├── .gitignore
├── LINQTut14.Aggregate
├── LINQTut14.Aggregate.csproj
└── Program.cs
├── LINQTut14.StandardMethod
├── LINQTut14.StandardMethod.csproj
└── Program.cs
├── LINQTut14.sln
└── Shared
├── Choice.cs
├── Question.cs
├── QuestionBank.cs
└── Shared.csproj
/.gitignore:
--------------------------------------------------------------------------------
1 | ## Ignore Visual Studio temporary files, build results, and
2 | ## files generated by popular Visual Studio add-ons.
3 | ##
4 | ## Get latest from https://github.com/github/gitignore/blob/master/VisualStudio.gitignore
5 |
6 | # User-specific files
7 | *.rsuser
8 | *.suo
9 | *.user
10 | *.userosscache
11 | *.sln.docstates
12 |
13 | # User-specific files (MonoDevelop/Xamarin Studio)
14 | *.userprefs
15 |
16 | # Mono auto generated files
17 | mono_crash.*
18 |
19 | # Build results
20 | [Dd]ebug/
21 | [Dd]ebugPublic/
22 | [Rr]elease/
23 | [Rr]eleases/
24 | x64/
25 | x86/
26 | [Ww][Ii][Nn]32/
27 | [Aa][Rr][Mm]/
28 | [Aa][Rr][Mm]64/
29 | bld/
30 | [Bb]in/
31 | [Oo]bj/
32 | [Ll]og/
33 | [Ll]ogs/
34 |
35 | # Visual Studio 2015/2017 cache/options directory
36 | .vs/
37 | # Uncomment if you have tasks that create the project's static files in wwwroot
38 | #wwwroot/
39 |
40 | # Visual Studio 2017 auto generated files
41 | Generated\ Files/
42 |
43 | # MSTest test Results
44 | [Tt]est[Rr]esult*/
45 | [Bb]uild[Ll]og.*
46 |
47 | # NUnit
48 | *.VisualState.xml
49 | TestResult.xml
50 | nunit-*.xml
51 |
52 | # Build Results of an ATL Project
53 | [Dd]ebugPS/
54 | [Rr]eleasePS/
55 | dlldata.c
56 |
57 | # Benchmark Results
58 | BenchmarkDotNet.Artifacts/
59 |
60 | # .NET Core
61 | project.lock.json
62 | project.fragment.lock.json
63 | artifacts/
64 |
65 | # Tye
66 | .tye/
67 |
68 | # ASP.NET Scaffolding
69 | ScaffoldingReadMe.txt
70 |
71 | # StyleCop
72 | StyleCopReport.xml
73 |
74 | # Files built by Visual Studio
75 | *_i.c
76 | *_p.c
77 | *_h.h
78 | *.ilk
79 | *.meta
80 | *.obj
81 | *.iobj
82 | *.pch
83 | *.pdb
84 | *.ipdb
85 | *.pgc
86 | *.pgd
87 | *.rsp
88 | *.sbr
89 | *.tlb
90 | *.tli
91 | *.tlh
92 | *.tmp
93 | *.tmp_proj
94 | *_wpftmp.csproj
95 | *.log
96 | *.vspscc
97 | *.vssscc
98 | .builds
99 | *.pidb
100 | *.svclog
101 | *.scc
102 |
103 | # Chutzpah Test files
104 | _Chutzpah*
105 |
106 | # Visual C++ cache files
107 | ipch/
108 | *.aps
109 | *.ncb
110 | *.opendb
111 | *.opensdf
112 | *.sdf
113 | *.cachefile
114 | *.VC.db
115 | *.VC.VC.opendb
116 |
117 | # Visual Studio profiler
118 | *.psess
119 | *.vsp
120 | *.vspx
121 | *.sap
122 |
123 | # Visual Studio Trace Files
124 | *.e2e
125 |
126 | # TFS 2012 Local Workspace
127 | $tf/
128 |
129 | # Guidance Automation Toolkit
130 | *.gpState
131 |
132 | # ReSharper is a .NET coding add-in
133 | _ReSharper*/
134 | *.[Rr]e[Ss]harper
135 | *.DotSettings.user
136 |
137 | # TeamCity is a build add-in
138 | _TeamCity*
139 |
140 | # DotCover is a Code Coverage Tool
141 | *.dotCover
142 |
143 | # AxoCover is a Code Coverage Tool
144 | .axoCover/*
145 | !.axoCover/settings.json
146 |
147 | # Coverlet is a free, cross platform Code Coverage Tool
148 | coverage*.json
149 | coverage*.xml
150 | coverage*.info
151 |
152 | # Visual Studio code coverage results
153 | *.coverage
154 | *.coveragexml
155 |
156 | # NCrunch
157 | _NCrunch_*
158 | .*crunch*.local.xml
159 | nCrunchTemp_*
160 |
161 | # MightyMoose
162 | *.mm.*
163 | AutoTest.Net/
164 |
165 | # Web workbench (sass)
166 | .sass-cache/
167 |
168 | # Installshield output folder
169 | [Ee]xpress/
170 |
171 | # DocProject is a documentation generator add-in
172 | DocProject/buildhelp/
173 | DocProject/Help/*.HxT
174 | DocProject/Help/*.HxC
175 | DocProject/Help/*.hhc
176 | DocProject/Help/*.hhk
177 | DocProject/Help/*.hhp
178 | DocProject/Help/Html2
179 | DocProject/Help/html
180 |
181 | # Click-Once directory
182 | publish/
183 |
184 | # Publish Web Output
185 | *.[Pp]ublish.xml
186 | *.azurePubxml
187 | # Note: Comment the next line if you want to checkin your web deploy settings,
188 | # but database connection strings (with potential passwords) will be unencrypted
189 | *.pubxml
190 | *.publishproj
191 |
192 | # Microsoft Azure Web App publish settings. Comment the next line if you want to
193 | # checkin your Azure Web App publish settings, but sensitive information contained
194 | # in these scripts will be unencrypted
195 | PublishScripts/
196 |
197 | # NuGet Packages
198 | *.nupkg
199 | # NuGet Symbol Packages
200 | *.snupkg
201 | # The packages folder can be ignored because of Package Restore
202 | **/[Pp]ackages/*
203 | # except build/, which is used as an MSBuild target.
204 | !**/[Pp]ackages/build/
205 | # Uncomment if necessary however generally it will be regenerated when needed
206 | #!**/[Pp]ackages/repositories.config
207 | # NuGet v3's project.json files produces more ignorable files
208 | *.nuget.props
209 | *.nuget.targets
210 |
211 | # Microsoft Azure Build Output
212 | csx/
213 | *.build.csdef
214 |
215 | # Microsoft Azure Emulator
216 | ecf/
217 | rcf/
218 |
219 | # Windows Store app package directories and files
220 | AppPackages/
221 | BundleArtifacts/
222 | Package.StoreAssociation.xml
223 | _pkginfo.txt
224 | *.appx
225 | *.appxbundle
226 | *.appxupload
227 |
228 | # Visual Studio cache files
229 | # files ending in .cache can be ignored
230 | *.[Cc]ache
231 | # but keep track of directories ending in .cache
232 | !?*.[Cc]ache/
233 |
234 | # Others
235 | ClientBin/
236 | ~$*
237 | *~
238 | *.dbmdl
239 | *.dbproj.schemaview
240 | *.jfm
241 | *.pfx
242 | *.publishsettings
243 | orleans.codegen.cs
244 |
245 | # Including strong name files can present a security risk
246 | # (https://github.com/github/gitignore/pull/2483#issue-259490424)
247 | #*.snk
248 |
249 | # Since there are multiple workflows, uncomment next line to ignore bower_components
250 | # (https://github.com/github/gitignore/pull/1529#issuecomment-104372622)
251 | #bower_components/
252 |
253 | # RIA/Silverlight projects
254 | Generated_Code/
255 |
256 | # Backup & report files from converting an old project file
257 | # to a newer Visual Studio version. Backup files are not needed,
258 | # because we have git ;-)
259 | _UpgradeReport_Files/
260 | Backup*/
261 | UpgradeLog*.XML
262 | UpgradeLog*.htm
263 | ServiceFabricBackup/
264 | *.rptproj.bak
265 |
266 | # SQL Server files
267 | *.mdf
268 | *.ldf
269 | *.ndf
270 |
271 | # Business Intelligence projects
272 | *.rdl.data
273 | *.bim.layout
274 | *.bim_*.settings
275 | *.rptproj.rsuser
276 | *- [Bb]ackup.rdl
277 | *- [Bb]ackup ([0-9]).rdl
278 | *- [Bb]ackup ([0-9][0-9]).rdl
279 |
280 | # Microsoft Fakes
281 | FakesAssemblies/
282 |
283 | # GhostDoc plugin setting file
284 | *.GhostDoc.xml
285 |
286 | # Node.js Tools for Visual Studio
287 | .ntvs_analysis.dat
288 | node_modules/
289 |
290 | # Visual Studio 6 build log
291 | *.plg
292 |
293 | # Visual Studio 6 workspace options file
294 | *.opt
295 |
296 | # Visual Studio 6 auto-generated workspace file (contains which files were open etc.)
297 | *.vbw
298 |
299 | # Visual Studio LightSwitch build output
300 | **/*.HTMLClient/GeneratedArtifacts
301 | **/*.DesktopClient/GeneratedArtifacts
302 | **/*.DesktopClient/ModelManifest.xml
303 | **/*.Server/GeneratedArtifacts
304 | **/*.Server/ModelManifest.xml
305 | _Pvt_Extensions
306 |
307 | # Paket dependency manager
308 | .paket/paket.exe
309 | paket-files/
310 |
311 | # FAKE - F# Make
312 | .fake/
313 |
314 | # CodeRush personal settings
315 | .cr/personal
316 |
317 | # Python Tools for Visual Studio (PTVS)
318 | __pycache__/
319 | *.pyc
320 |
321 | # Cake - Uncomment if you are using it
322 | # tools/**
323 | # !tools/packages.config
324 |
325 | # Tabs Studio
326 | *.tss
327 |
328 | # Telerik's JustMock configuration file
329 | *.jmconfig
330 |
331 | # BizTalk build output
332 | *.btp.cs
333 | *.btm.cs
334 | *.odx.cs
335 | *.xsd.cs
336 |
337 | # OpenCover UI analysis results
338 | OpenCover/
339 |
340 | # Azure Stream Analytics local run output
341 | ASALocalRun/
342 |
343 | # MSBuild Binary and Structured Log
344 | *.binlog
345 |
346 | # NVidia Nsight GPU debugger configuration file
347 | *.nvuser
348 |
349 | # MFractors (Xamarin productivity tool) working folder
350 | .mfractor/
351 |
352 | # Local History for Visual Studio
353 | .localhistory/
354 |
355 | # BeatPulse healthcheck temp database
356 | healthchecksdb
357 |
358 | # Backup folder for Package Reference Convert tool in Visual Studio 2017
359 | MigrationBackup/
360 |
361 | # Ionide (cross platform F# VS Code tools) working folder
362 | .ionide/
363 |
364 | # Fody - auto-generated XML schema
365 | FodyWeavers.xsd
366 |
367 | ##
368 | ## Visual studio for Mac
369 | ##
370 |
371 |
372 | # globs
373 | Makefile.in
374 | *.userprefs
375 | *.usertasks
376 | config.make
377 | config.status
378 | aclocal.m4
379 | install-sh
380 | autom4te.cache/
381 | *.tar.gz
382 | tarballs/
383 | test-results/
384 |
385 | # Mac bundle stuff
386 | *.dmg
387 | *.app
388 |
389 | # content below from: https://github.com/github/gitignore/blob/master/Global/macOS.gitignore
390 | # General
391 | .DS_Store
392 | .AppleDouble
393 | .LSOverride
394 |
395 | # Icon must end with two \r
396 | Icon
397 |
398 |
399 | # Thumbnails
400 | ._*
401 |
402 | # Files that might appear in the root of a volume
403 | .DocumentRevisions-V100
404 | .fseventsd
405 | .Spotlight-V100
406 | .TemporaryItems
407 | .Trashes
408 | .VolumeIcon.icns
409 | .com.apple.timemachine.donotpresent
410 |
411 | # Directories potentially created on remote AFP share
412 | .AppleDB
413 | .AppleDesktop
414 | Network Trash Folder
415 | Temporary Items
416 | .apdisk
417 |
418 | # content below from: https://github.com/github/gitignore/blob/master/Global/Windows.gitignore
419 | # Windows thumbnail cache files
420 | Thumbs.db
421 | ehthumbs.db
422 | ehthumbs_vista.db
423 |
424 | # Dump file
425 | *.stackdump
426 |
427 | # Folder config file
428 | [Dd]esktop.ini
429 |
430 | # Recycle Bin used on file shares
431 | $RECYCLE.BIN/
432 |
433 | # Windows Installer files
434 | *.cab
435 | *.msi
436 | *.msix
437 | *.msm
438 | *.msp
439 |
440 | # Windows shortcuts
441 | *.lnk
442 |
443 | # JetBrains Rider
444 | .idea/
445 | *.sln.iml
446 |
447 | ##
448 | ## Visual Studio Code
449 | ##
450 | .vscode/*
451 | !.vscode/settings.json
452 | !.vscode/tasks.json
453 | !.vscode/launch.json
454 | !.vscode/extensions.json
455 |
--------------------------------------------------------------------------------
/LINQTut14.Aggregate/LINQTut14.Aggregate.csproj:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | Exe
5 | net6.0
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
--------------------------------------------------------------------------------
/LINQTut14.Aggregate/Program.cs:
--------------------------------------------------------------------------------
1 | using Shared;
2 | using System;
3 | using System.Linq;
4 |
5 | namespace LINQTut14.Aggregation
6 | {
7 | internal class Program
8 | {
9 | private static Random random = new Random();
10 |
11 | static void Main(string[] args)
12 | {
13 | RunMethod03();
14 | Console.ReadKey();
15 | }
16 |
17 | private static void RunMethod01()
18 | {
19 | var names = new[] { "Ali", "Salem", "Abeer", "Reem", "Jalal" };
20 | // Ali, Salem, ....
21 |
22 | //var output = "";
23 | //foreach (var item in names)
24 | // output += $"{item},";
25 | //Console.WriteLine(output.TrimEnd(','));
26 |
27 | //var output = string.Join(',', names);
28 | //Console.WriteLine(output);
29 |
30 | var commaSeparatedNames = names.Aggregate((a, b) =>
31 | {
32 | Console.WriteLine($"a = {a}, b = {b}");
33 | return $"{a},{b}";
34 | });
35 |
36 | }
37 |
38 | private static void RunMethod02()
39 | {
40 | var numbers = new[] { 1, 2, 3, 4, 5 };
41 |
42 | //var total = 0;
43 | //foreach (var n in numbers)
44 | // total += n;
45 |
46 | var total = numbers.Aggregate(2, (a, b) => a + b);
47 |
48 | Console.WriteLine($"Total: {total}");
49 | }
50 |
51 |
52 | private static void RunMethod03()
53 | {
54 | var quiz = QuestionBank.All;
55 |
56 | var longestQuestionTitle = quiz[0];
57 |
58 | Console.WriteLine($"{longestQuestionTitle}");
59 | Console.WriteLine("-----");
60 | longestQuestionTitle =
61 | quiz.Aggregate(longestQuestionTitle,
62 | (longest, next) => longest.Title.Length < next.Title.Length ? next : longest,
63 | x => x);
64 |
65 |
66 |
67 | Console.WriteLine($"{longestQuestionTitle}");
68 | }
69 | }
70 | }
71 |
--------------------------------------------------------------------------------
/LINQTut14.StandardMethod/LINQTut14.StandardMethod.csproj:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | Exe
5 | net6.0
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
--------------------------------------------------------------------------------
/LINQTut14.StandardMethod/Program.cs:
--------------------------------------------------------------------------------
1 | using Shared;
2 | using System;
3 | using System.Linq;
4 |
5 | namespace LINQTut14.StandardMethod
6 | {
7 | internal class Program
8 | {
9 | static void Main(string[] args)
10 | {
11 | RunAvg();
12 | Console.ReadKey();
13 | }
14 |
15 | private static void RunCount()
16 | {
17 | var quiz = QuestionBank.GetQuestionRange(Enumerable.Range(1, 200));
18 | Console.WriteLine($"Total Questions: {quiz.Count()}");
19 | Console.WriteLine($"Total Questions With One Mark : {quiz.Count(x => x.Marks == 1)}");
20 | Console.WriteLine($"Total Questions With One Mark : {quiz.Where(x => x.Marks == 1).Count()}");
21 | Console.WriteLine($"Total Questions With One Mark Using LongCount : {quiz.Where(x => x.Marks == 1).LongCount()}");
22 | }
23 |
24 | private static void RunMax()
25 | {
26 | var quiz = QuestionBank.GetQuestionRange(Enumerable.Range(1, 200));
27 | var maximumMark = quiz.Max(x => x.Marks);
28 | //var maximumMark = quiz.Where(x => x.Choices.Count < 3).Max(x => x.Marks);
29 | Console.WriteLine($"Maximum Mark: {maximumMark}");
30 | }
31 | private static void RunMaxBy()
32 | {
33 | var quiz = QuestionBank.GetQuestionRange(Enumerable.Range(1, 200));
34 | var maximumQuestionMark = quiz.MaxBy(x => x.Marks);
35 | //var maximumMark = quiz.Where(x => x.Choices.Count < 3).Max(x => x.Marks);
36 | Console.WriteLine($"{maximumQuestionMark}");
37 | }
38 | private static void RunMin()
39 | {
40 | var quiz = QuestionBank.GetQuestionRange(Enumerable.Range(1, 200));
41 | var maximumMark = quiz.Min(x => x.Marks);
42 | //var minimumMark = quiz.Where(x => x.Choices.Count < 3).Min(x => x.Marks);
43 | Console.WriteLine($"Minimum Mark: {maximumMark}");
44 | }
45 | private static void RunMinBy()
46 | {
47 | var quiz = QuestionBank.GetQuestionRange(Enumerable.Range(1, 200));
48 | var minimumQuestionMark = quiz.MinBy(x => x.Marks);
49 | //var minimumMark = quiz.Where(x => x.Choices.Count < 3).MinBy(x => x.Marks);
50 | Console.WriteLine($"{minimumQuestionMark}");
51 | }
52 |
53 | private static void RunSum()
54 | {
55 | var quiz = QuestionBank.GetQuestionRange(Enumerable.Range(1, 200));
56 | var total = quiz.Sum(x => x.Marks);
57 | Console.WriteLine($"total: {total}");
58 | }
59 |
60 | private static void RunAvg()
61 | {
62 | var quiz = QuestionBank.GetQuestionRange(Enumerable.Range(1, 200));
63 | var average = quiz.Average(x => x.Marks);
64 | Console.WriteLine($"average: {average.ToString("#.##")}");
65 | }
66 | }
67 | }
68 |
--------------------------------------------------------------------------------
/LINQTut14.sln:
--------------------------------------------------------------------------------
1 |
2 | Microsoft Visual Studio Solution File, Format Version 12.00
3 | # Visual Studio Version 17
4 | VisualStudioVersion = 17.0.32112.339
5 | MinimumVisualStudioVersion = 10.0.40219.1
6 | Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "Shared", "Shared\Shared.csproj", "{6D3FC11B-A08A-475F-856F-DD45B0B08D16}"
7 | EndProject
8 | Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "LINQTut14.Aggregate", "LINQTut14.Aggregate\LINQTut14.Aggregate.csproj", "{BCE8C812-83E1-4C05-BBA2-F1C38F6569F0}"
9 | EndProject
10 | Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "LINQTut14.StandardMethod", "LINQTut14.StandardMethod\LINQTut14.StandardMethod.csproj", "{A718B8A2-522E-4C75-B2DF-7C94A2159FEF}"
11 | EndProject
12 | Global
13 | GlobalSection(SolutionConfigurationPlatforms) = preSolution
14 | Debug|Any CPU = Debug|Any CPU
15 | Release|Any CPU = Release|Any CPU
16 | EndGlobalSection
17 | GlobalSection(ProjectConfigurationPlatforms) = postSolution
18 | {6D3FC11B-A08A-475F-856F-DD45B0B08D16}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
19 | {6D3FC11B-A08A-475F-856F-DD45B0B08D16}.Debug|Any CPU.Build.0 = Debug|Any CPU
20 | {6D3FC11B-A08A-475F-856F-DD45B0B08D16}.Release|Any CPU.ActiveCfg = Release|Any CPU
21 | {6D3FC11B-A08A-475F-856F-DD45B0B08D16}.Release|Any CPU.Build.0 = Release|Any CPU
22 | {BCE8C812-83E1-4C05-BBA2-F1C38F6569F0}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
23 | {BCE8C812-83E1-4C05-BBA2-F1C38F6569F0}.Debug|Any CPU.Build.0 = Debug|Any CPU
24 | {BCE8C812-83E1-4C05-BBA2-F1C38F6569F0}.Release|Any CPU.ActiveCfg = Release|Any CPU
25 | {BCE8C812-83E1-4C05-BBA2-F1C38F6569F0}.Release|Any CPU.Build.0 = Release|Any CPU
26 | {A718B8A2-522E-4C75-B2DF-7C94A2159FEF}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
27 | {A718B8A2-522E-4C75-B2DF-7C94A2159FEF}.Debug|Any CPU.Build.0 = Debug|Any CPU
