - each transaction brings the database from one valid state to anotherI - each transaction prevents concurrent access that would interfere with teh resultsD - each transaction will endure even after the system failures

What does the "Address Resolution Protocol" aim to determine?

A mac address associated with the given IP address

!Which are components of the SSP protocol: AUTH (A), CONN (C), LOG (L), TRANS (T)?

A, C, T

Which notation is used by SNMP's Management Information Base to store information from requests and replies?

ACN - Abstract Syntax Notation

Let "A ⊂ B" denote "A is encapsulated inside B". Which best represents the relationship between an Application Message (AM), IPDatagram (IP), and User Datagram (UP)?

AM in UP in IP

Which SQL keyword should be used to have the database generate the primary keys?

AUTOINCREMENT

Desired goal with the SQL command

Add a row to a table - INSERTRetrieve rows from a table - SELECT -DROP

!What does the "Reverse Address Resolution Protocol" aim to determine?

An IP address associated with a given MAC address

!Which best describes IP in IP tunneling?

An encrypted datagram is encapsulated in another unencrypted datagramThis is what it says in the notes, not sure if this is the right answer but the notes don't say anything about encryption so...This works well when the group is geographically dispersed - a few members at each of a few sites.A router at each site is configured to know about other sites.When the router receives one of the datagrams for the group, it forwards it via hardware multicast locally.It then consults its configuration information and sends a copy to each remote site on its list - using IP-in-IP tunneling, to encapsulate the multicast datagrams in unicast datagrams.

What is the purpose of a "source encoder"?

Compresses data from analog or digital into a format of transmission

Which layers use logical rather than physical connections?

Application(Presentation)Internet/NetworkTransport

OSI Model

Application, Presentation, Session, Transport, Network, Data Link, Physical

Which are features specifically of "transaction processing" in a database?

Atomicity - each transaction is treated as a single unit, which either succeeds completely("committed") or fails completely ("rolled back")Consistency - each transaction brings the database from one valid state to another, all rulessuch as constraints and triggers are followedIsolation - each transaction prevents concurrent access that would interfere with the results,i.e. it should behave as if it were run sequentiallyDurability - results of each transaction will endure even after system failures such as poweroutages and crashes (data must be stored in non-volatile memory)

Which class does the classful address 146.132.128.116 belong?

B

SQL keywords with their purpose

BETWEEN - check if column value is within a rangeIN - check if column value matches any value within a listLIKE - check if column value matches string patternEXISTS - check if subquery returns any rowsNOT NULL- check if column value is present

Dynamic Host Configuration Protocol extends the ideas of which other protocol?

Bootstrap Protocol (BOOTP) (DHCP) - boots up get the ip

Both true of HTTP and HTTPS

Both use reliable deliveryBoth use the public internet (as opposed to leased curcuits)Both support IPv4 addresses

Which Bootstrap construct is used to help record user-navigation?

Breadcrumbs

To what class does the IP address 200.201.202.203 belong?

C

Of the above five segments used in an SSH packet, which one features redundancy for error-detection purposes?

CRC - cyclic redundancy check used to check if data is valid, doesn't get encrypted

Which commands are part of the SQL Data Definition Language?

CREATE - is used to create the database or its objects (like table, index, function, views, storeprocedure and triggers).DROP - is used to delete objects from the database.ALTER-is used to alter the structure of the database. (means to change)TRUNCATE-is used to remove all records from a table, including all spaces allocated for therecords are removed.COMMENT -is used to add comments to the data dictionary.RENAME -is used to rename an object existing in the database

Which is not a valid datatype in JavaScript?

Character

Which is not one of the seven basic data types in JavaScript?

Character(They are - var, string, number, boolean, null, undefined, object)

Which type of issue would Internet Control Message Protocol (ICMP) not report on?

Checksum problem - don't know where send to

What class is the "classful" IPv4 address is 226.227.228.229?

Class D because class D starting address is 224.0.0.0 and ending address is 255.255.255.255, itfalls within the range

What did designers do in order to accommodate both large and small networks in an IP address?

Classful IP addressing

In a client-server architecture, which can initiate a connection?

Client

Which goal is relatively deemphasized according to the "SOA Manifesto"

Client specific optimizationsprovide services that are useful to large numbers of people

Which methods apply to the client-side of the "socket" process?

