Computer Networking Lesson 1

Computer Networking Lesson 1

University

30 Qs

quiz-placeholder

Similar activities

COMPNET REVIEW QUIZ 2

COMPNET REVIEW QUIZ 2

University

29 Qs

IFT 303 Quiz one

IFT 303 Quiz one

University

25 Qs

[Pre-Assessment]Networking 1

[Pre-Assessment]Networking 1

University

25 Qs

Administrasi Infrastruktur Jaringan

Administrasi Infrastruktur Jaringan

12th Grade - University

25 Qs

Computer Networks

Computer Networks

University

25 Qs

QUIZ 3 The OSI Model Quiz

QUIZ 3 The OSI Model Quiz

University

25 Qs

Layering Models

Layering Models

University

25 Qs

NETWORK1 M2 Quiz

NETWORK1 M2 Quiz

University

29 Qs

Computer Networking Lesson 1

Computer Networking Lesson 1

Assessment

Quiz

Computers

University

Medium

Created by

Sofia Razón

Used 8+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A transport layer level segment combined with a network layer header is called a ...

message

datagram

packet

frame

2.

REORDER QUESTION

1 min • 1 pt

Reorder the layers in their correct ascending order:

Physical

Data Link

Network

Transport

Application

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The e2e (end to end) principle suggests that specific application-level functions usually can, and preferably should be built into the lower levels of the system at the core of the network.

True

False

4.

DRAG AND DROP QUESTION

1 min • 1 pt

The e2e principle is summarized as: the ​ (a)   should be simple and minimal, while the ​ (b)   should carry the intelligence

network core
end systems

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Some data link layer protocols, such 802.11 (WiFi), implement some basic error correction as the physical medium used is easily prone to interference and noise (such as a nearby running microwave). Is this a violation of the end-to-end principle?

Yes

No

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are ramifications of the “hourglass shape of the internet”?

Many technologies that were not originally designed for the internet have been modified so that they have versions that can communicate over the internet (such as Radio over IP).

It has been a difficult and slow process to transition to IPv6, despite the shortage of public IPv4 addresses.

Applications like BitTorrent leverage peer-to-peer networking instead of a more traditional client-server model for better performance.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following statements are correct?

The Spanning Tree Algorithm helps to prevent broadcast storms

The Spanning Tree Algorithm presented in this lecture always results in a spanning tree that places the root in a topologically central location, so that all the nodes are as “close” as possible to the root.

Network traffic cannot traverse an inactive link.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?