28 | {A718B8A2-522E-4C75-B2DF-7C94A2159FEF}.Release|Any CPU.ActiveCfg = Release|Any CPU
29 | {A718B8A2-522E-4C75-B2DF-7C94A2159FEF}.Release|Any CPU.Build.0 = Release|Any CPU
30 | EndGlobalSection
31 | GlobalSection(SolutionProperties) = preSolution
32 | HideSolutionNode = FALSE
33 | EndGlobalSection
34 | GlobalSection(ExtensibilityGlobals) = postSolution
35 | SolutionGuid = {A5BEE0BF-7B2F-45E2-AC3A-EDF3F31DF5F2}
36 | EndGlobalSection
37 | EndGlobal
38 |
--------------------------------------------------------------------------------
/Shared/Choice.cs:
--------------------------------------------------------------------------------
1 | namespace Shared
2 | {
3 | public class Choice
4 | {
5 | public int Order { get; set; }
6 | public string Description { get; set; }
7 | }
8 | }
9 |
--------------------------------------------------------------------------------
/Shared/Question.cs:
--------------------------------------------------------------------------------
1 | using System.Collections.Generic;
2 |
3 | namespace Shared
4 | {
5 | public class Question
6 | {
7 | public string Title { get; set; }
8 | public List Choices { get; set; } = new();
9 | public int CorrectAnswer { get; set; }
10 |
11 | public int Marks { get; set; }
12 |
13 | public override string ToString()
14 | {
15 | var choices = "";
16 |
17 | foreach (var item in Choices)
18 | {
19 | choices += $"\n\t{item.Order}) {item.Description}";
20 | }
21 |
22 | return $"{Title} [{Marks} marks]" +
23 | $"{choices}";
24 |
25 |
26 | }
27 | }
28 | }
29 |
--------------------------------------------------------------------------------
/Shared/QuestionBank.cs:
--------------------------------------------------------------------------------
1 | using System;
2 | using System.Collections.Generic;
3 | using System.Linq;
4 |
5 | namespace Shared
6 |
7 | {
8 | public static class QuestionBank
9 | {
10 | private static Random random = new Random();
11 |
12 | public static IEnumerable Randomize(int count)
13 | {
14 | if (All.Count < count) return All;
15 | return AllShuffled.Take(count);
16 | }
17 |
18 | public static Question PickOne()
19 | {
20 | return All[random.Next(0, All.Count)];
21 | }
22 |
23 | public static void ToQuiz(this IEnumerable questions)
24 | {
25 | foreach (var question in questions)
26 | {
27 | Console.WriteLine(question);
28 | Console.WriteLine();
29 |
30 | }
31 | }
32 |
33 | public static List GetQuestionRange(IEnumerable range)
34 | {
35 | return All.Where((x, i) => range.Contains(i)).ToList();
36 | }
37 |
38 | public static List All => new List() {
39 | // Question #1
40 |
41 | new Question {
42 | Title = "Q #1: In the streaming stored audio/video category of audio/video services",
43 | CorrectAnswer = 1,
44 | Marks = 7,
45 | Choices = new List < Choice > {
46 | new Choice {
47 | Order = 1,
48 | Description = "Files are compressed and stored on the server"
49 | },
50 | new Choice {
51 | Order = 2,
52 | Description = "A user listens to a broadcast audio and video through the internet"
53 | },
54 | new Choice {
55 | Order = 3,
56 | Description = "People use the Internet to interactively communicate with one another"
57 | },
58 | new Choice {
59 | Order = 4,
60 | Description = "None of the above"
61 | }
62 | }
63 | },
64 | new Question {
65 | Title = "Q #2: In the streaming live audio/video category of audio/video services",
66 | CorrectAnswer = 1,
67 | Marks = 4,
68 | Choices = new List < Choice > {
69 | new Choice {
70 | Order = 1,
71 | Description = "Files are compressed and stored on the server"
72 | },
73 | new Choice {
74 | Order = 2,
75 | Description = "A user listens to a broadcast audio and video through the internet"
76 | },
77 | new Choice {
78 | Order = 3,
79 | Description = "People use the Internet to interactively communicate with one another"
80 | },
81 | new Choice {
82 | Order = 4,
83 | Description = "None of the above"
84 | }
85 | }
86 | },
87 | new Question {
88 | Title = "Q #3: In the interactive audio/video category of audio/video services",
89 | CorrectAnswer = 1,
90 | Marks = 1,
91 | Choices = new List < Choice > {
92 | new Choice {
93 | Order = 1,
94 | Description = "Files are compressed and stored on the server"
95 | },
96 | new Choice {
97 | Order = 2,
98 | Description = "A user listens to a broadcast audio and video through the internet"
99 | },
100 | new Choice {
101 | Order = 3,
102 | Description = "People use the Internet to interactively communicate with one another"
103 | },
104 | new Choice {
105 | Order = 4,
106 | Description = "None of the above"
107 | }
108 | }
109 | },
110 | new Question {
111 | Title = "Q #4: Streaming stored audio/video is sometimes referred to as on-demand audio/video",
112 | CorrectAnswer = 1,
113 | Marks = 3,
114 | Choices = new List < Choice > {
115 | new Choice {
116 | Order = 1,
117 | Description = "True"
118 | },
119 | new Choice {
120 | Order = 2,
121 | Description = "False"
122 | }
123 | }
124 | },
125 | new Question {
126 | Title = "Q #5: An example of streaming stored audio/video is Internet radio",
127 | CorrectAnswer = 1,
128 | Marks = 9,
129 | Choices = new List < Choice > {
130 | new Choice {
131 | Order = 1,
132 | Description = "True"
133 | },
134 | new Choice {
135 | Order = 2,
136 | Description = "False"
137 | }
138 | }
139 | },
140 | new Question {
141 | Title = "Q #6: Streaming live audio/video refers to on-demand requests for compressed audio/video",
142 | CorrectAnswer = 1,
143 | Marks = 2,
144 | Choices = new List < Choice > {
145 | new Choice {
146 | Order = 1,
147 | Description = "True"
148 | },
149 | new Choice {
150 | Order = 2,
151 | Description = "False"
152 | }
153 | }
154 | },
155 | new Question {
156 | Title = "Q #7: An example of interactive audio/video is Internet teleconferencing",
157 | CorrectAnswer = 1,
158 | Marks = 9,
159 | Choices = new List < Choice > {
160 | new Choice {
161 | Order = 1,
162 | Description = "True"
163 | },
164 | new Choice {
165 | Order = 2,
166 | Description = "False"
167 | }
168 | }
169 | },
170 | new Question {
171 | Title = "Q #8: A raw piece of information, whether audio or video, must be compressed and then digitized",
172 | CorrectAnswer = 1,
173 | Marks = 2,
174 | Choices = new List < Choice > {
175 | new Choice {
176 | Order = 1,
177 | Description = "True"
178 | },
179 | new Choice {
180 | Order = 2,
181 | Description = "False"
182 | }
183 | }
184 | },
185 | new Question {
186 | Title = "Q #9: A raw piece of information, whether audio or video, must be digitized and then compressed",
187 | CorrectAnswer = 1,
188 | Marks = 9,
189 | Choices = new List < Choice > {
190 | new Choice {
191 | Order = 1,
192 | Description = "True"
193 | },
194 | new Choice {
195 | Order = 2,
196 | Description = "False"
197 | }
198 | }
199 | },
200 | new Question {
201 | Title = "Q #10: Digitization refers to",
202 | CorrectAnswer = 1,
203 | Marks = 5,
204 | Choices = new List < Choice > {
205 | new Choice {
206 | Order = 1,
207 | Description = "Conversion to a stream of numbers, and preferably these numbers should be integers for efficiency"
208 | },
209 | new Choice {
210 | Order = 2,
211 | Description = "The process of coding that will effectively reduce the total number of bits needed to represent certain information"
212 | },
213 | new Choice {
214 | Order = 3,
215 | Description = "The process of converting information into an analog format"
216 | },
217 | new Choice {
218 | Order = 4,
219 | Description = "Conversion to a stream of numbers, and preferably these numbers should be decimals for efficiency"
220 | }
221 | }
222 | },
223 | new Question {
224 | Title = "Q #11: Compression refers to",
225 | CorrectAnswer = 1,
226 | Marks = 3,
227 | Choices = new List < Choice > {
228 | new Choice {
229 | Order = 1,
230 | Description = "Conversion to a stream of numbers, and preferably these numbers should be integers for efficiency"
231 | },
232 | new Choice {
233 | Order = 2,
234 | Description = "The process of coding that will effectively reduce the total number of bits needed to represent certain information"
235 | },
236 | new Choice {
237 | Order = 3,
238 | Description = "The process of converting information into an analog format"
239 | },
240 | new Choice {
241 | Order = 4,
242 | Description = "Conversion to a stream of numbers, and preferably these numbers should be decimals for efficiency"
243 | }
244 | }
245 | },
246 | new Question {
247 | Title = "Q #12: Analog frequencies represents the sound frequency as a function of time",
248 | CorrectAnswer = 1,
249 | Marks = 3,
250 | Choices = new List < Choice > {
251 | new Choice {
252 | Order = 1,
253 | Description = "True"
254 | },
255 | new Choice {
256 | Order = 2,
257 | Description = "False"
258 | }
259 | }
260 | },
261 | new Question {
262 | Title = "Q #13: Analog frequencies represents the sound amplitude as a function of time",
263 | CorrectAnswer = 1,
264 | Marks = 5,
265 | Choices = new List < Choice > {
266 | new Choice {
267 | Order = 1,
268 | Description = "True"
269 | },
270 | new Choice {
271 | Order = 2,
272 | Description = "False"
273 | }
274 | }
275 | },
276 | new Question {
277 | Title = "Q #14: To digitize an analog signal, the signal must be sampled in the dimension of time, as well as the dimension of amplitude",
278 | CorrectAnswer = 1,
279 | Marks = 8,
280 | Choices = new List < Choice > {
281 | new Choice {
282 | Order = 1,
283 | Description = "True"
284 | },
285 | new Choice {
286 | Order = 2,
287 | Description = "False"
288 | }
289 | }
290 | },
291 | new Question {
292 | Title = "Q #15: To digitize an analog signal, the signal must be sampled in the dimension of time, as well as the dimension of frequency",
293 | CorrectAnswer = 1,
294 | Marks = 6,
295 | Choices = new List < Choice > {
296 | new Choice {
297 | Order = 1,
298 | Description = "True"
299 | },
300 | new Choice {
301 | Order = 2,
302 | Description = "False"
303 | }
304 | }
305 | },
306 | new Question {
307 | Title = "Q #16: Quantization refers to",
308 | CorrectAnswer = 1,
309 | Marks = 8,
310 | Choices = new List < Choice > {
311 | new Choice {
312 | Order = 1,
313 | Description = "Sampling in the voltage dimension"
314 | },
315 | new Choice {
316 | Order = 2,
317 | Description = "Sampling in the frequency dimension"
318 | },
319 | new Choice {
320 | Order = 3,
321 | Description = "Sampling in the time dimension"
322 | },
323 | new Choice {
324 | Order = 4,
325 | Description = "Sampling in the bitrate dimension"
326 | }
327 | }
328 | },
329 | new Question {
330 | Title = "Q #17: Sampling referes to the process of sampling the time dimension",
331 | CorrectAnswer = 1,
332 | Marks = 3,
333 | Choices = new List < Choice > {
334 | new Choice {
335 | Order = 1,
336 | Description = "True"
337 | },
338 | new Choice {
339 | Order = 2,
340 | Description = "False"
341 | }
342 | }
343 | },
344 | new Question {
345 | Title = "Q #18: Sampling referes to the process of sampling the amplitude dimension",
346 | CorrectAnswer = 1,
347 | Marks = 9,
348 | Choices = new List < Choice > {
349 | new Choice {
350 | Order = 1,
351 | Description = "True"
352 | },
353 | new Choice {
354 | Order = 2,
355 | Description = "False"
356 | }
357 | }
358 | },
359 | new Question {
360 | Title = "Q #19: Nyquist thereom states",
361 | CorrectAnswer = 1,
362 | Marks = 9,
363 | Choices = new List < Choice > {
364 | new Choice {
365 | Order = 1,
366 | Description = "If the highest frequency of the signal is f, we need to sample the signal 2f times per second"
367 | },
368 | new Choice {
369 | Order = 2,
370 | Description = "If the highest frequency of the signal is f, we need to sample the signal f times per second"
371 | },
372 | new Choice {
373 | Order = 3,
374 | Description = "If the highest frequency of the signal is f, we need to sample the signal 3f times per second"
375 | },
376 | new Choice {
377 | Order = 4,
378 | Description = "If the highest frequency of the signal is f, we need to sample the signal 4f times per second"
379 | }
380 | }
381 | },
382 | new Question {
383 | Title = "Q #20: The process of converting from analog audio to compressed binary form sampling quantization, and encoding is known as:",
384 | CorrectAnswer = 1,
385 | Marks = 4,
386 | Choices = new List < Choice > {
387 | new Choice {
388 | Order = 1,
389 | Description = "Pulse code modulation"
390 | },
391 | new Choice {
392 | Order = 2,
393 | Description = "Polar quantization"
394 | },
395 | new Choice {
396 | Order = 3,
397 | Description = "Pulse code quantization"
398 | },
399 | new Choice {
400 | Order = 4,
401 | Description = "Polar code modulation"
402 | }
403 | }
404 | },
405 | new Question {
406 | Title = "Q #21: A video consists of a sequence of frames",
407 | CorrectAnswer = 1,
408 | Marks = 8,
409 | Choices = new List < Choice > {
410 | new Choice {
411 | Order = 1,
412 | Description = "True"
413 | },
414 | new Choice {
415 | Order = 2,
416 | Description = "False"
417 | }
418 | }
419 | },
420 | new Question {
421 | Title = "Q #22: The standard number of frames per second of a video is 25 frames per second",
422 | CorrectAnswer = 1,
423 | Marks = 1,
424 | Choices = new List < Choice > {
425 | new Choice {
426 | Order = 1,
427 | Description = "True"
428 | },
429 | new Choice {
430 | Order = 2,
431 | Description = "False"
432 | }
433 | }
434 | },
435 | new Question {
436 | Title = "Q #23: In North America, a common number of frames per second _________ frames per second",
437 | CorrectAnswer = 1,
438 | Marks = 6,
439 | Choices = new List < Choice > {
440 | new Choice {
441 | Order = 1,
442 | Description = "20"
443 | },
444 | new Choice {
445 | Order = 2,
446 | Description = "35"
447 | },
448 | new Choice {
449 | Order = 3,
450 | Description = "25"
451 | },
452 | new Choice {
453 | Order = 4,
454 | Description = "30"
455 | }
456 | }
457 | },
458 | new Question {
459 | Title = "Q #24: To avoid a condition called flickering, a frame needs to be refreshed",
460 | CorrectAnswer = 1,
461 | Marks = 1,
462 | Choices = new List < Choice > {
463 | new Choice {
464 | Order = 1,
465 | Description = "True"
466 | },
467 | new Choice {
468 | Order = 2,
469 | Description = "False"
470 | }
471 | }
472 | },
473 | new Question {
474 | Title = "Q #25: Pixels are also known as picture elements",
475 | CorrectAnswer = 1,
476 | Marks = 2,
477 | Choices = new List < Choice > {
478 | new Choice {
479 | Order = 1,
480 | Description = "True"
481 | },
482 | new Choice {
483 | Order = 2,
484 | Description = "False"
485 | }
486 | }
487 | },
488 | new Question {
489 | Title = "Q #26: For colour TV, each pixel represents 8 bits",
490 | CorrectAnswer = 1,
491 | Marks = 4,
492 | Choices = new List < Choice > {
493 | new Choice {
494 | Order = 1,
495 | Description = "True"
496 | },
497 | new Choice {
498 | Order = 2,
499 | Description = "False"
500 | }
501 | }
502 | },
503 | new Question {
504 | Title = "Q #27: For black and white TV, each pixel represents 8 bits",
505 | CorrectAnswer = 1,
506 | Marks = 5,
507 | Choices = new List < Choice > {
508 | new Choice {
509 | Order = 1,
510 | Description = "True"
511 | },
512 | new Choice {
513 | Order = 2,
514 | Description = "False"
515 | }
516 | }
517 | },
518 | new Question {
519 | Title = "Q #28: For colour TV, each pixel designates 8 bits for each primary colour (red, blue, yellow)",
520 | CorrectAnswer = 1,
521 | Marks = 7,
522 | Choices = new List < Choice > {
523 | new Choice {
524 | Order = 1,
525 | Description = "True"
526 | },
527 | new Choice {
528 | Order = 2,
529 | Description = "False"
530 | }
531 | }
532 | },
533 | new Question {
534 | Title = "Q #29: A video's dimensions are 1920x1080 pixels (in colour), and is played at 25 frames per second (with refreshing). This means we need a ___________ Mbps bitrate",
535 | CorrectAnswer = 1,
536 | Marks = 1,
537 | Choices = new List < Choice > {
538 | new Choice {
539 | Order = 1,
540 | Description = "944"
541 | },
542 | new Choice {
543 | Order = 2,
544 | Description = "2488"
545 | },
546 | new Choice {
547 | Order = 3,
548 | Description = "1024"
549 | },
550 | new Choice {
551 | Order = 4,
552 | Description = "2048"
553 | }
554 | }
555 | },
556 | new Question {
557 | Title = "Q #30: In ______________ encoding, the differences between the samples are encoded instead of encoding all the sampled values",
558 | CorrectAnswer = 1,
559 | Marks = 5,
560 | Choices = new List < Choice > {
561 | new Choice {
562 | Order = 1,
563 | Description = "Predictive"
564 | },
565 | new Choice {
566 | Order = 2,
567 | Description = "Perceptual"
568 | },
569 | new Choice {
570 | Order = 3,
571 | Description = "Perpetual"
572 | },
573 | new Choice {
574 | Order = 4,
575 | Description = "Compressed"
576 | }
577 | }
578 | },
579 | new Question {
580 | Title = "Q #31: Predictive encoding is often used for creating CD-quality audio",
581 | CorrectAnswer = 1,
582 | Marks = 7,
583 | Choices = new List < Choice > {
584 | new Choice {
585 | Order = 1,
586 | Description = "True"
587 | },
588 | new Choice {
589 | Order = 2,
590 | Description = "False"
591 | }
592 | }
593 | },
594 | new Question {
595 | Title = "Q #32: Predictive encoding is often used for speech",
596 | CorrectAnswer = 1,
597 | Marks = 1,
598 | Choices = new List < Choice > {
599 | new Choice {
600 | Order = 1,
601 | Description = "True"
602 | },
603 | new Choice {
604 | Order = 2,
605 | Description = "False"
606 | }
607 | }
608 | },
