Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

51.

According to Internet Assigned Numbers Authority (IANA), which of the following ranges is not a part of port number ranges?(a) Well-known ports(b) Registered ports(c) Dynamic ports(d) Static portsI have been asked this question during an interview.Question is from P2P Applications topic in chapter TCP/IP Protocol Suite of Computer Network

Answer»

The correct choice is (d) Static ports

Easiest explanation: IANA divided port numbers into three ranges i.e., Well-known, Registered and DYNAMIC ports. Well-known port numbers RANGE from 0 to 1023, registered port numbers are from 1024 to 49151 and dynamic port numbers are from 49152 to 65535.

52.

Range of port numbers in Internet model is __________(a) 0 and 32,765(8-bit)(b) 0 and 32,765(16-bit)(c) 0 and 65,535(32-bit)(d) 0 and 65,535(16-bit)This question was posed to me during an interview.My question is based upon P2P Applications topic in section TCP/IP Protocol Suite of Computer Network

Answer»

Right ANSWER is (d) 0 and 65,535(16-bit)

To EXPLAIN: Port numbers are 16-bit integers between 0 and 65,535. They are an interface for the IMPLEMENTATION of PROCESS to process delivery for the TRANSPORT layer.

53.

Multiple processes on destinations at transport layer are identified by __________(a) Mac address(b) Port number(c) Host number(d) Host addressThis question was addressed to me in an interview for internship.Origin of the question is P2P Applications in chapter TCP/IP Protocol Suite of Computer Network

Answer»

Correct answer is (B) Port number

Explanation: MULTIPLE processes on DESTINATIONS are identified by a transport layer address also called as port number. The IP address along with the port number is called the socket address.

54.

In process-to-process delivery, two processes communicate in which of the following methods?(a) Client/Server(b) Source/Destination(c) Message Transfer(d) Peer to PeerI got this question in a national level competition.My question is based upon P2P Applications in chapter TCP/IP Protocol Suite of Computer Network

Answer»

Correct answer is (a) CLIENT/Server

The explanation is: The most COMMON method used for this communication is Client/Server. The client requests a service through a PARTICULAR PORT number to the port of the server using its socket address. Then the server RESPONDS by giving the requested service to the client port.

55.

Which layer is responsible for process-to-process delivery?(a) Physical layer(b) Network layer(c) Transport layer(d) Application layerThis question was posed to me in an internship interview.Question is taken from P2P Applications topic in portion TCP/IP Protocol Suite of Computer Network

Answer»

The correct option is (C) Transport layer

Easiest explanation: The transport layer is responsible for process-to-process DELIVERY, error control and FLOW control. It provides an INTERFACE for the implementation of process to process delivery through ports. There are 65,535 port numbers.

56.

When was IPv6 launched?(a) June 2, 2012(b) June 4, 2012(c) June 5, 2012(d) June 6, 2012I got this question in a job interview.I'm obligated to ask this question of IPv6Addressing topic in chapter TCP/IP Protocol Suite of Computer Network

Answer»

Right CHOICE is (d) June 6, 2012

For explanation I would say: IPv6 is the latest VERSION of the Internet Protocol released on 6^th June 2012. An IPv6 ADDRESS is 128 bits LONG. Therefore, 2^128 i.e. 340 undecillion addresses are possible in IPv6.

57.

Which statement(s) about IPv6 addresses are true?(a) Leading zeros are required(b) Two colons (::) are used to represent successive hexadecimal fields of zeros(c) Two colons (::) are used to separate fields(d) A single interface cannot have multiple IPv6 addresses of different typesI have been asked this question in an internship interview.I'm obligated to ask this question of IPv6Addressing in portion TCP/IP Protocol Suite of Computer Network

Answer»

Correct choice is (b) Two COLONS (::) are used to represent successive HEXADECIMAL fields of zeros

For EXPLANATION I would say: In order to shorten the written length of an IPv6 address, successive fields of zeros may be replaced by double colons. In trying to shorten the address further, leading zeros may also be removed. Just as with IPv4, a SINGLE DEVICE’s interface can have more than one address; with IPv6 there are more types of addresses and the same rule applies. There can be link-local, global unicast, and multicast addresses all assigned to the same interface.

