Computer Science Questions
Explore questions in the Computer Science category that you can ask Spark.E!
Which part of the mail created by the UA(User Agent) contains the sender and receiver names?A. envelope B. addressC. headerD. none of theme
Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNECT are for implementingA. Flow control in the Transport LayerB. Connectionless services in the Transport LayerC. None of these D. Connection-Oriented services in the Transport Layer
This command identifies the sender of the message.A. RCPT TOB. HELOC. MAIL FROMD. none of them
What is the service that the UDP protocol provides ?A. Error detection B. Flow controlC. None is correctD. Guaranteed delivery
Which cable type used for segment length more than 2000 meters?A. Thick coaxB. Twisted pairC. Fiber opticsD. Thin coax
Relating to CRC, a sequence of bits 100101 can be presented as polynomialA. None of them B. X^3+x^2+1C. X^2+X+1D. X^5+X^2+1
Assume that Seoul National University is assigned with IP addresses wirtten as 194.6.96.0/30 what is the first address and the lass address of the university?A. 194.6.96.0 and 194.96.255B. 194.96.250 and 194.6.96.255C. 194.6.96.0 and 194.6.96.3D. 194.6.96.1 and 194.6.96.255
The ________ domains define registered hosts according tho their generic behavior A. none is correctB. genericC. countryD. inverse
Bridges work in the _______ layers.A. network and transportB. data link and networkC. physical and data link D. none is correct
What is the default subnet mask for a class C network?A. 255.255.0.0B. 255.0.0.0C. 0.0.0.225D. 255.255.255.0
IN a Datagram networks.A. No state about end-to-end connections at the routersB. Packets may take differnet paths for the same source-destination pairC. All are correct D. No call setup at network layer
A set rules which is used by computers to communicate with each other across a network is called _________A. Network protocolsB. Network policies C. Network archieturesD. Network conventions
An HTTP request message always contains _______.A. a status line, a header, and a bodyB. a header and a bodyC. none is correctD. a request and a header
The OSI model consists of ________ layersA. Eight B. seven C. five D. three
DNS can use the services of ________ using the well-known port 53.A. either (UDP) of (TCP)B. TCPC. none of them D. UDP
What is the data unit used in Internet Protocol (IP)?A. Frame B. DatagramC. Message D. Segment
Which one(s) is (are) routing algorithm(s) for IP?A. None of themB. Both (Distance vector algorithms (DVA) and (Link-state algorithms (LSA))C. Distance vector algorithms (DVA)D. Link-state algorithms (LSA)
Which of the following statement is correct?A. Half-Duplex: Communcations that can go only one directionB. Full-Duplex: Communcations that can go only one directionC. Half-Duplex: Communcations in which both sender and receiver can send at the same timeD. Full-Duplex: Communcations in which both sender and receiver can send at the same time
What does NAT stand for?A. Network Address TranslationB. Network Address TableC. Network Address TransferD. Network Address Taking
In error reporting the encapsulated ICMP packet goes toA. None of themB. The original senderC. The receiverD. A router