├── .gitignore ├── LINQTut14.Aggregate ├── LINQTut14.Aggregate.csproj └── Program.cs ├── LINQTut14.StandardMethod ├── LINQTut14.StandardMethod.csproj └── Program.cs ├── LINQTut14.sln └── Shared ├── Choice.cs ├── Question.cs ├── QuestionBank.cs └── Shared.csproj /.gitignore: -------------------------------------------------------------------------------- 1 | ## Ignore Visual Studio temporary files, build results, and 2 | ## files generated by popular Visual Studio add-ons. 3 | ## 4 | ## Get latest from https://github.com/github/gitignore/blob/master/VisualStudio.gitignore 5 | 6 | # User-specific files 7 | *.rsuser 8 | *.suo 9 | *.user 10 | *.userosscache 11 | *.sln.docstates 12 | 13 | # User-specific files (MonoDevelop/Xamarin Studio) 14 | *.userprefs 15 | 16 | # Mono auto generated files 17 | mono_crash.* 18 | 19 | # Build results 20 | [Dd]ebug/ 21 | [Dd]ebugPublic/ 22 | [Rr]elease/ 23 | [Rr]eleases/ 24 | x64/ 25 | x86/ 26 | [Ww][Ii][Nn]32/ 27 | [Aa][Rr][Mm]/ 28 | [Aa][Rr][Mm]64/ 29 | bld/ 30 | [Bb]in/ 31 | [Oo]bj/ 32 | [Ll]og/ 33 | [Ll]ogs/ 34 | 35 | # Visual Studio 2015/2017 cache/options directory 36 | .vs/ 37 | # Uncomment if you have tasks that create the project's static files in wwwroot 38 | #wwwroot/ 39 | 40 | # Visual Studio 2017 auto generated files 41 | Generated\ Files/ 42 | 43 | # MSTest test Results 44 | [Tt]est[Rr]esult*/ 45 | [Bb]uild[Ll]og.* 46 | 47 | # NUnit 48 | *.VisualState.xml 49 | TestResult.xml 50 | nunit-*.xml 51 | 52 | # Build Results of an ATL Project 53 | [Dd]ebugPS/ 54 | [Rr]eleasePS/ 55 | dlldata.c 56 | 57 | # Benchmark Results 58 | BenchmarkDotNet.Artifacts/ 59 | 60 | # .NET Core 61 | project.lock.json 62 | project.fragment.lock.json 63 | artifacts/ 64 | 65 | # Tye 66 | .tye/ 67 | 68 | # ASP.NET Scaffolding 69 | ScaffoldingReadMe.txt 70 | 71 | # StyleCop 72 | StyleCopReport.xml 73 | 74 | # Files built by Visual Studio 75 | *_i.c 76 | *_p.c 77 | *_h.h 78 | *.ilk 79 | *.meta 80 | *.obj 81 | *.iobj 82 | *.pch 83 | *.pdb 84 | *.ipdb 85 | *.pgc 86 | *.pgd 87 | *.rsp 88 | *.sbr 89 | *.tlb 90 | *.tli 91 | *.tlh 92 | *.tmp 93 | *.tmp_proj 94 | *_wpftmp.csproj 95 | *.log 96 | *.vspscc 97 | *.vssscc 98 | .builds 99 | *.pidb 100 | *.svclog 101 | *.scc 102 | 103 | # Chutzpah Test files 104 | _Chutzpah* 105 | 106 | # Visual C++ cache files 107 | ipch/ 108 | *.aps 109 | *.ncb 110 | *.opendb 111 | *.opensdf 112 | *.sdf 113 | *.cachefile 114 | *.VC.db 115 | *.VC.VC.opendb 116 | 117 | # Visual Studio profiler 118 | *.psess 119 | *.vsp 120 | *.vspx 121 | *.sap 122 | 123 | # Visual Studio Trace Files 124 | *.e2e 125 | 126 | # TFS 2012 Local Workspace 127 | $tf/ 128 | 129 | # Guidance Automation Toolkit 130 | *.gpState 131 | 132 | # ReSharper is a .NET coding add-in 133 | _ReSharper*/ 134 | *.[Rr]e[Ss]harper 135 | *.DotSettings.user 136 | 137 | # TeamCity is a build add-in 138 | _TeamCity* 139 | 140 | # DotCover is a Code Coverage Tool 141 | *.dotCover 142 | 143 | # AxoCover is a Code Coverage Tool 144 | .axoCover/* 145 | !.axoCover/settings.json 146 | 147 | # Coverlet is a free, cross platform Code Coverage Tool 148 | coverage*.json 149 | coverage*.xml 150 | coverage*.info 151 | 152 | # Visual Studio code coverage results 153 | *.coverage 154 | *.coveragexml 155 | 156 | # NCrunch 157 | _NCrunch_* 158 | .*crunch*.local.xml 159 | nCrunchTemp_* 160 | 161 | # MightyMoose 162 | *.mm.* 163 | AutoTest.Net/ 164 | 165 | # Web workbench (sass) 166 | .sass-cache/ 167 | 168 | # Installshield output folder 169 | [Ee]xpress/ 170 | 171 | # DocProject is a documentation generator add-in 172 | DocProject/buildhelp/ 173 | DocProject/Help/*.HxT 174 | DocProject/Help/*.HxC 175 | DocProject/Help/*.hhc 176 | DocProject/Help/*.hhk 177 | DocProject/Help/*.hhp 178 | DocProject/Help/Html2 179 | DocProject/Help/html 180 | 181 | # Click-Once directory 182 | publish/ 183 | 184 | # Publish Web Output 185 | *.[Pp]ublish.xml 186 | *.azurePubxml 187 | # Note: Comment the next line if you want to checkin your web deploy settings, 188 | # but database connection strings (with potential passwords) will be unencrypted 189 | *.pubxml 190 | *.publishproj 191 | 192 | # Microsoft Azure Web App publish settings. Comment the next line if you want to 193 | # checkin your Azure Web App publish settings, but sensitive information contained 194 | # in these scripts will be unencrypted 195 | PublishScripts/ 196 | 197 | # NuGet Packages 198 | *.nupkg 199 | # NuGet Symbol Packages 200 | *.snupkg 201 | # The packages folder can be ignored because of Package Restore 202 | **/[Pp]ackages/* 203 | # except build/, which is used as an MSBuild target. 204 | !**/[Pp]ackages/build/ 205 | # Uncomment if necessary however generally it will be regenerated when needed 206 | #!**/[Pp]ackages/repositories.config 207 | # NuGet v3's project.json files produces more ignorable files 208 | *.nuget.props 209 | *.nuget.targets 210 | 211 | # Microsoft Azure Build Output 212 | csx/ 213 | *.build.csdef 214 | 215 | # Microsoft Azure Emulator 216 | ecf/ 217 | rcf/ 218 | 219 | # Windows Store app package directories and files 220 | AppPackages/ 221 | BundleArtifacts/ 222 | Package.StoreAssociation.xml 223 | _pkginfo.txt 224 | *.appx 225 | *.appxbundle 226 | *.appxupload 227 | 228 | # Visual Studio cache files 229 | # files ending in .cache can be ignored 230 | *.[Cc]ache 231 | # but keep track of directories ending in .cache 232 | !?*.[Cc]ache/ 233 | 234 | # Others 235 | ClientBin/ 236 | ~$* 237 | *~ 238 | *.dbmdl 239 | *.dbproj.schemaview 240 | *.jfm 241 | *.pfx 242 | *.publishsettings 243 | orleans.codegen.cs 244 | 245 | # Including strong name files can present a security risk 246 | # (https://github.com/github/gitignore/pull/2483#issue-259490424) 247 | #*.snk 248 | 249 | # Since there are multiple workflows, uncomment next line to ignore bower_components 250 | # (https://github.com/github/gitignore/pull/1529#issuecomment-104372622) 251 | #bower_components/ 252 | 253 | # RIA/Silverlight projects 254 | Generated_Code/ 255 | 256 | # Backup & report files from converting an old project file 257 | # to a newer Visual Studio version. Backup files are not needed, 258 | # because we have git ;-) 259 | _UpgradeReport_Files/ 260 | Backup*/ 261 | UpgradeLog*.XML 262 | UpgradeLog*.htm 263 | ServiceFabricBackup/ 264 | *.rptproj.bak 265 | 266 | # SQL Server files 267 | *.mdf 268 | *.ldf 269 | *.ndf 270 | 271 | # Business Intelligence projects 272 | *.rdl.data 273 | *.bim.layout 274 | *.bim_*.settings 275 | *.rptproj.rsuser 276 | *- [Bb]ackup.rdl 277 | *- [Bb]ackup ([0-9]).rdl 278 | *- [Bb]ackup ([0-9][0-9]).rdl 279 | 280 | # Microsoft Fakes 281 | FakesAssemblies/ 282 | 283 | # GhostDoc plugin setting file 284 | *.GhostDoc.xml 285 | 286 | # Node.js Tools for Visual Studio 287 | .ntvs_analysis.dat 288 | node_modules/ 289 | 290 | # Visual Studio 6 build log 291 | *.plg 292 | 293 | # Visual Studio 6 workspace options file 294 | *.opt 295 | 296 | # Visual Studio 6 auto-generated workspace file (contains which files were open etc.) 297 | *.vbw 298 | 299 | # Visual Studio LightSwitch build output 300 | **/*.HTMLClient/GeneratedArtifacts 301 | **/*.DesktopClient/GeneratedArtifacts 302 | **/*.DesktopClient/ModelManifest.xml 303 | **/*.Server/GeneratedArtifacts 304 | **/*.Server/ModelManifest.xml 305 | _Pvt_Extensions 306 | 307 | # Paket dependency manager 308 | .paket/paket.exe 309 | paket-files/ 310 | 311 | # FAKE - F# Make 312 | .fake/ 313 | 314 | # CodeRush personal settings 315 | .cr/personal 316 | 317 | # Python Tools for Visual Studio (PTVS) 318 | __pycache__/ 319 | *.pyc 320 | 321 | # Cake - Uncomment if you are using it 322 | # tools/** 323 | # !tools/packages.config 324 | 325 | # Tabs Studio 326 | *.tss 327 | 328 | # Telerik's JustMock configuration file 329 | *.jmconfig 330 | 331 | # BizTalk build output 332 | *.btp.cs 333 | *.btm.cs 334 | *.odx.cs 335 | *.xsd.cs 336 | 337 | # OpenCover UI analysis results 338 | OpenCover/ 339 | 340 | # Azure Stream Analytics local run output 341 | ASALocalRun/ 342 | 343 | # MSBuild Binary and Structured Log 344 | *.binlog 345 | 346 | # NVidia Nsight GPU debugger configuration file 347 | *.nvuser 348 | 349 | # MFractors (Xamarin productivity tool) working folder 350 | .mfractor/ 351 | 352 | # Local History for Visual Studio 353 | .localhistory/ 354 | 355 | # BeatPulse healthcheck temp database 356 | healthchecksdb 357 | 358 | # Backup folder for Package Reference Convert tool in Visual Studio 2017 359 | MigrationBackup/ 360 | 361 | # Ionide (cross platform F# VS Code tools) working folder 362 | .ionide/ 363 | 364 | # Fody - auto-generated XML schema 365 | FodyWeavers.xsd 366 | 367 | ## 368 | ## Visual studio for Mac 369 | ## 370 | 371 | 372 | # globs 373 | Makefile.in 374 | *.userprefs 375 | *.usertasks 376 | config.make 377 | config.status 378 | aclocal.m4 379 | install-sh 380 | autom4te.cache/ 381 | *.tar.gz 382 | tarballs/ 383 | test-results/ 384 | 385 | # Mac bundle stuff 386 | *.dmg 387 | *.app 388 | 389 | # content below from: https://github.com/github/gitignore/blob/master/Global/macOS.gitignore 390 | # General 391 | .DS_Store 392 | .AppleDouble 393 | .LSOverride 394 | 395 | # Icon must end with two \r 396 | Icon 397 | 398 | 399 | # Thumbnails 400 | ._* 401 | 402 | # Files that might appear in the root of a volume 403 | .DocumentRevisions-V100 404 | .fseventsd 405 | .Spotlight-V100 406 | .TemporaryItems 407 | .Trashes 408 | .VolumeIcon.icns 409 | .com.apple.timemachine.donotpresent 410 | 411 | # Directories potentially created on remote AFP share 412 | .AppleDB 413 | .AppleDesktop 414 | Network Trash Folder 415 | Temporary Items 416 | .apdisk 417 | 418 | # content below from: https://github.com/github/gitignore/blob/master/Global/Windows.gitignore 419 | # Windows thumbnail cache files 420 | Thumbs.db 421 | ehthumbs.db 422 | ehthumbs_vista.db 423 | 424 | # Dump file 425 | *.stackdump 426 | 427 | # Folder config file 428 | [Dd]esktop.ini 429 | 430 | # Recycle Bin used on file shares 431 | $RECYCLE.BIN/ 432 | 433 | # Windows Installer files 434 | *.cab 435 | *.msi 436 | *.msix 437 | *.msm 438 | *.msp 439 | 440 | # Windows shortcuts 441 | *.lnk 442 | 443 | # JetBrains Rider 444 | .idea/ 445 | *.sln.iml 446 | 447 | ## 448 | ## Visual Studio Code 449 | ## 450 | .vscode/* 451 | !.vscode/settings.json 452 | !.vscode/tasks.json 453 | !.vscode/launch.json 454 | !.vscode/extensions.json 455 | -------------------------------------------------------------------------------- /LINQTut14.Aggregate/LINQTut14.Aggregate.csproj: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | Exe 5 | net6.0 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | -------------------------------------------------------------------------------- /LINQTut14.Aggregate/Program.cs: -------------------------------------------------------------------------------- 1 | using Shared; 2 | using System; 3 | using System.Linq; 4 | 5 | namespace LINQTut14.Aggregation 6 | { 7 | internal class Program 8 | { 9 | private static Random random = new Random(); 10 | 11 | static void Main(string[] args) 12 | { 13 | RunMethod03(); 14 | Console.ReadKey(); 15 | } 16 | 17 | private static void RunMethod01() 18 | { 19 | var names = new[] { "Ali", "Salem", "Abeer", "Reem", "Jalal" }; 20 | // Ali, Salem, .... 