58.

In IPv6 addresses, addresses that start with eight 0s are called ________(a) Unicast addresses(b) Multicast addresses(c) Any cast addresses(d) Reserved addressesI had been asked this question during an online exam.Question is from IPv6Addressing topic in portion TCP/IP Protocol Suite of Computer Network

Answer» RIGHT answer is (d) Reserved addresses

To elaborate: In IPv6 address FORMAT, the starting bits are specified with eight 0s to represent reserved addresses. These reserved addresses have a CERTAIN function pre-defined like the loop-back address is used to test a network CARD. Reserved addresses cannot be ALLOTTED to a machine.
59.

A few leftmost bits in each address of IPv6 address define its category is called ________(a) Prefix type(b) Postfix type(c) Reserved type(d) Local typeI have been asked this question in class test.The doubt is from IPv6Addressing topic in chapter TCP/IP Protocol Suite of Computer Network

Answer»

Correct choice is (a) Prefix type

Easiest explanation: Prefix is the BITS in the IP address which are placed in leftmost position. A NETWORK prefix in IPV6 is GIVEN by a CIDR format-liked number at the end of the address.

60.

In subcategories of reserved address in IPv6, address that is used by a host to test itself without going into network is called _________(a) Unspecified address(b) Loopback address(c) Compatible address(d) Mapped addressI got this question during an interview for a job.My question is from IPv6Addressing topic in division TCP/IP Protocol Suite of Computer Network

Answer»

Correct option is (b) Loopback ADDRESS

Explanation: In SUBCATEGORIES of reserved address in IPV6, address that is USED by a host to test itself without going into NETWORK is called loop back address. IPv6 loopback address is 0000:0000:0000:0000:0000:0000:0000:0001. IPv4 loopback address is 127.0.0.1. It’s a reserved address.

61.

A link local address of local addresses is used in an _______(a) Isolated router(b) Isolated mask(c) Isolated subnet(d) Isolated netI had been asked this question in an interview.The question is from IPv6Addressing topic in chapter TCP/IP Protocol Suite of Computer Network

Answer»

Correct CHOICE is (c) Isolated subnet

To explain I would say: Isolated subnet is very huge SHARING network area in this link local ADDRESS of local addresses is USED. A link local address can be configured on any subnet with the prefix “FE80::”.

62.

Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits ______(a) 96 to 127(b) 0 to 63(c) 80 to 95(d) 64 to 79The question was posed to me during a job interview.This intriguing question comes from IPv6Addressing topic in section TCP/IP Protocol Suite of Computer Network

Answer»

Correct choice is (a) 96 to 127

The explanation is: TEREDO is a TECHNIQUE through which gives the possibility for full IPv6 network connectivity to IPv6 capable hosts which are currently on an IPv4 network. Bits 96 to 127 in the datagram represents OBFUSCATED 1Pv4 address of the IPv4 network.

63.

Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but they are connected to each other by intervening IPv4 routers. The best solution here is ________(a) Use dual-stack approach(b) Tunneling(c) No solution(d) Replace the systemThis question was addressed to me during an internship interview.I'd like to ask this question from IPv6Addressing topic in section TCP/IP Protocol Suite of Computer Network

Answer»

Correct ANSWER is (b) Tunneling

For explanation: The IPv4 ROUTERS can form a tunnel in which at the sender’s side, the IPV6 datagram is encapsulated in to IPv4, and at the RECEIVER’s side of the tunnel, the IPv4 packet is stripped and the IPv6 packet is SENT to the receiver.

64.