609 | new Question {
610 | Title = "Q #33: The idea of _____________ encoding is based on the limitations of our auditory system",
611 | CorrectAnswer = 1,
612 | Marks = 8,
613 | Choices = new List < Choice > {
614 | new Choice {
615 | Order = 1,
616 | Description = "Predictive"
617 | },
618 | new Choice {
619 | Order = 2,
620 | Description = "Perceptual"
621 | },
622 | new Choice {
623 | Order = 3,
624 | Description = "Perpetual"
625 | },
626 | new Choice {
627 | Order = 4,
628 | Description = "Compressed"
629 | }
630 | }
631 | },
632 | new Question {
633 | Title = "Q #34: Perceptual encoding is often used for creating CD-quality audio",
634 | CorrectAnswer = 1,
635 | Marks = 3,
636 | Choices = new List < Choice > {
637 | new Choice {
638 | Order = 1,
639 | Description = "True"
640 | },
641 | new Choice {
642 | Order = 2,
643 | Description = "False"
644 | }
645 | }
646 | },
647 | new Question {
648 | Title = "Q #35: Perceptual encoding is often used for speech",
649 | CorrectAnswer = 1,
650 | Marks = 5,
651 | Choices = new List < Choice > {
652 | new Choice {
653 | Order = 1,
654 | Description = "True"
655 | },
656 | new Choice {
657 | Order = 2,
658 | Description = "False"
659 | }
660 | }
661 | },
662 | new Question {
663 | Title = "Q #36: MP3 uses predictive encoding",
664 | CorrectAnswer = 1,
665 | Marks = 3,
666 | Choices = new List < Choice > {
667 | new Choice {
668 | Order = 1,
669 | Description = "True"
670 | },
671 | new Choice {
672 | Order = 2,
673 | Description = "False"
674 | }
675 | }
676 | },
677 | new Question {
678 | Title = "Q #37: JPEG is a standard which is used to compress images",
679 | CorrectAnswer = 1,
680 | Marks = 5,
681 | Choices = new List < Choice > {
682 | new Choice {
683 | Order = 1,
684 | Description = "True"
685 | },
686 | new Choice {
687 | Order = 2,
688 | Description = "False"
689 | }
690 | }
691 | },
692 | new Question {
693 | Title = "Q #38: MPEG is a standard which is used to compress audio",
694 | CorrectAnswer = 1,
695 | Marks = 7,
696 | Choices = new List < Choice > {
697 | new Choice {
698 | Order = 1,
699 | Description = "True"
700 | },
701 | new Choice {
702 | Order = 2,
703 | Description = "False"
704 | }
705 | }
706 | },
707 | new Question {
708 | Title = "Q #39: JPEG works by",
709 | CorrectAnswer = 1,
710 | Marks = 3,
711 | Choices = new List < Choice > {
712 | new Choice {
713 | Order = 1,
714 | Description = "Changing the picture into a linear set of numbers so that redundancies can be found and removed"
715 | },
716 | new Choice {
717 | Order = 2,
718 | Description = "Partitioning the picture into I-frames, P-frames, and B-frames"
719 | },
720 | new Choice {
721 | Order = 3,
722 | Description = "Changing the colour of pixels that are similar to the colour of other pixels so they are the same"
723 | },
724 | new Choice {
725 | Order = 4,
726 | Description = "Changing the size of the picture so that it is smaller"
727 | }
728 | }
729 | },
730 | new Question {
731 | Title = "Q #40: The steps for JPEG compression are (in order from first to last)",
732 | CorrectAnswer = 1,
733 | Marks = 1,
734 | Choices = new List < Choice > {
735 | new Choice {
736 | Order = 1,
737 | Description = "DCT, Quantization, Data Compression"
738 | },
739 | new Choice {
740 | Order = 2,
741 | Description = "Quantization, DCT, Data Compression"
742 | },
743 | new Choice {
744 | Order = 3,
745 | Description = "DCT, Data Compression, Quantization"
746 | },
747 | new Choice {
748 | Order = 4,
749 | Description = "Data Compression, Quantization, DCT"
750 | }
751 | }
752 | },
753 | new Question {
754 | Title = "Q #41: Discrete cosine transformation changes a block of 64 values so that the relative relationships between pixels are kept but the redundancies are revealed ",
755 | CorrectAnswer = 1,
756 | Marks = 2,
757 | Choices = new List < Choice > {
758 | new Choice {
759 | Order = 1,
760 | Description = "True"
761 | },
762 | new Choice {
763 | Order = 2,
764 | Description = "False"
765 | }
766 | }
767 | },
768 | new Question {
769 | Title = "Q #42: DCT is irreversable ",
770 | CorrectAnswer = 1,
771 | Marks = 6,
772 | Choices = new List < Choice > {
773 | new Choice {
774 | Order = 1,
775 | Description = "True"
776 | },
777 | new Choice {
778 | Order = 2,
779 | Description = "False"
780 | }
781 | }
782 | },
783 | new Question {
784 | Title = "Q #43: In DCT, the value T(0, 0) in the transformation table is called the AC value",
785 | CorrectAnswer = 1,
786 | Marks = 3,
787 | Choices = new List < Choice > {
788 | new Choice {
789 | Order = 1,
790 | Description = "True"
791 | },
792 | new Choice {
793 | Order = 2,
794 | Description = "False"
795 | }
796 | }
797 | },
798 | new Question {
799 | Title = "Q #44: In DCT, the value T(0, 0) in the transformation table is called the DC value",
800 | CorrectAnswer = 1,
801 | Marks = 6,
802 | Choices = new List < Choice > {
803 | new Choice {
804 | Order = 1,
805 | Description = "True"
806 | },
807 | new Choice {
808 | Order = 2,
809 | Description = "False"
810 | }
811 | }
812 | },
813 | new Question {
814 | Title = "Q #45: In DCT, the value T(m, n), exluding the value T(0, 0) in the transformation table, is called the AC value",
815 | CorrectAnswer = 1,
816 | Marks = 7,
817 | Choices = new List < Choice > {
818 | new Choice {
819 | Order = 1,
820 | Description = "True"
821 | },
822 | new Choice {
823 | Order = 2,
824 | Description = "False"
825 | }
826 | }
827 | },
828 | new Question {
829 | Title = "Q #46: In DCT, the DC values are the changes in the colours of the pixels",
830 | CorrectAnswer = 1,
831 | Marks = 3,
832 | Choices = new List < Choice > {
833 | new Choice {
834 | Order = 1,
835 | Description = "True"
836 | },
837 | new Choice {
838 | Order = 2,
839 | Description = "False"
840 | }
841 | }
842 | },
843 | new Question {
844 | Title = "Q #47: In DCT, the DC value is the average value (multiplied by a constant) of the pixels",
845 | CorrectAnswer = 1,
846 | Marks = 9,
847 | Choices = new List < Choice > {
848 | new Choice {
849 | Order = 1,
850 | Description = "True"
851 | },
852 | new Choice {
853 | Order = 2,
854 | Description = "False"
855 | }
856 | }
857 | },
858 | new Question {
859 | Title = "Q #48: JPEG compression is called \"lossy\" because of the",
860 | CorrectAnswer = 1,
861 | Marks = 3,
862 | Choices = new List < Choice > {
863 | new Choice {
864 | Order = 1,
865 | Description = "DCT phase"
866 | },
867 | new Choice {
868 | Order = 2,
869 | Description = "Quantization phase"
870 | },
871 | new Choice {
872 | Order = 3,
873 | Description = "Compression phase"
874 | },
875 | new Choice {
876 | Order = 4,
877 | Description = "JPEG is not \"lossy\""
878 | }
879 | }
880 | },
881 | new Question {
882 | Title = "Q #49: For JPEG compression, the compression phase is read",
883 | CorrectAnswer = 1,
884 | Marks = 1,
885 | Choices = new List < Choice > {
886 | new Choice {
887 | Order = 1,
888 | Description = "In a zigzag fashion"
889 | },
890 | new Choice {
891 | Order = 2,
892 | Description = "Row by row"
893 | },
894 | new Choice {
895 | Order = 3,
896 | Description = "Column by column"
897 | }
898 | }
899 | },
900 | new Question {
901 | Title = "Q #50: Compressing video means spatially compressing each frame and temporally compressing a set of frames",
902 | CorrectAnswer = 1,
903 | Marks = 4,
904 | Choices = new List < Choice > {
905 | new Choice {
906 | Order = 1,
907 | Description = "True"
908 | },
909 | new Choice {
910 | Order = 2,
911 | Description = "False"
912 | }
913 | }
914 | },
915 | new Question {
916 | Title = "Q #51: Spatial compression in MPEG is done with JPEG (or a modification of it)",
917 | CorrectAnswer = 1,
918 | Marks = 8,
919 | Choices = new List < Choice > {
920 | new Choice {
921 | Order = 1,
922 | Description = "True"
923 | },
924 | new Choice {
925 | Order = 2,
926 | Description = "False"
927 | }
928 | }
929 | },
930 | new Question {
931 | Title = "Q #52: Spatial compression in MPEG is done with PNG",
932 | CorrectAnswer = 1,
933 | Marks = 8,
934 | Choices = new List < Choice > {
935 | new Choice {
936 | Order = 1,
937 | Description = "True"
938 | },
939 | new Choice {
940 | Order = 2,
941 | Description = "False"
942 | }
943 | }
944 | },
945 | new Question {
946 | Title = "Q #53: The 3 categories that MPEG divides its frames into are",
947 | CorrectAnswer = 1,
948 | Marks = 1,
949 | Choices = new List < Choice > {
950 | new Choice {
951 | Order = 1,
952 | Description = "I-frames, P-frames, and B-frames"
953 | },
954 | new Choice {
955 | Order = 2,
956 | Description = "A-frames, B-frames, and C-frames"
957 | },
958 | new Choice {
959 | Order = 3,
960 | Description = "B-frames, P-frames, and R-frames"
961 | },
962 | new Choice {
963 | Order = 4,
964 | Description = "T-frames, I-frames, and B-frames"
965 | }
966 | }
967 | },
968 | new Question {
969 | Title = "Q #54: ___________ is an independent frame that is not related to any other frame",
970 | CorrectAnswer = 1,
971 | Marks = 1,
972 | Choices = new List < Choice > {
973 | new Choice {
974 | Order = 1,
975 | Description = "I-frames"
976 | },
977 | new Choice {
978 | Order = 2,
979 | Description = "P-frames"
980 | },
981 | new Choice {
982 | Order = 3,
983 | Description = "B-frames"
984 | }
985 | }
986 | },
987 | new Question {
988 | Title = "Q #55: ___________ is predicted frame that is related to the preceding frame",
989 | CorrectAnswer = 1,
990 | Marks = 2,
991 | Choices = new List < Choice > {
992 | new Choice {
993 | Order = 1,
994 | Description = "I-frames"
995 | },
996 | new Choice {
997 | Order = 2,
998 | Description = "P-frames"
999 | },
1000 | new Choice {
1001 | Order = 3,
1002 | Description = "B-frames"
1003 | }
1004 | }
1005 | },
1006 | new Question {
1007 | Title = "Q #56: ___________ is a bidirectional frame that is related to the preceding and following frame",
1008 | CorrectAnswer = 1,
1009 | Marks = 7,
1010 | Choices = new List < Choice > {
1011 | new Choice {
1012 | Order = 1,
1013 | Description = "I-frames"
1014 | },
1015 | new Choice {
1016 | Order = 2,
1017 | Description = "P-frames"
1018 | },
1019 | new Choice {
1020 | Order = 3,
1021 | Description = "B-frames"
1022 | }
1023 | }
1024 | },
1025 | new Question {
1026 | Title = "Q #57: A B-frame can be related to another B-frame",
1027 | CorrectAnswer = 1,
1028 | Marks = 7,
1029 | Choices = new List < Choice > {
1030 | new Choice {
1031 | Order = 1,
1032 | Description = "True"
1033 | },
1034 | new Choice {
1035 | Order = 2,
1036 | Description = "False"
1037 | }
1038 | }
1039 | },
1040 | new Question {
1041 | Title = "Q #58: A P-frame can be related to an I-frame",
1042 | CorrectAnswer = 1,
1043 | Marks = 1,
1044 | Choices = new List < Choice > {
1045 | new Choice {
1046 | Order = 1,
1047 | Description = "True"
1048 | },
1049 | new Choice {
1050 | Order = 2,
1051 | Description = "False"
1052 | }
1053 | }
1054 | },
1055 | new Question {
1056 | Title = "Q #59: When using only a web server to download an audio/video file, the file can be played before the downloading has finished",
1057 | CorrectAnswer = 1,
1058 | Marks = 1,
1059 | Choices = new List < Choice > {
1060 | new Choice {
1061 | Order = 1,
1062 | Description = "True"
1063 | },
1064 | new Choice {
1065 | Order = 2,
1066 | Description = "False"
1067 | }
1068 | }
1069 | },
1070 | new Question {
1071 | Title = "Q #60: When using a web server with a metafile to download an audio/video file, the media player is directly connected to the Web server for downloading the file",
1072 | CorrectAnswer = 1,
1073 | Marks = 6,
1074 | Choices = new List < Choice > {
1075 | new Choice {
1076 | Order = 1,
1077 | Description = "True"
1078 | },
1079 | new Choice {
1080 | Order = 2,
1081 | Description = "False"
1082 | }
1083 | }
1084 | },
1085 | new Question {
1086 | Title = "Q #61: When using a web server with a metafile to download an audio/video file, the Web server only stores the actual audio/video file",
1087 | CorrectAnswer = 1,
1088 | Marks = 6,
1089 | Choices = new List < Choice > {
1090 | new Choice {
1091 | Order = 1,
1092 | Description = "True"
1093 | },
1094 | new Choice {
1095 | Order = 2,
1096 | Description = "False"
1097 | }
1098 | }
1099 | },
1100 | new Question {
1101 | Title = "Q #62: A problem when using a web server with a metafile to download an audio/video file is that the browser and media player both use HTTP. ",
1102 | CorrectAnswer = 1,
1103 | Marks = 2,
1104 | Choices = new List < Choice > {
1105 | new Choice {
1106 | Order = 1,
1107 | Description = "True"
1108 | },
1109 | new Choice {
1110 | Order = 2,
1111 | Description = "False"
1112 | }
1113 | }
1114 | },
1115 | new Question {
1116 | Title = "Q #63: When using a web server with a media server to download an audio/video file, the media player uses the URL in the metafile to access the media server to download the file",
1117 | CorrectAnswer = 1,
1118 | Marks = 2,
1119 | Choices = new List < Choice > {
1120 | new Choice {
1121 | Order = 1,
1122 | Description = "True"
1123 | },
1124 | new Choice {
1125 | Order = 2,
1126 | Description = "False"
1127 | }
1128 | }
1129 | },
1130 | new Question {
1131 | Title = "Q #64: The protocol used to download a file from a web server to your browser should utilize TCP, in case a damaged file needs to be retransmitted",
1132 | CorrectAnswer = 1,
1133 | Marks = 4,
1134 | Choices = new List < Choice > {
1135 | new Choice {
1136 | Order = 1,
1137 | Description = "True"
1138 | },
1139 | new Choice {
1140 | Order = 2,
1141 | Description = "False"
1142 | }
1143 | }
1144 | },
1145 | new Question {
1146 | Title = "Q #65: Real-Time Streaming Protocol is an in-band control protocol",
1147 | CorrectAnswer = 1,
1148 | Marks = 8,
1149 | Choices = new List < Choice > {
1150 | new Choice {
1151 | Order = 1,
1152 | Description = "True"
1153 | },
1154 | new Choice {
1155 | Order = 2,
1156 | Description = "False"
1157 | }
1158 | }
1159 | },
1160 | new Question {
1161 | Title = "Q #66: Real-Time Streaming Protocol is an out-of-band control protocol",
1162 | CorrectAnswer = 1,
1163 | Marks = 3,
1164 | Choices = new List < Choice > {
1165 | new Choice {
1166 | Order = 1,
1167 | Description = "True"
1168 | },
1169 | new Choice {
1170 | Order = 2,
1171 | Description = "False"
1172 | }
1173 | }
1174 | },
1175 | new Question {
1176 | Title = "Q #67: Real-Time Streaming Protocol is used to",
1177 | CorrectAnswer = 1,
1178 | Marks = 4,
1179 | Choices = new List < Choice > {
1180 | new Choice {
1181 | Order = 1,
1182 | Description = "Control the playing of audio/video"
1183 | },
1184 | new Choice {
1185 | Order = 2,
1186 | Description = "Display the video in a video player"
1187 | },
1188 | new Choice {
1189 | Order = 3,
1190 | Description = "Compress the video so that it can be efficiently downloaded from a web server"
1191 | },
1192 | new Choice {
1193 | Order = 4,
1194 | Description = "Allow users to interact with another user through the Internet"
1195 | }
1196 | }
1197 | },
1198 | new Question {
1199 | Title = "Q #68: Real-Time Streaming Protocol defines a compression scheme for audio and video",
1200 | CorrectAnswer = 1,
1201 | Marks = 2,
1202 | Choices = new List < Choice > {
1203 | new Choice {
1204 | Order = 1,
1205 | Description = "True"
1206 | },
1207 | new Choice {
1208 | Order = 2,
1209 | Description = "False"
1210 | }
1211 | }
1212 | },
1213 | new Question {
1214 | Title = "Q #69: Real-Time Streaming Protocol does not define how audio and video are encapsulated in packets for transmission over a network",
1215 | CorrectAnswer = 1,
1216 | Marks = 3,
1217 | Choices = new List < Choice > {
1218 | new Choice {
1219 | Order = 1,
1220 | Description = "True"
1221 | },
1222 | new Choice {
1223 | Order = 2,
1224 | Description = "False"
1225 | }
1226 | }
1227 | },
1228 | new Question {
1229 | Title = "Q #70: Real-Time Streaming Protocol can only be transported using UDP",
1230 | CorrectAnswer = 1,
1231 | Marks = 4,
1232 | Choices = new List < Choice > {
1233 | new Choice {
1234 | Order = 1,
1235 | Description = "True"
1236 | },
1237 | new Choice {
1238 | Order = 2,
1239 | Description = "False"
1240 | }
1241 | }
1242 | },
1243 | new Question {
1244 | Title = "Q #71: Real-Time Streaming Protocol does not restrict how the media player buffers the audio/video",
1245 | CorrectAnswer = 1,
1246 | Marks = 4,
1247 | Choices = new List < Choice > {
1248 | new Choice {
1249 | Order = 1,
1250 | Description = "True"
1251 | },
1252 | new Choice {
1253 | Order = 2,
1254 | Description = "False"
1255 | }
1256 | }
1257 | },
1258 | new Question {
1259 | Title = "Q #72: The media stream used when streaming a video from a web server is considered in-band",
1260 | CorrectAnswer = 1,
1261 | Marks = 5,
1262 | Choices = new List < Choice > {
1263 | new Choice {
1264 | Order = 1,
1265 | Description = "True"
1266 | },
1267 | new Choice {
1268 | Order = 2,
1269 | Description = "False"
1270 | }
1271 | }
1272 | },
1273 | new Question {
1274 | Title = "Q #73: Streaming ________ audio/video is multicast",
1275 | CorrectAnswer = 1,
1276 | Marks = 7,
1277 | Choices = new List < Choice > {
1278 | new Choice {
1279 | Order = 1,
1280 | Description = "Stored"
1281 | },
1282 | new Choice {
1283 | Order = 2,
1284 | Description = "Live"
1285 | }
1286 | }
1287 | },
1288 | new Question {
1289 | Title = "Q #74: Streaming ________ audio/video is unicast",
1290 | CorrectAnswer = 1,