21 | 22 | //var output = ""; 23 | //foreach (var item in names) 24 | // output += $"{item},"; 25 | //Console.WriteLine(output.TrimEnd(',')); 26 | 27 | //var output = string.Join(',', names); 28 | //Console.WriteLine(output); 29 | 30 | var commaSeparatedNames = names.Aggregate((a, b) => 31 | { 32 | Console.WriteLine($"a = {a}, b = {b}"); 33 | return $"{a},{b}"; 34 | }); 35 | 36 | } 37 | 38 | private static void RunMethod02() 39 | { 40 | var numbers = new[] { 1, 2, 3, 4, 5 }; 41 | 42 | //var total = 0; 43 | //foreach (var n in numbers) 44 | // total += n; 45 | 46 | var total = numbers.Aggregate(2, (a, b) => a + b); 47 | 48 | Console.WriteLine($"Total: {total}"); 49 | } 50 | 51 | 52 | private static void RunMethod03() 53 | { 54 | var quiz = QuestionBank.All; 55 | 56 | var longestQuestionTitle = quiz[0]; 57 | 58 | Console.WriteLine($"{longestQuestionTitle}"); 59 | Console.WriteLine("-----"); 60 | longestQuestionTitle = 61 | quiz.Aggregate(longestQuestionTitle, 62 | (longest, next) => longest.Title.Length < next.Title.Length ? next : longest, 63 | x => x); 64 | 65 | 66 | 67 | Console.WriteLine($"{longestQuestionTitle}"); 68 | } 69 | } 70 | } 71 | -------------------------------------------------------------------------------- /LINQTut14.StandardMethod/LINQTut14.StandardMethod.csproj: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | Exe 5 | net6.0 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | -------------------------------------------------------------------------------- /LINQTut14.StandardMethod/Program.cs: -------------------------------------------------------------------------------- 1 | using Shared; 2 | using System; 3 | using System.Linq; 4 | 5 | namespace LINQTut14.StandardMethod 6 | { 7 | internal class Program 8 | { 9 | static void Main(string[] args) 10 | { 11 | RunAvg(); 12 | Console.ReadKey(); 13 | } 14 | 15 | private static void RunCount() 16 | { 17 | var quiz = QuestionBank.GetQuestionRange(Enumerable.Range(1, 200)); 18 | Console.WriteLine($"Total Questions: {quiz.Count()}"); 19 | Console.WriteLine($"Total Questions With One Mark : {quiz.Count(x => x.Marks == 1)}"); 20 | Console.WriteLine($"Total Questions With One Mark : {quiz.Where(x => x.Marks == 1).Count()}"); 21 | Console.WriteLine($"Total Questions With One Mark Using LongCount : {quiz.Where(x => x.Marks == 1).LongCount()}"); 22 | } 23 | 24 | private static void RunMax() 25 | { 26 | var quiz = QuestionBank.GetQuestionRange(Enumerable.Range(1, 200)); 27 | var maximumMark = quiz.Max(x => x.Marks); 28 | //var maximumMark = quiz.Where(x => x.Choices.Count < 3).Max(x => x.Marks); 29 | Console.WriteLine($"Maximum Mark: {maximumMark}"); 30 | } 31 | private static void RunMaxBy() 32 | { 33 | var quiz = QuestionBank.GetQuestionRange(Enumerable.Range(1, 200)); 34 | var maximumQuestionMark = quiz.MaxBy(x => x.Marks); 35 | //var maximumMark = quiz.Where(x => x.Choices.Count < 3).Max(x => x.Marks); 36 | Console.WriteLine($"{maximumQuestionMark}"); 37 | } 38 | private static void RunMin() 39 | { 40 | var quiz = QuestionBank.GetQuestionRange(Enumerable.Range(1, 200)); 41 | var maximumMark = quiz.Min(x => x.Marks); 42 | //var minimumMark = quiz.Where(x => x.Choices.Count < 3).Min(x => x.Marks); 43 | Console.WriteLine($"Minimum Mark: {maximumMark}"); 44 | } 45 | private static void RunMinBy() 46 | { 47 | var quiz = QuestionBank.GetQuestionRange(Enumerable.Range(1, 200)); 48 | var minimumQuestionMark = quiz.MinBy(x => x.Marks); 49 | //var minimumMark = quiz.Where(x => x.Choices.Count < 3).MinBy(x => x.Marks); 50 | Console.WriteLine($"{minimumQuestionMark}"); 51 | } 52 | 53 | private static void RunSum() 54 | { 55 | var quiz = QuestionBank.GetQuestionRange(Enumerable.Range(1, 200)); 56 | var total = quiz.Sum(x => x.Marks); 57 | Console.WriteLine($"total: {total}"); 58 | } 59 | 60 | private static void RunAvg() 61 | { 62 | var quiz = QuestionBank.GetQuestionRange(Enumerable.Range(1, 200)); 63 | var average = quiz.Average(x => x.Marks); 64 | Console.WriteLine($"average: {average.ToString("#.##")}"); 65 | } 66 | } 67 | } 68 | -------------------------------------------------------------------------------- /LINQTut14.sln: -------------------------------------------------------------------------------- 1 |  2 | Microsoft Visual Studio Solution File, Format Version 12.00 3 | # Visual Studio Version 17 4 | VisualStudioVersion = 17.0.32112.339 5 | MinimumVisualStudioVersion = 10.0.40219.1 6 | Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "Shared", "Shared\Shared.csproj", "{6D3FC11B-A08A-475F-856F-DD45B0B08D16}" 7 | EndProject 8 | Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "LINQTut14.Aggregate", "LINQTut14.Aggregate\LINQTut14.Aggregate.csproj", "{BCE8C812-83E1-4C05-BBA2-F1C38F6569F0}" 9 | EndProject 10 | Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "LINQTut14.StandardMethod", "LINQTut14.StandardMethod\LINQTut14.StandardMethod.csproj", "{A718B8A2-522E-4C75-B2DF-7C94A2159FEF}" 11 | EndProject 12 | Global 13 | GlobalSection(SolutionConfigurationPlatforms) = preSolution 14 | Debug|Any CPU = Debug|Any CPU 15 | Release|Any CPU = Release|Any CPU 16 | EndGlobalSection 17 | GlobalSection(ProjectConfigurationPlatforms) = postSolution 18 | {6D3FC11B-A08A-475F-856F-DD45B0B08D16}.Debug|Any CPU.ActiveCfg = Debug|Any CPU 19 | {6D3FC11B-A08A-475F-856F-DD45B0B08D16}.Debug|Any CPU.Build.0 = Debug|Any CPU 20 | {6D3FC11B-A08A-475F-856F-DD45B0B08D16}.Release|Any CPU.ActiveCfg = Release|Any CPU 21 | {6D3FC11B-A08A-475F-856F-DD45B0B08D16}.Release|Any CPU.Build.0 = Release|Any CPU 22 | {BCE8C812-83E1-4C05-BBA2-F1C38F6569F0}.Debug|Any CPU.ActiveCfg = Debug|Any CPU 23 | {BCE8C812-83E1-4C05-BBA2-F1C38F6569F0}.Debug|Any CPU.Build.0 = Debug|Any CPU 24 | {BCE8C812-83E1-4C05-BBA2-F1C38F6569F0}.Release|Any CPU.ActiveCfg = Release|Any CPU 25 | {BCE8C812-83E1-4C05-BBA2-F1C38F6569F0}.Release|Any CPU.Build.0 = Release|Any CPU 26 | {A718B8A2-522E-4C75-B2DF-7C94A2159FEF}.Debug|Any CPU.ActiveCfg = Debug|Any CPU 27 | {A718B8A2-522E-4C75-B2DF-7C94A2159FEF}.Debug|Any CPU.Build.0 = Debug|Any CPU 28 | {A718B8A2-522E-4C75-B2DF-7C94A2159FEF}.Release|Any CPU.ActiveCfg = Release|Any CPU 29 | {A718B8A2-522E-4C75-B2DF-7C94A2159FEF}.Release|Any CPU.Build.0 = Release|Any CPU 30 | EndGlobalSection 31 | GlobalSection(SolutionProperties) = preSolution 32 | HideSolutionNode = FALSE 33 | EndGlobalSection 34 | GlobalSection(ExtensibilityGlobals) = postSolution 35 | SolutionGuid = {A5BEE0BF-7B2F-45E2-AC3A-EDF3F31DF5F2} 36 | EndGlobalSection 37 | EndGlobal 38 | -------------------------------------------------------------------------------- /Shared/Choice.cs: -------------------------------------------------------------------------------- 1 | namespace Shared 2 | { 3 | public class Choice 4 | { 5 | public int Order { get; set; } 6 | public string Description { get; set; } 7 | } 8 | } 9 | -------------------------------------------------------------------------------- /Shared/Question.cs: -------------------------------------------------------------------------------- 1 | using System.Collections.Generic; 2 | 3 | namespace Shared 4 | { 5 | public class Question 6 | { 7 | public string Title { get; set; } 8 | public List Choices { get; set; } = new(); 9 | public int CorrectAnswer { get; set; } 10 | 11 | public int Marks { get; set; } 12 | 13 | public override string ToString() 14 | { 15 | var choices = ""; 16 | 17 | foreach (var item in Choices) 18 | { 19 | choices += $"\n\t{item.Order}) {item.Description}"; 20 | } 21 | 22 | return $"{Title} [{Marks} marks]" + 23 | $"{choices}"; 24 | 25 | 26 | } 27 | } 28 | } 29 | -------------------------------------------------------------------------------- /Shared/QuestionBank.cs: -------------------------------------------------------------------------------- 1 | using System; 2 | using System.Collections.Generic; 3 | using System.Linq; 4 | 5 | namespace Shared 6 | 7 | { 8 | public static class QuestionBank 9 | { 10 | private static Random random = new Random(); 11 | 12 | public static IEnumerable Randomize(int count) 13 | { 14 | if (All.Count < count) return All; 15 | return AllShuffled.Take(count); 16 | } 17 | 18 | public static Question PickOne() 19 | { 20 | return All[random.Next(0, All.Count)]; 21 | } 22 | 23 | public static void ToQuiz(this IEnumerable questions) 24 | { 25 | foreach (var question in questions) 26 | { 27 | Console.WriteLine(question); 28 | Console.WriteLine(); 29 | 30 | } 31 | } 32 | 33 | public static List GetQuestionRange(IEnumerable range) 34 | { 35 | return All.Where((x, i) => range.Contains(i)).ToList(); 36 | } 37 | 38 | public static List All => new List() { 39 | // Question #1 40 | 41 | new Question { 42 | Title = "Q #1: In the streaming stored audio/video category of audio/video services", 43 | CorrectAnswer = 1, 44 | Marks = 7, 45 | Choices = new List < Choice > { 46 | new Choice { 47 | Order = 1, 48 | Description = "Files are compressed and stored on the server" 49 | }, 50 | new Choice { 51 | Order = 2, 52 | Description = "A user listens to a broadcast audio and video through the internet" 53 | }, 54 | new Choice { 55 | Order = 3, 56 | Description = "People use the Internet to interactively communicate with one another" 57 | }, 58 | new Choice { 59 | Order = 4, 60 | Description = "None of the above" 61 | } 62 | } 63 | }, 64 | new Question { 65 | Title = "Q #2: In the streaming live audio/video category of audio/video services", 66 | CorrectAnswer = 1, 67 | Marks = 4, 68 | Choices = new List < Choice > { 69 | new Choice { 70 | Order = 1, 71 | Description = "Files are compressed and stored on the server" 72 | }, 73 | new Choice { 74 | Order = 2, 75 | Description = "A user listens to a broadcast audio and video through the internet" 76 | }, 77 | new Choice { 78 | Order = 3, 79 | Description = "People use the Internet to interactively communicate with one another" 80 | }, 81 | new Choice { 82 | Order = 4, 83 | Description = "None of the above" 84 | } 85 | } 86 | }, 87 | new Question { 88 | Title = "Q #3: In the interactive audio/video category of audio/video services", 89 | CorrectAnswer = 1, 90 | Marks = 1, 91 | Choices = new List < Choice > { 92 | new Choice { 93 | Order = 1, 94 | Description = "Files are compressed and stored on the server" 95 | }, 96 | new Choice { 97 | Order = 2, 98 | Description = "A user listens to a broadcast audio and video through the internet" 99 | }, 100 | new Choice { 101 | Order = 3, 102 | Description = "People use the Internet to interactively communicate with one another" 103 | }, 104 | new Choice { 105 | Order = 4, 106 | Description = "None of the above" 107 | } 108 | } 109 | }, 110 | new Question { 111 | Title = "Q #4: Streaming stored audio/video is sometimes referred to as on-demand audio/video", 112 | CorrectAnswer = 1, 113 | Marks = 3, 114 | Choices = new List < Choice > { 115 | new Choice { 116 | Order = 1, 117 | Description = "True" 118 | }, 119 | new Choice { 120 | Order = 2, 121 | Description = "False" 122 | } 123 | } 124 | }, 125 | new Question { 126 | Title = "Q #5: An example of streaming stored audio/video is Internet radio", 127 | CorrectAnswer = 1, 128 | Marks = 9, 129 | Choices = new List < Choice > { 130 | new Choice { 131 | Order = 1, 132 | Description = "True" 133 | }, 134 | new Choice { 135 | Order = 2, 136 | Description = "False" 137 | } 138 | } 139 | }, 140 | new Question { 141 | Title = "Q #6: Streaming live audio/video refers to on-demand requests for compressed audio/video", 142 | CorrectAnswer = 1, 143 | Marks = 2, 144 | Choices = new List < Choice > { 145 | new Choice { 146 | Order = 1, 147 | Description = "True" 148 | }, 149 | new Choice { 150 | Order = 2, 151 | Description = "False" 152 | } 153 | } 154 | }, 155 | new Question { 156 | Title = "Q #7: An example of interactive audio/video is Internet teleconferencing", 157 | CorrectAnswer = 1, 158 | Marks = 9, 159 | Choices = new List < Choice > { 160 | new Choice { 161 | Order = 1, 162 | Description = "True" 163 | }, 164 | new Choice { 165 | Order = 2, 166 | Description = "False" 167 | } 168 | } 169 | }, 170 | new Question { 171 | Title = "Q #8: A raw piece of information, whether audio or video, must be compressed and then digitized", 172 | CorrectAnswer = 1, 173 | Marks = 2, 174 | Choices = new List < Choice > { 175 | new Choice { 176 | Order = 1, 177 | Description = "True" 178 | }, 179 | new Choice { 180 | Order = 2, 181 | Description = "False" 182 | } 183 | } 184 | }, 185 | new Question { 186 | Title = "Q #9: A raw piece of information, whether audio or