Close, connect, receive, send

Using the Bootstrap grid-model, and assuming a screen width of at least 576 pixels, what portion of the width of the screen will Aand B together take up?

Col-sm-3 and col-sm-5 → total is 12 column model → 8/12=2/3

Stream paradigm

Connection-oriented1 to 1 communicationSend sequences of individual bytesArbitrary length TransferUsed by Most ApplicationsUses TCP

What are the characteristic of the "stream paradigm"?

Connection-oriented1-to-1 communicationSend sequences of individual bytesArbitrary length transferUsed by most applicationsuses" Transmission control protocol

What is "STP", discussed in class?

Copper Wire - Shielded Twist Pair

Media type with cooresponding signal

Copper wire - electricalFiber-Optic - light pulseWireless - radio wave

!What class is the classful addressing 230.255.255.255?

D

!How does a client identify the server with which it wishes to communicate: domain name (DN), IP address (IP), medium accesscontrol (MAC)?

DN

Which higher level protocol can use either TCP or UDP as its next layer protocols?

DNS

TCP/IP Layer with the Protocol Data Unit

Data Link - FrameApplication - MessagePhysical - BitsInternet - PacketTransport - Segment

In JavaScript Object Notation (JSON), a value may not be which of the following data types?

Date, Undefined, Function

Which fields does a forwarding table need to contain?

Destination IP network addressMask that encodes the prefix/suffix boundary of the Destination network addressIP address of a next hop to send packets to that destination network

Which is true of JSON?

More concise than XMLSupports arrays

Which field is the least likely to appear in the header of a UDP datagram?

Domain Name

To which class does the IPPv4 address 240:230:220:210 belong?

E

!Which is NOT true of an Exterior Gateway Protocol (EGP) , compared to an Interior Gateway Protocol (IGP)?

EGP's report more detailed routing than information than IGPs

Which are characteristics of the primary key in a database?

Each row should have oneIt should be uniqueIt should not be null

Which best describes "IP-in-IP Tunneling"?

Encapsulate one IP datagram in anotherEncrypt one an put it in another(can't encrypt header - won't know where to go)

ITU's FCAPS model for network management

F- Fault DetectionC- ConfigurationA - AccountingP - PerformanceS - Security

In a SQL SELECT statement, what is the typical sequence of the FROM (F), ORDER BY (O), and WHERE (W) keywords?

FROM, WHERE, ORDER BY

Which protocol uses more than one port for its standard behavior?

FTP

Protocol with default port

FTP - 20 and 21HTTP - 80SMTP - 25SSH - 22HTTPS - 443

True or false:== in javascript checks that it is equal value and equal type.

False - === does that

True or False:The Server may terminate after interacting with a client?

False - Opposite (The client may terminate after interacting with a server)

Light pulses are used as the signal for which type of physical medium?

Fiber - Optic

For which protocol are 20/21 the standard ports?

File Transfer Protocol (FTP)

Which are not goals of firewalls?

Firewall goal - Keep things in (that need to be protected) and out (that will harm)

How many classes is the IPv4 "classful" addressing divided into?

Five classes

Which are approaches to Multicast Datagram Forwarding?

Flood-and-pruneConfiguration-and-tunnelingCore-based discovery

Which are valid SQL constraints?

Foreign Key, Check, Unique, Default

How many octets are in IPv4 and IPv6 addresses respectively?

Four octets in IPv4 (32/8=4), and sixteen octets in IPv6 (128/8=16)

If an application sends UDP data that exceeds the Maximum Transmission Unit (MTU), what will the IP protocol do?

Fragment It

Which IP addresses generally appear in the header of an IPv6 packet: source (S), intermediate (I), destination (D)?

Source and destination

What is the three level hierarchy for IPv6 addressing?

Global routingsubnet IDHost

Which organization defines the services and protocols of the upper layers of the TCP/IP Internet model?

IETF(IEEE - data communications)

Which protocol primarily uses UDP for transport?

IGP, EGP, BGP(DNS - higher up than UDP - does not have to be reliable ------ANSWER FOR THE TEST MOST PROBABLY)

At the Transport Layer, how does a client identify the server with which it wishes to communicate: domain name (DN), IP address(IP), port (P)?

IP Address, Port (DNS)

In Network Address Translation (NAT), which IP address needs to get replaced?