Dual-stack approach refers to _________(a) Implementing Ipv4 with 2 stacks(b) Implementing Ipv6 with 2 stacks(c) Node has both IPv4 and IPv6 support(d) Implementing a MAC address with 2 stacksThe question was posed to me in class test.My doubt is from IPv6Addressing topic in division TCP/IP Protocol Suite of Computer Network

Answer» CORRECT answer is (c) Node has both IPv4 and IPv6 support

To explain I would SAY: Dual-stack is one of the approaches used to support IPv6 in ALREADY existing systems. ISPs are using it as a method to transfer from IPv4 to IPv6 completely eventually due to the lower NUMBER of POSSIBLE available addresses in IPv4.
65.

Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits ______(a) 96 to 127(b) 0 to 63(c) 80 to 95(d) 64 to 79This question was addressed to me by my school principal while I was bunking the class.I would like to ask this question from IPv6 in division TCP/IP Protocol Suite of Computer Network

Answer»

The CORRECT CHOICE is (a) 96 to 127

The best I can explain: Teredo is a TECHNIQUE through which gives the possibility for full IPv6 network connectivity to IPv6 capable HOSTS which are CURRENTLY on an IPv4 network. Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address of the IPv4 network.

66.

Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but they are connected to each other by intervening IPv4 routers. The best solution here is ________(a) Use dual-stack approach(b) Tunneling(c) No solution(d) Replace the systemThis question was posed to me during an interview.I want to ask this question from IPv6 in division TCP/IP Protocol Suite of Computer Network

Answer» CORRECT option is (b) Tunneling

The explanation: The IPV4 routers can form a tunnel in which at the SENDER’s side, the IPv6 DATAGRAM is encapsulated in to IPv4, and at the receiver’s side of the tunnel, the IPv4 packet is stripped and the IPv6 packet is sent to the receiver.
67.

Dual-stack approach refers to _________(a) implementing Ipv4 with 2 stacks(b) implementing Ipv6 with 2 stacks(c) node has both IPv4 and IPv6 support(d) implementing a MAC address with 2 stacksThis question was addressed to me during an internship interview.This key question is from IPv6 topic in division TCP/IP Protocol Suite of Computer Network

Answer»

Correct answer is (C) node has both IPv4 and IPv6 support

The best I can EXPLAIN: Dual-stack is one of the approaches used to support IPv6 in already existing SYSTEMS. ISPS are using it as a method to TRANSFER from IPv4 to IPv6 completely eventually due to the lower number of possible available addresses in IPv4.

68.

The _________ field determines the lifetime of IPv6 datagram(a) Hop limit(b) TTL(c) Next header(d) Type of trafficThe question was posed to me in examination.My doubt is from IPv6 topic in portion TCP/IP Protocol Suite of Computer Network

Answer»

The correct CHOICE is (a) Hop LIMIT

The explanation: The Hop limit VALUE is decremented by one by a router when the datagram is forwarded by the router. When the value BECOMES zero the datagram is discarded. The field is 8-bits wide, so an IPv6 packet can live up to 255 router hops only.

69.

Which among the following features is present in IPv6 but not in IPv4?(a) Fragmentation(b) Header checksum(c) Options(d) Anycast addressThis question was posed to me in an online quiz.This is a very interesting question from IPv6 topic in division TCP/IP Protocol Suite of Computer Network

Answer»

Correct choice is (d) Anycast ADDRESS

To explain I would say: There is an anycast address in IPV6 which allows SENDING MESSAGES to a group of devices but not all devices in a network. Anycast address is not standardized in IPv4.

70.

IPv6 does not use _________ type of address.(a) broadcast(b) multicast(c) anycast(d) unicastThis question was addressed to me during an interview.This interesting question is from IPv6 topic in chapter TCP/IP Protocol Suite of Computer Network

Answer» RIGHT answer is (a) broadcast

For explanation I would say: There is no concept of broadcast address in IPV6. INSTEAD, there is an anycast address in IPv6 which allows sending messages to a group of devices but not all devices in a NETWORK. Anycast address is not standardized in IPv4.
71.

In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?(a) Fragmentation field(b) Fast-switching(c) ToS field(d) Option fieldThe question was asked in an internship interview.This key question is from IPv6 topic in chapter TCP/IP Protocol Suite of Computer Network

Answer»

Correct option is (c) ToS field

To explain: The traffic class field is used to specify the PRIORITY of the IP PACKET which is a similar functionality to the TYPE of Service field in the IPv4 header. It’s an 8-bit field and its VALUES are not defined in the RFC 2460.

72.

The header length of an IPv6 datagram is ___________(a) 10bytes(b) 25bytes(c) 30bytes(d) 40bytesI had been asked this question by my school teacher while I was bunking the class.My question comes from IPv6 topic in portion TCP/IP Protocol Suite of Computer Network

Answer» CORRECT answer is (d) 40bytes

The EXPLANATION is: IPv6 datagram has fixed HEADER length of 40bytes, which results in faster processing of the datagram. There is one fixed header and optional headers which MAY or may not exist. The fixed header CONTAINS the mandatory essential information about the packet while the optional headers contain the optional “not that necessary” information.
73.

The size of an IP address in IPv6 is _________(a) 4 bytes(b) 128 bits(c) 8 bytes(d) 100 bitsI got this question in examination.My enquiry is from IPv6 in division TCP/IP Protocol Suite of Computer Network

Answer»

The correct choice is (B) 128 bits

For explanation: An IPv6 address is 128 bits long. Therefore, 2128 i.e. 340 undecillion addresses are possible in IPv6. IPv4 has only 4 billion possible addresses and IPv6 would be a BRILLIANT alternative in CASE IPv4 runs out of possible new addresses.

74.

Which of this is not a class of IP address?(a) Class E(b) Class C(c) Class D(d) Class FThe question was asked in final exam.This intriguing question comes from IPv4Addressing in section TCP/IP Protocol Suite of Computer Network

Answer»

The correct option is (d) Class F

The EXPLANATION: Class F is not a class of IP addressing. There are only FIVE CLASSES of IP addresses: Class A (0.0.0.0 to 127.255.255.255), Class B (128.0.0.0 to 191.255.255.255), Class C (192.0.0.0 to 223.255.255.255), Class D (224.0.0.0 to 239.255.255.255), and Class E (240.0.0.0 to 255.255.255.255).

75.

Network addresses are a very important concept of ________(a) Routing(b) Mask(c) IP Addressing(d) Classless AddressingThis question was addressed to me in semester exam.This is a very interesting question from IPv4Addressing in portion TCP/IP Protocol Suite of Computer Network

Answer»

Correct choice is (C) IP Addressing

Explanation: Network addresses are a very important CONCEPT of IP addressing. The first address in a block is used as network address that represents the organization. The network address can be FOUND by AND’ing any address in the block or class by the default mask.

76.

In classful addressing, a large part of available addresses are ________(a) Organized(b) Blocked(c) Wasted(d) CommunicatedThe question was asked in an online interview.My question is taken from IPv4Addressing topic in portion TCP/IP Protocol Suite of Computer Network

Answer»

The correct answer is (c) Wasted

Easiest explanation: In classful addressing, a LARGE part of AVAILABLE addresses are wasted. Thus to solve this classful addressing is replaced with CLASSLESS addressing where ONE can reserve the number of IP addresses required by modifying the CIDR value and make sure that not many addresses are wasted.

77.

First address in a block is used as network address that represents the ________(a) Class Network(b) Entity(c) Organization(d) CodesThis question was addressed to me by my school principal while I was bunking the class.This question is from IPv4Addressing in division TCP/IP Protocol Suite of Computer Network

Answer»

Correct answer is (c) Organization

To explain: First address in a block is USED as NETWORK address that represents the organization. The network address can be FOUND by AND’ing any address in the block by the default mask. The LAST address in a block represents the broadcast address.

78.

In IPv4 Addresses, classful addressing is replaced with ________(a) Classless Addressing(b) Classful Addressing(c) Classful Advertising(d) Classless AdvertisingI got this question in an internship interview.This intriguing question comes from IPv4Addressing topic in section TCP/IP Protocol Suite of Computer Network

Answer»

Correct choice is (a) Classless Addressing

Easiest EXPLANATION: Classful addressing is replaced with classless addressing as a large RATIO of the available addresses in a class in calssful addressing is wasted. In classless addressing, ONE can reserve the NUMBER of IP addresses REQUIRED by modifying the CIDR value and make sure that not many addresses are wasted.

79.

In classless addressing, there are no classes but addresses are still granted in ______(a) IPs(b) Blocks(c) Codes(d) SizesI got this question by my school principal while I was bunking the class.My query is from IPv4Addressing topic in portion TCP/IP Protocol Suite of Computer Network

Answer»

Correct OPTION is (B) BLOCKS

Best explanation: In classless addressing, there are no classes but addresses are still granted in blocks. The total number of addresses in a block of classless IP addresses = 2^(32 – CIDR_value).

80.

Which field helps to check rearrangement of the fragments?(a) Offset(b) Flag(c) TTL(d) IdentifierThis question was posed to me in examination.I would like to ask this question from IPv4Addressing in division TCP/IP Protocol Suite of Computer Network

Answer»

Right choice is (a) Offset

Easiest EXPLANATION: The Fragment Offset field SPECIFIES where the fragment fits in the original DATAGRAM. The offset of the first fragment will always be 0. The size of the field (13 bits) is 3-bits shorter than the size of the total LENGTH field (16 bits).

81.

Which of the following demerits does Fragmentation have?(a) Complicates routers(b) Open to DOS attack(c) Overlapping of fragments(d) All of the mentionedThis question was addressed to me in an interview.This intriguing question originated from IPv4Addressing in division TCP/IP Protocol Suite of Computer Network

Answer»

Right answer is (d) All of the mentioned

Best explanation: FRAGMENTATION makes the implementation of the IP protocol complex and can ALSO be exploited by attackers to create a DOS ATTACK such as a TEARDROP attack. Fragmentation won’t be required if the transport layer protocols PERFORM wise segmentation.

82.

Which of these is not applicable for IP protocol?(a) Connectionless(b) Offer reliable service(c) Offer unreliable service(d) Does not offer error reportingThis question was posed to me in my homework.I need to ask this question from IPv4Addressing topic in portion TCP/IP Protocol Suite of Computer Network

Answer»

The correct option is (b) Offer RELIABLE service

Easy explanation: IP does not provide reliable DELIVERY service for the data. It’s DEPENDENT upon the transport LAYER protocols like TCP to offer reliability.

83.

Which field helps to check rearrangement of the fragments?(a) offset(b) flag(c) ttl(d) identiferI have been asked this question during an online exam.This intriguing question comes from IPv4 in chapter TCP/IP Protocol Suite of Computer Network

Answer»

Correct OPTION is (a) offset

Easiest EXPLANATION: The Fragment Offset field specifies where the fragment fits in the original DATAGRAM. The offset of the FIRST fragment will always be 0. The size of the field (13 bits) is 3-bits shorter than the size of the total LENGTH field (16 bits).

84.

Which of the following demerits does Fragmentation have?(a) complicates routers(b) open to DOS attack(c) overlapping of fragments.(d) all of the mentionedThis question was posed to me in class test.I want to ask this question from IPv4 in division TCP/IP Protocol Suite of Computer Network

Answer» RIGHT option is (d) all of the mentioned

The explanation: FRAGMENTATION makes the implementation of the IP protocol COMPLEX and can also be exploited by attackers to CREATE a DOS attack such as a teardrop attack. Fragmentation won’t be required if the transport layer protocols PERFORM wise segmentation.
85.

Which of these is not applicable for IP protocol?(a) is connectionless(b) offer reliable service(c) offer unreliable service(d) does not offer error reportingI have been asked this question in semester exam.My doubt stems from IPv4 topic in chapter TCP/IP Protocol Suite of Computer Network

Answer»

Correct option is (b) offer reliable service

The BEST explanation: IP does not PROVIDE reliable delivery service for the data. It’s dependent UPON the transport layer protocols like TCP to offer RELIABILITY.

86.

What should be the flag value to indicate the last fragment?(a) 0(b) 1(c) TTl value(d) Protocol field valueThis question was addressed to me in class test.Question is taken from IPv4 in division TCP/IP Protocol Suite of Computer Network

Answer»

The correct choice is (a) 0

To explain I would say: The FLAG FIELD in the IP header is used to control and identify the FRAGMENTS. It contains three BITS: reserved, don’t fragment and more fragments. If the more fragments bit is 0, it means that the fragment is the last fragment.

87.

The data field cannot carry which of the following?(a) TCP segment(b) UDP segment(c) ICMP messages(d) SMTP messagesThe question was asked during an internship interview.I'm obligated to ask this question of IPv4 in section TCP/IP Protocol Suite of Computer Network

Answer»

Right answer is (c) ICMP messages

Explanation: Data FIELD USUALLY has transport layer segments, but it can also carry ICMP messages. SMTP is an APPLICATION layer protocol. First it must go through the transport layer to be converted into TCP segments and then it can be inserted into IP PACKETS.

88.

If the value in protocol field is 17, the transport layer protocol used is _____________(a) TCP(b) UDP(c) ICMP(d) IGMPI had been asked this question during an interview.The doubt is from IPv4 topic in division TCP/IP Protocol Suite of Computer Network

Answer»

Correct choice is (b) UDP

Explanation: The protocol field enables the demultiplexing feature so that the IP protocol can be used to carry payloads of more than ONE protocol type. Its most used VALUES are 17 and 6 for UDP and TCP RESPECTIVELY. ICMP and IGMP are network layer PROTOCOLS.

89.

The TTL field has value 10. How many routers (max) can process this datagram?(a) 11(b) 5(c) 10(d) 1I had been asked this question in a job interview.Question is from IPv4 topic in chapter TCP/IP Protocol Suite of Computer Network

Answer»

Correct choice is (c) 10

The EXPLANATION: TTL stands for Time to Live. This FIELD specifies the life of the IP packet based on the number of hops it MAKES (Number of routers it goes through). TTL field is decremented by one each time the DATAGRAM is processed by a router. When the value is 0, the packet is AUTOMATICALLY destroyed.

90.

Which of the following field in IPv4 datagram is not related to fragmentation?(a) Flags(b) Offset(c) TOS(d) IdentifierThe question was asked by my school teacher while I was bunking the class.This interesting question is from IPv4 topic in portion TCP/IP Protocol Suite of Computer Network

Answer» CORRECT answer is (c) TOS

To explain I would say: TOS-type of SERVICE identifies the type of PACKETS. It is not RELATED to fragmentation but is used to request specific treatment such as high throughput, high reliability or low latency for the IP packet depending upon the type of service it belongs to.
91.

Which of the following is not applicable for IP?(a) Error reporting(b) Handle addressing conventions(c) Datagram format(d) Packet handling conventionsThe question was asked by my college director while I was bunking the class.This question is from IPv4 in portion TCP/IP Protocol Suite of Computer Network

Answer»

Correct option is (a) Error reporting

To explain I would SAY: The Internet Protocol is the networking protocol which establishes the internet by relaying datagrams across network boundaries. ICMP is a supporting protocol for IP which HANDLES the Error Reporting functionality.

92.

AJAX stands for _______(a) asynchronous javascript and xml(b) advanced JSP and xml(c) asynchronous JSP and xml(d) advanced javascript and xmlI had been asked this question during an interview.My doubt stems from World Wide Web topic in chapter TCP/IP Protocol Suite of Computer Network

Answer» CORRECT choice is (a) asynchronous JAVASCRIPT and xml

The best I can explain: AJAX is a group of technologies that works on the client-side to create asynchronous WEB applications. It is used to MODIFY only a part of a webpage and not the whole webpage whenever some event occurs.
93.

What is document object model (DOM)?(a) convention for representing and interacting with objects in html documents(b) application programming interface(c) hierarchy of objects in ASP.NET(d) scripting languageThis question was addressed to me in an interview for internship.The origin of the question is World Wide Web in chapter TCP/IP Protocol Suite of Computer Network

Answer» CORRECT choice is (a) CONVENTION for representing and interacting with OBJECTS in html documents

Easy explanation: DOM is a hierarchical model i.e. a tree USED to REPRESENT an HTML or XML document. Every node of the tree an object that represents a part of the document.
94.

An alternative to JavaScript on windows platform is _______(a) VBScript(b) ASP.NET(c) JSP(d) PHPI got this question in examination.I need to ask this question from World Wide Web topic in division TCP/IP Protocol Suite of Computer Network

Answer» RIGHT choice is (a) VBSCRIPT

Explanation: VBScript is a general-purpose, lightweight and active scripting language which can be used on Microsoft VISUAL BASIC. It was first released in 1996.
95.

Which one of the following is not used to generate dynamic web pages?(a) PHP(b) ASP.NET(c) JSP(d) CSSI got this question in unit test.My enquiry is from World Wide Web topic in section TCP/IP Protocol Suite of Computer Network

Answer»

The correct choice is (d) CSS

The best I can EXPLAIN: CSS ALONE cannot be used to generate dynamic web pages as it does not provide MANY event handling functions. It can be used along with JavaScript to generate dynamic web pages which are visually compelling.

96.

A web cookie is a small piece of data that is _______(a) sent from a website and stored in user’s web browser while a user is browsing a website(b) sent from user and stored in the server while a user is browsing a website(c) sent from root server to all servers(d) sent from the root server to other root serversI have been asked this question by my college director while I was bunking the class.The question is from World Wide Web topic in division TCP/IP Protocol Suite of Computer Network

Answer»

The correct CHOICE is (a) sent from a website and STORED in user’s web browser while a user is browsing a website

To ELABORATE: A web cookie is a small piece of data sent from a website and stored in user’s web browser while a user is browsing the website and is used to remember stateful information about the user’s OPERATIONS on the website. This can help the website provide a better browsing experience to the user.

97.

URL stands for ________(a) unique reference label(b) uniform reference label(c) uniform resource locator(d) unique resource locatorThe question was posed to me in homework.This key question is from World Wide Web in division TCP/IP Protocol Suite of Computer Network

Answer»

The correct answer is (c) UNIFORM resource locator

The BEST I can EXPLAIN: The Uniform Resource Locator is a locator for the resource to be located by HTTP on the World Wide WEB. The URL is DERIVED from the Uniform Resource Identifier.

98.

Common gateway interface is used to _______(a) generate executable files from web content by web server(b) generate web pages(c) stream videos(d) download media filesThis question was posed to me in semester exam.This interesting question is from World Wide Web topic in portion TCP/IP Protocol Suite of Computer Network

Answer»

Right answer is (a) generate executable files from WEB content by web SERVER

To EXPLAIN I would say: CGI is an interface through servers can run execute console-based executable files on a web server that generates dynamic web PAGES. A CGI script executes only when a request is made. The script then generates HTML.

99.

What is a web browser?(a) a program that can display a web page(b) a program used to view html documents(c) it enables user to access the resources of internet(d) all of the mentionedI had been asked this question in an online interview.Query is from World Wide Web in portion TCP/IP Protocol Suite of Computer Network

Answer»

Right answer is (d) all of the mentioned

The BEST EXPLANATION: A web browser is an application PROGRAM that is used to access the World Wide Web resources, applications and websites. Some examples of web BROWSERS are Google Chrome, Internet Explorer and SAFARI.

100.

Dynamic web page ______(a) is same every time whenever it displays(b) generates on demand by a program or a request from browser(c) both is same every time whenever it displays and generates on demand by a program or a request from browser(d) is different always in a predefined orderThe question was posed to me by my college director while I was bunking the class.The question is from World Wide Web in division TCP/IP Protocol Suite of Computer Network

Answer»

Correct ANSWER is (b) generates on demand by a program or a request from browser

To ELABORATE: A dynamic web page provides DIFFERENT content EVERY time the user opens it based on some events like NEW additions or time of the day. Languages such as JavaScript are used to respond to client-side events while languages such as PHP as used to respond to server-side events.