video, must be digitized and then compressed", 187 | CorrectAnswer = 1, 188 | Marks = 9, 189 | Choices = new List < Choice > { 190 | new Choice { 191 | Order = 1, 192 | Description = "True" 193 | }, 194 | new Choice { 195 | Order = 2, 196 | Description = "False" 197 | } 198 | } 199 | }, 200 | new Question { 201 | Title = "Q #10: Digitization refers to", 202 | CorrectAnswer = 1, 203 | Marks = 5, 204 | Choices = new List < Choice > { 205 | new Choice { 206 | Order = 1, 207 | Description = "Conversion to a stream of numbers, and preferably these numbers should be integers for efficiency" 208 | }, 209 | new Choice { 210 | Order = 2, 211 | Description = "The process of coding that will effectively reduce the total number of bits needed to represent certain information" 212 | }, 213 | new Choice { 214 | Order = 3, 215 | Description = "The process of converting information into an analog format" 216 | }, 217 | new Choice { 218 | Order = 4, 219 | Description = "Conversion to a stream of numbers, and preferably these numbers should be decimals for efficiency" 220 | } 221 | } 222 | }, 223 | new Question { 224 | Title = "Q #11: Compression refers to", 225 | CorrectAnswer = 1, 226 | Marks = 3, 227 | Choices = new List < Choice > { 228 | new Choice { 229 | Order = 1, 230 | Description = "Conversion to a stream of numbers, and preferably these numbers should be integers for efficiency" 231 | }, 232 | new Choice { 233 | Order = 2, 234 | Description = "The process of coding that will effectively reduce the total number of bits needed to represent certain information" 235 | }, 236 | new Choice { 237 | Order = 3, 238 | Description = "The process of converting information into an analog format" 239 | }, 240 | new Choice { 241 | Order = 4, 242 | Description = "Conversion to a stream of numbers, and preferably these numbers should be decimals for efficiency" 243 | } 244 | } 245 | }, 246 | new Question { 247 | Title = "Q #12: Analog frequencies represents the sound frequency as a function of time", 248 | CorrectAnswer = 1, 249 | Marks = 3, 250 | Choices = new List < Choice > { 251 | new Choice { 252 | Order = 1, 253 | Description = "True" 254 | }, 255 | new Choice { 256 | Order = 2, 257 | Description = "False" 258 | } 259 | } 260 | }, 261 | new Question { 262 | Title = "Q #13: Analog frequencies represents the sound amplitude as a function of time", 263 | CorrectAnswer = 1, 264 | Marks = 5, 265 | Choices = new List < Choice > { 266 | new Choice { 267 | Order = 1, 268 | Description = "True" 269 | }, 270 | new Choice { 271 | Order = 2, 272 | Description = "False" 273 | } 274 | } 275 | }, 276 | new Question { 277 | Title = "Q #14: To digitize an analog signal, the signal must be sampled in the dimension of time, as well as the dimension of amplitude", 278 | CorrectAnswer = 1, 279 | Marks = 8, 280 | Choices = new List < Choice > { 281 | new Choice { 282 | Order = 1, 283 | Description = "True" 284 | }, 285 | new Choice { 286 | Order = 2, 287 | Description = "False" 288 | } 289 | } 290 | }, 291 | new Question { 292 | Title = "Q #15: To digitize an analog signal, the signal must be sampled in the dimension of time, as well as the dimension of frequency", 293 | CorrectAnswer = 1, 294 | Marks = 6, 295 | Choices = new List < Choice > { 296 | new Choice { 297 | Order = 1, 298 | Description = "True" 299 | }, 300 | new Choice { 301 | Order = 2, 302 | Description = "False" 303 | } 304 | } 305 | }, 306 | new Question { 307 | Title = "Q #16: Quantization refers to", 308 | CorrectAnswer = 1, 309 | Marks = 8, 310 | Choices = new List < Choice > { 311 | new Choice { 312 | Order = 1, 313 | Description = "Sampling in the voltage dimension" 314 | }, 315 | new Choice { 316 | Order = 2, 317 | Description = "Sampling in the frequency dimension" 318 | }, 319 | new Choice { 320 | Order = 3, 321 | Description = "Sampling in the time dimension" 322 | }, 323 | new Choice { 324 | Order = 4, 325 | Description = "Sampling in the bitrate dimension" 326 | } 327 | } 328 | }, 329 | new Question { 330 | Title = "Q #17: Sampling referes to the process of sampling the time dimension", 331 | CorrectAnswer = 1, 332 | Marks = 3, 333 | Choices = new List < Choice > { 334 | new Choice { 335 | Order = 1, 336 | Description = "True" 337 | }, 338 | new Choice { 339 | Order = 2, 340 | Description = "False" 341 | } 342 | } 343 | }, 344 | new Question { 345 | Title = "Q #18: Sampling referes to the process of sampling the amplitude dimension", 346 | CorrectAnswer = 1, 347 | Marks = 9, 348 | Choices = new List < Choice > { 349 | new Choice { 350 | Order = 1, 351 | Description = "True" 352 | }, 353 | new Choice { 354 | Order = 2, 355 | Description = "False" 356 | } 357 | } 358 | }, 359 | new Question { 360 | Title = "Q #19: Nyquist thereom states", 361 | CorrectAnswer = 1, 362 | Marks = 9, 363 | Choices = new List < Choice > { 364 | new Choice { 365 | Order = 1, 366 | Description = "If the highest frequency of the signal is f, we need to sample the signal 2f times per second" 367 | }, 368 | new Choice { 369 | Order = 2, 370 | Description = "If the highest frequency of the signal is f, we need to sample the signal f times per second" 371 | }, 372 | new Choice { 373 | Order = 3, 374 | Description = "If the highest frequency of the signal is f, we need to sample the signal 3f times per second" 375 | }, 376 | new Choice { 377 | Order = 4, 378 | Description = "If the highest frequency of the signal is f, we need to sample the signal 4f times per second" 379 | } 380 | } 381 | }, 382 | new Question { 383 | Title = "Q #20: The process of converting from analog audio to compressed binary form sampling quantization, and encoding is known as:", 384 | CorrectAnswer = 1, 385 | Marks = 4, 386 | Choices = new List < Choice > { 387 | new Choice { 388 | Order = 1, 389 | Description = "Pulse code modulation" 390 | }, 391 | new Choice { 392 | Order = 2, 393 | Description = "Polar quantization" 394 | }, 395 | new Choice { 396 | Order = 3, 397 | Description = "Pulse code quantization" 398 | }, 399 | new Choice { 400 | Order = 4, 401 | Description = "Polar code modulation" 402 | } 403 | } 404 | }, 405 | new Question { 406 | Title = "Q #21: A video consists of a sequence of frames", 407 | CorrectAnswer = 1, 408 | Marks = 8, 409 | Choices = new List < Choice > { 410 | new Choice { 411 | Order = 1, 412 | Description = "True" 413 | }, 414 | new Choice { 415 | Order = 2, 416 | Description = "False" 417 | } 418 | } 419 | }, 420 | new Question { 421 | Title = "Q #22: The standard number of frames per second of a video is 25 frames per second", 422 | CorrectAnswer = 1, 423 | Marks = 1, 424 | Choices = new List < Choice > { 425 | new Choice { 426 | Order = 1, 427 | Description = "True" 428 | }, 429 | new Choice { 430 | Order = 2, 431 | Description = "False" 432 | } 433 | } 434 | }, 435 | new Question { 436 | Title = "Q #23: In North America, a common number of frames per second _________ frames per second", 437 | CorrectAnswer = 1, 438 | Marks = 6, 439 | Choices = new List < Choice > { 440 | new Choice { 441 | Order = 1, 442 | Description = "20" 443 | }, 444 | new Choice { 445 | Order = 2, 446 | Description = "35" 447 | }, 448 | new Choice { 449 | Order = 3, 450 | Description = "25" 451 | }, 452 | new Choice { 453 | Order = 4, 454 | Description = "30" 455 | } 456 | } 457 | }, 458 | new Question { 459 | Title = "Q #24: To avoid a condition called flickering, a frame needs to be refreshed", 460 | CorrectAnswer = 1, 461 | Marks = 1, 462 | Choices = new List < Choice > { 463 | new Choice { 464 | Order = 1, 465 | Description = "True" 466 | }, 467 | new Choice { 468 | Order = 2, 469 | Description = "False" 470 | } 471 | } 472 | }, 473 | new Question { 474 | Title = "Q #25: Pixels are also known as picture elements", 475 | CorrectAnswer = 1, 476 | Marks = 2, 477 | Choices = new List < Choice > { 478 | new Choice { 479 | Order = 1, 480 | Description = "True" 481 | }, 482 | new Choice { 483 | Order = 2, 484 | Description = "False" 485 | } 486 | } 487 | }, 488 | new Question { 489 | Title = "Q #26: For colour TV, each pixel represents 8 bits", 490 | CorrectAnswer = 1, 491 | Marks = 4, 492 | Choices = new List < Choice > { 493 | new Choice { 494 | Order = 1, 495 | Description = "True" 496 | }, 497 | new Choice { 498 | Order = 2, 499 | Description = "False" 500 | } 501 | } 502 | }, 503 | new Question { 504 | Title = "Q #27: For black and white TV, each pixel represents 8 bits", 505 | CorrectAnswer = 1, 506 | Marks = 5, 507 | Choices = new List < Choice > { 508 | new Choice { 509 | Order = 1, 510 | Description = "True" 511 | }, 512 | new Choice { 513 | Order = 2, 514 | Description = "False" 515 | } 516 | } 517 | }, 518 | new Question { 519 | Title = "Q #28: For colour TV, each pixel designates 8 bits for each primary colour (red, blue, yellow)", 520 | CorrectAnswer = 1, 521 | Marks = 7, 522 | Choices = new List < Choice > { 523 | new Choice { 524 | Order = 1, 525 | Description = "True" 526 | }, 527 | new Choice { 528 | Order = 2, 529 | Description = "False" 530 | } 531 | } 532 | }, 533 | new Question { 534 | Title = "Q #29: A video's dimensions are 1920x1080 pixels (in colour), and is played at 25 frames per second (with refreshing). This means we need a ___________ Mbps bitrate", 535 | CorrectAnswer = 1, 536 | Marks = 1, 537 | Choices = new List < Choice > { 538 | new Choice { 539 | Order = 1, 540 | Description = "944" 541 | }, 542 | new Choice { 543 | Order = 2, 544 | Description = "2488" 545 | }, 546 | new Choice { 547 | Order = 3, 548 | Description = "1024" 549 | }, 550 | new Choice { 551 | Order = 4, 552 | Description = "2048" 553 | } 554 | } 555 | }, 556 | new Question { 557 | Title = "Q #30: In ______________ encoding, the differences between the samples are encoded instead of encoding all the sampled values", 558 | CorrectAnswer = 1, 559 | Marks = 5, 560 | Choices = new List < Choice > { 561 | new Choice { 562 | Order = 1, 563 | Description = "Predictive" 564 | }, 565 | new Choice { 566 | Order = 2, 567 | Description = "Perceptual" 568 | }, 569 | new Choice { 570 | Order = 3, 571 | Description = "Perpetual" 572 | }, 573 | new Choice { 574 | Order = 4, 575 | Description = "Compressed" 576 | } 577 | } 578 | }, 579 | new Question { 580 | Title = "Q #31: Predictive encoding is often used for creating CD-quality audio", 581 | CorrectAnswer = 1, 582 | Marks = 7, 583 | Choices = new List < Choice > { 584 | new Choice { 585 | Order = 1, 586 | Description = "True" 587 | }, 588 | new Choice { 589 | Order = 2, 590 | Description = "False" 591 | } 592 | } 593 | }, 594 | new Question { 595 | Title = "Q #32: Predictive encoding is often used for speech", 596 | CorrectAnswer = 1, 597 | Marks = 1, 598 | Choices = new List < Choice > { 599 | new Choice { 600 | Order = 1, 601 | Description = "True" 602 | }, 603 | new Choice { 604 | Order = 2, 605 | Description = "False" 606 | } 607 | } 608 | }, 609 | new Question { 610 | Title = "Q #33: The idea of _____________ encoding is based on the limitations of our auditory system", 611 | CorrectAnswer = 1, 612 | Marks = 8, 613 | Choices = new List < Choice > { 614 | new Choice { 615 | Order = 1, 616 | Description = "Predictive" 617 | }, 618 | new Choice { 619 | Order = 2, 620 | Description = "Perceptual" 621 | }, 622 | new Choice { 623 | Order = 3, 624 | Description = "Perpetual" 625 | }, 626 | new Choice { 627 | Order = 4, 628 | Description = "Compressed" 629 | } 630 | } 631 | }, 632 | new Question { 633 | Title = "Q #34: Perceptual encoding is often used for creating CD-quality audio", 634 | CorrectAnswer = 1, 635 | Marks = 3, 636 | Choices = new List < Choice > { 637 | new Choice { 638 | Order = 1, 639 | Description = "True" 640 | }, 641 | new Choice { 642 | Order = 2, 643 | Description = "False" 644 | } 645 | } 646 | }, 647 | new Question { 648 | Title = "Q #35: Perceptual encoding is often used for speech", 649 | CorrectAnswer = 1, 650 | Marks = 5, 651 | Choices = new List < Choice > { 652 | new Choice { 653 | Order = 1, 654 | Description = "True" 655 | }, 656 | new Choice { 657 | Order = 2, 658 | Description = "False" 659 | } 660 | } 661 | }, 662 | new Question { 663 | Title = "Q #36: MP3 uses predictive encoding", 664 | CorrectAnswer = 1, 665 | Marks = 3, 666 | Choices = new List < Choice > { 667 | new Choice { 668 | Order = 1, 669 | Description = "True" 670 | }, 671 | new Choice { 672 | Order = 2, 673 | Description = "False" 674 | } 675 | } 676 | }, 677 | new Question { 678 | Title = "Q #37: JPEG is a standard which is used to compress images", 679 | CorrectAnswer = 1, 680 | Marks = 5, 681 | Choices = new List < Choice > { 682 | new Choice { 683 | Order = 1, 684 | Description = "True" 685 | }, 686 | new Choice { 687 | Order = 2, 688 | Description = "False" 689 | } 690 | } 691 | }, 692 | new Question { 693 | Title = "Q #38: MPEG is a standard which is used to compress audio", 694 | CorrectAnswer = 1, 695 | Marks = 7, 696 | Choices = new List < Choice > { 697 | new Choice { 698 | Order = 1, 699 | Description = "True" 700 | }, 701 | new Choice { 702 | Order = 2, 703 | Description = "False" 704 | } 705 | } 706 | }, 707 | new Question { 708 | Title = "Q #39: JPEG works by", 709 | CorrectAnswer = 1, 710 | Marks = 3, 711 | Choices = new List < Choice > { 712 | new Choice { 713 | Order = 1, 714 | Description = "Changing the picture into a linear set of numbers so that redundancies can be found and removed" 715 | }, 716 | new Choice { 717 | Order = 2, 718 | Description = "Partitioning the picture into I-frames, P-frames, and B-frames" 719 | }, 720 | new Choice { 721 | Order = 3, 722 | Description = "Changing the colour of pixels that are similar to the colour of other pixels so they are the same" 723 | }, 724 | new Choice { 725 | Order = 4, 726 | Description = "Changing the size of the picture so that it is smaller" 727 | } 728 | } 729 | }, 730 | new Question { 731 | Title = "Q #40: The steps for JPEG compression are (in order from first to last)", 732 | CorrectAnswer = 1, 733 | Marks = 1, 734 | Choices = new List < Choice > { 735 | new Choice { 736 | Order = 1, 737 | Description = "DCT, Quantization, Data Compression" 738 | }, 739 | new Choice { 740 | Order = 2, 741 | Description = "Quantization, DCT, Data Compression" 742 | }, 743 | new Choice { 744 | Order = 3, 745 | Description = "DCT, Data Compression, Quantization" 746 | }, 747 | new Choice { 748 | Order = 4, 749 | Description = "Data Compression, Quantization, DCT" 750 | } 751 | } 752 | }, 753 | new Question { 754 | Title = "Q #41: Discrete cosine transformation changes a block of 64 values so that the relative relationships between pixels are kept but the redundancies are revealed ", 755 | CorrectAnswer = 1, 756 | Marks = 2, 757 | Choices = new List < Choice > { 758 | new Choice { 759 | Order = 1, 760 | Description = "True" 761 | }, 762 | new Choice { 763 | Order = 2, 764 | Description = "False" 765 | } 766 | } 767 | }, 768 | new Question { 769 | Title = "Q #42: DCT is irreversable ", 770 | CorrectAnswer = 1, 771 | Marks = 6, 772 | Choices = new List < Choice > { 773 | new Choice { 774 | Order = 1, 775 | Description = "True" 776 | }, 777 | new Choice { 778 | Order = 2, 779 | Description = "False" 780 | } 781 | } 782 | }, 783 | new Question { 784 | Title = "Q #43: In DCT, the value T(0, 0) in the transformation table is called the AC value", 785 | CorrectAnswer = 1, 786 | Marks = 3, 787 | Choices = new List < Choice > { 788 | new Choice { 789 | Order = 1, 790 | Description = "True" 791 | }, 792 | new Choice { 793 | Order = 2, 794 | Description = "False" 795 | } 796 | } 797 | }, 798 | new Question { 799 | Title = "Q #44: In DCT, the value T(0, 0) in the transformation table is called the DC value", 800 | CorrectAnswer = 1, 801 | Marks = 6, 802 | Choices = new List < Choice > { 803 | new Choice { 804 | Order = 1, 805 | Description = "True" 806 | }, 807 | new Choice { 808 | Order = 2, 809 | Description = "False" 810 | } 811 | } 812 | }, 813 | new Question { 814 | Title = "Q #45: In DCT, the value T(m, n), exluding the value T(0, 0) in the transformation table, is called the AC value", 815 | CorrectAnswer = 1, 816 | Marks = 7, 817 | Choices = new List < Choice > { 818 | new Choice { 819 | Order = 1, 820 | Description = "True" 821 | }, 822 | new Choice { 823 | Order = 2, 824 | Description = "False" 825 | } 826 | } 827 | }, 828 | new Question { 829 | Title = "Q #46: In DCT, the DC values are the changes in the colours of the pixels", 830 | CorrectAnswer = 1, 831 | Marks = 3, 832 | Choices = new List < Choice > { 833 | new Choice { 834 | Order = 1, 835 | Description = "True" 836 | }, 837 | new Choice { 838 | Order = 2, 839 | Description = "False" 840 | } 841 | } 842 | }, 843 | new Question { 844 | Title = "Q #47: In DCT, the DC value is the average value (multiplied by a constant) of the pixels", 845 | CorrectAnswer = 1, 846 | Marks = 9, 847 | Choices = new List < Choice > { 848 | new Choice { 849 | Order = 1, 850 | Description = "True" 851 | }, 852 | new Choice { 853 | Order = 2, 854 | Description = "False" 855 | } 856 | } 857 | }, 858 | new Question { 859 | Title = "Q #48: JPEG compression is called \"lossy\" because of the", 860 | CorrectAnswer = 1, 861 | Marks = 3, 862 | Choices = new List < Choice > { 863 | new Choice { 864 | Order = 1, 865 | Description = "DCT phase" 866 | }, 867 | new Choice { 868 | Order = 2, 869 | Description = "Quantization phase" 870 | }, 871 | new Choice { 872 | Order = 3, 873 | Description = "Compression phase" 874 | }, 875 | new Choice { 876 | Order = 4, 877 | Description = "JPEG is not \"lossy\"" 878 | } 879 | } 880 | }, 881 | new Question { 882 | Title = "Q #49: For JPEG compression, the compression phase is read", 883 | CorrectAnswer = 1, 884 | Marks = 1, 885 | Choices = new List < Choice > { 886 | new Choice { 887 | Order = 1, 888 | Description = "In a zigzag fashion" 889 | }, 890 | new Choice { 891 | Order = 2, 892 | Description = "Row by row" 893 | }, 894 | new Choice { 895 | Order = 3, 896 | Description = "Column by column" 897 | } 898 | } 899 | }, 900 | new Question { 901 | Title = "Q #50: Compressing video means spatially compressing each frame and temporally compressing a set of frames", 902 | CorrectAnswer = 1, 903 | Marks = 4, 904 | Choices = new List < Choice > { 905 | new Choice { 906 | Order = 1, 907 | Description = "True" 908 | }, 909 | new Choice { 910 | Order = 2, 911 | Description = "False" 912 | } 913 | } 914 | }, 915 | new Question { 916 | Title = "Q #51: Spatial compression in MPEG is done with JPEG (or a modification of it)", 917 | CorrectAnswer = 1, 918 | Marks = 8, 919 | Choices = new List < Choice > { 920 | new Choice { 921 | Order = 1, 922 | Description = "True" 923 | }, 924 | new Choice { 925 | Order = 2, 926 | Description = "False" 927 | } 928 | } 929 | }, 930 | new Question { 931 | Title = "Q #52: Spatial compression in MPEG is done with PNG", 932 | CorrectAnswer = 1, 933 | Marks = 8, 934 | Choices = new List < Choice > { 935 | new Choice { 936 | Order = 1, 937 | Description = "True" 938 | }, 939 | new Choice { 940 | Order = 2, 941 | Description = "False" 942 | } 943 | } 944 | }, 945 | new Question { 946 | Title = "Q #53: The 3 categories that MPEG divides its frames into are", 947 | CorrectAnswer = 1, 948 | Marks = 1, 949 | Choices = new List < Choice > { 950 | new Choice { 951 | Order = 1, 952 | Description = "I-frames, P-frames, and B-frames" 953 | }, 954 | new Choice { 955 | Order = 2, 956 | Description = "A-frames, B-frames, and C-frames" 957 | }, 958 | new Choice { 959 | Order = 3, 960 | Description = "B-frames, P-frames, and R-frames" 961 | }, 962 | new Choice { 963 | Order = 4, 964 | Description = "T-frames, I-frames, and B-frames" 965 | } 966 | } 967 | }, 968 | new Question { 969 | Title = "Q #54: ___________ is an independent frame that is not related to any other frame", 970 | CorrectAnswer = 1, 971 | Marks = 1, 972 | Choices = new List < Choice > { 973 | new Choice { 974 | Order = 1, 975 | Description = "I-frames" 976 | }, 977 | new Choice { 978 | Order = 2, 979 | Description = "P-frames" 980 | }, 981 | new Choice { 982 | Order = 3, 983 | Description = "B-frames" 984 | } 985 | } 986 | }, 987 | new Question { 988 | Title = "Q #55: ___________ is predicted frame that is related to the preceding frame", 989 | CorrectAnswer = 1, 990 | Marks = 2, 991 | Choices = new List < Choice > { 992 | new Choice { 993 | Order = 1, 994 | Description = "I-frames" 995 | }, 996 | new Choice { 997 | Order = 2, 998 | Description = "P-frames" 999 | }, 1000 | new Choice { 1001 | Order = 3, 1002 | Description = "B-frames" 1003 | } 1004 | } 1005 | }, 1006 | new Question { 1007 | Title = "Q #56: ___________ is a bidirectional frame that is related to the preceding and following frame", 1008 | CorrectAnswer = 1, 1009 | Marks = 7, 1010 | Choices = new List < Choice > { 1011 | new Choice { 1012 | Order = 1, 1013 | Description = "I-frames" 1014 | }, 1015 | new Choice { 1016 | Order = 2, 1017 | Description = "P-frames" 1018 | }, 1019 | new Choice { 1020 | Order = 3, 1021 | Description = "B-frames" 1022 | } 1023 | } 1024 | }, 1025 | new Question { 1026 | Title = "Q #57: A B-frame can be related to another B-frame", 1027 | CorrectAnswer = 1, 1028 | Marks = 7, 1029 | Choices = new List < Choice > { 1030 | new Choice { 1031 | Order = 1, 1032 | Description = "True" 1033 | }, 1034 | new Choice { 1035 | Order = 2, 1036 | Description = "False" 1037 | } 1038 | } 1039 | }, 1040 | new Question { 1041 | Title = "Q #58: A P-frame can be related to an I-frame", 1042 | CorrectAnswer = 1, 1043 | Marks = 1, 1044 | Choices = new List < Choice > { 1045 | new Choice { 1046 | Order = 1, 1047 | Description = "True" 1048 | }, 1049 | new Choice { 1050 | Order = 2, 1051 | Description = "False" 1052 | } 1053 | } 1054 | }, 1055 | new Question { 1056 | Title = "Q #59: When using only a web server to download an audio/video file, the file can be played before the downloading has finished", 1057 | CorrectAnswer = 1, 1058 | Marks = 1, 1059 | Choices = new List < Choice > { 1060 | new Choice { 1061 | Order = 1, 1062 | Description = "True" 1063 | }, 1064 | new Choice { 1065 | Order = 2, 1066 | Description = "False" 1067 | } 1068 | } 1069 | }, 1070 | new Question { 1071 | Title = "Q #60: When using a web server with a metafile to download an audio/video file, the media player is directly connected to the Web server for downloading the file", 1072 | CorrectAnswer = 1, 1073 | Marks = 6, 1074 | Choices = new List < Choice > { 1075 | new Choice { 1076 | Order = 1, 1077 | Description = "True" 1078 | }, 1079 | new Choice { 1080 | Order = 2, 1081 | Description = "False" 1082 | } 1083 | } 1084 | }, 1085 | new Question { 1086 | Title = "Q #61: When using a web server with a metafile to download an audio/video file, the Web server only stores the actual audio/video file", 1087 | CorrectAnswer = 1, 1088 | Marks = 6, 1089 | Choices = new List < Choice > { 1090 | new Choice { 1091 | Order = 1, 1092 | Description = "True" 1093 | }, 1094 | new Choice { 1095 | Order = 2, 1096 | Description = "False" 1097 | } 1098 | } 1099 | }, 1100 | new Question { 1101 | Title = "Q #62: A problem when using a web server with a metafile to download an audio/video file is that the browser and media player both use HTTP. ", 1102 | CorrectAnswer = 1, 1103 | Marks = 2, 1104 | Choices = new List < Choice > { 1105 | new Choice { 1106 | Order = 1, 1107 | Description = "True" 1108 | }, 1109 | new Choice { 1110 | Order = 2, 1111 | Description = "False" 1112 | } 1113 | } 1114 | }, 1115 | new Question { 1116 | Title = "Q #63: When using a web server with a media server to download an audio/video file, the media player uses the URL in the metafile to access the media server to download the file", 1117 | CorrectAnswer = 1, 1118 | Marks = 2, 1119 | Choices = new List < Choice > { 1120 | new Choice { 1121 | Order = 1, 1122 | Description = "True" 1123 | }, 1124 | new Choice { 1125 | Order = 2, 1126 | Description = "False" 1127 | } 1128 | } 1129 | }, 1130 | new Question { 1131 | Title = "Q #64: The protocol used to download a file from a web server to your browser should utilize TCP, in case a damaged file needs to be retransmitted", 1132 | CorrectAnswer = 1, 1133 | Marks = 4, 1134 | Choices = new List < Choice > { 1135 | new Choice { 1136 | Order = 1, 1137 | Description = "True" 1138 | }, 1139 | new Choice { 1140 | Order = 2, 1141 | Description = "False" 1142 | } 1143 | } 1144 | }, 1145 | new Question { 1146 | Title = "Q #65: Real-Time Streaming Protocol is an in-band control protocol", 1147 | CorrectAnswer = 1, 1148 | Marks = 8, 1149 | Choices = new List < Choice > { 1150 | new Choice { 1151 | Order = 1, 1152 | Description = "True" 1153 | }, 1154 | new Choice { 1155 | Order = 2, 1156 | Description = "False" 1157 | } 1158 | } 1159 | }, 1160 | new Question { 1161 | Title = "Q #66: Real-Time Streaming Protocol is an out-of-band control protocol", 1162 | CorrectAnswer = 1, 1163 | Marks = 3, 1164 | Choices = new List < Choice > { 1165 | new Choice { 1166 | Order = 1, 1167 | Description = "True" 1168 | }, 1169 | new Choice { 1170 | Order = 2, 1171 | Description = "False" 1172 | } 1173 | } 1174 | }, 1175 | new Question { 1176 | Title = "Q #67: Real-Time Streaming Protocol is used to", 1177 | CorrectAnswer = 1, 1178 | Marks = 4, 1179 | Choices = new List < Choice > { 1180 | new Choice { 1181 | Order = 1, 1182 | Description = "Control the playing of audio/video" 1183 | }, 1184 | new Choice { 1185 | Order = 2, 1186 | Description = "Display the video in a video player" 1187 | }, 1188 | new Choice { 1189 | Order = 3, 1190 | Description = "Compress the video so that it can be efficiently downloaded from a web server" 1191 | }, 1192 | new Choice { 1193 | Order = 4, 1194 | Description = "Allow users to interact with another user through the Internet" 1195 | } 1196 | } 1197 | }, 1198 | new Question { 1199 | Title = "Q #68: Real-Time Streaming Protocol defines a compression scheme for audio and video", 1200 | CorrectAnswer = 1, 1201 | Marks = 2, 1202 | Choices = new List < Choice > { 1203 | new Choice { 1204 | Order = 1, 1205 | Description = "True" 1206 | }, 1207 | new Choice { 1208 | Order = 2, 1209 | Description = "False" 1210 | } 1211 | } 1212 | }, 1213 | new Question { 1214 | Title = "Q #69: Real-Time Streaming Protocol does not define how audio and video are encapsulated in packets for transmission over a network", 1215 | CorrectAnswer = 1, 1216 | Marks = 3, 1217 | Choices = new List < Choice > { 1218 | new Choice { 1219 | Order = 1, 1220 | Description = "True" 1221 | }, 1222 | new Choice { 1223 | Order = 2, 1224 | Description = "False" 1225 | } 1226 | } 1227 | }, 1228 | new Question { 1229 | Title = "Q #70: Real-Time Streaming Protocol can only be transported using UDP", 1230 | CorrectAnswer = 1, 1231 | Marks = 4, 1232 | Choices = new List < Choice > { 1233 | new Choice { 1234 | Order = 1, 1235 | Description = "True" 1236 | }, 1237 | new Choice { 1238 | Order = 2, 1239 | Description = "False" 1240 | } 1241 | } 1242 | }, 1243 | new Question { 1244 | Title = "Q #71: Real-Time Streaming Protocol does not restrict how the media player buffers the audio/video", 1245 | CorrectAnswer = 1, 1246 | Marks = 4, 1247 | Choices = new List < Choice > { 1248 | new Choice { 1249 | Order = 1, 1250 | Description = "True" 1251 | }, 1252 | new Choice { 1253 | Order = 2, 1254 | Description = "False" 1255 | } 1256 | } 1257 | }, 1258 | new Question { 1259 | Title = "Q #72: The media stream used when streaming a video from a web server is considered in-band", 1260 | CorrectAnswer = 1, 1261 | Marks = 5, 1262 | Choices = new List < Choice > { 1263 | new Choice { 1264 | Order = 1, 1265 | Description = "True" 1266 | }, 1267 | new Choice { 1268 | Order = 2, 1269 | Description = "False" 1270 | } 1271 | } 1272 | }, 1273 | new Question { 1274 | Title = "Q #73: Streaming ________ audio/video is multicast", 1275 | CorrectAnswer = 1, 1276 | Marks = 7, 1277 | Choices = new List < Choice > { 1278 | new Choice { 1279 | Order = 1, 1280 | Description = "Stored" 1281 | }, 1282 | new Choice { 1283 | Order = 2, 1284 | Description = "Live" 1285 | } 1286 | } 1287 | }, 1288 | new Question { 1289 | Title = "Q #74: Streaming ________ audio/video is unicast", 1290 | CorrectAnswer = 1, 1291 | Marks = 9, 1292 | Choices = new List < Choice > { 1293 | new Choice { 1294 | Order = 1, 1295 | Description = "Stored" 1296 | }, 1297 | new Choice { 1298 | Order = 2, 1299 | Description = "Live" 1300 | } 1301 | } 1302 | }, 1303 | new Question { 1304 | Title = "Q #75: When using real-time interactive audio/video, the time relationship between the packets is preserved", 1305 | CorrectAnswer = 1, 1306 | Marks = 3, 1307 | Choices = new List < Choice > { 1308 | new Choice { 1309 | Order = 1, 1310 | Description = "True" 1311 | }, 1312 | new Choice { 1313 | Order = 2, 1314 | Description = "False" 1315 | } 1316 | } 1317 | }, 1318 | new Question { 1319 | Title = "Q #76: Jitter is the variation of packet delay", 1320 | CorrectAnswer = 1, 1321 | Marks = 3, 1322 | Choices = new List < Choice > { 1323 | new Choice { 1324 | Order = 1, 1325 | Description = "True" 1326 | }, 1327 | new Choice { 1328 | Order = 2, 1329 | Description = "False" 1330 | } 1331 | } 1332 | }, 1333 | new Question { 1334 | Title = "Q #77: Real-time traffic in interactive audio/video does not require a playback buffer", 1335 | CorrectAnswer = 1, 1336 | Marks = 8, 1337 | Choices = new List < Choice > { 1338 | new Choice { 1339 | Order = 1, 1340 | Description = "True" 1341 | }, 1342 | new Choice { 1343 | Order = 2, 1344 | Description = "False" 1345 | } 1346 | } 1347 | }, 1348 | new Question { 1349 | Title = "Q #78: Client-side _______________________ compensate for delay jitter", 1350 | CorrectAnswer = 1, 1351 | Marks = 9, 1352 | Choices = new List < Choice > { 1353 | new Choice { 1354 | Order = 1, 1355 | Description = "Buffering" 1356 | }, 1357 | new Choice { 1358 | Order = 2, 1359 | Description = "Playback delay" 1360 | }, 1361 | new Choice { 1362 | Order = 3, 1363 | Description = "All of the above" 1364 | }, 1365 | new Choice { 1366 | Order = 4, 1367 | Description = "None of the above" 1368 | } 1369 | } 1370 | }, 1371 | new Question { 1372 | Title = "Q #79: RTP provides which of the following features for real-time interactive audio/video", 1373 | CorrectAnswer = 1, 1374 | Marks = 3, 1375 | Choices = new List < Choice > { 1376 | new Choice { 1377 | Order = 1, 1378 | Description = "Mixing, multicasting, ordering" 1379 | }, 1380 | new Choice { 1381 | Order = 2, 1382 | Description = "Ordering, unicasting, mixing" 1383 | }, 1384 | new Choice { 1385 | Order = 3, 1386 | Description = "Timing, multicasting, retransmission" 1387 | }, 1388 | new Choice { 1389 | Order = 4, 1390 | Description = "Multicasting, unicasting, ordering" 1391 | } 1392 | } 1393 | }, 1394 | new Question { 1395 | Title = "Q #80: TCP is used for real-time interactive multimedia", 1396 | CorrectAnswer = 1, 1397 | Marks = 8, 1398 | Choices = new List < Choice > { 1399 | new Choice { 1400 | Order = 1, 1401 | Description = "True" 1402 | }, 1403 | new Choice { 1404 | Order = 2, 1405 | Description = "False" 1406 | } 1407 | } 1408 | }, 1409 | new Question { 1410 | Title = "Q #81: What protocol is used for real-time interactive multimedia", 1411 | CorrectAnswer = 1, 1412 | Marks = 5, 1413 | Choices = new List < Choice > { 1414 | new Choice { 1415 | Order = 1, 1416 | Description = "RTP" 1417 | }, 1418 | new Choice { 1419 | Order = 2, 1420 | Description = "UDP" 1421 | }, 1422 | new Choice { 1423 | Order = 3, 1424 | Description = "TCP" 1425 | }, 1426 | new Choice { 1427 | Order = 4, 1428 | Description = "RTP and UDP" 1429 | } 1430 | } 1431 | }, 1432 | new Question { 1433 | Title = "Q #82: RTP does not have a delivery mechanism", 1434 | CorrectAnswer = 1, 1435 | Marks = 3, 1436 | Choices = new List < Choice > { 1437 | new Choice { 1438 | Order = 1, 1439 | Description = "True" 1440 | }, 1441 | new Choice { 1442 | Order = 2, 1443 | Description = "False" 1444 | } 1445 | } 1446 | }, 1447 | new Question { 1448 | Title = "Q #83: RTP runs beneath UDP", 1449 | CorrectAnswer = 1, 1450 | Marks = 7, 1451 | Choices = new List < Choice > { 1452 | new Choice { 1453 | Order = 1, 1454 | Description = "True" 1455 | }, 1456 | new Choice { 1457 | Order = 2, 1458 | Description = "False" 1459 | } 1460 | } 1461 | }, 1462 | new Question { 1463 | Title = "Q #84: RTP packet headers can have a maximum of 31 contributors because the 5-bit field allows the numbers 0-31", 1464 | CorrectAnswer = 1, 1465 | Marks = 7, 1466 | Choices = new List < Choice > { 1467 | new Choice { 1468 | Order = 1, 1469 | Description = "True" 1470 | }, 1471 | new Choice { 1472 | Order = 2, 1473 | Description = "False" 1474 | } 1475 | } 1476 | }, 1477 | new Question { 1478 | Title = "Q #85: The sender of a audio/video stream can change the encoding on the fly", 1479 | CorrectAnswer = 1, 1480 | Marks = 6, 1481 | Choices = new List < Choice > { 1482 | new Choice { 1483 | Order = 1, 1484 | Description = "True" 1485 | }, 1486 | new Choice { 1487 | Order = 2, 1488 | Description = "False" 1489 | } 1490 | } 1491 | }, 1492 | new Question { 1493 | Title = "Q #86: The initial sequence number of an RTP packet is 0, and is then incremented by 1 for each subsequent packet", 1494 | CorrectAnswer = 1, 1495 | Marks = 8, 1496 | Choices = new List < Choice > { 1497 | new Choice { 1498 | Order = 1, 1499 | Description = "True" 1500 | }, 1501 | new Choice { 1502 | Order = 2, 1503 | Description = "False" 1504 | } 1505 | } 1506 | }, 1507 | new Question { 1508 | Title = "Q #87: RTP packets add a SSRC field, which", 1509 | CorrectAnswer = 1, 1510 | Marks = 9, 1511 | Choices = new List < Choice > { 1512 | new Choice { 1513 | Order = 1, 1514 | Description = "Defines the source(s)" 1515 | }, 1516 | new Choice { 1517 | Order = 2, 1518 | Description = "Defines the receiver(s)" 1519 | }, 1520 | new Choice { 1521 | Order = 3, 1522 | Description = "Defines the packet quality" 1523 | }, 1524 | new Choice { 1525 | Order = 4, 1526 | Description = "Defines the packet quantity" 1527 | } 1528 | } 1529 | }, 1530 | new Question { 1531 | Title = "Q #88: RTCP works in conjunction with", 1532 | CorrectAnswer = 1, 1533 | Marks = 8, 1534 | Choices = new List < Choice > { 1535 | new Choice { 1536 | Order = 1, 1537 | Description = "RTP" 1538 | }, 1539 | new Choice { 1540 | Order = 2, 1541 | Description = "UDP" 1542 | }, 1543 | new Choice { 1544 | Order = 3, 1545 | Description = "TCP" 1546 | }, 1547 | new Choice { 1548 | Order = 4, 1549 | Description = "RTSP" 1550 | } 1551 | } 1552 | }, 1553 | new Question { 1554 | Title = "Q #89: RTCP is used when", 1555 | CorrectAnswer = 1, 1556 | Marks = 2, 1557 | Choices = new List < Choice > { 1558 | new Choice { 1559 | Order = 1, 1560 | Description = "The networking application multicasts audio/video to multiple receivers from one or more senders" 1561 | }, 1562 | new Choice { 1563 | Order = 2, 1564 | Description = "The sender wants the receiver to have control the playback of the audio/video" 1565 | }, 1566 | new Choice { 1567 | Order = 3, 1568 | Description = "The application controls who the audio/video is sent to" 1569 | }, 1570 | new Choice { 1571 | Order = 4, 1572 | Description = "The network congestion prevents users from playing the streamed multimedia without buffering" 1573 | } 1574 | } 1575 | }, 1576 | new Question { 1577 | Title = "Q #90: RTP and RTSP packets are distinguished from each other through the use of distinct port numbers", 1578 | CorrectAnswer = 1, 1579 | Marks = 8, 1580 | Choices = new List < Choice > { 1581 | new Choice { 1582 | Order = 1, 1583 | Description = "True" 