IP source on outgoing datagram and IP destination on incoming datagram

"Zero Compression", as discussed in class, is associated with which of the following concepts?

IPv6

Which addressing scheme facilitates "Auto-Configuration" to obtain a host id?

IPv6 - 128 bits

In addition to caching, which technique(s) is/are used for domain-name lookup? authentication resolution (AR), iterative resolution(IR), recursive resolution (RR)

IR and RR

Organization with it's function

ISO - developed OSI model of internetW3c - regulates standards such as HTML CSS and XMLICANN - maintain namespaces and numerical spaces of the internetIEEE - maintain standards for low - level such as wired and wireless connectionsIETF - promote voluntary standards such as the TCP/IP protocol suite

When are NAPT systems used?

In residences and small businesses - way of running a network while sharing a single IP address

HTML styling from highest to lowest priority

Inline styling, internal stylesheet, external stylesheet, browser default

What does the Dynamic Host Configuration Protocol (DHCP) do?

It allows a new unknown computer to join a network and be assigned an IP address from a pool of addresses maintained for that purpose

Which is not characteristic of "Simple API for XML" (SAX)?

It supports random-access to the document

Which is not true of the Transmission Control Protocol (TCP)?

It's connections are physical

What does the sender need to specify when sending a packet across the internet?

It's own IP addressThe address of the intended recipient

!The notion of having intense off-site developer/user conferences to define requirements is most associated with whichdevelopment model?

JAD

"Jitter" most commonly refers to variance in which of the following?

Latency

Which data compression schemes are "lossless": Run Compression (RC), Huffman Coding (HC), Lempel-Ziv-Welch (LZW)?

Lempel-Ziv-Welch (LZW) (dictionary), Run Compression, and Huffman encoding-statistic

Consider the following activities related to sending e-mail: m1 = checking email in a web browser, m2 = send an email from a mailclient to mail server; m3 = download an email from mailbox server to a mail client;. Which is an applicable protocol for each activity?

M1, going to the account, is HTTPM2, client to server, is SMTPM3, download, is POP

Which architectural pattern is commonly used for developing interfaces that divide an application into three interconnected parts?

MVC (model view controller)

!In Network Address and Port Translation (NAPT), which best describes the information used in an attempt to identify he local destination address?

Source IP and Destination Port (look at the port and what devices are on there)

What is the data unit most associated with the application layer?

Message

!Which term is the most synonymous with "channel sharing"?

Multiplexing

Which term is most synonymous with "channel-sharing"?

Multiplexing is the way information from multiple sources is combined for transmission over a shared medium

Given a destination address (D), a network prefix (N), and an address mask (M) - all with the same number of bits - whichcomparison should be used to determine whether the destination lies on the network? (Let | denote OR, and let & denote AND)

N==(D&M)

Which are a type of constraints in SQL?

NOT NULL - Ensures that a column cannot have a NULL valueUNIQUE - Ensures that all values in a column are differentPRIMARY KEY - A combination of a NOT NULL and UNIQUE. Uniquely identifies each row in atableFOREIGN KEY - Uniquely identifies a row/record in another tableCHECK - Ensures that all values in a column satisfies a specific conditionDEFAULT - Sets a default value for a column when no value is specifiedINDEX - Used to create and retrieve data from the database very quickly

Which best describes the roles in the Simple Network Management Protocol (SNMP)?

Network managers are clients and network agents are severs

Compression method to general category

Null (or zero) compression - Run length encodingHuffman Coding - Frequency based compressionLempel Ziv - Dictionary Based compression

Which is not characteristic of the "stream paradigm"?

One - to - many communication

Which method is not associated with the client-side of the "socket" process?

Only server listens

While of the following five consecutive segments are typically encrypted in an SSH packet? length (L), padding (P), type (T), data(D), CRC (C)?

P through CRC

Which is a valid HTTP request type?

POST, HEAD, TRACE, DELETE

Which is not a valid HTTP request type?

PUSHVIEW

Which command is not part of the SQL Data Definition Language?

Part of the language - table, view, create, alter, add, drop, trunc

In class, we used a Distributed Hash Table (DHT) in conjunction with which architectural model?

Peer - to - peer

What kind of address is used to identify the service?