1291 | Marks = 9,
1292 | Choices = new List < Choice > {
1293 | new Choice {
1294 | Order = 1,
1295 | Description = "Stored"
1296 | },
1297 | new Choice {
1298 | Order = 2,
1299 | Description = "Live"
1300 | }
1301 | }
1302 | },
1303 | new Question {
1304 | Title = "Q #75: When using real-time interactive audio/video, the time relationship between the packets is preserved",
1305 | CorrectAnswer = 1,
1306 | Marks = 3,
1307 | Choices = new List < Choice > {
1308 | new Choice {
1309 | Order = 1,
1310 | Description = "True"
1311 | },
1312 | new Choice {
1313 | Order = 2,
1314 | Description = "False"
1315 | }
1316 | }
1317 | },
1318 | new Question {
1319 | Title = "Q #76: Jitter is the variation of packet delay",
1320 | CorrectAnswer = 1,
1321 | Marks = 3,
1322 | Choices = new List < Choice > {
1323 | new Choice {
1324 | Order = 1,
1325 | Description = "True"
1326 | },
1327 | new Choice {
1328 | Order = 2,
1329 | Description = "False"
1330 | }
1331 | }
1332 | },
1333 | new Question {
1334 | Title = "Q #77: Real-time traffic in interactive audio/video does not require a playback buffer",
1335 | CorrectAnswer = 1,
1336 | Marks = 8,
1337 | Choices = new List < Choice > {
1338 | new Choice {
1339 | Order = 1,
1340 | Description = "True"
1341 | },
1342 | new Choice {
1343 | Order = 2,
1344 | Description = "False"
1345 | }
1346 | }
1347 | },
1348 | new Question {
1349 | Title = "Q #78: Client-side _______________________ compensate for delay jitter",
1350 | CorrectAnswer = 1,
1351 | Marks = 9,
1352 | Choices = new List < Choice > {
1353 | new Choice {
1354 | Order = 1,
1355 | Description = "Buffering"
1356 | },
1357 | new Choice {
1358 | Order = 2,
1359 | Description = "Playback delay"
1360 | },
1361 | new Choice {
1362 | Order = 3,
1363 | Description = "All of the above"
1364 | },
1365 | new Choice {
1366 | Order = 4,
1367 | Description = "None of the above"
1368 | }
1369 | }
1370 | },
1371 | new Question {
1372 | Title = "Q #79: RTP provides which of the following features for real-time interactive audio/video",
1373 | CorrectAnswer = 1,
1374 | Marks = 3,
1375 | Choices = new List < Choice > {
1376 | new Choice {
1377 | Order = 1,
1378 | Description = "Mixing, multicasting, ordering"
1379 | },
1380 | new Choice {
1381 | Order = 2,
1382 | Description = "Ordering, unicasting, mixing"
1383 | },
1384 | new Choice {
1385 | Order = 3,
1386 | Description = "Timing, multicasting, retransmission"
1387 | },
1388 | new Choice {
1389 | Order = 4,
1390 | Description = "Multicasting, unicasting, ordering"
1391 | }
1392 | }
1393 | },
1394 | new Question {
1395 | Title = "Q #80: TCP is used for real-time interactive multimedia",
1396 | CorrectAnswer = 1,
1397 | Marks = 8,
1398 | Choices = new List < Choice > {
1399 | new Choice {
1400 | Order = 1,
1401 | Description = "True"
1402 | },
1403 | new Choice {
1404 | Order = 2,
1405 | Description = "False"
1406 | }
1407 | }
1408 | },
1409 | new Question {
1410 | Title = "Q #81: What protocol is used for real-time interactive multimedia",
1411 | CorrectAnswer = 1,
1412 | Marks = 5,
1413 | Choices = new List < Choice > {
1414 | new Choice {
1415 | Order = 1,
1416 | Description = "RTP"
1417 | },
1418 | new Choice {
1419 | Order = 2,
1420 | Description = "UDP"
1421 | },
1422 | new Choice {
1423 | Order = 3,
1424 | Description = "TCP"
1425 | },
1426 | new Choice {
1427 | Order = 4,
1428 | Description = "RTP and UDP"
1429 | }
1430 | }
1431 | },
1432 | new Question {
1433 | Title = "Q #82: RTP does not have a delivery mechanism",
1434 | CorrectAnswer = 1,
1435 | Marks = 3,
1436 | Choices = new List < Choice > {
1437 | new Choice {
1438 | Order = 1,
1439 | Description = "True"
1440 | },
1441 | new Choice {
1442 | Order = 2,
1443 | Description = "False"
1444 | }
1445 | }
1446 | },
1447 | new Question {
1448 | Title = "Q #83: RTP runs beneath UDP",
1449 | CorrectAnswer = 1,
1450 | Marks = 7,
1451 | Choices = new List < Choice > {
1452 | new Choice {
1453 | Order = 1,
1454 | Description = "True"
1455 | },
1456 | new Choice {
1457 | Order = 2,
1458 | Description = "False"
1459 | }
1460 | }
1461 | },
1462 | new Question {
1463 | Title = "Q #84: RTP packet headers can have a maximum of 31 contributors because the 5-bit field allows the numbers 0-31",
1464 | CorrectAnswer = 1,
1465 | Marks = 7,
1466 | Choices = new List < Choice > {
1467 | new Choice {
1468 | Order = 1,
1469 | Description = "True"
1470 | },
1471 | new Choice {
1472 | Order = 2,
1473 | Description = "False"
1474 | }
1475 | }
1476 | },
1477 | new Question {
1478 | Title = "Q #85: The sender of a audio/video stream can change the encoding on the fly",
1479 | CorrectAnswer = 1,
1480 | Marks = 6,
1481 | Choices = new List < Choice > {
1482 | new Choice {
1483 | Order = 1,
1484 | Description = "True"
1485 | },
1486 | new Choice {
1487 | Order = 2,
1488 | Description = "False"
1489 | }
1490 | }
1491 | },
1492 | new Question {
1493 | Title = "Q #86: The initial sequence number of an RTP packet is 0, and is then incremented by 1 for each subsequent packet",
1494 | CorrectAnswer = 1,
1495 | Marks = 8,
1496 | Choices = new List < Choice > {
1497 | new Choice {
1498 | Order = 1,
1499 | Description = "True"
1500 | },
1501 | new Choice {
1502 | Order = 2,
1503 | Description = "False"
1504 | }
1505 | }
1506 | },
1507 | new Question {
1508 | Title = "Q #87: RTP packets add a SSRC field, which",
1509 | CorrectAnswer = 1,
1510 | Marks = 9,
1511 | Choices = new List < Choice > {
1512 | new Choice {
1513 | Order = 1,
1514 | Description = "Defines the source(s)"
1515 | },
1516 | new Choice {
1517 | Order = 2,
1518 | Description = "Defines the receiver(s)"
1519 | },
1520 | new Choice {
1521 | Order = 3,
1522 | Description = "Defines the packet quality"
1523 | },
1524 | new Choice {
1525 | Order = 4,
1526 | Description = "Defines the packet quantity"
1527 | }
1528 | }
1529 | },
1530 | new Question {
1531 | Title = "Q #88: RTCP works in conjunction with",
1532 | CorrectAnswer = 1,
1533 | Marks = 8,
1534 | Choices = new List < Choice > {
1535 | new Choice {
1536 | Order = 1,
1537 | Description = "RTP"
1538 | },
1539 | new Choice {
1540 | Order = 2,
1541 | Description = "UDP"
1542 | },
1543 | new Choice {
1544 | Order = 3,
1545 | Description = "TCP"
1546 | },
1547 | new Choice {
1548 | Order = 4,
1549 | Description = "RTSP"
1550 | }
1551 | }
1552 | },
1553 | new Question {
1554 | Title = "Q #89: RTCP is used when",
1555 | CorrectAnswer = 1,
1556 | Marks = 2,
1557 | Choices = new List < Choice > {
1558 | new Choice {
1559 | Order = 1,
1560 | Description = "The networking application multicasts audio/video to multiple receivers from one or more senders"
1561 | },
1562 | new Choice {
1563 | Order = 2,
1564 | Description = "The sender wants the receiver to have control the playback of the audio/video"
1565 | },
1566 | new Choice {
1567 | Order = 3,
1568 | Description = "The application controls who the audio/video is sent to"
1569 | },
1570 | new Choice {
1571 | Order = 4,
1572 | Description = "The network congestion prevents users from playing the streamed multimedia without buffering"
1573 | }
1574 | }
1575 | },
1576 | new Question {
1577 | Title = "Q #90: RTP and RTSP packets are distinguished from each other through the use of distinct port numbers",
1578 | CorrectAnswer = 1,
1579 | Marks = 8,
1580 | Choices = new List < Choice > {
1581 | new Choice {
1582 | Order = 1,
1583 | Description = "True"
1584 | },
1585 | new Choice {
1586 | Order = 2,
1587 | Description = "False"
1588 | }
1589 | }
1590 | },
1591 | new Question {
1592 | Title = "Q #91: RTP and RTCP packets are distinguished from each other through the use of distinct port numbers",
1593 | CorrectAnswer = 1,
1594 | Marks = 5,
1595 | Choices = new List < Choice > {
1596 | new Choice {
1597 | Order = 1,
1598 | Description = "True"
1599 | },
1600 | new Choice {
1601 | Order = 2,
1602 | Description = "False"
1603 | }
1604 | }
1605 | },
1606 | new Question {
1607 | Title = "Q #92: RTCP packets encapsulate chunks of audio or video",
1608 | CorrectAnswer = 1,
1609 | Marks = 4,
1610 | Choices = new List < Choice > {
1611 | new Choice {
1612 | Order = 1,
1613 | Description = "True"
1614 | },
1615 | new Choice {
1616 | Order = 2,
1617 | Description = "False"
1618 | }
1619 | }
1620 | },
1621 | new Question {
1622 | Title = "Q #93: RTCP packets contain sender and/or receiver reports",
1623 | CorrectAnswer = 1,
1624 | Marks = 7,
1625 | Choices = new List < Choice > {
1626 | new Choice {
1627 | Order = 1,
1628 | Description = "True"
1629 | },
1630 | new Choice {
1631 | Order = 2,
1632 | Description = "False"
1633 | }
1634 | }
1635 | },
1636 | new Question {
1637 | Title = "Q #94: RTCP __________________ are sent periodically by the active senders in a conference to report transmission and reception statistics for all RTP packets sent during the interval",
1638 | CorrectAnswer = 1,
1639 | Marks = 7,
1640 | Choices = new List < Choice > {
1641 | new Choice {
1642 | Order = 1,
1643 | Description = "Sender report packets"
1644 | },
1645 | new Choice {
1646 | Order = 2,
1647 | Description = "Receiver reception packets"
1648 | },
1649 | new Choice {
1650 | Order = 3,
1651 | Description = "Source description packets"
1652 | },
1653 | new Choice {
1654 | Order = 4,
1655 | Description = "Bye messages"
1656 | }
1657 | }
1658 | },
1659 | new Question {
1660 | Title = "Q #95: RTCP __________________ are for passive participants, those that do not send RTP packets. The report informs the sender and other receivers about the quality of service.",
1661 | CorrectAnswer = 1,
1662 | Marks = 4,
1663 | Choices = new List < Choice > {
1664 | new Choice {
1665 | Order = 1,
1666 | Description = "Sender report packets"
1667 | },
1668 | new Choice {
1669 | Order = 2,
1670 | Description = "Receiver reception packets"
1671 | },
1672 | new Choice {
1673 | Order = 3,
1674 | Description = "Source description packets"
1675 | },
1676 | new Choice {
1677 | Order = 4,
1678 | Description = "Bye messages"
1679 | }
1680 | }
1681 | },
1682 | new Question {
1683 | Title = "Q #96: RTCP __________________ can include the email address of the sender, the sender's name, and the application that generates the RTP stream",
1684 | CorrectAnswer = 1,
1685 | Marks = 9,
1686 | Choices = new List < Choice > {
1687 | new Choice {
1688 | Order = 1,
1689 | Description = "Sender report packets"
1690 | },
1691 | new Choice {
1692 | Order = 2,
1693 | Description = "Receiver reception packets"
1694 | },
1695 | new Choice {
1696 | Order = 3,
1697 | Description = "Source description packets"
1698 | },
1699 | new Choice {
1700 | Order = 4,
1701 | Description = "Bye messages"
1702 | }
1703 | }
1704 | },
1705 | new Question {
1706 | Title = "Q #97: RTCP __________________ are for an application that wants to use new applications not defined in the standard. It allows the definition of a new message type.",
1707 | CorrectAnswer = 1,
1708 | Marks = 5,
1709 | Choices = new List < Choice > {
1710 | new Choice {
1711 | Order = 1,
1712 | Description = "Sender report packets"
1713 | },
1714 | new Choice {
1715 | Order = 2,
1716 | Description = "Receiver reception packets"
1717 | },
1718 | new Choice {
1719 | Order = 3,
1720 | Description = "Source description packets"
1721 | },
1722 | new Choice {
1723 | Order = 4,
1724 | Description = "Bye messages"
1725 | }
1726 | }
1727 | },
1728 | new Question {
1729 | Title = "Q #98: RTCP __________________ are messages that shut down a stream",
1730 | CorrectAnswer = 1,
1731 | Marks = 8,
1732 | Choices = new List < Choice > {
1733 | new Choice {
1734 | Order = 1,
1735 | Description = "Sender report packets"
1736 | },
1737 | new Choice {
1738 | Order = 2,
1739 | Description = "Receiver reception packets"
1740 | },
1741 | new Choice {
1742 | Order = 3,
1743 | Description = "Source description packets"
1744 | },
1745 | new Choice {
1746 | Order = 4,
1747 | Description = "Bye messages"
1748 | }
1749 | }
1750 | },
1751 | new Question {
1752 | Title = "Q #99: RTP port numbers must be",
1753 | CorrectAnswer = 1,
1754 | Marks = 8,
1755 | Choices = new List < Choice > {
1756 | new Choice {
1757 | Order = 1,
1758 | Description = "An even number"
1759 | },
1760 | new Choice {
1761 | Order = 2,
1762 | Description = "An odd number"
1763 | },
1764 | new Choice {
1765 | Order = 3,
1766 | Description = "A prime number"
1767 | }
1768 | }
1769 | },
1770 | new Question {
1771 | Title = "Q #100: RTCP port numbers must be",
1772 | CorrectAnswer = 1,
1773 | Marks = 5,
1774 | Choices = new List < Choice > {
1775 | new Choice {
1776 | Order = 1,
1777 | Description = "An even number"
1778 | },
1779 | new Choice {
1780 | Order = 2,
1781 | Description = "An odd number"
1782 | },
1783 | new Choice {
1784 | Order = 3,
1785 | Description = "A prime number"
1786 | }
1787 | }
1788 | },
1789 | new Question {
1790 | Title = "Q #101: RTP port numbers must immediately follow a RTCP port number",
1791 | CorrectAnswer = 1,
1792 | Marks = 9,
1793 | Choices = new List < Choice > {
1794 | new Choice {
1795 | Order = 1,
1796 | Description = "True"
1797 | },
1798 | new Choice {
1799 | Order = 2,
1800 | Description = "False"
1801 | }
1802 | }
1803 | },
1804 | new Question {
1805 | Title = "Q #102: VoIP allows communication between two parties over a ___________ network",
1806 | CorrectAnswer = 1,
1807 | Marks = 7,
1808 | Choices = new List < Choice > {
1809 | new Choice {
1810 | Order = 1,
1811 | Description = "Packet-switched"
1812 | },
1813 | new Choice {
1814 | Order = 2,
1815 | Description = "Circuit-switched"
1816 | }
1817 | }
1818 | },
1819 | new Question {
1820 | Title = "Q #103: What is session initiation protocol (SIP)?",
1821 | CorrectAnswer = 1,
1822 | Marks = 9,
1823 | Choices = new List < Choice > {
1824 | new Choice {
1825 | Order = 1,
1826 | Description = "It is a standard that allows telephones on the public telephone network to talk to computers connected to the internet"
1827 | },
1828 | new Choice {
1829 | Order = 2,
1830 | Description = "It is an application layer protocol that establishes, manages, and terminates a multimedia session (call)"
1831 | },
1832 | new Choice {
1833 | Order = 3,
1834 | Description = "It is a method for implementing virtual private networks"
1835 | },
1836 | new Choice {
1837 | Order = 4,
1838 | Description = "It lets a server and client have multiple conversations over a single TCP connection"
1839 | }
1840 | }
1841 | },
1842 | new Question {
1843 | Title = "Q #104: SIP is a text-based protocol",
1844 | CorrectAnswer = 1,
1845 | Marks = 7,
1846 | Choices = new List < Choice > {
1847 | new Choice {
1848 | Order = 1,
1849 | Description = "True"
1850 | },
1851 | new Choice {
1852 | Order = 2,
1853 | Description = "False"
1854 | }
1855 | }
1856 | },
1857 | new Question {
1858 | Title = "Q #105: SIP defines the following messages",
1859 | CorrectAnswer = 1,
1860 | Marks = 1,
1861 | Choices = new List < Choice > {
1862 | new Choice {
1863 | Order = 1,
1864 | Description = "INVITE, ACK, BYE, OPTIONS, CANCEL, REGISTER"
1865 | },
1866 | new Choice {
1867 | Order = 2,
1868 | Description = "PING, RECEIVE, END, MESSAGE, CREATE, BYE"
1869 | },
1870 | new Choice {
1871 | Order = 3,
1872 | Description = "CREATE, RESTORE, ACK, RECEIVE, CANCEL, INVITE"
1873 | },
1874 | new Choice {
1875 | Order = 4,
1876 | Description = "HELO, ACK, WAIT, OPTIONS, BYE, CANCEL, LOGIN"
1877 | }
1878 | }
1879 | },
1880 | new Question {
1881 | Title = "Q #106: Which of the following is a valid SIP address?",
1882 | CorrectAnswer = 1,
1883 | Marks = 4,
1884 | Choices = new List < Choice > {
1885 | new Choice {
1886 | Order = 1,
1887 | Description = "Sip:tom@201.23.45.78"
1888 | },
1889 | new Choice {
1890 | Order = 2,
1891 | Description = "Sip@tom:fhda.edu"
1892 | },
1893 | new Choice {
1894 | Order = 3,
1895 | Description = "201.23.45.78@sip:tom"
1896 | },
1897 | new Choice {
1898 | Order = 4,
1899 | Description = "Fhda.edu:sip@tom"
1900 | }
1901 | }
1902 | },
1903 | new Question {
1904 | Title = "Q #107: Establishing a session in SIP requires a",
1905 | CorrectAnswer = 1,
1906 | Marks = 2,
1907 | Choices = new List < Choice > {
1908 | new Choice {
1909 | Order = 1,
1910 | Description = "2 way handshake"
1911 | },
1912 | new Choice {
1913 | Order = 2,
1914 | Description = "3 way handshake"
1915 | },
1916 | new Choice {
1917 | Order = 3,
1918 | Description = "4 way handshake"
1919 | },
1920 | new Choice {
1921 | Order = 4,
1922 | Description = "5 way handshake"
1923 | }
1924 | }
1925 | },
1926 | new Question {
1927 | Title = "Q #108: A SIP session is terminated with the CANCEL message sent by either party",
1928 | CorrectAnswer = 1,
1929 | Marks = 2,
1930 | Choices = new List < Choice > {
1931 | new Choice {
1932 | Order = 1,
1933 | Description = "True"
1934 | },
1935 | new Choice {
1936 | Order = 2,
1937 | Description = "False"
1938 | }
1939 | }
1940 | },
1941 | new Question {
1942 | Title = "Q #109: What is H.323?",
1943 | CorrectAnswer = 1,
1944 | Marks = 7,
1945 | Choices = new List < Choice > {
1946 | new Choice {
1947 | Order = 1,
1948 | Description = "It is a standard that allows telephones on the public telephone network to talk to computers connected to the internet"
1949 | },
1950 | new Choice {
1951 | Order = 2,
1952 | Description = "It is an application layer protocol that establishes, manages, and terminates a multimedia session (call)."
