Question
Subject. Internet & web design technology

I need the questions number.
27, 28, 29,30,35,,37,39 , 40,43,45,49,50


Please send me the correct answer


The last page have 43,45,49,50

media%2Fdac%2Fdac84ca0-fb15-444b-997c-ec
protocol (32) t an application attempts to send a UDP do? message that exceeds the Maximum Transmission Unit (MTU), what will the Ip d) compress it le) expand MTU (b) truncate it (c) fragment n (a) reject it (33] Which is not true of the Transmission Controil Protocol (TCP)? (a) t supports full duplex communication b) it has graceful connection shutdown (c) its connections are physical (d) its data is sent as a าเ0s stream e) t is an end-to-end protocol best describes the purpose of an Address Resolution Protocol (ARP) query? 34) Which (a) Given an IP address, determine the corresponding physical address b) Given a physical address, debermine the corresponding IP address (c) Given an IPv4 address, determine the coresponding IPv6 address id) Given a source IP address in a datagram, determine the corresponding destination IP address e) Given a destination iP address in a datagram, determine the corresponding source IP address 35) WWhat are the respective goals of the Siding Window (SW) and Congestion Control (CC) aigonthms? (a) Both SW and CC aim to speed up the flow of data b) Both SW and CC aim to siow down the flow of data (c) SW arns to speeds up ยาง flow of data whi, CC anns to slow down the fow of data id) SW ams to slow down the fow of data while CC aims to speed up the flow of data e) Neither SW nor CC ams to impact the speed of the flow of data (361 Which type of issue would internet Control Message Protoool OCMP) not report on? (a) checksum probiem (b)desination unreachable (c parameter problem(d) redrect required me exceeded [37] Let A B denote A ㅀ encapsuated raide ธ. which best represents the reasonship beteen an iP Datagram 0P) Pryscal Frame (PF) and UDP Datagram (UDP)? 38) MongoDB is an example of which kind of NoSQL database? (a) colum b) document ci graph d object (e) tuple 30Which attack mechanism is intended to exhaust a receivers set of TCP connections? b) phishing (ci scanning id) spoofing e) SYN flooding 140] WWhich is true of Public Key Cryptography? (a) The sender uses a public key to encrypt and the receiver uses the same public key to decrypt (b) The sender uses a public key to encrypt and the receiver uses a difterent public key to decrypt (c) The sender uses a private key to encrypt and the receiver uses the same private key to dearypt (d) The sender uses a public key to encrypt and the receiver uses a private key to decrypt (e) The sender uses a private key to encrypt and the receiver uses a public key to decryp 41] Which best describes the relationshp of JavaScopt and TypeScript? (a) They are two completely distinct languages b) TypeScript is just another name for JavaScnipt (c) JavaScript is a syntactic superset of Type Script (d) TypeSoript is a syntactic superset of JavaScipt (e) JavaScript gets transpiled into Type Script 42] Which is not a feature specificaly of transaction processing in a database? (a) atomicity b) consistency (c) durability d) isolation
Which is not a type of constraint in SQL? check Which is not a valid value of the name attibute in an HTML <meta> tag? )author l Which is not true of an Exterior Gateway Protocol (EGP), compared to an Interior Gateway Protocol (GP) EGPs are more complex to install than IGPs (b) default (c) join (d) not null (e) redundancy (b) description (c) keywords (d) protocol (e) viewport ) EGPs scale better than IGPs EGPs report more detailed routing information than IGPs ) EGPs use policy constraints to control what information they share EGPs work between rather than inside autonomous systems 46] Dynamic Host Configuration Protocol extends the ideas of which other protocol? (a) BOOTP b) ICMP (C) FTP (d) POP (e) SSL Which is not a type of <input» tag in HTML? (a) email (b) form (c) radio (d) submit (e) text 8] Which is not a valid combinator (selector operator) in CSS (b) & (e) space Using the Bootstrap grid-model, and assuming a screen width of at least 576 pixels, what portion of the width of the screen d B together take up? cdiv ciass-col-m-3 A/d <div class col-sm-5 s/div /div> 1/2 (b) 5/8 (c) 5/12 (d) 2/3 (e) 8/8 (entire) ] Which Bootstrap construct is used to help record user-navigation? (b) candycane breadcrumb (c) ice-cream (d) hamburger (e) pizza
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Please Note:
As per the Chegg Answering Guidelines, I should answer the first question.
Below I have answered the first 2 questions.
Please Re-post for the other Questions

Answer)
27) question not clear and complete or cropped
28)question not clear and complete or cropped

29) Which IP addresses generally appear in an IPV4 datagram header, source(S), intermediate(I), destination (D)?
source(S) and destination (D)

Answer)
c) S,D

30) How many synchronization(SYN) requests are sent as part of establishing a 3 way handshake?