Port ( if you see socket choose socket)

Special IPv4 address with the corresponding value:

Prefix and suffix all 0's - indicates this computerPrefix network, suffix all 0's - indicates networkPrefix network, suffix all 1's - directed broadcast on specified netPrefix and suffix all 1's - limited broadcast on local netPrefix 127/8, suffix any - loopback for testing

What are the tiers of the 3-tier architecture?

Presentation TierApplication/business logic tierData data tier

What is the purpose of the IP datagram header field "Time To Live (TTL)?

Prevent packet looping-represent the number of hops

Which is a type of constraint in SQL?

Primary Key, Foreign Key, Unique, Not Null, Check

Which best describes the use of keys for "authentication"?

Private key to encrypt, public key to decrypt

Which are the three primary roles in the Service Oriented Architecture?

Provider, Consumer, Broker

What is Secure Shell (SSH) used for?

Remote logging and file transfer

Which fields does a UDP datagram header contain?

Source portDestination portMessage lengthOptional checksum

In the Stop-and-Wait flow-control protocol, what best describes the sender's (S) and receiver's (R) respective window sizes?

S=1, R=1

Which protocol provides multi-homing and redundant paths to increase resilience and reliability?

SCTP

Which transport layer protocol is used to support electronic mail?

SMTP

Which of the following is most likely to be associated with the Session layer of the Internet?

SQL

What are the respective goals of the Sliding Window (SW) and Congestion Control (CC) algorithms?

SW speeds up the data flow,CC slows down the data flow.

!Which attack mechanism is intended to exhaust a receiver's set of TCP connections?

SYN - floodingDenial of Service (DOS/DDOS - distributive denial of service which can do more and is harder to identify source)

What is used to handle the issues in the Transport Protocol?

Sequencing - used to handle duplicates and out of order delivery, assigns a number to each TCP packet so the receiver can handle duplicates and make sure that packets are in orderAlso uses:Resubmission - receiver sends acknowledgement and sender keeps trackAvoid Replay - Assigns a unique identifier to each connection so that the receiver does not get a packet from an earlier connection and keep it and then later discard a packet with the same number and discard it

What are the roles or the Service-Oriented Architecture (SOA)?

Service providerService brokerService requester/consumer locates entries in the broker registry using various operations and then binds to the service provider in order to invoke one of its web services

Which IP addresses generally appear in the header of an IPv6 datagram?

Source IP address, Destination IP address

In which software development model do developers start with smaller scale problems. explore issues and risk and gradually increase size and complexity?

Spiral

The 10-BASE-T and related Ethernet media primarily assume which network topology?

Star Topology

. Is this an example of static or dynamic routing? "The contents of the forwarding table remain unchanged unless an administrator modifies it"

Static routing

Which Transport Layer protocol is used to support the transfer of secure documents?

TCP

What was SSH originally designed to replace?

TELNET

Which feature of an XML file does not directly contribute to it being "well-formed"?

The structure matches a document-type-definition

Which best describes the division of bits in a MAC address of a network interface controller?

The prefix represents the manufacture (24) and the suffix represents the controller/device(24)

Which is true of public key cryptography?

The sender uses a public key to encrypt and the receiver uses a private key to decrypt

!Which is not a category of Fine-Grain Quality of Service (QoS)?

These are the Fine-Grain Quality Services:Constant Bit Rate (CBR) - data enters the flow at a fixed bit rate (e.g. digitized voice call at 64kbps)Variable Bit Rate (VBR) - data enters the flow at variable bit rate (within specified statistical bounds)Available Bit Rate (ABR) - flow agrees to use whatever bit rate is available at a given time Unspecified Bit Rate (UBR) - no bit rate is specified, application is satisfied with best-effort service

Which is not characteristic of a Virtual Private Network (VPN)?

These are the characteristics of VPN:Increased latency due to trips across Internet between VPN routers.Decreased throughput because of the use of the (slower) Internet instead of a high-speed LAN. Increased overhead and fragmentation resulting from the use of tunneling

What is the total number of synchronizations (SYN) and acknowledgements (ACK) in a three-way handshake for creating aconnection?

To create a TCP connection: send SYN->receive SYN, send SYN+ACK->receive SYN+ACK, sendACK->receive ACK4

For which "protocol data unit" is "Segment" another name?

Transport

TCP/IP model with corresponding addressing

Transport - PortNetwork - IP AddressData Link - MAC Address

Which are components of SSH

Transport Layer ProtocolAuthentication ProtocolConnection Protocol

Which are components of SSH?

