Host or network interface identification
Location Addressing
Both of Above
None of These
Ans.- C
Q2)-The designers of the Internet Protocol defined an IP address as a ____number:
32 Bit
34 Bit
31 Bit
None of These
Ans.- A
Q3)-Two versions of the internet protocol (IP) are in use such as IP version 4 and IP version 6 each version defines an IP address ____:
Same
Unique
Different
None of These
Ans.- C
Q4)-High levels of demand have decreased the supply of un-allocated internet protocol version 4 addresses available for assignment to internet service providers and end user organization since the _____:
1980s
1990s
2000s
None of These
Ans.- A
Q5)-NAT stands for:
Network Address Translator
Network Access Translator
Network Acquired Translator
None of These
Ans.- A
Q6)-Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication:
Protocols
Algorithms
Strategies
All of the Above
Ans.- D
Q7)-An example of the sub - fields of cryptography is:
Steganography
Traffic Analysis
Both of Above
None of These
Ans.- C
Q8)-License is still required to use cryptography in which among the following countries:
Iran and China
China and India
India and Pakistan
None of These
Ans.- A
Q9)-Which among the following is necessary for General Intelligence (in computer language):
Artificial Consciousness
Artificial Brain
Both of Above
None of These
Ans.- C
Q10)-Artificial Intelligence consists of:
Theoretical Side
Experimental Side
Both of Above
None of These
Ans.- C
No comments:
Post a Comment