1953 | },
1954 | new Choice {
1955 | Order = 3,
1956 | Description = "It defines a set of quality-of-service enhancements for wireless LAN applications through modifications to the Media Access Control (MAC) layer"
1957 | },
1958 | new Choice {
1959 | Order = 4,
1960 | Description = "It is designed to compensate for the differences between traditional packet-less communications over analog lines and packet-based transmissions which are the basis for IP communications"
1961 | }
1962 | }
1963 | },
1964 | new Question {
1965 | Title = "Q #110: What is a gateway?",
1966 | CorrectAnswer = 1,
1967 | Marks = 8,
1968 | Choices = new List < Choice > {
1969 | new Choice {
1970 | Order = 1,
1971 | Description = "It connects the Internet to the telephone network"
1972 | },
1973 | new Choice {
1974 | Order = 2,
1975 | Description = "It is a running instance of an application capable of accepting requests from the client and giving responses accordingly"
1976 | },
1977 | new Choice {
1978 | Order = 3,
1979 | Description = "It is an endpoint of an inter-process communication flow across a computer network"
1980 | }
1981 | }
1982 | },
1983 | new Question {
1984 | Title = "Q #111: Which of the following are characteristic types attributed to flow",
1985 | CorrectAnswer = 1,
1986 | Marks = 9,
1987 | Choices = new List < Choice > {
1988 | new Choice {
1989 | Order = 1,
1990 | Description = "Reliability"
1991 | },
1992 | new Choice {
1993 | Order = 2,
1994 | Description = "Delay"
1995 | },
1996 | new Choice {
1997 | Order = 3,
1998 | Description = "Jitter"
1999 | },
2000 | new Choice {
2001 | Order = 4,
2002 | Description = "Bandwidth"
2003 | }
2004 | }
2005 | },
2006 | new Question {
2007 | Title = "Q #112: Network loss happens when the packet arrives too late for playback at the receiver",
2008 | CorrectAnswer = 1,
2009 | Marks = 7,
2010 | Choices = new List < Choice > {
2011 | new Choice {
2012 | Order = 1,
2013 | Description = "True"
2014 | },
2015 | new Choice {
2016 | Order = 2,
2017 | Description = "False"
2018 | }
2019 | }
2020 | },
2021 | new Question {
2022 | Title = "Q #113: End-to-End Delay loss happens when the packet arrives too late for playback at the receiver",
2023 | CorrectAnswer = 1,
2024 | Marks = 8,
2025 | Choices = new List < Choice > {
2026 | new Choice {
2027 | Order = 1,
2028 | Description = "True"
2029 | },
2030 | new Choice {
2031 | Order = 2,
2032 | Description = "False"
2033 | }
2034 | }
2035 | },
2036 | new Question {
2037 | Title = "Q #114: Multimedia networking applications are typically highly sensitive to delay",
2038 | CorrectAnswer = 1,
2039 | Marks = 3,
2040 | Choices = new List < Choice > {
2041 | new Choice {
2042 | Order = 1,
2043 | Description = "True"
2044 | },
2045 | new Choice {
2046 | Order = 2,
2047 | Description = "False"
2048 | }
2049 | }
2050 | },
2051 | new Question {
2052 | Title = "Q #115: _____________ is/are needed for routers to distingush between different classes",
2053 | CorrectAnswer = 1,
2054 | Marks = 1,
2055 | Choices = new List < Choice > {
2056 | new Choice {
2057 | Order = 1,
2058 | Description = "Packet marking"
2059 | },
2060 | new Choice {
2061 | Order = 2,
2062 | Description = "Timestamps"
2063 | },
2064 | new Choice {
2065 | Order = 3,
2066 | Description = "Network marking"
2067 | },
2068 | new Choice {
2069 | Order = 4,
2070 | Description = "Packet naming"
2071 | }
2072 | }
2073 | },
2074 | new Question {
2075 | Title = "Q #116: _____________ is a technique used for controlling errors in data transmission over unreliable or noisy communication channels",
2076 | CorrectAnswer = 1,
2077 | Marks = 4,
2078 | Choices = new List < Choice > {
2079 | new Choice {
2080 | Order = 1,
2081 | Description = "Interleaving"
2082 | },
2083 | new Choice {
2084 | Order = 2,
2085 | Description = "Forward-error correction"
2086 | },
2087 | new Choice {
2088 | Order = 3,
2089 | Description = "Network smoothing"
2090 | },
2091 | new Choice {
2092 | Order = 4,
2093 | Description = "Packet rescue"
2094 | }
2095 | }
2096 | },
2097 | new Question {
2098 | Title = "Q #117: A tradeoff with interleaving is that when we increase the value of n, there is less bandwidth waste and a higher probability that 2 or more chunks will be lost",
2099 | CorrectAnswer = 1,
2100 | Marks = 4,
2101 | Choices = new List < Choice > {
2102 | new Choice {
2103 | Order = 1,
2104 | Description = "True"
2105 | },
2106 | new Choice {
2107 | Order = 2,
2108 | Description = "False"
2109 | }
2110 | }
2111 | },
2112 | new Question {
2113 | Title = "Q #118: One technique for forward-error correction is for every group of N chunks create redundant chunk by exclusive ORing N original chunks",
2114 | CorrectAnswer = 1,
2115 | Marks = 5,
2116 | Choices = new List < Choice > {
2117 | new Choice {
2118 | Order = 1,
2119 | Description = "True"
2120 | },
2121 | new Choice {
2122 | Order = 2,
2123 | Description = "False"
2124 | }
2125 | }
2126 | },
2127 | new Question {
2128 | Title = "Q #119: Interleaving is a technique where the idea is to send a lower quality audio stream as the redundant information with the nominal stream",
2129 | CorrectAnswer = 1,
2130 | Marks = 7,
2131 | Choices = new List < Choice > {
2132 | new Choice {
2133 | Order = 1,
2134 | Description = "True"
2135 | },
2136 | new Choice {
2137 | Order = 2,
2138 | Description = "False"
2139 | }
2140 | }
2141 | },
2142 | new Question {
2143 | Title = "Q #120: Interleaving is a technique where the sender re-sequences units of audio data before transmission, so that originally adjacent units are separated by a certain distance in the transmitted stream",
2144 | CorrectAnswer = 1,
2145 | Marks = 9,
2146 | Choices = new List < Choice > {
2147 | new Choice {
2148 | Order = 1,
2149 | Description = "True"
2150 | },
2151 | new Choice {
2152 | Order = 2,
2153 | Description = "False"
2154 | }
2155 | }
2156 | },
2157 | new Question {
2158 | Title = "Q #121: An advantage for interleaving is that it decreases latency",
2159 | CorrectAnswer = 1,
2160 | Marks = 3,
2161 | Choices = new List < Choice > {
2162 | new Choice {
2163 | Order = 1,
2164 | Description = "True"
2165 | },
2166 | new Choice {
2167 | Order = 2,
2168 | Description = "False"
2169 | }
2170 | }
2171 | },
2172 | new Question {
2173 | Title = "Q #122: ______________ is where packets wait in a buffer (queue) until the node (router or switch) is ready to process them.",
2174 | CorrectAnswer = 1,
2175 | Marks = 6,
2176 | Choices = new List < Choice > {
2177 | new Choice {
2178 | Order = 1,
2179 | Description = "FIFO queuing"
2180 | },
2181 | new Choice {
2182 | Order = 2,
2183 | Description = "Priority queuing"
2184 | },
2185 | new Choice {
2186 | Order = 3,
2187 | Description = "Weighted fair queuing"
2188 | }
2189 | }
2190 | },
2191 | new Question {
2192 | Title = "Q #123: ______________ is where packets are first assigned to a priority class. Each priority class has its own queue. The packets in the highest-priority queue are processed first. Packets in the lowest-priority queue are processed last",
2193 | CorrectAnswer = 1,
2194 | Marks = 1,
2195 | Choices = new List < Choice > {
2196 | new Choice {
2197 | Order = 1,
2198 | Description = "FIFO queuing"
2199 | },
2200 | new Choice {
2201 | Order = 2,
2202 | Description = "Priority queuing"
2203 | },
2204 | new Choice {
2205 | Order = 3,
2206 | Description = "Weighted fair queuing"
2207 | }
2208 | }
2209 | },
2210 | new Question {
2211 | Title = "Q #124: ______________ is where packets are assigned to different classes and admitted to different queues. The system processes packets in each queue in a round-robin fashion with the number of packets selected from each queue based on the corresponding weight.",
2212 | CorrectAnswer = 1,
2213 | Marks = 5,
2214 | Choices = new List < Choice > {
2215 | new Choice {
2216 | Order = 1,
2217 | Description = "FIFO queuing"
2218 | },
2219 | new Choice {
2220 | Order = 2,
2221 | Description = "Priority queuing"
2222 | },
2223 | new Choice {
2224 | Order = 3,
2225 | Description = "Weighted fair queuing"
2226 | }
2227 | }
2228 | },
2229 | new Question {
2230 | Title = "Q #125: With priority queuing, the system does not stop serving a queue until it is empty",
2231 | CorrectAnswer = 1,
2232 | Marks = 8,
2233 | Choices = new List < Choice > {
2234 | new Choice {
2235 | Order = 1,
2236 | Description = "True"
2237 | },
2238 | new Choice {
2239 | Order = 2,
2240 | Description = "False"
2241 | }
2242 | }
2243 | },
2244 | new Question {
2245 | Title = "Q #126: What is traffic shaping?",
2246 | CorrectAnswer = 1,
2247 | Marks = 9,
2248 | Choices = new List < Choice > {
2249 | new Choice {
2250 | Order = 1,
2251 | Description = "A mechanism to control the amount and the rate of the traffic sent to the network"
2252 | },
2253 | new Choice {
2254 | Order = 2,
2255 | Description = "A way for the system to reduce the packet flow by preventing packets from entering specified subnets"
2256 | },
2257 | new Choice {
2258 | Order = 3,
2259 | Description = "A feature where a network creates fake packets to fill router buffers to prevent new packets from arriving"
2260 | },
2261 | new Choice {
2262 | Order = 4,
2263 | Description = "A mechanism where packets are scheduled to flow through a network at specified times"
2264 | }
2265 | }
2266 | },
2267 | new Question {
2268 | Title = "Q #127: What is a \"leaky bucket\"",
2269 | CorrectAnswer = 1,
2270 | Marks = 8,
2271 | Choices = new List < Choice > {
2272 | new Choice {
2273 | Order = 1,
2274 | Description = "It shapes bursty traffic into fixed-rate traffic by averaging the data rate"
2275 | },
2276 | new Choice {
2277 | Order = 2,
2278 | Description = "A mechanism that slowly eliminates packets from the network that have been looping continuously between routers"
2279 | },
2280 | new Choice {
2281 | Order = 3,
2282 | Description = "A tool for a web server to allow only 1 client at a time to download a audio/video file"
2283 | },
2284 | new Choice {
2285 | Order = 4,
2286 | Description = "A method where a packet is split up into individual bits, and sent across a network 1 bit at a time"
2287 | }
2288 | }
2289 | },
2290 | new Question {
2291 | Title = "Q #128: A leaky bucket may drop the packets if the bucket is full.",
2292 | CorrectAnswer = 1,
2293 | Marks = 9,
2294 | Choices = new List < Choice > {
2295 | new Choice {
2296 | Order = 1,
2297 | Description = "True"
2298 | },
2299 | new Choice {
2300 | Order = 2,
2301 | Description = "False"
2302 | }
2303 | }
2304 | },
2305 | new Question {
2306 | Title = "Q #129: The token bucket algorithm allows idle hosts to accumulate credit for the future in the form of tokens",
2307 | CorrectAnswer = 1,
2308 | Marks = 5,
2309 | Choices = new List < Choice > {
2310 | new Choice {
2311 | Order = 1,
2312 | Description = "True"
2313 | },
2314 | new Choice {
2315 | Order = 2,
2316 | Description = "False"
2317 | }
2318 | }
2319 | },
2320 | new Question {
2321 | Title = "Q #130: The ____________ allows bursty traffic at a regulated maximum rate",
2322 | CorrectAnswer = 1,
2323 | Marks = 3,
2324 | Choices = new List < Choice > {
2325 | new Choice {
2326 | Order = 1,
2327 | Description = "Token bucket"
2328 | },
2329 | new Choice {
2330 | Order = 2,
2331 | Description = "Leaky bucket"
2332 | },
2333 | new Choice {
2334 | Order = 3,
2335 | Description = "Half bucket"
2336 | },
2337 | new Choice {
2338 | Order = 4,
2339 | Description = "Maximum bucket"
2340 | }
2341 | }
2342 | },
2343 | new Question {
2344 | Title = "Q #131: What is a computer that can act as both a server and/or client?",
2345 | CorrectAnswer = 1,
2346 | Marks = 8,
2347 | Choices = new List < Choice > {
2348 | new Choice {
2349 | Order = 1,
2350 | Description = "Peer"
2351 | },
2352 | new Choice {
2353 | Order = 2,
2354 | Description = "Router"
2355 | },
2356 | new Choice {
2357 | Order = 3,
2358 | Description = "Seeder"
2359 | },
2360 | new Choice {
2361 | Order = 4,
2362 | Description = "Dedicated server"
2363 | }
2364 | }
2365 | },
2366 | new Question {
2367 | Title = "Q #132: A P2P system should consist of at least two or more peers",
2368 | CorrectAnswer = 1,
2369 | Marks = 9,
2370 | Choices = new List < Choice > {
2371 | new Choice {
2372 | Order = 1,
2373 | Description = "True"
2374 | },
2375 | new Choice {
2376 | Order = 2,
2377 | Description = "False"
2378 | }
2379 | }
2380 | },
2381 | new Question {
2382 | Title = "Q #133: Peers should be able to exchange resources directly between themselves",
2383 | CorrectAnswer = 1,
2384 | Marks = 2,
2385 | Choices = new List < Choice > {
2386 | new Choice {
2387 | Order = 1,
2388 | Description = "True"
2389 | },
2390 | new Choice {
2391 | Order = 2,
2392 | Description = "False"
2393 | }
2394 | }
2395 | },
2396 | new Question {
2397 | Title = "Q #134: P2P systems cannot utilize dedicated servers",
2398 | CorrectAnswer = 1,
2399 | Marks = 8,
2400 | Choices = new List < Choice > {
2401 | new Choice {
2402 | Order = 1,
2403 | Description = "True"
2404 | },
2405 | new Choice {
2406 | Order = 2,
2407 | Description = "False"
2408 | }
2409 | }
2410 | },
2411 | new Question {
2412 | Title = "Q #135: A \"pure\" P2P system is",
2413 | CorrectAnswer = 1,
2414 | Marks = 9,
2415 | Choices = new List < Choice > {
2416 | new Choice {
2417 | Order = 1,
2418 | Description = "A P2P system without dedicated servers"
2419 | },
2420 | new Choice {
2421 | Order = 2,
2422 | Description = "A P2P system that prevents leechers from using too much bandwidth"
2423 | },
2424 | new Choice {
2425 | Order = 3,
2426 | Description = "A P2P system with dedicated servers"
2427 | },
2428 | new Choice {
2429 | Order = 4,
2430 | Description = "A P2P system that uses a dedicated web server, along with a media server to stream audio/video"
2431 | }
2432 | }
2433 | },
2434 | new Question {
2435 | Title = "Q #136: Which of the following is not a benefit of P2P systems?",
2436 | CorrectAnswer = 1,
2437 | Marks = 8,
2438 | Choices = new List < Choice > {
2439 | new Choice {
2440 | Order = 1,
2441 | Description = "Workload is spread to all peers"
2442 | },
2443 | new Choice {
2444 | Order = 2,
2445 | Description = "Maximize system utilization"
2446 | },
2447 | new Choice {
2448 | Order = 3,
2449 | Description = "No central point of failure"
2450 | },
2451 | new Choice {
2452 | Order = 4,
2453 | Description = "Scalability"
2454 | }
2455 | }
2456 | },
2457 | new Question {
2458 | Title = "Q #137: It is easier to enforce standards in P2P systems compared to client-server systems",
2459 | CorrectAnswer = 1,
2460 | Marks = 3,
2461 | Choices = new List < Choice > {
2462 | new Choice {
2463 | Order = 1,
2464 | Description = "True"
2465 | },
2466 | new Choice {
2467 | Order = 2,
2468 | Description = "False"
2469 | }
2470 | }
2471 | },
2472 | new Question {
2473 | Title = "Q #138: Which of the following is not a P2P topology?",
2474 | CorrectAnswer = 1,
2475 | Marks = 1,
2476 | Choices = new List < Choice > {
2477 | new Choice {
2478 | Order = 1,
2479 | Description = "Centralized"
2480 | },
2481 | new Choice {
2482 | Order = 2,
2483 | Description = "Ring"
2484 | },
2485 | new Choice {
2486 | Order = 3,
2487 | Description = "Hierarchical"
2488 | },
2489 | new Choice {
2490 | Order = 4,
2491 | Description = "Decentralized"
2492 | }
2493 | }
2494 | },
2495 | new Question {
2496 | Title = "Q #139: Which of the following is the most popular P2P topology?",
2497 | CorrectAnswer = 1,
2498 | Marks = 6,
2499 | Choices = new List < Choice > {
2500 | new Choice {
2501 | Order = 1,
2502 | Description = "Centralized"
2503 | },
2504 | new Choice {
2505 | Order = 2,
2506 | Description = "Ring"
2507 | },
2508 | new Choice {
2509 | Order = 3,
2510 | Description = "Hierarchical"
2511 | },
2512 | new Choice {
2513 | Order = 4,
2514 | Description = "Decentralized"
2515 | }
2516 | }
2517 | },
2518 | new Question {
2519 | Title = "Q #140: Which P2P topology has a one centralized server with many connected clients?",
2520 | CorrectAnswer = 1,
2521 | Marks = 3,
2522 | Choices = new List < Choice > {
2523 | new Choice {
2524 | Order = 1,
2525 | Description = "Centralized"
2526 | },
2527 | new Choice {
2528 | Order = 2,
2529 | Description = "Ring"
2530 | },
2531 | new Choice {
2532 | Order = 3,
2533 | Description = "Hierarchical"
2534 | },
2535 | new Choice {
2536 | Order = 4,
2537 | Description = "Decentralized"
2538 | }
2539 | }
2540 | },
2541 | new Question {
2542 | Title = "Q #141: A single centralized server is usually able to handle high clients load",
2543 | CorrectAnswer = 1,
2544 | Marks = 7,
2545 | Choices = new List < Choice > {
2546 | new Choice {
2547 | Order = 1,
2548 | Description = "True"
2549 | },
2550 | new Choice {
2551 | Order = 2,
2552 | Description = "False"
2553 | }
2554 | }
2555 | },
2556 | new Question {
2557 | Title = "Q #142: Which P2P topology uses a cluster of machines arranged in a ring to act as distributed servers?",
2558 | CorrectAnswer = 1,
2559 | Marks = 8,
2560 | Choices = new List < Choice > {
2561 | new Choice {
2562 | Order = 1,
2563 | Description = "Centralized"
2564 | },
2565 | new Choice {
2566 | Order = 2,
2567 | Description = "Ring"
2568 | },
2569 | new Choice {
2570 | Order = 3,
2571 | Description = "Hierarchical"
2572 | },
2573 | new Choice {
2574 | Order = 4,
2575 | Description = "Decentralized"
2576 | }
2577 | }
2578 | },
2579 | new Question {
2580 | Title = "Q #143: Ring systems are generally built on the assumption that the machines are all nearby on the network",
2581 | CorrectAnswer = 1,
2582 | Marks = 1,
2583 | Choices = new List < Choice > {
2584 | new Choice {
2585 | Order = 1,
2586 | Description = "True"
2587 | },
2588 | new Choice {
2589 | Order = 2,
2590 | Description = "False"
2591 | }
2592 | }
2593 | },
2594 | new Question {
2595 | Title = "Q #144: Which P2P topology has a similar structure to the Domain Name Service (DNS)?",
2596 | CorrectAnswer = 1,
2597 | Marks = 3,
2598 | Choices = new List < Choice > {
2599 | new Choice {
2600 | Order = 1,
2601 | Description = "Centralized"