Transport-Layer ProtocolAuthentication ProtocolConnection Protocol

True or False: A Framework gives you a set of functions/Modules/Api's but it changes your code on the structural or architectural level?

True

Which best describes the relationship of JavaScript and TypeScript?

TypeScript is syntactic superset of Javascript

Let "A ⊂ B" denote "A is encapsulated inside B". Which best represents the relationship between an Frame(F), IPDatagram (IP), and User Datagram (UP)?

U in I in F

!Which protocol does not belong to the Application layer of the TCP/IP model?

UDP

Which is least likely to be associated with the session layer of the internet?

UDP (found in the transport layer)

Which protocol(s) should be considered "Best Effort Delivery"

UDP, IP

What are the three types of IPv6 Addressing?

UnicastMulticastAnycast

Which terms describe the User Datagram Protocol (UDP)?

Unreliable, connectionless, Message Oriented, End to End

What are the pros of using Dynamic Application Development (DAD)?

Users see software development processDeliverables are provided quicklyclose working relationship between developers and end-users

When is it appropriate to use UDP?

When streaming audio or video - since it doesn't matter if an occasional packet is lost

!Which is not a common data communication standard for wireless media?

WiNie

Which organization is primarily concerned with protocols for low-power digital radio devices such as for home automation?

Zigbee

What is UTP, as discussed in class?

a medium of unprotected wires divided into groups

Which type of issue would Internet Control Message Protocol (ICMP) not report on?

checksum problem

Which term does not describe the User Data Protocol (UDP)?

connection - oriented

Which term does not describe the User Datagram Protocol (UDP)?

connection oriented

Which term does not describe UDP?

connection-oriented

In JavaScript Object Notation (JSON), a value many not be which of the following data types?

date

Which cannot be used to specify a color in CSS?

decimal number

!Which is not a valid method of communicating with the user via the browser in JavaScript?

deliver

!What is the purpose of the "channel encoder"?

detects and corrects transmission errors (redundancy)

!At the application layer, how does a client identify the server with which it wishes to communicate: domain name (DN), IP address (IP), medium access control (MAC)?

domain name (DN)

Consider the following piece of a CSS file referenced by an HTML file. For what is x (without any accompanying symbols) aplaceholder? x {color: green}

element

In the CSS snippet "x {color: blue}', what does x represent (when x is not accompanied by any symbol?

element

Which is not a type of <input> tag in HTML?

form

!Which object is not part of the Document Object Model (DOM)?

history

!What will happen when executing the following lines of JavaScript code?(1) var x;(2) var x;(3) x = 4;(4) x = "Java";

it will run all four lines without error

Which method/functionality is not associated with the client-side of the "socket" process?

listen

Which are true of fiber optic cable media?

low noise immunityhigh bandwidthrequires special handling

!Which is not a reserved word in JavaScript?

main

Which best describes the use of IPv4 class D addresses?

multicast

In a datagram Forwarding Table, which columns must be found: A = destination address, H = next hop, M = network mask, N =destination network address?

next hop, network mask, destination network addressIf multiple matches - take longest prefix

Which feature of XML does not directly contribute to it being well-formed?

the structure matches a document type definition

Which are valid list tags in HTML?

olul

Which is not a characteristic of the "stream paradigm"?

one to many communication

Which is not a valid value of the name attribute in an HTML <meta> tag?

protocol

!Which IP addresses generally appear in an IPv4 datagram header: source (S), intermediate (I), destination (D)?

source and destination

What best describes the difference between categories of Ethernet cables (CAT-n)?

speed

Which is not a referencing object in the Document Object Model (DOM)?

tag

Quizwiz - Ace Your Homework & Exams, Now With ChatGPT AI (2024)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Kimberely Baumbach CPA

Last Updated:

Views: 5561

Rating: 4 / 5 (41 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Kimberely Baumbach CPA

Birthday: 1996-01-14

Address: 8381 Boyce Course, Imeldachester, ND 74681

Phone: +3571286597580

Job: Product Banking Analyst

Hobby: Cosplaying, Inline skating, Amateur radio, Baton twirling, Mountaineering, Flying, Archery

Introduction: My name is Kimberely Baumbach CPA, I am a gorgeous, bright, charming, encouraging, zealous, lively, good person who loves writing and wants to share my knowledge and understanding with you.