SYN performs a three-way (or 3-step) handshake

Answer)
c) 3

Add a comment
Know the answer?
Add Answer to:
Subject. Internet & web design technology I need the questions number. 27, 28, 29,30,35,,37,39 , 40,43,45,49,50...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 3) [10 marks] Refer to following Figure 2.14 and Figure 16.3. This question is about encapsulation,...

    3) [10 marks] Refer to following Figure 2.14 and Figure 16.3. This question is about encapsulation, decapsulation, and protocols. Figure 2.14 illustrates that a TFTP Trivial File Transfer Protocol) packet is encapsulated in a UDP (User Datagram Protocol) segment that in turn is encapsulated in an IP (Internet Protocol) datagram. In Figure 2.14, the length of each row is 32 bits (4 bytes). For example, the length of row "Source Address" is 32 bits long. Figure 16.3 gives the format...

  • Question 1 The size of the datagram is determined by the application that sends the data....

    Question 1 The size of the datagram is determined by the application that sends the data. Allowing the size of datagrams to vary makes IP adaptable to a variety of applications. True False Question 2 What is the conceptual network boundary, and where is it located within the protocol stack? Is the transition area between digital and analog signals and can be found between layer 2 and layer 3 of the protocol stack. Identifies application direct messaging and is formed...

  • Networks Hi guys. I need some assistance with a few questions below. 1. Which of the...

    Networks Hi guys. I need some assistance with a few questions below. 1. Which of the following is TRUE regarding a TCP 3-way handshake. a.   Consists of 3 segments being sent between 2 hosts       b.   Segments only carry data in the SYN, ACK and sequence number bits and bytes with no data       c.   No ACK is needed for the SYNACK received from the receiver       d.   A, B and C       e.   None of the above 2. Which...

  • RSA is a common form of symmetric key encryption. Select one: True False What is the...

    RSA is a common form of symmetric key encryption. Select one: True False What is the purpose of a nonce in an end-point authentication protocol? Select one: a. It protects against replay attacks. b. It serves as a private key. c. It serves as a public key. d. It serves as a signature. e. It serves as a shared symmetric key. What is (19 * 16) mod 7? Answer: A TCP connection setup requires 3 messages to be passed. How...

  • Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic...

    Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...

  • just need help with part c key and public key cryptography methods 2. (a) Explain the...

    just need help with part c key and public key cryptography methods 2. (a) Explain the difference between the symmetric (b) In the famou s RSA algorithm for public key cryptography, very large prime numbers are used so as to make ult for the attackers to find from their product the prime factors. However, for an illustration of the ideas behind the RSA algorithm, you could chooses two small prime numbers 7 and 11, and a public key e 13...

  • EXPLAIN in details why is it true or false. need to be 100% POSTIVE OF ANSWER. SOLVE D E F G H I J 2) (10 points) IP and MAC addressing. True or False. Circle True or False. One point for each corre...

    EXPLAIN in details why is it true or false. need to be 100% POSTIVE OF ANSWER. SOLVE D E F G H I J 2) (10 points) IP and MAC addressing. True or False. Circle True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer the folowing network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ΛΕΡ tables are up-to-date unless otherwise stated Switch Ronter...

  • Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA...

    Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA {    private BigInteger phi; private BigInteger e; private BigInteger d; private BigInteger num; public static void main(String[] args) {    Scanner keyboard = new Scanner(System.in); System.out.println("Enter the message you would like to encode, using any ASCII characters: "); String input = keyboard.nextLine(); int[] ASCIIvalues = new int[input.length()]; for (int i = 0; i < input.length(); i++) { ASCIIvalues[i] = input.charAt(i); } String ASCIInumbers...

  • 1. Which of the following protocols is used by a client to send an email message?...

    1. Which of the following protocols is used by a client to send an email message? a. HTTP SMTP b. FTP d. RDP 2. What is the most common network topology today? a/Star c. Hub Ring d. Mesh 3. A client/server network is the simplest network model. a/ True O False 4. Which client server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A Telnet C. Remote...

  • QUESTION 2 Ensuring that data is genuine, meaning that the sender of the data is who...

    QUESTION 2 Ensuring that data is genuine, meaning that the sender of the data is who they say they are, that the data received is the data that the sender meant to send, and that the receiver is who they say they are a. confidentiality b. authentication c. non-repudiation d. integrity 2 points    QUESTION 3 Cryptography method that uses a single key for both encryption and decryption a. prime factorization b. asymmetric c. symmetric d. message authentication code 2...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT