Computer Networking

Book Title:Computer Networking: A Top-Down Approach Featuring the Internet Book Author:James F. Kurose and Keith W. RossWeb Site:Computer Networking: A Top-Down Approach Featuring the Internet Chapter 2 Multiple Choice Questions
  1. For the Web application, the user agent is the user's monitor the user's keyboard the user's mouse none of the above
  2. The transfer of an html file from one host to another is loss-intolerant and time sensitive loss-tolerant and time sensitive loss-intolerant and time insensitive none of the above
  3. Internet telephony typically runs over TCP HTTP UDP none of the above
  4. A browser will generate header lines as a function of browser type and version user configuration of browser whether the browser has a cached version of the requested object all of the above
  5. Suppose a client sends an HTTP request message with the If-modified-since: header. Suppose the object in a server has not changed since the last time a client retrieved the object. Then the server will send a response message with the status code: 200 OK 304 Not Modified 404 Not Found none of the above
  6. Suppose the hit rate is .5 (instead of .4) in the caching example in the text. Then the average delay is greater than two seconds between 1.2 and 1.3 seconds between 1.0 and 1.1 seconds none of the above
  7. SMTP is used to to transfer messages from mail server to a user agent to define the format of message headers to transfer messages from one mail server to another all of the above
  8. Suppose a DNS resource record has Type=MX. Then Value is the IP address of the mail server that has the alias hostname Name. Value is the hostname of the DNS server that is authoritative for Name. Value is the hostname of the mail server that has the alias hostname Name. none of the above
  9. Local DNS name servers obtain resource records from Web caches never cache resource records cache resource records, but discard them after a period of time that is on the order of a few days cache resource records and never discard them
  10. Streams are not needed in which of the following programs: TCPclient TCPserver UDPserver UDPclient