2602 | },
2603 | new Choice {
2604 | Order = 2,
2605 | Description = "Ring"
2606 | },
2607 | new Choice {
2608 | Order = 3,
2609 | Description = "Hierarchical"
2610 | },
2611 | new Choice {
2612 | Order = 4,
2613 | Description = "Decentralized"
2614 | }
2615 | }
2616 | },
2617 | new Question {
2618 | Title = "Q #145: Which P2P topology has a similar structure to the Network Time Protocol (NTP)?",
2619 | CorrectAnswer = 1,
2620 | Marks = 9,
2621 | Choices = new List < Choice > {
2622 | new Choice {
2623 | Order = 1,
2624 | Description = "Centralized"
2625 | },
2626 | new Choice {
2627 | Order = 2,
2628 | Description = "Ring"
2629 | },
2630 | new Choice {
2631 | Order = 3,
2632 | Description = "Hierarchical"
2633 | },
2634 | new Choice {
2635 | Order = 4,
2636 | Description = "Decentralized"
2637 | }
2638 | }
2639 | },
2640 | new Question {
2641 | Title = "Q #146: Which P2P topology allows all peers to communicate symmetrically, and have equal roles?",
2642 | CorrectAnswer = 1,
2643 | Marks = 7,
2644 | Choices = new List < Choice > {
2645 | new Choice {
2646 | Order = 1,
2647 | Description = "Centralized"
2648 | },
2649 | new Choice {
2650 | Order = 2,
2651 | Description = "Ring"
2652 | },
2653 | new Choice {
2654 | Order = 3,
2655 | Description = "Hierarchical"
2656 | },
2657 | new Choice {
2658 | Order = 4,
2659 | Description = "Decentralized"
2660 | }
2661 | }
2662 | },
2663 | new Question {
2664 | Title = "Q #147: Gnutella is an example of which P2P topology?",
2665 | CorrectAnswer = 1,
2666 | Marks = 6,
2667 | Choices = new List < Choice > {
2668 | new Choice {
2669 | Order = 1,
2670 | Description = "Centralized"
2671 | },
2672 | new Choice {
2673 | Order = 2,
2674 | Description = "Ring"
2675 | },
2676 | new Choice {
2677 | Order = 3,
2678 | Description = "Hierarchical"
2679 | },
2680 | new Choice {
2681 | Order = 4,
2682 | Description = "Decentralized"
2683 | }
2684 | }
2685 | },
2686 | new Question {
2687 | Title = "Q #148: Which of the following is a combination of several P2P topologies into one system?",
2688 | CorrectAnswer = 1,
2689 | Marks = 4,
2690 | Choices = new List < Choice > {
2691 | new Choice {
2692 | Order = 1,
2693 | Description = "Centralized"
2694 | },
2695 | new Choice {
2696 | Order = 2,
2697 | Description = "Ring"
2698 | },
2699 | new Choice {
2700 | Order = 3,
2701 | Description = "Hierarchical"
2702 | },
2703 | new Choice {
2704 | Order = 4,
2705 | Description = "Decentralized"
2706 | }
2707 | }
2708 | },
2709 | new Question {
2710 | Title = "Q #149: Which hybrid topology has a ring of servers acting as the main server, with many connected clients?",
2711 | CorrectAnswer = 1,
2712 | Marks = 7,
2713 | Choices = new List < Choice > {
2714 | new Choice {
2715 | Order = 1,
2716 | Description = "Centralized + Ring"
2717 | },
2718 | new Choice {
2719 | Order = 2,
2720 | Description = "Centralized + Hierarchical"
2721 | },
2722 | new Choice {
2723 | Order = 3,
2724 | Description = "Decentralized + Ring"
2725 | },
2726 | new Choice {
2727 | Order = 4,
2728 | Description = "Centralized + Decentralized"
2729 | }
2730 | }
2731 | },
2732 | new Question {
2733 | Title = "Q #150: Which hybrid topology has a set of supernodes, each with their own set of connected peers?",
2734 | CorrectAnswer = 1,
2735 | Marks = 1,
2736 | Choices = new List < Choice > {
2737 | new Choice {
2738 | Order = 1,
2739 | Description = "Centralized + Ring"
2740 | },
2741 | new Choice {
2742 | Order = 2,
2743 | Description = "Centralized + Hierarchical"
2744 | },
2745 | new Choice {
2746 | Order = 3,
2747 | Description = "Decentralized + Ring"
2748 | },
2749 | new Choice {
2750 | Order = 4,
2751 | Description = "Centralized + Decentralized"
2752 | }
2753 | }
2754 | },
2755 | new Question {
2756 | Title = "Q #151: Which of the following is not an attribute of a centralized P2P topology?",
2757 | CorrectAnswer = 1,
2758 | Marks = 5,
2759 | Choices = new List < Choice > {
2760 | new Choice {
2761 | Order = 1,
2762 | Description = "Managable"
2763 | },
2764 | new Choice {
2765 | Order = 2,
2766 | Description = "Coherent"
2767 | },
2768 | new Choice {
2769 | Order = 3,
2770 | Description = "Secure"
2771 | },
2772 | new Choice {
2773 | Order = 4,
2774 | Description = "Extensible"
2775 | }
2776 | }
2777 | },
2778 | new Question {
2779 | Title = "Q #152: Which of the following is an attribute of a centralized P2P topology?",
2780 | CorrectAnswer = 1,
2781 | Marks = 9,
2782 | Choices = new List < Choice > {
2783 | new Choice {
2784 | Order = 1,
2785 | Description = "Extensible"
2786 | },
2787 | new Choice {
2788 | Order = 2,
2789 | Description = "Fault Tolerant"
2790 | },
2791 | new Choice {
2792 | Order = 3,
2793 | Description = "Lawsuit-proof"
2794 | },
2795 | new Choice {
2796 | Order = 4,
2797 | Description = "Coherent"
2798 | }
2799 | }
2800 | },
2801 | new Question {
2802 | Title = "Q #153: Which of the following is not an attribute of a ring P2P topology?",
2803 | CorrectAnswer = 1,
2804 | Marks = 2,
2805 | Choices = new List < Choice > {
2806 | new Choice {
2807 | Order = 1,
2808 | Description = "Managable"
2809 | },
2810 | new Choice {
2811 | Order = 2,
2812 | Description = "Coherent"
2813 | },
2814 | new Choice {
2815 | Order = 3,
2816 | Description = "Secure"
2817 | },
2818 | new Choice {
2819 | Order = 4,
2820 | Description = "Fault Tolerant"
2821 | }
2822 | }
2823 | },
2824 | new Question {
2825 | Title = "Q #154: Which of the following is an attribute of a ring P2P topology?",
2826 | CorrectAnswer = 1,
2827 | Marks = 8,
2828 | Choices = new List < Choice > {
2829 | new Choice {
2830 | Order = 1,
2831 | Description = "Extensible"
2832 | },
2833 | new Choice {
2834 | Order = 2,
2835 | Description = "Fault Tolerant"
2836 | },
2837 | new Choice {
2838 | Order = 3,
2839 | Description = "Scalable"
2840 | }
2841 | }
2842 | },
2843 | new Question {
2844 | Title = "Q #155: Which of the following is not an attribute of a decentralized P2P topology?",
2845 | CorrectAnswer = 1,
2846 | Marks = 2,
2847 | Choices = new List < Choice > {
2848 | new Choice {
2849 | Order = 1,
2850 | Description = "Extensible"
2851 | },
2852 | new Choice {
2853 | Order = 2,
2854 | Description = "Lawsuit-proof"
2855 | },
2856 | new Choice {
2857 | Order = 3,
2858 | Description = "Managable"
2859 | },
2860 | new Choice {
2861 | Order = 4,
2862 | Description = "Fault Tolerant"
2863 | }
2864 | }
2865 | },
2866 | new Question {
2867 | Title = "Q #156: Which of the following is an attribute of a decentralized P2P topology?",
2868 | CorrectAnswer = 1,
2869 | Marks = 3,
2870 | Choices = new List < Choice > {
2871 | new Choice {
2872 | Order = 1,
2873 | Description = "Managable"
2874 | },
2875 | new Choice {
2876 | Order = 2,
2877 | Description = "Coherent"
2878 | },
2879 | new Choice {
2880 | Order = 3,
2881 | Description = "Secure"
2882 | },
2883 | new Choice {
2884 | Order = 4,
2885 | Description = "Extensible"
2886 | }
2887 | }
2888 | },
2889 | new Question {
2890 | Title = "Q #157: Which of the following is not an attribute of a centralized + ring hybrid P2P topology?",
2891 | CorrectAnswer = 1,
2892 | Marks = 7,
2893 | Choices = new List < Choice > {
2894 | new Choice {
2895 | Order = 1,
2896 | Description = "Managable"
2897 | },
2898 | new Choice {
2899 | Order = 2,
2900 | Description = "Coherent"
2901 | },
2902 | new Choice {
2903 | Order = 3,
2904 | Description = "Secure"
2905 | },
2906 | new Choice {
2907 | Order = 4,
2908 | Description = "Fault Tolerant"
2909 | }
2910 | }
2911 | },
2912 | new Question {
2913 | Title = "Q #158: Which of the following is an attribute of a centralized + ring hybrid P2P topology?",
2914 | CorrectAnswer = 1,
2915 | Marks = 5,
2916 | Choices = new List < Choice > {
2917 | new Choice {
2918 | Order = 1,
2919 | Description = "Extensible"
2920 | },
2921 | new Choice {
2922 | Order = 2,
2923 | Description = "Fault Tolerant"
2924 | },
2925 | new Choice {
2926 | Order = 3,
2927 | Description = "Lawsuit-proof"
2928 | }
2929 | }
2930 | },
2931 | new Question {
2932 | Title = "Q #159: The centralized + ring hybrid P2P topology is a common architecture for web applications",
2933 | CorrectAnswer = 1,
2934 | Marks = 8,
2935 | Choices = new List < Choice > {
2936 | new Choice {
2937 | Order = 1,
2938 | Description = "True"
2939 | },
2940 | new Choice {
2941 | Order = 2,
2942 | Description = "False"
2943 | }
2944 | }
2945 | },
2946 | new Question {
2947 | Title = "Q #160: Which of the following is not an attribute of a centralized + decentralized hybrid P2P topology?",
2948 | CorrectAnswer = 1,
2949 | Marks = 1,
2950 | Choices = new List < Choice > {
2951 | new Choice {
2952 | Order = 1,
2953 | Description = "Managable"
2954 | },
2955 | new Choice {
2956 | Order = 2,
2957 | Description = "Lawsuit-proof"
2958 | },
2959 | new Choice {
2960 | Order = 3,
2961 | Description = "Fault Tolerant"
2962 | }
2963 | }
2964 | },
2965 | new Question {
2966 | Title = "Q #161: Which of the following is an attribute of a centralized + decentralized hybrid P2P topology?",
2967 | CorrectAnswer = 1,
2968 | Marks = 5,
2969 | Choices = new List < Choice > {
2970 | new Choice {
2971 | Order = 1,
2972 | Description = "Managable"
2973 | },
2974 | new Choice {
2975 | Order = 2,
2976 | Description = "Secure"
2977 | },
2978 | new Choice {
2979 | Order = 3,
2980 | Description = "Lawsuit-proof"
2981 | }
2982 | }
2983 | },
2984 | new Question {
2985 | Title = "Q #162: Which of the following is the best topology for P2P networks?",
2986 | CorrectAnswer = 1,
2987 | Marks = 2,
2988 | Choices = new List < Choice > {
2989 | new Choice {
2990 | Order = 1,
2991 | Description = "Centralized"
2992 | },
2993 | new Choice {
2994 | Order = 2,
2995 | Description = "Ring"
2996 | },
2997 | new Choice {
2998 | Order = 3,
2999 | Description = "Hierarchical"
3000 | },
3001 | new Choice {
3002 | Order = 4,
3003 | Description = "Decentralized"
3004 | }
3005 | }
3006 | },
3007 | new Question {
3008 | Title = "Q #163: After Napster, new file-sharing P2P systems bypass the legal problems by not holding a central directory",
3009 | CorrectAnswer = 1,
3010 | Marks = 6,
3011 | Choices = new List < Choice > {
3012 | new Choice {
3013 | Order = 1,
3014 | Description = "True"
3015 | },
3016 | new Choice {
3017 | Order = 2,
3018 | Description = "False"
3019 | }
3020 | }
3021 | },
3022 | new Question {
3023 | Title = "Q #164: Which of the following is not a Gnutella protocol message?",
3024 | CorrectAnswer = 1,
3025 | Marks = 5,
3026 | Choices = new List < Choice > {
3027 | new Choice {
3028 | Order = 1,
3029 | Description = "PING"
3030 | },
3031 | new Choice {
3032 | Order = 2,
3033 | Description = "PONG"
3034 | },
3035 | new Choice {
3036 | Order = 3,
3037 | Description = "QUERY"
3038 | },
3039 | new Choice {
3040 | Order = 4,
3041 | Description = "RESPONSE"
3042 | }
3043 | }
3044 | },
3045 | new Question {
3046 | Title = "Q #165: Which of the following is a P2P protocol which allows peers to download a file from a group of other peers",
3047 | CorrectAnswer = 1,
3048 | Marks = 1,
3049 | Choices = new List < Choice > {
3050 | new Choice {
3051 | Order = 1,
3052 | Description = "BitTorrent"
3053 | },
3054 | new Choice {
3055 | Order = 2,
3056 | Description = "Gnutella"
3057 | },
3058 | new Choice {
3059 | Order = 3,
3060 | Description = "Napster"
3061 | },
3062 | new Choice {
3063 | Order = 4,
3064 | Description = "Limewire"
3065 | }
3066 | }
3067 | },
3068 | new Question {
3069 | Title = "Q #166: A torrent is a set of all peers that take part in downloading a file using the BitTorrent protocol",
3070 | CorrectAnswer = 1,
3071 | Marks = 9,
3072 | Choices = new List < Choice > {
3073 | new Choice {
3074 | Order = 1,
3075 | Description = "True"
3076 | },
3077 | new Choice {
3078 | Order = 2,
3079 | Description = "False"
3080 | }
3081 | }
3082 | },
3083 | new Question {
3084 | Title = "Q #167: The set of all peers that takes part in a torrent is refered to as a(n) _________________",
3085 | CorrectAnswer = 1,
3086 | Marks = 5,
3087 | Choices = new List < Choice > {
3088 | new Choice {
3089 | Order = 1,
3090 | Description = "Swarm"
3091 | },
3092 | new Choice {
3093 | Order = 2,
3094 | Description = "Seed"
3095 | },
3096 | new Choice {
3097 | Order = 3,
3098 | Description = "Leech"
3099 | },
3100 | new Choice {
3101 | Order = 4,
3102 | Description = "Tracker"
3103 | }
3104 | }
3105 | },
3106 | new Question {
3107 | Title = "Q #168: A peer in a swarm that has the complete content file is called a(n) _________________",
3108 | CorrectAnswer = 1,
3109 | Marks = 1,
3110 | Choices = new List < Choice > {
3111 | new Choice {
3112 | Order = 1,
3113 | Description = "Swarm"
3114 | },
3115 | new Choice {
3116 | Order = 2,
3117 | Description = "Seed"
3118 | },
3119 | new Choice {
3120 | Order = 3,
3121 | Description = "Leech"
3122 | },
3123 | new Choice {
3124 | Order = 4,
3125 | Description = "Tracker"
3126 | }
3127 | }
3128 | },
3129 | new Question {
3130 | Title = "Q #169: A peer that has only part of the file and wants to download the rest is called a(n) _________________",
3131 | CorrectAnswer = 1,
3132 | Marks = 3,
3133 | Choices = new List < Choice > {
3134 | new Choice {
3135 | Order = 1,
3136 | Description = "Swarm"
3137 | },
3138 | new Choice {
3139 | Order = 2,
3140 | Description = "Seed"
3141 | },
3142 | new Choice {
3143 | Order = 3,
3144 | Description = "Leech"
3145 | },
3146 | new Choice {
3147 | Order = 4,
3148 | Description = "Tracker"
3149 | }
3150 | }
3151 | },
3152 | new Question {
3153 | Title = "Q #170: A swarm is a combination of seeds and trackers",
3154 | CorrectAnswer = 1,
3155 | Marks = 2,
3156 | Choices = new List < Choice > {
3157 | new Choice {
3158 | Order = 1,
3159 | Description = "True"
3160 | },
3161 | new Choice {
3162 | Order = 2,
3163 | Description = "False"
3164 | }
3165 | }
3166 | },
3167 | new Question {
3168 | Title = "Q #171: In BitTorrent, the __________ group is the list of peers that the current peer has concurrently connected to; it continuously uploads and downloads pieces from this group.",
3169 | CorrectAnswer = 1,
3170 | Marks = 2,
3171 | Choices = new List < Choice > {
3172 | new Choice {
3173 | Order = 1,
3174 | Description = "Unchoked"
3175 | },
3176 | new Choice {
3177 | Order = 2,
3178 | Description = "Choked"
3179 | }
3180 | }
3181 | },
3182 | new Question {
3183 | Title = "Q #172: In BitTorrent, the __________ group is the list of neighbours that the peer is not currently connected to but may connect to in the future",
3184 | CorrectAnswer = 1,
3185 | Marks = 4,
3186 | Choices = new List < Choice > {
3187 | new Choice {
3188 | Order = 1,
3189 | Description = "Unchoked"
3190 | },
3191 | new Choice {
3192 | Order = 2,
3193 | Description = "Choked"
3194 | }
3195 | }
3196 | },
3197 | new Question {
3198 | Title = "Q #173: In BitTorrent, optimistic choking is when the system promotes a single interested peer every 30 seconds, regardless of its uploading rate, from the choked group and flags it as unchoked",
3199 | CorrectAnswer = 1,
3200 | Marks = 8,
3201 | Choices = new List < Choice > {
3202 | new Choice {
3203 | Order = 1,
3204 | Description = "True"
3205 | },
3206 | new Choice {
3207 | Order = 2,
3208 | Description = "False"
3209 | }
3210 | }
3211 | },
3212 | new Question {
3213 | Title = "Q #174: In BitTorrent, the strategy \"common-last\" is when a peer tries to first download the pieces with the fewest repeated copies amoung the neighbours",
3214 | CorrectAnswer = 1,
3215 | Marks = 4,
3216 | Choices = new List < Choice > {
3217 | new Choice {
3218 | Order = 1,
3219 | Description = "True"
3220 | },
3221 | new Choice {
3222 | Order = 2,
3223 | Description = "False"
3224 | }
3225 | }
3226 | },
3227 | new Question {
3228 | Title = "Q #175: Which of the following is not a common feature of P2P applications",
3229 | CorrectAnswer = 1,
3230 | Marks = 2,
3231 | Choices = new List < Choice > {
3232 | new Choice {
3233 | Order = 1,
3234 | Description = "Protocols are constructed at the application layer"
3235 | },
3236 | new Choice {
3237 | Order = 2,
3238 | Description = "Peers have a unique identifier"
3239 | },
3240 | new Choice {
3241 | Order = 3,
3242 | Description = "P2P protocols support some type of message-routing capability"
3243 | },
3244 | new Choice {
3245 | Order = 4,
3246 | Description = "Applications mask the IP address of peers so they cannot be tracked"
3247 | }
3248 | }
3249 | },
3250 | new Question {
3251 | Title = "Q #176: A(n) ______________________ is the collection of peer connections in a P2P network",
3252 | CorrectAnswer = 1,
3253 | Marks = 5,
3254 | Choices = new List < Choice > {
3255 | new Choice {
3256 | Order = 1,
3257 | Description = "Overlay"
3258 | },
3259 | new Choice {
3260 | Order = 2,
3261 | Description = "Swarm"
3262 | },
3263 | new Choice {
3264 | Order = 3,
3265 | Description = "Tracker"
3266 | },
3267 | new Choice {
3268 | Order = 4,
3269 | Description = "Torrent"
3270 | }
3271 | }
3272 | },
3273 | new Question {
3274 | Title = "Q #177: Which of the following is not an attribute of unstructured networks?",
3275 | CorrectAnswer = 1,
3276 | Marks = 6,
3277 | Choices = new List < Choice > {
3278 | new Choice {
3279 | Order = 1,
3280 | Description = "The nodes are linked randomly"
3281 | },
3282 | new Choice {
3283 | Order = 2,
3284 | Description = "Searching is inefficient"
3285 | },
3286 | new Choice {
3287 | Order = 3,
3288 | Description = "Queries may not be resolved"
3289 | },
3290 | new Choice {
3291 | Order = 4,
3292 | Description = "Uses predefined set of rules to link nodes"
3293 | }
3294 | }
3295 | },
3296 | new Question {
3297 | Title = "Q #178: A structured P2P network uses a predefined set of rules to link nodes so that a query can be effectively and efficiently resolved",
3298 | CorrectAnswer = 1,
3299 | Marks = 7,
3300 | Choices = new List < Choice > {
3301 | new Choice {
3302 | Order = 1,
3303 | Description = "True"
3304 | },
3305 | new Choice {
3306 | Order = 2,
3307 | Description = "False"
3308 | }
3309 | }
