Correct sequence:
C → A → D → B → E
User enters the URL (C).
DNS resolution happens (A).
Browser obtains the IP address (D).
HTTP request is sent (B).
The webpage is displayed (E).
| List I | List II |
|---|---|
| A. Count to infinity problem | I. Mobile Adhoc Networks |
| B. IEEE 802.16 | II. Distance vector routing |
| C. IEEE 802.15 | III. WiMAX |
| D. AODV protocol | IV. Bluetooth |
| List I | List II |
|---|---|
| A. Digital Signature | I. Asymmetric encryption algorithm. |
| B. Hash Function | II. Confirms authenticity and integrity. |
| C. AES | III. Produces a fixed-size digest. |
| D. RSA | IV. Symmetric encryption algorithm. |
Choose the correct answer from the options given below:
| Protocol | Type | Explanation |
|---|---|---|
| A. Reservation | Controlled Access | Stations reserve the channel for transmission before sending data. |
| B. Polling | Controlled Access | A central controller polls each station to determine if it has data to send. |
| C. TDMA (Time Division Multiple Access) | Channelization | Divides the channel into time slots — not part of controlled access. |
| D. Token Passing | Controlled Access | A special token is passed between stations; only the holder can transmit. |
| E. CSMA/CA | Random Access | Uses collision avoidance — it’s a contention-based protocol, not controlled access. |
Online Test Series, Information About Examination,
Syllabus, Notification
and More.
Online Test Series, Information About Examination,
Syllabus, Notification
and More.