3310 | },
3311 | new Question {
3312 | Title = "Q #179: A common technique used in unstructured P2P networks is the distributed hash table (DHT)",
3313 | CorrectAnswer = 1,
3314 | Marks = 6,
3315 | Choices = new List < Choice > {
3316 | new Choice {
3317 | Order = 1,
3318 | Description = "True"
3319 | },
3320 | new Choice {
3321 | Order = 2,
3322 | Description = "False"
3323 | }
3324 | }
3325 | },
3326 | new Question {
3327 | Title = "Q #180: The address space of a distributed hash table ranges from",
3328 | CorrectAnswer = 1,
3329 | Marks = 1,
3330 | Choices = new List < Choice > {
3331 | new Choice {
3332 | Order = 1,
3333 | Description = "0 to 2^m - 1"
3334 | },
3335 | new Choice {
3336 | Order = 2,
3337 | Description = "1 to 2^m - 1"
3338 | },
3339 | new Choice {
3340 | Order = 3,
3341 | Description = "0 to 2^m"
3342 | },
3343 | new Choice {
3344 | Order = 4,
3345 | Description = "1 to 2^m"
3346 | }
3347 | }
3348 | },
3349 | new Question {
3350 | Title = "Q #181: A distributed hash table distributes data items among a set of nodes according to some predefined rules",
3351 | CorrectAnswer = 1,
3352 | Marks = 4,
3353 | Choices = new List < Choice > {
3354 | new Choice {
3355 | Order = 1,
3356 | Description = "True"
3357 | },
3358 | new Choice {
3359 | Order = 2,
3360 | Description = "False"
3361 | }
3362 | }
3363 | },
3364 | new Question {
3365 | Title = "Q #182: The addresses in a distributed hash table are distributed in a counter-clockwise direction",
3366 | CorrectAnswer = 1,
3367 | Marks = 4,
3368 | Choices = new List < Choice > {
3369 | new Choice {
3370 | Order = 1,
3371 | Description = "True"
3372 | },
3373 | new Choice {
3374 | Order = 2,
3375 | Description = "False"
3376 | }
3377 | }
3378 | },
3379 | new Question {
3380 | Title = "Q #183: Most DHT implementations use a value of m equal to",
3381 | CorrectAnswer = 1,
3382 | Marks = 3,
3383 | Choices = new List < Choice > {
3384 | new Choice {
3385 | Order = 1,
3386 | Description = "256"
3387 | },
3388 | new Choice {
3389 | Order = 2,
3390 | Description = "128"
3391 | },
3392 | new Choice {
3393 | Order = 3,
3394 | Description = "160"
3395 | },
3396 | new Choice {
3397 | Order = 4,
3398 | Description = "150"
3399 | }
3400 | }
3401 | },
3402 | new Question {
3403 | Title = "Q #184: The _______________ method of storing objects in the DHT address space stores the node whose ID is \"closest\" to the key in the ring",
3404 | CorrectAnswer = 1,
3405 | Marks = 5,
3406 | Choices = new List < Choice > {
3407 | new Choice {
3408 | Order = 1,
3409 | Description = "Direct"
3410 | },
3411 | new Choice {
3412 | Order = 2,
3413 | Description = "Indirect"
3414 | }
3415 | }
3416 | },
3417 | new Question {
3418 | Title = "Q #185: The _______________ method of storing objects in the DHT address space stores the physical object and the reference to the object in different locations (peers).",
3419 | CorrectAnswer = 1,
3420 | Marks = 7,
3421 | Choices = new List < Choice > {
3422 | new Choice {
3423 | Order = 1,
3424 | Description = "Direct"
3425 | },
3426 | new Choice {
3427 | Order = 2,
3428 | Description = "Indirect"
3429 | }
3430 | }
3431 | },
3432 | new Question {
3433 | Title = "Q #186: _______________ overlays in a P2P network organize nodes into a random graph, and then use floods/random walks to discover data stored by overlay nodes",
3434 | CorrectAnswer = 1,
3435 | Marks = 8,
3436 | Choices = new List < Choice > {
3437 | new Choice {
3438 | Order = 1,
3439 | Description = "Unstructured"
3440 | },
3441 | new Choice {
3442 | Order = 2,
3443 | Description = "Structured"
3444 | }
3445 | }
3446 | },
3447 | new Question {
3448 | Title = "Q #187: Which unstructured overlay algorithm prevents messages from circulating endlessly by attaching message identifiers/TTL values (and does not alter the TTL if the query fails)",
3449 | CorrectAnswer = 1,
3450 | Marks = 8,
3451 | Choices = new List < Choice > {
3452 | new Choice {
3453 | Order = 1,
3454 | Description = "Flooding"
3455 | },
3456 | new Choice {
3457 | Order = 2,
3458 | Description = "Expanding ring"
3459 | },
3460 | new Choice {
3461 | Order = 3,
3462 | Description = "Random walk"
3463 | },
3464 | new Choice {
3465 | Order = 4,
3466 | Description = "Pastry"
3467 | }
3468 | }
3469 | },
3470 | new Question {
3471 | Title = "Q #188: Which unstructured overlay algorithm increases the TTL value by a small amount if the query fails?",
3472 | CorrectAnswer = 1,
3473 | Marks = 4,
3474 | Choices = new List < Choice > {
3475 | new Choice {
3476 | Order = 1,
3477 | Description = "Flooding"
3478 | },
3479 | new Choice {
3480 | Order = 2,
3481 | Description = "Expanding ring"
3482 | },
3483 | new Choice {
3484 | Order = 3,
3485 | Description = "Dijkstra"
3486 | },
3487 | new Choice {
3488 | Order = 4,
3489 | Description = "Pastry"
3490 | }
3491 | }
3492 | },
3493 | new Question {
3494 | Title = "Q #189: Which unstructured overlay algorithm randomly traverses nodes, and decrements a TTL at each hop?",
3495 | CorrectAnswer = 1,
3496 | Marks = 7,
3497 | Choices = new List < Choice > {
3498 | new Choice {
3499 | Order = 1,
3500 | Description = "Flooding"
3501 | },
3502 | new Choice {
3503 | Order = 2,
3504 | Description = "Expanding ring"
3505 | },
3506 | new Choice {
3507 | Order = 3,
3508 | Description = "Dijkstra"
3509 | },
3510 | new Choice {
3511 | Order = 4,
3512 | Description = "Pastry"
3513 | }
3514 | }
3515 | },
3516 | new Question {
3517 | Title = "Q #190: Random walk queries in an unstructured overlay must be carried out sequentially",
3518 | CorrectAnswer = 1,
3519 | Marks = 7,
3520 | Choices = new List < Choice > {
3521 | new Choice {
3522 | Order = 1,
3523 | Description = "True"
3524 | },
3525 | new Choice {
3526 | Order = 2,
3527 | Description = "False"
3528 | }
3529 | }
3530 | },
3531 | new Question {
3532 | Title = "Q #191: _______________ overlays in a P2P network combines a specific geometrical structure with appropriate routing and maintenance mechanisms",
3533 | CorrectAnswer = 1,
3534 | Marks = 2,
3535 | Choices = new List < Choice > {
3536 | new Choice {
3537 | Order = 1,
3538 | Description = "Unstructured"
3539 | },
3540 | new Choice {
3541 | Order = 2,
3542 | Description = "Structured"
3543 | }
3544 | }
3545 | },
3546 | new Question {
3547 | Title = "Q #192: Which of the following is not a structured overlay protocol?",
3548 | CorrectAnswer = 1,
3549 | Marks = 8,
3550 | Choices = new List < Choice > {
3551 | new Choice {
3552 | Order = 1,
3553 | Description = "Kademlia"
3554 | },
3555 | new Choice {
3556 | Order = 2,
3557 | Description = "Chord"
3558 | },
3559 | new Choice {
3560 | Order = 3,
3561 | Description = "Pastry"
3562 | },
3563 | new Choice {
3564 | Order = 4,
3565 | Description = "Finger"
3566 | }
3567 | }
3568 | },
3569 | new Question {
3570 | Title = "Q #193: What is a Distributed Object Location and Routing (DOLR) system?",
3571 | CorrectAnswer = 1,
3572 | Marks = 2,
3573 | Choices = new List < Choice > {
3574 | new Choice {
3575 | Order = 1,
3576 | Description = "A P2P system that uses key-based routing"
3577 | },
3578 | new Choice {
3579 | Order = 2,
3580 | Description = "A distributed naming system for resources connected to the internet"
3581 | },
3582 | new Choice {
3583 | Order = 3,
3584 | Description = "A method of routing resources from a centralized server to a client"
3585 | },
3586 | new Choice {
3587 | Order = 4,
3588 | Description = "A client-server system which distributes files evenly across the server"
3589 | }
3590 | }
3591 | },
3592 | new Question {
3593 | Title = "Q #194: For the Chord protocol, the closest peer with N >= k hosts the value (k, v), where k is the hash of the data name, and v is the information about the peer that has the actual object",
3594 | CorrectAnswer = 1,
3595 | Marks = 6,
3596 | Choices = new List < Choice > {
3597 | new Choice {
3598 | Order = 1,
3599 | Description = "True"
3600 | },
3601 | new Choice {
3602 | Order = 2,
3603 | Description = "False"
3604 | }
3605 | }
3606 | },
3607 | new Question {
3608 | Title = "Q #195: The Pastry protocol utilizes a finger table to resolve a query/lookup",
3609 | CorrectAnswer = 1,
3610 | Marks = 7,
3611 | Choices = new List < Choice > {
3612 | new Choice {
3613 | Order = 1,
3614 | Description = "True"
3615 | },
3616 | new Choice {
3617 | Order = 2,
3618 | Description = "False"
3619 | }
3620 | }
3621 | },
3622 | new Question {
3623 | Title = "Q #196: In a finger table for the Chord protocol, each node needs to know about m successor nodes and one predecessor node",
3624 | CorrectAnswer = 1,
3625 | Marks = 6,
3626 | Choices = new List < Choice > {
3627 | new Choice {
3628 | Order = 1,
3629 | Description = "True"
3630 | },
3631 | new Choice {
3632 | Order = 2,
3633 | Description = "False"
3634 | }
3635 | }
3636 | },
3637 | new Question {
3638 | Title = "Q #197: What is the successor of a target key in a finger table? (N=current node, i=record number starting at 1)",
3639 | CorrectAnswer = 1,
3640 | Marks = 2,
3641 | Choices = new List < Choice > {
3642 | new Choice {
3643 | Order = 1,
3644 | Description = "Successor(N + 2^(i - 1))"
3645 | },
3646 | new Choice {
3647 | Order = 2,
3648 | Description = "Successor(N + 2^(i + 1))"
3649 | },
3650 | new Choice {
3651 | Order = 3,
3652 | Description = "Successor(N - 2^(i - 1))"
3653 | },
3654 | new Choice {
3655 | Order = 4,
3656 | Description = "Successor(N - 2^(i + 1))"
3657 | }
3658 | }
3659 | },
3660 | new Question {
3661 | Title = "Q #198: In a finger table, a node is responsible for all keys less than the current node, but greater than the preceeding node (i.e. N > K > N - 1)",
3662 | CorrectAnswer = 1,
3663 | Marks = 6,
3664 | Choices = new List < Choice > {
3665 | new Choice {
3666 | Order = 1,
3667 | Description = "True"
3668 | },
3669 | new Choice {
3670 | Order = 2,
3671 | Description = "False"
3672 | }
3673 | }
3674 | },
3675 | new Question {
3676 | Title = "Q #199: Which Chord operation is used to find where an object is located among the available peers in the ring?",
3677 | CorrectAnswer = 1,
3678 | Marks = 3,
3679 | Choices = new List < Choice > {
3680 | new Choice {
3681 | Order = 1,
3682 | Description = "Lookup"
3683 | },
3684 | new Choice {
3685 | Order = 2,
3686 | Description = "Stabilize"
3687 | },
3688 | new Choice {
3689 | Order = 3,
3690 | Description = "Fix_Finger"
3691 | },
3692 | new Choice {
3693 | Order = 4,
3694 | Description = "Join"
3695 | }
3696 | }
3697 | },
3698 | new Question {
3699 | Title = "Q #200: Which Chord operation is used to validate its information about its successor, and let the success validate its information about its predecessor?",
3700 | CorrectAnswer = 1,
3701 | Marks = 9,
3702 | Choices = new List < Choice > {
3703 | new Choice {
3704 | Order = 1,
3705 | Description = "Lookup"
3706 | },
3707 | new Choice {
3708 | Order = 2,
3709 | Description = "Stabilize"
3710 | },
3711 | new Choice {
3712 | Order = 3,
3713 | Description = "Fix_Finger"
3714 | },
3715 | new Choice {
3716 | Order = 4,
3717 | Description = "Join"
3718 | }
3719 | }
3720 | },
3721 | new Question {
3722 | Title = "Q #201: Which Chord operation is used to update a finger table?",
3723 | CorrectAnswer = 1,
3724 | Marks = 2,
3725 | Choices = new List < Choice > {
3726 | new Choice {
3727 | Order = 1,
3728 | Description = "Lookup"
3729 | },
3730 | new Choice {
3731 | Order = 2,
3732 | Description = "Stabilize"
3733 | },
3734 | new Choice {
3735 | Order = 3,
3736 | Description = "Fix_Finger"
3737 | },
3738 | new Choice {
3739 | Order = 4,
3740 | Description = "Join"
3741 | }
3742 | }
3743 | },
3744 | new Question {
3745 | Title = "Q #202: In the Chord protocol, when a node leaves, the data/references must be duplicated on other nodes",
3746 | CorrectAnswer = 1,
3747 | Marks = 5,
3748 | Choices = new List < Choice > {
3749 | new Choice {
3750 | Order = 1,
3751 | Description = "True"
3752 | },
3753 | new Choice {
3754 | Order = 2,
3755 | Description = "False"
3756 | }
3757 | }
3758 | },
3759 | new Question {
3760 | Title = "Q #203: What is a common value for m in the Pastry protocol?",
3761 | CorrectAnswer = 1,
3762 | Marks = 2,
3763 | Choices = new List < Choice > {
3764 | new Choice {
3765 | Order = 1,
3766 | Description = "256"
3767 | },
3768 | new Choice {
3769 | Order = 2,
3770 | Description = "128"
3771 | },
3772 | new Choice {
3773 | Order = 3,
3774 | Description = "160"
3775 | },
3776 | new Choice {
3777 | Order = 4,
3778 | Description = "150"
3779 | }
3780 | }
3781 | },
3782 | new Question {
3783 | Title = "Q #204: In the Pastry protocol, a key is stored in the node whose identifier is numerically closest to the key",
3784 | CorrectAnswer = 1,
3785 | Marks = 5,
3786 | Choices = new List < Choice > {
3787 | new Choice {
3788 | Order = 1,
3789 | Description = "True"
3790 | },
3791 | new Choice {
3792 | Order = 2,
3793 | Description = "False"
3794 | }
3795 | }
3796 | },
3797 | new Question {
3798 | Title = "Q #205: In the Pastry protocol, the number of rows in the routing table is equal to",
3799 | CorrectAnswer = 1,
3800 | Marks = 9,
3801 | Choices = new List < Choice > {
3802 | new Choice {
3803 | Order = 1,
3804 | Description = "M / b"
3805 | },
3806 | new Choice {
3807 | Order = 2,
3808 | Description = "M * b"
3809 | },
3810 | new Choice {
3811 | Order = 3,
3812 | Description = "B / m"
3813 | },
3814 | new Choice {
3815 | Order = 4,
3816 | Description = "2^b"
3817 | }
3818 | }
3819 | },
3820 | new Question {
3821 | Title = "Q #206: In the Pastry protocol, the number of columns in the routing table is equal to",
3822 | CorrectAnswer = 1,
3823 | Marks = 1,
3824 | Choices = new List < Choice > {
3825 | new Choice {
3826 | Order = 1,
3827 | Description = "M / b"
3828 | },
3829 | new Choice {
3830 | Order = 2,
3831 | Description = "M * b"
3832 | },
3833 | new Choice {
3834 | Order = 3,
3835 | Description = "B / m"
3836 | },
3837 | new Choice {
3838 | Order = 4,
3839 | Description = "2^b"
3840 | }
3841 | }
3842 | },
3843 | new Question {
3844 | Title = "Q #207: In the Pastry protocol, a cell in the routing table can contain multiple values",
3845 | CorrectAnswer = 1,
3846 | Marks = 2,
3847 | Choices = new List < Choice > {
3848 | new Choice {
3849 | Order = 1,
3850 | Description = "True"
3851 | },
3852 | new Choice {
3853 | Order = 2,
3854 | Description = "False"
3855 | }
3856 | }
3857 | },
3858 | new Question {
3859 | Title = "Q #208: In the Pastry protocol, the leaf set is a list of IDs that are numerically larger than the current node ID",
3860 | CorrectAnswer = 1,
3861 | Marks = 7,
3862 | Choices = new List < Choice > {
3863 | new Choice {
3864 | Order = 1,
3865 | Description = "True"
3866 | },
3867 | new Choice {
3868 | Order = 2,
3869 | Description = "False"
3870 | }
3871 | }
3872 | },
3873 | new Question {
3874 | Title = "Q #209: In the Pastry protocol, the leaf set contains _________ identifiers",
3875 | CorrectAnswer = 1,
3876 | Marks = 6,
3877 | Choices = new List < Choice > {
3878 | new Choice {
3879 | Order = 1,
3880 | Description = "M / b"
3881 | },
3882 | new Choice {
3883 | Order = 2,
3884 | Description = "M * b"
3885 | },
3886 | new Choice {
3887 | Order = 3,
3888 | Description = "B / m"
3889 | },
3890 | new Choice {
3891 | Order = 4,
3892 | Description = "2^b"
3893 | }
3894 | }
3895 | },
3896 | new Question {
3897 | Title = "Q #210: Which of the following structured overlay protocols routes messages based on the distance between the nodes?",
3898 | CorrectAnswer = 1,
3899 | Marks = 6,
3900 | Choices = new List < Choice > {
3901 | new Choice {
3902 | Order = 1,
3903 | Description = "Kademlia"
3904 | },
3905 | new Choice {
3906 | Order = 2,
3907 | Description = "Chord"
3908 | },
3909 | new Choice {
3910 | Order = 3,
3911 | Description = "Pastry"
3912 | }
3913 | }
3914 | },
3915 | new Question {
3916 | Title = "Q #211: In the Kademlia protocol, the distance between nodes is determined by bitwise",
3917 | CorrectAnswer = 1,
3918 | Marks = 6,
3919 | Choices = new List < Choice > {
3920 | new Choice {
3921 | Order = 1,
3922 | Description = "XOR"
3923 | },
3924 | new Choice {
3925 | Order = 2,
3926 | Description = "XAND"
3927 | },
3928 | new Choice {
3929 | Order = 3,
3930 | Description = "OR"
3931 | },
3932 | new Choice {
3933 | Order = 4,
3934 | Description = "AND"
3935 | }
3936 | }
3937 | },
3938 | new Question {
3939 | Title = "Q #212: In the Kademlia protocol, if m=5, how many subtrees does a node divide the binary tree into?",
3940 | CorrectAnswer = 1,
3941 | Marks = 9,
3942 | Choices = new List < Choice > {
3943 | new Choice {
3944 | Order = 1,
3945 | Description = "5"
3946 | },
3947 | new Choice {
3948 | Order = 2,
3949 | Description = "32"
3950 | },
3951 | new Choice {
3952 | Order = 3,
3953 | Description = "64"
3954 | },
3955 | new Choice {
3956 | Order = 4,
3957 | Description = "25"
3958 | }
3959 | }
3960 | },
3961 | new Question {
3962 | Title = "Q #213: The Kademlia protocol, requires that each row in the routing table keeps at least up to __________ nodes from the corresponding subtree",
3963 | CorrectAnswer = 1,
3964 | Marks = 9,
3965 | Choices = new List < Choice > {
3966 | new Choice {
3967 | Order = 1,
3968 | Description = "5"
3969 | },
3970 | new Choice {
3971 | Order = 2,
3972 | Description = "10"
3973 | },
3974 | new Choice {
3975 | Order = 3,
3976 | Description = "15"
3977 | },
3978 | new Choice {
3979 | Order = 4,
3980 | Description = "20"
3981 | }
3982 | }
3983 | },
3984 | new Question {
3985 | Title = "Q #214: In Kademlia, each row is referred to as a",
3986 | CorrectAnswer = 1,
3987 | Marks = 8,
3988 | Choices = new List < Choice > {
3989 | new Choice {
3990 | Order = 1,
3991 | Description = "K-bucket"
3992 | },
3993 | new Choice {
3994 | Order = 2,
3995 | Description = "N-bucket"
3996 | },
3997 | new Choice {
3998 | Order = 3,
3999 | Description = "Subrecord"
4000 | },
4001 | new Choice {
4002 | Order = 4,
4003 | Description = "Finger"
4004 | }
4005 | }
4006 | },
4007 | new Question {
4008 | Title = "Q #215: _____________ refers to what Alice does with the message and the key to obtain a ciphertext",
4009 | CorrectAnswer = 1,
4010 | Marks = 7,
4011 | Choices = new List < Choice > {
4012 | new Choice {
4013 | Order = 1,
4014 | Description = "Key generation"
4015 | },
4016 | new Choice {
4017 | Order = 2,
4018 | Description = "Encryption"
4019 | },
4020 | new Choice {
4021 | Order = 3,
4022 | Description = "Decryption"
4023 | },
4024 | new Choice {
4025 | Order = 4,
4026 | Description = "Signing"
4027 | }
4028 | }
4029 | },
4030 | new Question {
4031 | Title = "Q #216: _____________ refers to what Bob does with the ciphertext and the key to obtain the plaintext",
4032 | CorrectAnswer = 1,
4033 | Marks = 2,
4034 | Choices = new List < Choice > {
4035 | new Choice {
4036 | Order = 1,
4037 | Description = "Key generation"
4038 | },
4039 | new Choice {
4040 | Order = 2,
4041 | Description = "Encryption"
4042 | },
4043 | new Choice {
4044 | Order = 3,
4045 | Description = "Decryption"
4046 | },
4047 | new Choice {
4048 | Order = 4,
4049 | Description = "Signing"
4050 | }
4051 | }
4052 | },
4053 | new Question {
4054 | Title = "Q #217: _____________ refers to what Alice and Bob do to create the shared secret key",
4055 | CorrectAnswer = 1,
4056 | Marks = 8,
4057 | Choices = new List < Choice > {
4058 | new Choice {
4059 | Order = 1,
4060 | Description = "Key generation"
4061 | },
4062 | new Choice {
4063 | Order = 2,
4064 | Description = "Encryption"
4065 | },
4066 | new Choice {
4067 | Order = 3,
4068 | Description = "Decryption"
4069 | },
4070 | new Choice {
4071 | Order = 4,
4072 | Description = "Signing"
4073 | }
4074 | }
4075 | },
4076 | new Question {
4077 | Title = "Q #218: What is cryptology?",
4078 | CorrectAnswer = 1,
4079 | Marks = 2,
4080 | Choices = new List < Choice > {
4081 | new Choice {
4082 | Order = 1,
4083 | Description = "The art and science of making and breaking \"secret codes\""
4084 | },
4085 | new Choice {
4086 | Order = 2,
4087 | Description = "Making \"secret codes\""
4088 | },
4089 | new Choice {
4090 | Order = 3,
4091 | Description = "Breaking \"secret codes\""
4092 | },
4093 | new Choice {
4094 | Order = 4,
4095 | Description = "All of the above"
4096 | }
4097 | }
4098 | },
4099 | new Question {
4100 | Title = "Q #219: What is cryptography?",
4101 | CorrectAnswer = 1,
4102 | Marks = 7,
4103 | Choices = new List < Choice > {
4104 | new Choice {
4105 | Order = 1,
4106 | Description = "The art and science of making and breaking \"secret codes\""
4107 | },
4108 | new Choice {
4109 | Order = 2,
4110 | Description = "Making \"secret codes\""
4111 | },
4112 | new Choice {
4113 | Order = 3,
4114 | Description = "Breaking \"secret codes\""
4115 | },
4116 | new Choice {
4117 | Order = 4,
4118 | Description = "All of the above"
4119 | }
4120 | }
4121 | },
4122 | new Question {
4123 | Title = "Q #220: What is cryptoanalysis?",
4124 | CorrectAnswer = 1,
4125 | Marks = 2,
4126 | Choices = new List < Choice > {
4127 | new Choice {
4128 | Order = 1,
4129 | Description = "The art and science of making and breaking \"secret codes\""
4130 | },
4131 | new Choice {
4132 | Order = 2,
4133 | Description = "Making \"secret codes\""
4134 | },
4135 | new Choice {
4136 | Order = 3,
4137 | Description = "Breaking \"secret codes\""
4138 | },
4139 | new Choice {
4140 | Order = 4,
4141 | Description = "All of the above"
4142 | }
4143 | }
4144 | },
4145 | new Question {
4146 | Title = "Q #221: What is crypto?",
4147 | CorrectAnswer = 1,
4148 | Marks = 1,
4149 | Choices = new List < Choice > {
4150 | new Choice {
4151 | Order = 1,
4152 | Description = "The art and science of making and breaking \"secret codes\""
4153 | },
4154 | new Choice {
4155 | Order = 2,
4156 | Description = "Making \"secret codes\""
4157 | },
4158 | new Choice {
4159 | Order = 3,
4160 | Description = "Breaking \"secret codes\""
4161 | },
4162 | new Choice {
4163 | Order = 4,
4164 | Description = "All of the above"
4165 | }
4166 | }
4167 | },
4168 | new Question {
4169 | Title = "Q #222: A symmetric key cryptosystem uses ____________ to encrypt as to decrypt",
4170 | CorrectAnswer = 1,
4171 | Marks = 2,
4172 | Choices = new List < Choice > {
4173 | new Choice {
4174 | Order = 1,
4175 | Description = "The same key"
4176 | },
4177 | new Choice {
4178 | Order = 2,
4179 | Description = "A public key and a private key"
4180 | },
4181 | new Choice {
4182 | Order = 3,
4183 | Description = "No keys"
4184 | }
4185 | }
4186 | },
4187 | new Question {
4188 | Title = "Q #223: A public key cryptosystem uses ____________ to encrypt as to decrypt",
4189 | CorrectAnswer = 1,
4190 | Marks = 4,
4191 | Choices = new List < Choice > {
4192 | new Choice {
4193 | Order = 1,
4194 | Description = "The same key"
4195 | },
4196 | new Choice {
4197 | Order = 2,
4198 | Description = "A public key and a private key"
4199 | },
4200 | new Choice {
4201 | Order = 3,
4202 | Description = "No keys"
4203 | }
4204 | }
4205 | },
4206 | new Question {
4207 | Title = "Q #224: A public key cryptosystem uses a private key to encrypt and a public key to decrypt",
4208 | CorrectAnswer = 1,
4209 | Marks = 6,
4210 | Choices = new List < Choice > {
4211 | new Choice {
4212 | Order = 1,
4213 | Description = "True"
4214 | },
4215 | new Choice {
4216 | Order = 2,
4217 | Description = "False"
4218 | }
4219 | }
4220 | },
4221 | new Question {
4222 | Title = "Q #225: Polynomial time is considered infeasible",
4223 | CorrectAnswer = 1,
4224 | Marks = 1,
4225 | Choices = new List < Choice > {
4226 | new Choice {
4227 | Order = 1,
4228 | Description = "True"
4229 | },
4230 | new Choice {
4231 | Order = 2,
4232 | Description = "False"
4233 | }
4234 | }
4235 | },
4236 | new Question {
4237 | Title = "Q #226: What is Kerckhoff's Principle?",
4238 | CorrectAnswer = 1,
4239 | Marks = 3,
4240 | Choices = new List < Choice > {
4241 | new Choice {
4242 | Order = 1,
4243 | Description = "Crypto algorithms are not a secret"
4244 | },
4245 | new Choice {
4246 | Order = 2,
4247 | Description = "The algebraic sum of currents in a network of conductors meeting at a point is zero"
4248 | },
4249 | new Choice {
4250 | Order = 3,
4251 | Description = "Public key encryption is more secure than symmetric key encryption"
4252 | },
4253 | new Choice {
4254 | Order = 4,
4255 | Description = "The cryptosystem should depend on the secrecy of the algorithm"
4256 | }
4257 | }
4258 | },
4259 | new Question {
4260 | Title = "Q #227: In Ouda's Key Crypto notation, P refers to",
4261 | CorrectAnswer = 1,
4262 | Marks = 3,
4263 | Choices = new List < Choice > {
4264 | new Choice {
4265 | Order = 1,
4266 | Description = "Plaintext block"
4267 | },
4268 | new Choice {
4269 | Order = 2,
4270 | Description = "Cipertext block"
4271 | },
4272 | new Choice {
4273 | Order = 3,
4274 | Description = "Signature"
4275 | },
4276 | new Choice {
4277 | Order = 4,
4278 | Description = "Public key"
4279 | }
4280 | }
4281 | },
4282 | new Question {
4283 | Title = "Q #228: In Ouda's Key Crypto notation, C refers to",
4284 | CorrectAnswer = 1,
4285 | Marks = 3,
4286 | Choices = new List < Choice > {
4287 | new Choice {
4288 | Order = 1,
4289 | Description = "Plaintext block"
4290 | },
4291 | new Choice {
4292 | Order = 2,
4293 | Description = "Cipertext block"
4294 | },
4295 | new Choice {
4296 | Order = 3,
4297 | Description = "Signature"
4298 | },
4299 | new Choice {
4300 | Order = 4,
4301 | Description = "Public key"
4302 | }
4303 | }
4304 | },
4305 | new Question {
4306 | Title = "Q #229: In cryptography, C = D(P, K)",
4307 | CorrectAnswer = 1,
4308 | Marks = 6,
4309 | Choices = new List < Choice > {
4310 | new Choice {
4311 | Order = 1,
4312 | Description = "True"
4313 | },
4314 | new Choice {
4315 | Order = 2,
4316 | Description = "False"
4317 | }
4318 | }
4319 | },
4320 | new Question {
4321 | Title = "Q #230: In cryptography, P = D(E(P, K), K)",
4322 | CorrectAnswer = 1,
4323 | Marks = 6,
4324 | Choices = new List < Choice > {
4325 | new Choice {
4326 | Order = 1,
4327 | Description = "True"
4328 | },
4329 | new Choice {
4330 | Order = 2,
4331 | Description = "False"
4332 | }
4333 | }
4334 | },
4335 | new Question {
4336 | Title = "Q #231: In Ouda's Key Crypto notation, [M]_Alice refers to",
4337 | CorrectAnswer = 1,
4338 | Marks = 3,
4339 | Choices = new List < Choice > {
4340 | new Choice {
4341 | Order = 1,
4342 | Description = "Signing a message with Alice's private key"
4343 | },
4344 | new Choice {
4345 | Order = 2,
4346 | Description = "Signing a message with Alice's public key"
4347 | },
4348 | new Choice {
4349 | Order = 3,
4350 | Description = "Encrypting a message with Alice's private key"
4351 | },
4352 | new Choice {
4353 | Order = 4,
4354 | Description = "Encrypting a message with Alice's public key"
4355 | }
4356 | }
4357 | },
4358 | new Question {
4359 | Title = "Q #232: In Ouda's Key Crypto notation, {M}_Alice refers to",
4360 | CorrectAnswer = 1,
4361 | Marks = 1,
4362 | Choices = new List < Choice > {
4363 | new Choice {
4364 | Order = 1,
4365 | Description = "Signing a message with Alice's private key"
4366 | },
4367 | new Choice {
4368 | Order = 2,
4369 | Description = "Signing a message with Alice's public key"
4370 | },
4371 | new Choice {
4372 | Order = 3,
4373 | Description = "Encrypting a message with Alice's private key"
4374 | },
4375 | new Choice {
4376 | Order = 4,
4377 | Description = "Encrypting a message with Alice's public key"
4378 | }
4379 | }
4380 | },
4381 | new Question {
4382 | Title = "Q #233: In cryptography, {[M]_Alice}_Alice = M",
4383 | CorrectAnswer = 1,
4384 | Marks = 5,
4385 | Choices = new List < Choice > {
4386 | new Choice {
4387 | Order = 1,
4388 | Description = "True"
4389 | },
4390 | new Choice {
4391 | Order = 2,
4392 | Description = "False"
4393 | }
4394 | }
4395 | },
4396 | new Question {
4397 | Title = "Q #234: In cryptography, {[M]_Bob}_Alice = M",
4398 | CorrectAnswer = 1,
4399 | Marks = 6,
4400 | Choices = new List < Choice > {
4401 | new Choice {
4402 | Order = 1,
4403 | Description = "True"
4404 | },
4405 | new Choice {
4406 | Order = 2,
4407 | Description = "False"
4408 | }
4409 | }
4410 | },
4411 | new Question {
4412 | Title = "Q #235: A cryptographic nonce is an arbitrary number that can be used multiple times",
4413 | CorrectAnswer = 1,
4414 | Marks = 8,
4415 | Choices = new List < Choice > {
4416 | new Choice {
4417 | Order = 1,
4418 | Description = "True"
4419 | },
4420 | new Choice {
4421 | Order = 2,
4422 | Description = "False"
4423 | }
4424 | }
4425 | },
4426 | new Question {
4427 | Title = "Q #236: Timestamps in cryptography must account for clock skew",
4428 | CorrectAnswer = 1,
4429 | Marks = 8,
4430 | Choices = new List < Choice > {
4431 | new Choice {
4432 | Order = 1,
4433 | Description = "True"
4434 | },
4435 | new Choice {
4436 | Order = 2,
4437 | Description = "False"
4438 | }
4439 | }
4440 | },
4441 | new Question {
4442 | Title = "Q #237: For entity authentication with a public key signature, which key pair is not needed?",
4443 | CorrectAnswer = 1,
4444 | Marks = 3,
4445 | Choices = new List < Choice > {
4446 | new Choice {
4447 | Order = 1,
4448 | Description = "Encryption/decryption key pair"
4449 | },
4450 | new Choice {
4451 | Order = 2,
4452 | Description = "Signing/verifying key pair"
4453 | },
4454 | new Choice {
4455 | Order = 3,
4456 | Description = "Key exchange key pair"
4457 | },
4458 | new Choice {
4459 | Order = 4,
4460 | Description = "Session key pair"
4461 | }
4462 | }
4463 | },
4464 | new Question {
4465 | Title = "Q #238: One session key is used per session when it is required",
4466 | CorrectAnswer = 1,
4467 | Marks = 8,
4468 | Choices = new List < Choice > {
4469 | new Choice {
4470 | Order = 1,
4471 | Description = "True"
4472 | },
4473 | new Choice {
4474 | Order = 2,
4475 | Description = "False"
4476 | }
4477 | }
4478 | },
4479 | new Question {
4480 | Title = "Q #239: What is perfect forward secrecy?",
4481 | CorrectAnswer = 1,
4482 | Marks = 6,
4483 | Choices = new List < Choice > {
4484 | new Choice {
4485 | Order = 1,
4486 | Description = "A type of encryption where a compromise of a private key can't be used to decrypt past communications"
4487 | },
4488 | new Choice {
4489 | Order = 2,
4490 | Description = "An encryption method where each bit or character of the plaintext is encrypted by combining it with the corresponding bit or character from the pad using modular addition"
4491 | },
4492 | new Choice {
4493 | Order = 3,
4494 | Description = "A type of encryption where one of the encryption keys are private and the other is public"
4495 | },
4496 | new Choice {
4497 | Order = 4,
4498 | Description = "A technique used to secure both the public and private keys when communicating insecurely"
4499 | }
4500 | }
4501 | },
4502 | new Question {
4503 | Title = "Q #240: How can Alice and Bob ensure perfect forward secrecy?",
4504 | CorrectAnswer = 1,
4505 | Marks = 7,
4506 | Choices = new List < Choice > {
4507 | new Choice {
4508 | Order = 1,
4509 | Description = "Encrypt with the session key"
4510 | },
4511 | new Choice {
4512 | Order = 2,
4513 | Description = "Encrypt with the public key"
4514 | },
4515 | new Choice {
4516 | Order = 3,
4517 | Description = "Encrypt with the private key"
4518 | },
4519 | new Choice {
4520 | Order = 4,
4521 | Description = "Encrypt with the one time pad"
4522 | }
4523 | }
4524 | },
4525 | new Question {
4526 | Title = "Q #241: What is Diffie-Hellman?",
4527 | CorrectAnswer = 1,
4528 | Marks = 7,
4529 | Choices = new List < Choice > {
4530 | new Choice {
4531 | Order = 1,
4532 | Description = "A specific method of securely exchanging cryptographic keys over a public channel"
4533 | },
4534 | new Choice {
4535 | Order = 2,
4536 | Description = "A method of factoring an RSA key"
4537 | },
4538 | new Choice {
4539 | Order = 3,
4540 | Description = "An authenticated protocol for key agreement"
4541 | },
4542 | new Choice {
4543 | Order = 4,
4544 | Description = "An augmented password-authenticated key agreement"
4545 | }
4546 | }
4547 | },
4548 | new Question {
4549 | Title = "Q #242: What is a man in the middle attack?",
4550 | CorrectAnswer = 1,
4551 | Marks = 2,
4552 | Choices = new List < Choice > {
4553 | new Choice {
4554 | Order = 1,
4555 | Description = "An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other"
4556 | },
4557 | new Choice {
4558 | Order = 2,
4559 | Description = "An attack where the attacker uses expired session keys to decrypt messages"
4560 | },
4561 | new Choice {
4562 | Order = 3,
4563 | Description = "An attack in which each possibility is tried until success is obtained"
4564 | },
4565 | new Choice {
4566 | Order = 4,
4567 | Description = "A known plaintext attack against double encryption with two separated keys where the attacker encrypts a plaintext with a key and \"decrypts\" the original ciphertext with another key and hopes to get the same value."
4568 | }
4569 | }
4570 | },
4571 | new Question {
4572 | Title = "Q #243: The socket layer lives between the",
4573 | CorrectAnswer = 1,
4574 | Marks = 7,
4575 | Choices = new List < Choice > {
4576 | new Choice {
4577 | Order = 1,
4578 | Description = "Application and transport layers"
4579 | },
4580 | new Choice {
4581 | Order = 2,
4582 | Description = "Transport and network layers"
4583 | },
4584 | new Choice {
4585 | Order = 3,
4586 | Description = "Network and link layers"
4587 | },
4588 | new Choice {
4589 | Order = 4,
4590 | Description = "Application and network layers"
4591 | }
4592 | }
4593 | },
4594 | new Question {
4595 | Title = "Q #244: ___________ is a standard security technology for establishing an encrypted link between a server and a client",
4596 | CorrectAnswer = 1,
4597 | Marks = 1,
4598 | Choices = new List < Choice > {
4599 | new Choice {
4600 | Order = 1,
4601 | Description = "SSL"
4602 | },
4603 | new Choice {
4604 | Order = 2,
4605 | Description = "RSA"
4606 | },
4607 | new Choice {
4608 | Order = 3,
4609 | Description = "SHA-2"
4610 | },
4611 | new Choice {
4612 | Order = 4,
4613 | Description = "TCP"
4614 | }
4615 | }
4616 | },
4617 | new Question {
4618 | Title = "Q #245: A ___________ is a small data file that digitally binds a cryptographic key to an organization's details. It allows secure connections from a web server to a browser",
4619 | CorrectAnswer = 1,
4620 | Marks = 1,
4621 | Choices = new List < Choice > {
4622 | new Choice {
4623 | Order = 1,
4624 | Description = "SSL certificate"
4625 | },
4626 | new Choice {
4627 | Order = 2,
4628 | Description = "Private key"
4629 | },
4630 | new Choice {
4631 | Order = 3,
4632 | Description = "Public key"
4633 | },
4634 | new Choice {
4635 | Order = 4,
4636 | Description = "RSA certificate"
4637 | }
4638 | }
4639 | },
4640 | new Question {
4641 | Title = "Q #245: What is PAN",
4642 | CorrectAnswer = 1,
4643 | Marks = 2,
4644 | Choices = new List < Choice > {
4645 | new Choice {
4646 | Order = 1,
4647 | Description = "Let devices connect and communicate over the range of a person. E.g. connecting Bluetooth devices"
4648 | },
4649 | new Choice {
4650 | Order = 2,
4651 | Description = "It is a privately owned network that operates within and nearby a single building like a home, office, or factory"
4652 | },
4653 | new Choice {
4654 | Order = 3,
4655 | Description = "It is a privately owned network that operates within and nearby a single building like a home, office, or factory"
4656 | },
4657 | new Choice {
4658 | Order = 4,
4659 | Description = "It is a privately owned network that operates within and nearby a single building like a home, office, or factory"
4660 | }
4661 | }
4662 | }
4663 |
4664 | };
4665 |
4666 | private static List AllShuffled => All.OrderBy(x => random.Next()).ToList();
4667 | }
4668 | }
--------------------------------------------------------------------------------
/Shared/Shared.csproj:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | net6.0
5 |
6 |
7 |
8 |
--------------------------------------------------------------------------------