1584 | }, 1585 | new Choice { 1586 | Order = 2, 1587 | Description = "False" 1588 | } 1589 | } 1590 | }, 1591 | new Question { 1592 | Title = "Q #91: RTP and RTCP packets are distinguished from each other through the use of distinct port numbers", 1593 | CorrectAnswer = 1, 1594 | Marks = 5, 1595 | Choices = new List < Choice > { 1596 | new Choice { 1597 | Order = 1, 1598 | Description = "True" 1599 | }, 1600 | new Choice { 1601 | Order = 2, 1602 | Description = "False" 1603 | } 1604 | } 1605 | }, 1606 | new Question { 1607 | Title = "Q #92: RTCP packets encapsulate chunks of audio or video", 1608 | CorrectAnswer = 1, 1609 | Marks = 4, 1610 | Choices = new List < Choice > { 1611 | new Choice { 1612 | Order = 1, 1613 | Description = "True" 1614 | }, 1615 | new Choice { 1616 | Order = 2, 1617 | Description = "False" 1618 | } 1619 | } 1620 | }, 1621 | new Question { 1622 | Title = "Q #93: RTCP packets contain sender and/or receiver reports", 1623 | CorrectAnswer = 1, 1624 | Marks = 7, 1625 | Choices = new List < Choice > { 1626 | new Choice { 1627 | Order = 1, 1628 | Description = "True" 1629 | }, 1630 | new Choice { 1631 | Order = 2, 1632 | Description = "False" 1633 | } 1634 | } 1635 | }, 1636 | new Question { 1637 | Title = "Q #94: RTCP __________________ are sent periodically by the active senders in a conference to report transmission and reception statistics for all RTP packets sent during the interval", 1638 | CorrectAnswer = 1, 1639 | Marks = 7, 1640 | Choices = new List < Choice > { 1641 | new Choice { 1642 | Order = 1, 1643 | Description = "Sender report packets" 1644 | }, 1645 | new Choice { 1646 | Order = 2, 1647 | Description = "Receiver reception packets" 1648 | }, 1649 | new Choice { 1650 | Order = 3, 1651 | Description = "Source description packets" 1652 | }, 1653 | new Choice { 1654 | Order = 4, 1655 | Description = "Bye messages" 1656 | } 1657 | } 1658 | }, 1659 | new Question { 1660 | Title = "Q #95: RTCP __________________ are for passive participants, those that do not send RTP packets. The report informs the sender and other receivers about the quality of service.", 1661 | CorrectAnswer = 1, 1662 | Marks = 4, 1663 | Choices = new List < Choice > { 1664 | new Choice { 1665 | Order = 1, 1666 | Description = "Sender report packets" 1667 | }, 1668 | new Choice { 1669 | Order = 2, 1670 | Description = "Receiver reception packets" 1671 | }, 1672 | new Choice { 1673 | Order = 3, 1674 | Description = "Source description packets" 1675 | }, 1676 | new Choice { 1677 | Order = 4, 1678 | Description = "Bye messages" 1679 | } 1680 | } 1681 | }, 1682 | new Question { 1683 | Title = "Q #96: RTCP __________________ can include the email address of the sender, the sender's name, and the application that generates the RTP stream", 1684 | CorrectAnswer = 1, 1685 | Marks = 9, 1686 | Choices = new List < Choice > { 1687 | new Choice { 1688 | Order = 1, 1689 | Description = "Sender report packets" 1690 | }, 1691 | new Choice { 1692 | Order = 2, 1693 | Description = "Receiver reception packets" 1694 | }, 1695 | new Choice { 1696 | Order = 3, 1697 | Description = "Source description packets" 1698 | }, 1699 | new Choice { 1700 | Order = 4, 1701 | Description = "Bye messages" 1702 | } 1703 | } 1704 | }, 1705 | new Question { 1706 | Title = "Q #97: RTCP __________________ are for an application that wants to use new applications not defined in the standard. It allows the definition of a new message type.", 1707 | CorrectAnswer = 1, 1708 | Marks = 5, 1709 | Choices = new List < Choice > { 1710 | new Choice { 1711 | Order = 1, 1712 | Description = "Sender report packets" 1713 | }, 1714 | new Choice { 1715 | Order = 2, 1716 | Description = "Receiver reception packets" 1717 | }, 1718 | new Choice { 1719 | Order = 3, 1720 | Description = "Source description packets" 1721 | }, 1722 | new Choice { 1723 | Order = 4, 1724 | Description = "Bye messages" 1725 | } 1726 | } 1727 | }, 1728 | new Question { 1729 | Title = "Q #98: RTCP __________________ are messages that shut down a stream", 1730 | CorrectAnswer = 1, 1731 | Marks = 8, 1732 | Choices = new List < Choice > { 1733 | new Choice { 1734 | Order = 1, 1735 | Description = "Sender report packets" 1736 | }, 1737 | new Choice { 1738 | Order = 2, 1739 | Description = "Receiver reception packets" 1740 | }, 1741 | new Choice { 1742 | Order = 3, 1743 | Description = "Source description packets" 1744 | }, 1745 | new Choice { 1746 | Order = 4, 1747 | Description = "Bye messages" 1748 | } 1749 | } 1750 | }, 1751 | new Question { 1752 | Title = "Q #99: RTP port numbers must be", 1753 | CorrectAnswer = 1, 1754 | Marks = 8, 1755 | Choices = new List < Choice > { 1756 | new Choice { 1757 | Order = 1, 1758 | Description = "An even number" 1759 | }, 1760 | new Choice { 1761 | Order = 2, 1762 | Description = "An odd number" 1763 | }, 1764 | new Choice { 1765 | Order = 3, 1766 | Description = "A prime number" 1767 | } 1768 | } 1769 | }, 1770 | new Question { 1771 | Title = "Q #100: RTCP port numbers must be", 1772 | CorrectAnswer = 1, 1773 | Marks = 5, 1774 | Choices = new List < Choice > { 1775 | new Choice { 1776 | Order = 1, 1777 | Description = "An even number" 1778 | }, 1779 | new Choice { 1780 | Order = 2, 1781 | Description = "An odd number" 1782 | }, 1783 | new Choice { 1784 | Order = 3, 1785 | Description = "A prime number" 1786 | } 1787 | } 1788 | }, 1789 | new Question { 1790 | Title = "Q #101: RTP port numbers must immediately follow a RTCP port number", 1791 | CorrectAnswer = 1, 1792 | Marks = 9, 1793 | Choices = new List < Choice > { 1794 | new Choice { 1795 | Order = 1, 1796 | Description = "True" 1797 | }, 1798 | new Choice { 1799 | Order = 2, 1800 | Description = "False" 1801 | } 1802 | } 1803 | }, 1804 | new Question { 1805 | Title = "Q #102: VoIP allows communication between two parties over a ___________ network", 1806 | CorrectAnswer = 1, 1807 | Marks = 7, 1808 | Choices = new List < Choice > { 1809 | new Choice { 1810 | Order = 1, 1811 | Description = "Packet-switched" 1812 | }, 1813 | new Choice { 1814 | Order = 2, 1815 | Description = "Circuit-switched" 1816 | } 1817 | } 1818 | }, 1819 | new Question { 1820 | Title = "Q #103: What is session initiation protocol (SIP)?", 1821 | CorrectAnswer = 1, 1822 | Marks = 9, 1823 | Choices = new List < Choice > { 1824 | new Choice { 1825 | Order = 1, 1826 | Description = "It is a standard that allows telephones on the public telephone network to talk to computers connected to the internet" 1827 | }, 1828 | new Choice { 1829 | Order = 2, 1830 | Description = "It is an application layer protocol that establishes, manages, and terminates a multimedia session (call)" 1831 | }, 1832 | new Choice { 1833 | Order = 3, 1834 | Description = "It is a method for implementing virtual private networks" 1835 | }, 1836 | new Choice { 1837 | Order = 4, 1838 | Description = "It lets a server and client have multiple conversations over a single TCP connection" 1839 | } 1840 | } 1841 | }, 1842 | new Question { 1843 | Title = "Q #104: SIP is a text-based protocol", 1844 | CorrectAnswer = 1, 1845 | Marks = 7, 1846 | Choices = new List < Choice > { 1847 | new Choice { 1848 | Order = 1, 1849 | Description = "True" 1850 | }, 1851 | new Choice { 1852 | Order = 2, 1853 | Description = "False" 1854 | } 1855 | } 1856 | }, 1857 | new Question { 1858 | Title = "Q #105: SIP defines the following messages", 1859 | CorrectAnswer = 1, 1860 | Marks = 1, 1861 | Choices = new List < Choice > { 1862 | new Choice { 1863 | Order = 1, 1864 | Description = "INVITE, ACK, BYE, OPTIONS, CANCEL, REGISTER" 1865 | }, 1866 | new Choice { 1867 | Order = 2, 1868 | Description = "PING, RECEIVE, END, MESSAGE, CREATE, BYE" 1869 | }, 1870 | new Choice { 1871 | Order = 3, 1872 | Description = "CREATE, RESTORE, ACK, RECEIVE, CANCEL, INVITE" 1873 | }, 1874 | new Choice { 1875 | Order = 4, 1876 | Description = "HELO, ACK, WAIT, OPTIONS, BYE, CANCEL, LOGIN" 1877 | } 1878 | } 1879 | }, 1880 | new Question { 1881 | Title = "Q #106: Which of the following is a valid SIP address?", 1882 | CorrectAnswer = 1, 1883 | Marks = 4, 1884 | Choices = new List < Choice > { 1885 | new Choice { 1886 | Order = 1, 1887 | Description = "Sip:tom@201.23.45.78" 1888 | }, 1889 | new Choice { 1890 | Order = 2, 1891 | Description = "Sip@tom:fhda.edu" 1892 | }, 1893 | new Choice { 1894 | Order = 3, 1895 | Description = "201.23.45.78@sip:tom" 1896 | }, 1897 | new Choice { 1898 | Order = 4, 1899 | Description = "Fhda.edu:sip@tom" 1900 | } 1901 | } 1902 | }, 1903 | new Question { 1904 | Title = "Q #107: Establishing a session in SIP requires a", 1905 | CorrectAnswer = 1, 1906 | Marks = 2, 1907 | Choices = new List < Choice > { 1908 | new Choice { 1909 | Order = 1, 1910 | Description = "2 way handshake" 1911 | }, 1912 | new Choice { 1913 | Order = 2, 1914 | Description = "3 way handshake" 1915 | }, 1916 | new Choice { 1917 | Order = 3, 1918 | Description = "4 way handshake" 1919 | }, 1920 | new Choice { 1921 | Order = 4, 1922 | Description = "5 way handshake" 1923 | } 1924 | } 1925 | }, 1926 | new Question { 1927 | Title = "Q #108: A SIP session is terminated with the CANCEL message sent by either party", 1928 | CorrectAnswer = 1, 1929 | Marks = 2, 1930 | Choices = new List < Choice > { 1931 | new Choice { 1932 | Order = 1, 1933 | Description = "True" 1934 | }, 1935 | new Choice { 1936 | Order = 2, 1937 | Description = "False" 1938 | } 1939 | } 1940 | }, 1941 | new Question { 1942 | Title = "Q #109: What is H.323?", 1943 | CorrectAnswer = 1, 1944 | Marks = 7, 1945 | Choices = new List < Choice > { 1946 | new Choice { 1947 | Order = 1, 1948 | Description = "It is a standard that allows telephones on the public telephone network to talk to computers connected to the internet" 1949 | }, 1950 | new Choice { 1951 | Order = 2, 1952 | Description = "It is an application layer protocol that establishes, manages, and terminates a multimedia session (call)." 1953 | }, 1954 | new Choice { 1955 | Order = 3, 1956 | Description = "It defines a set of quality-of-service enhancements for wireless LAN applications through modifications to the Media Access Control (MAC) layer" 1957 | }, 1958 | new Choice { 1959 | Order = 4, 1960 | Description = "It is designed to compensate for the differences between traditional packet-less communications over analog lines and packet-based transmissions which are the basis for IP communications" 1961 | } 1962 | } 1963 | }, 1964 | new Question { 1965 | Title = "Q #110: What is a gateway?", 1966 | CorrectAnswer = 1, 1967 | Marks = 8, 1968 | Choices = new List < Choice > { 1969 | new Choice { 1970 | Order = 1, 1971 | Description = "It connects the Internet to the telephone network" 1972 | }, 1973 | new Choice { 1974 | Order = 2, 1975 | Description = "It is a running instance of an application capable of accepting requests from the client and giving responses accordingly" 1976 | }, 1977 | new Choice { 1978 | Order = 3, 1979 | Description = "It is an endpoint of an inter-process communication flow across a computer network" 1980 | } 1981 | } 1982 | }, 1983 | new Question { 1984 | Title = "Q #111: Which of the following are characteristic types attributed to flow", 1985 | CorrectAnswer = 1, 1986 | Marks = 9, 1987 | Choices = new List < Choice > { 1988 | new Choice { 1989 | Order = 1, 1990 | Description = "Reliability" 1991 | }, 1992 | new Choice { 1993 | Order = 2, 1994 | Description = "Delay" 1995 | }, 1996 | new Choice { 1997 | Order = 3, 1998 | Description = "Jitter" 1999 | }, 2000 | new Choice { 2001 | Order = 4, 2002 | Description = "Bandwidth" 2003 | } 2004 | } 2005 | }, 2006 | new Question { 2007 | Title = "Q #112: Network loss happens when the packet arrives too late for playback at the receiver", 2008 | CorrectAnswer = 1, 2009 | Marks = 7, 2010 | Choices = new List < Choice > { 2011 | new Choice { 2012 | Order = 1, 2013 | Description = "True" 2014 | }, 2015 | new Choice { 2016 | Order = 2, 2017 | Description = "False" 2018 | } 2019 | } 2020 | }, 2021 | new Question { 2022 | Title = "Q #113: End-to-End Delay loss happens when the packet arrives too late for playback at the receiver", 2023 | CorrectAnswer = 1, 2024 | Marks = 8, 2025 | Choices = new List < Choice > { 2026 | new Choice { 2027 | Order = 1, 2028 | Description = "True" 2029 | }, 2030 | new Choice { 2031 | Order = 2, 2032 | Description = "False" 2033 | } 2034 | } 2035 | }, 2036 | new Question { 2037 | Title = "Q #114: Multimedia networking applications are typically highly sensitive to delay", 2038 | CorrectAnswer = 1, 2039 | Marks = 3, 2040 | Choices = new List < Choice > { 2041 | new Choice { 2042 | Order = 1, 2043 | Description = "True" 2044 | }, 2045 | new Choice { 2046 | Order = 2, 2047 | Description = "False" 2048 | } 2049 | } 2050 | }, 2051 | new Question { 2052 | Title = "Q #115: _____________ is/are needed for routers to distingush between different classes", 2053 | CorrectAnswer = 1, 2054 | Marks = 1, 2055 | Choices = new List < Choice > { 2056 | new Choice { 2057 | Order = 1, 2058 | Description = "Packet marking" 2059 | }, 2060 | new Choice { 2061 | Order = 2, 2062 | Description = "Timestamps" 2063 | }, 2064 | new Choice { 2065 | Order = 3, 2066 | Description = "Network marking" 2067 | }, 2068 | new Choice { 2069 | Order = 4, 2070 | Description = "Packet naming" 2071 | } 2072 | } 2073 | }, 2074 | new Question { 2075 | Title = "Q #116: _____________ is a technique used for controlling errors in data transmission over unreliable or noisy communication channels", 2076 | CorrectAnswer = 1, 2077 | Marks = 4, 2078 | Choices = new List < Choice > { 2079 | new Choice { 2080 | Order = 1, 2081 | Description = "Interleaving" 2082 | }, 2083 | new Choice { 2084 | Order = 2, 2085 | Description = "Forward-error correction" 2086 | }, 2087 | new Choice { 2088 | Order = 3, 2089 | Description = "Network smoothing" 2090 | }, 2091 | new Choice { 2092 | Order = 4, 2093 | Description = "Packet rescue" 2094 | } 2095 | } 2096 | }, 2097 | new Question { 2098 | Title = "Q #117: A tradeoff with interleaving is that when we increase the value of n, there is less bandwidth waste and a higher probability that 2 or more chunks will be lost", 2099 | CorrectAnswer = 1, 2100 | Marks = 4, 2101 | Choices = new List < Choice > { 2102 | new Choice { 2103 | Order = 1, 2104 | Description = "True" 2105 | }, 2106 | new Choice { 2107 | Order = 2, 2108 | Description = "False" 2109 | } 2110 | } 2111 | }, 2112 | new Question { 2113 | Title = "Q #118: One technique for forward-error correction is for every group of N chunks create redundant chunk by exclusive ORing N original chunks", 2114 | CorrectAnswer = 1, 2115 | Marks = 5, 2116 | Choices = new List < Choice > { 2117 | new Choice { 2118 | Order = 1, 2119 | Description = "True" 2120 | }, 2121 | new Choice { 2122 | Order = 2, 2123 | Description = "False" 2124 | } 2125 | } 2126 | }, 2127 | new Question { 2128 | Title = "Q #119: Interleaving is a technique where the idea is to send a lower quality audio stream as the redundant information with the nominal stream", 2129 | CorrectAnswer = 1, 2130 | Marks = 7, 2131 | Choices = new List < Choice > { 2132 | new Choice { 2133 | Order = 1, 2134 | Description = "True" 2135 | }, 2136 | new Choice { 2137 | Order = 2, 2138 | Description = "False" 2139 | } 2140 | } 2141 | }, 2142 | new Question { 2143 | Title = "Q #120: Interleaving is a technique where the sender re-sequences units of audio data before transmission, so that originally adjacent units are separated by a certain distance in the transmitted stream", 2144 | CorrectAnswer = 1, 2145 | Marks = 9, 2146 | Choices = new List < Choice > { 2147 | new Choice { 2148 | Order = 1, 2149 | Description = "True" 2150 | }, 2151 | new Choice { 2152 | Order = 2, 2153 | Description = "False" 2154 | } 2155 | } 2156 | }, 2157 | new Question { 2158 | Title = "Q #121: An advantage for interleaving is that it decreases latency", 2159 | CorrectAnswer = 1, 2160 | Marks = 3, 2161 | Choices = new List < Choice > { 2162 | new Choice { 2163 | Order = 1, 2164 | Description = "True" 2165 | }, 2166 | new Choice { 2167 | Order = 2, 2168 | Description = "False" 2169 | } 2170 | } 2171 | }, 2172 | new Question { 2173 | Title = "Q #122: ______________ is where packets wait in a buffer (queue) until the node (router or switch) is ready to process them.", 2174 | CorrectAnswer = 1, 2175 | Marks = 6, 2176 | Choices = new List < Choice > { 2177 | new Choice { 2178 | Order = 1, 2179 | Description = "FIFO queuing" 2180 | }, 2181 | new Choice { 2182 | Order = 2, 2183 | Description = "Priority queuing" 2184 | }, 2185 | new Choice { 2186 | Order = 3, 2187 | Description = "Weighted fair queuing" 2188 | } 2189 | } 2190 | }, 2191 | new Question { 2192 | Title = "Q #123: ______________ is where packets are first assigned to a priority class. Each priority class has its own queue. The packets in the highest-priority queue are processed first. Packets in the lowest-priority queue are processed last", 2193 | CorrectAnswer = 1, 2194 | Marks = 1, 2195 | Choices = new List < Choice > { 2196 | new Choice { 2197 | Order = 1, 2198 | Description = "FIFO queuing" 2199 | }, 2200 | new Choice { 2201 | Order = 2, 2202 | Description = "Priority queuing" 2203 | }, 2204 | new Choice { 2205 | Order = 3, 2206 | Description = "Weighted fair queuing" 2207 | } 2208 | } 2209 | }, 2210 | new Question { 2211 | Title = "Q #124: ______________ is where packets are assigned to different classes and admitted to different queues. The system processes packets in each queue in a round-robin fashion with the number of packets selected from each queue based on the corresponding weight.", 2212 | CorrectAnswer = 1, 2213 | Marks = 5, 2214 | Choices = new List < Choice > { 2215 | new Choice { 2216 | Order = 1, 2217 | Description = "FIFO queuing" 2218 | }, 2219 | new Choice { 2220 | Order = 2, 2221 | Description = "Priority queuing" 2222 | }, 2223 | new Choice { 2224 | Order = 3, 2225 | Description = "Weighted fair queuing" 2226 | } 2227 | } 2228 | }, 2229 | new Question { 2230 | Title = "Q #125: With priority queuing, the system does not stop serving a queue until it is empty", 2231 | CorrectAnswer = 1, 2232 | Marks = 8, 2233 | Choices = new List < Choice > { 2234 | new Choice { 2235 | Order = 1, 2236 | Description = "True" 2237 | }, 2238 | new Choice { 2239 | Order = 2, 2240 | Description = "False" 2241 | } 2242 | } 2243 | }, 2244 | new Question { 2245 | Title = "Q #126: What is traffic shaping?", 2246 | CorrectAnswer = 1, 2247 | Marks = 9, 2248 | Choices = new List < Choice > { 2249 | new Choice { 2250 | Order = 1, 2251 | Description = "A mechanism to control the amount and the rate of the traffic sent to the network" 2252 | }, 2253 | new Choice { 2254 | Order = 2, 2255 | Description = "A way for the system to reduce the packet flow by preventing packets from entering specified subnets" 2256 | }, 2257 | new Choice { 2258 | Order = 3, 2259 | Description = "A feature where a network creates fake packets to fill router buffers to prevent new packets from arriving" 2260 | }, 2261 | new Choice { 2262 | Order = 4, 2263 | Description = "A mechanism where packets are scheduled to flow through a network at specified times" 2264 | } 2265 | } 2266 | }, 2267 | new Question { 2268 | Title = "Q #127: What is a \"leaky bucket\"", 2269 | CorrectAnswer = 1, 2270 | Marks = 8, 2271 | Choices = new List < Choice > { 2272 | new Choice { 2273 | Order = 1, 2274 | Description = "It shapes bursty traffic into fixed-rate traffic by averaging the data rate" 2275 | }, 2276 | new Choice { 2277 | Order = 2, 2278 | Description = "A mechanism that slowly eliminates packets from the network that have been looping continuously between routers" 2279 | }, 2280 | new Choice { 2281 | Order = 3, 2282 | Description = "A tool for a web server to allow only 1 client at a time to download a audio/video file" 2283 | }, 2284 | new Choice { 2285 | Order = 4, 2286 | Description = "A method where a packet is split up into individual bits, and sent across a network 1 bit at a time" 2287 | } 2288 | } 2289 | }, 2290 | new Question { 2291 | Title = "Q #128: A leaky bucket may drop the packets if the bucket is full.", 2292 | CorrectAnswer = 1, 2293 | Marks = 9, 2294 | Choices = new List < Choice > { 2295 | new Choice { 2296 | Order = 1, 2297 | Description = "True" 2298 | }, 2299 | new Choice { 2300 | Order = 2, 2301 | Description = "False" 2302 | } 2303 | } 2304 | }, 2305 | new Question { 2306 | Title = "Q #129: The token bucket algorithm allows idle hosts to accumulate credit for the future in the form of tokens", 2307 | CorrectAnswer = 1, 2308 | Marks = 5, 2309 | Choices = new List < Choice > { 2310 | new Choice { 2311 | Order = 1, 2312 | Description = "True" 2313 | }, 2314 | new Choice { 2315 | Order = 2, 2316 | Description = "False" 2317 | } 2318 | } 2319 | }, 2320 | new Question { 2321 | Title = "Q #130: The ____________ allows bursty traffic at a regulated maximum rate", 2322 | CorrectAnswer = 1, 2323 | Marks = 3, 2324 | Choices = new List < Choice > { 2325 | new Choice { 2326 | Order = 1, 2327 | Description = "Token bucket" 2328 | }, 2329 | new Choice { 2330 | Order = 2, 2331 | Description = "Leaky bucket" 2332 | }, 2333 | new Choice { 2334 | Order = 3, 2335 | Description = "Half bucket" 2336 | }, 2337 | new Choice { 2338 | Order = 4, 2339 | Description = "Maximum bucket" 2340 | } 2341 | } 2342 | }, 2343 | new Question { 2344 | Title = "Q #131: What is a computer that can act as both a server and/or client?", 2345 | CorrectAnswer = 1, 2346 | Marks = 8, 2347 | Choices = new List < Choice > { 2348 | new Choice { 2349 | Order = 1, 2350 | Description = "Peer" 2351 | }, 2352 | new Choice { 2353 | Order = 2, 2354 | Description = "Router" 2355 | }, 2356 | new Choice { 2357 | Order = 3, 2358 | Description = "Seeder" 2359 | }, 2360 | new Choice { 2361 | Order = 4, 2362 | Description = "Dedicated server" 2363 | } 2364 | } 2365 | }, 2366 | new Question { 2367 | Title = "Q #132: A P2P system should consist of at least two or more peers", 2368 | CorrectAnswer = 1, 2369 | Marks = 9, 2370 | Choices = new List < Choice > { 2371 | new Choice { 2372 | Order = 1, 2373 | Description = "True" 2374 | }, 2375 | new Choice { 2376 | Order = 2, 2377 | Description = "False" 2378 | } 2379 | } 2380 | }, 2381 | new Question { 2382 | Title = "Q #133: Peers should be able to exchange resources directly between themselves", 2383 | CorrectAnswer = 1, 2384 | Marks = 2, 2385 | Choices = new List < Choice > { 2386 | new Choice { 2387 | Order = 1, 2388 | Description = "True" 2389 | }, 2390 | new Choice { 2391 | Order = 2, 2392 | Description = "False" 2393 | } 2394 | } 2395 | }, 2396 | new Question { 2397 | Title = "Q #134: P2P systems cannot utilize dedicated servers", 2398 | CorrectAnswer = 1, 2399 | Marks = 8, 2400 | Choices = new List < Choice > { 2401 | new Choice { 2402 | Order = 1, 2403 | Description = "True" 2404 | }, 2405 | new Choice { 2406 | Order = 2, 2407 | Description = "False" 2408 | } 2409 | } 2410 | }, 2411 | new Question { 2412 | Title = "Q #135: A \"pure\" P2P system is", 2413 | CorrectAnswer = 1, 2414 | Marks = 9, 2415 | Choices = new List < Choice > { 2416 | new Choice { 2417 | Order = 1, 2418 | Description = "A P2P system without dedicated servers" 2419 | }, 2420 | new Choice { 2421 | Order = 2, 2422 | Description = "A P2P system that prevents leechers from using too much bandwidth" 2423 | }, 2424 | new Choice { 2425 | Order = 3, 2426 | Description = "A P2P system with dedicated servers" 2427 | }, 2428 | new Choice { 2429 | Order = 4, 2430 | Description = "A P2P system that uses a dedicated web server, along with a media server to stream audio/video" 2431 | } 2432 | } 2433 | }, 2434 | new Question { 2435 | Title = "Q #136: Which of the following is not a benefit of P2P systems?", 2436 | CorrectAnswer = 1, 2437 | Marks = 8, 2438 | Choices = new List < Choice > { 2439 | new Choice { 2440 | Order = 1, 2441 | Description = "Workload is spread to all peers" 2442 | }, 2443 | new Choice { 2444 | Order = 2, 2445 | Description = "Maximize system utilization" 2446 | }, 2447 | new Choice { 2448 | Order = 3, 2449 | Description = "No central point of failure" 2450 | }, 2451 | new Choice { 2452 | Order = 4, 2453 | Description = "Scalability" 2454 | } 2455 | } 2456 | }, 2457 | new Question { 2458 | Title = "Q #137: It is easier to enforce standards in P2P systems compared to client-server systems", 2459 | CorrectAnswer = 1, 2460 | Marks = 3, 2461 | Choices = new List < Choice > { 2462 | new Choice { 2463 | Order = 1, 2464 | Description = "True" 2465 | }, 2466 | new Choice { 2467 | Order = 2, 2468 | Description = "False" 2469 | } 2470 | } 2471 | }, 2472 | new Question { 2473 | Title = "Q #138: Which of the following is not a P2P topology?", 2474 | CorrectAnswer = 1, 2475 | Marks = 1, 2476 | Choices = new List < Choice > { 2477 | new Choice { 2478 | Order = 1, 2479 | Description = "Centralized" 2480 | }, 2481 | new Choice { 2482 | Order = 2, 2483 | Description = "Ring" 2484 | }, 2485 | new Choice { 2486 | Order = 3, 2487 | Description = "Hierarchical" 2488 | }, 2489 | new Choice { 2490 | Order = 4, 2491 | Description = "Decentralized" 2492 | } 2493 | } 2494 | }, 2495 | new Question { 2496 | Title = "Q #139: Which of the following is the most popular P2P topology?", 2497 | CorrectAnswer = 1, 2498 | Marks = 6, 2499 | Choices = new List < Choice > { 2500 | new Choice { 2501 | Order = 1, 2502 | Description = "Centralized" 2503 | }, 2504 | new Choice { 2505 | Order = 2, 2506 | Description = "Ring" 2507 | }, 2508 | new Choice { 2509 | Order = 3, 2510 | Description = "Hierarchical" 2511 | }, 2512 | new Choice { 2513 | Order = 4, 2514 | Description = "Decentralized" 2515 | } 2516 | } 2517 | }, 2518 | new Question { 2519 | Title = "Q #140: Which P2P topology has a one centralized server with many connected clients?", 2520 | CorrectAnswer = 1, 2521 | Marks = 3, 2522 | Choices = new List < Choice > { 2523 | new Choice { 2524 | Order = 1, 2525 | Description = "Centralized" 2526 | }, 2527 | new Choice { 2528 | Order = 2, 2529 | Description = "Ring" 2530 | }, 2531 | new Choice { 2532 | Order = 3, 2533 | Description = "Hierarchical" 2534 | }, 2535 | new Choice { 2536 | Order = 4, 2537 | Description = "Decentralized" 2538 | } 2539 | } 2540 | }, 2541 | new Question { 2542 | Title = "Q #141: A single centralized server is usually able to handle high clients load", 2543 | CorrectAnswer = 1, 2544 | Marks = 7, 2545 | Choices = new List < Choice > { 2546 | new Choice { 2547 | Order = 1, 2548 | Description = "True" 2549 | }, 2550 | new Choice { 2551 | Order = 2, 2552 | Description = "False" 2553 | } 2554 | } 2555 | }, 2556 | new Question { 2557 | Title = "Q #142: Which P2P topology uses a cluster of machines arranged in a ring to act as distributed servers?", 2558 | CorrectAnswer = 1, 2559 | Marks = 8, 2560 | Choices = new List < Choice > { 2561 | new Choice { 2562 | Order = 1, 2563 | Description = "Centralized" 2564 | }, 2565 | new Choice { 2566 | Order = 2, 2567 | Description = "Ring" 2568 | }, 2569 | new Choice { 2570 | Order = 3, 2571 | Description = "Hierarchical" 2572 | }, 2573 | new Choice { 2574 | Order = 4, 2575 | Description = "Decentralized" 2576 | } 2577 | } 2578 | }, 2579 | new Question { 2580 | Title = "Q #143: Ring systems are generally built on the assumption that the machines are all nearby on the network", 2581 | CorrectAnswer = 1, 2582 | Marks = 1, 2583 | Choices = new List < Choice > { 2584 | new Choice { 2585 | Order = 1, 2586 | Description = "True" 2587 | }, 2588 | new Choice { 2589 | Order = 2, 2590 | Description = "False" 2591 | } 2592 | } 2593 | }, 2594 | new Question { 2595 | Title = "Q #144: Which P2P topology has a similar structure to the Domain Name Service (DNS)?", 2596 | CorrectAnswer = 1, 2597 | Marks = 3, 2598 | Choices = new List < Choice > { 2599 | new Choice { 2600 | Order = 1, 2601 | Description = "Centralized" 2602 | }, 2603 | new Choice { 2604 | Order = 2, 2605 | Description = "Ring" 2606 | }, 2607 | new Choice { 2608 | Order = 3, 2609 | Description = "Hierarchical" 2610 | }, 2611 | new Choice { 2612 | Order = 4, 2613 | Description = "Decentralized" 2614 | } 2615 | } 2616 | }, 2617 | new Question { 2618 | Title = "Q #145: Which P2P topology has a similar structure to the Network Time Protocol (NTP)?", 2619 | CorrectAnswer = 1, 2620 | Marks = 9, 2621 | Choices = new List < Choice > { 2622 | new Choice { 2623 | Order = 1, 2624 | Description = "Centralized" 2625 | }, 2626 | new Choice { 2627 | Order = 2, 2628 | Description = "Ring" 2629 | }, 2630 | new Choice { 2631 | Order = 3, 2632 | Description = "Hierarchical" 2633 | }, 2634 | new Choice { 2635 | Order = 4, 2636 | Description = "Decentralized" 2637 | } 2638 | } 2639 | }, 2640 | new Question { 2641 | Title = "Q #146: Which P2P topology allows all peers to communicate symmetrically, and have equal roles?", 2642 | CorrectAnswer = 1, 2643 | Marks = 7, 2644 | Choices = new List < Choice > { 2645 | new Choice { 2646 | Order = 1, 2647 | Description = "Centralized" 2648 | }, 2649 | new Choice { 2650 | Order = 2, 2651 | Description = "Ring" 2652 | }, 2653 | new Choice { 2654 | Order = 3, 2655 | Description = "Hierarchical" 2656 | }, 2657 | new Choice { 2658 | Order = 4, 2659 | Description = "Decentralized" 2660 | } 2661 | } 2662 | }, 2663 | new Question { 2664 | Title = "Q #147: Gnutella is an example of which P2P topology?", 2665 | CorrectAnswer = 1, 2666 | Marks = 6, 2667 | Choices = new List < Choice > { 2668 | new Choice { 2669 | Order = 1, 2670 | Description = "Centralized" 2671 | }, 2672 | new Choice { 2673 | Order = 2, 2674 | Description = "Ring" 2675 | }, 2676 | new Choice { 2677 | Order = 3, 2678 | Description = "Hierarchical" 2679 | }, 2680 | new Choice { 2681 | Order = 4, 2682 | Description = "Decentralized" 2683 | } 2684 | } 2685 | }, 2686 | new Question { 2687 | Title = "Q #148: Which of the following is a combination of several P2P topologies into one system?", 2688 | CorrectAnswer = 1, 2689 | Marks = 4, 2690 | Choices = new List < Choice > { 2691 | new Choice { 2692 | Order = 1, 2693 | Description = "Centralized" 2694 | }, 2695 | new Choice { 2696 | Order = 2, 2697 | Description = "Ring" 2698 | }, 2699 | new Choice { 2700 | Order = 3, 2701 | Description = "Hierarchical" 2702 | }, 2703 | new Choice { 2704 | Order = 4, 2705 | Description = "Decentralized" 2706 | } 2707 | } 2708 | }, 2709 | new Question { 2710 | Title = "Q #149: Which hybrid topology has a ring of servers acting as the main server, with many connected clients?", 2711 | CorrectAnswer = 1, 2712 | Marks = 7, 2713 | Choices = new List < Choice > { 2714 | new Choice { 2715 | Order = 1, 2716 | Description = "Centralized + Ring" 2717 | }, 2718 | new Choice { 2719 | Order = 2, 2720 | Description = "Centralized + Hierarchical" 2721 | }, 2722 | new Choice { 2723 | Order = 3, 2724 | Description = "Decentralized + Ring" 2725 | }, 2726 | new Choice { 2727 | Order = 4, 2728 | Description = "Centralized + Decentralized" 2729 | } 2730 | } 2731 | }, 2732 | new Question { 2733 | Title = "Q #150: Which hybrid topology has a set of supernodes, each with their own set of connected peers?", 2734 | CorrectAnswer = 1, 2735 | Marks = 1, 2736 | Choices = new List < Choice > { 2737 | new Choice { 2738 | Order = 1, 2739 | Description = "Centralized + Ring" 2740 | }, 2741 | new Choice { 2742 | Order = 2, 2743 | Description = "Centralized + Hierarchical" 2744 | }, 2745 | new Choice { 2746 | Order = 3, 2747 | Description = "Decentralized + Ring" 2748 | }, 2749 | new Choice { 2750 | Order = 4, 2751 | Description = "Centralized + Decentralized" 2752 | } 2753 | } 2754 | }, 2755 | new Question { 2756 | Title = "Q #151: Which of the following is not an attribute of a centralized P2P topology?", 2757 | CorrectAnswer = 1, 2758 | Marks = 5, 2759 | Choices = new List < Choice > { 2760 | new Choice { 2761 | Order = 1, 2762 | Description = "Managable" 2763 | }, 2764 | new Choice { 2765 | Order = 2, 2766 | Description = "Coherent" 2767 | }, 2768 | new Choice { 2769 | Order = 3, 2770 | Description = "Secure" 2771 | }, 2772 | new Choice { 2773 | Order = 4, 2774 | Description = "Extensible" 2775 | } 2776 | } 2777 | }, 2778 | new Question { 2779 | Title = "Q #152: Which of the following is an attribute of a centralized P2P topology?", 2780 | CorrectAnswer = 1, 2781 | Marks = 9, 2782 | Choices = new List < Choice > { 2783 | new Choice { 2784 | Order = 1, 2785 | Description = "Extensible" 2786 | }, 2787 | new Choice { 2788 | Order = 2, 2789 | Description = "Fault Tolerant" 2790 | }, 2791 | new Choice { 2792 | Order = 3, 2793 | Description = "Lawsuit-proof" 2794 | }, 2795 | new Choice { 2796 | Order = 4, 2797 | Description = "Coherent" 2798 | } 2799 | } 2800 | }, 2801 | new Question { 2802 | Title = "Q #153: Which of the following is not an attribute of a ring P2P topology?", 2803 | CorrectAnswer = 1, 2804 | Marks = 2, 2805 | Choices = new List < Choice > { 2806 | new Choice { 2807 | Order = 1, 2808 | Description = "Managable" 2809 | }, 2810 | new Choice { 2811 | Order = 2, 2812 | Description = "Coherent" 2813 | }, 2814 | new Choice { 2815 | Order = 3, 2816 | Description = "Secure" 2817 | }, 2818 | new Choice { 2819 | Order = 4, 2820 | Description = "Fault Tolerant" 2821 | } 2822 | } 2823 | }, 2824 | new Question { 2825 | Title = "Q #154: Which of the following is an attribute of a ring P2P topology?", 2826 | CorrectAnswer = 1, 2827 | Marks = 8, 2828 | Choices = new List < Choice > { 2829 | new Choice { 2830 | Order = 1, 2831 | Description = "Extensible" 2832 | }, 2833 | new Choice { 2834 | Order = 2, 2835 | Description = "Fault Tolerant" 2836 | }, 2837 | new Choice { 2838 | Order = 3, 2839 | Description = "Scalable" 2840 | } 2841 | } 2842 | }, 2843 | new Question { 2844 | Title = "Q #155: Which of the following is not an attribute of a decentralized P2P topology?", 2845 | CorrectAnswer = 1, 2846 | Marks = 2, 2847 | Choices = new List < Choice > { 2848 | new Choice { 2849 | Order = 1, 2850 | Description = "Extensible" 2851 | }, 2852 | new Choice { 2853 | Order = 2, 2854 | Description = "Lawsuit-proof" 2855 | }, 2856 | new Choice { 2857 | Order = 3, 2858 | Description = "Managable" 2859 | }, 2860 | new Choice { 2861 | Order = 4, 2862 | Description = "Fault Tolerant" 2863 | } 2864 | } 2865 | }, 2866 | new Question { 2867 | Title = "Q #156: Which of the following is an attribute of a decentralized P2P topology?", 2868 | CorrectAnswer = 1, 2869 | Marks = 3, 2870 | Choices = new List < Choice > { 2871 | new Choice { 2872 | Order = 1, 2873 | Description = "Managable" 2874 | }, 2875 | new Choice { 2876 | Order = 2, 2877 | Description = "Coherent" 2878 | }, 2879 | new Choice { 2880 | Order = 3, 2881 | Description = "Secure" 2882 | }, 2883 | new Choice { 2884 | Order = 4, 2885 | Description = "Extensible" 2886 | } 2887 | } 2888 | }, 2889 | new Question { 2890 | Title = "Q #157: Which of the following is not an attribute of a centralized + ring hybrid P2P topology?", 2891 | CorrectAnswer = 1, 2892 | Marks = 7, 2893 | Choices = new List < Choice > { 2894 | new Choice { 2895 | Order = 1, 2896 | Description = "Managable" 2897 | }, 2898 | new Choice { 2899 | Order = 2, 2900 | Description = "Coherent" 2901 | }, 2902 | new Choice { 2903 | Order = 3, 2904 | Description = "Secure" 2905 | }, 2906 | new Choice { 2907 | Order = 4, 2908 | Description = "Fault Tolerant" 2909 | } 2910 | } 2911 | }, 2912 | new Question { 2913 | Title = "Q #158: Which of the following is an attribute of a centralized + ring hybrid P2P topology?", 2914 | CorrectAnswer = 1, 2915 | Marks = 5, 2916 | Choices = new List < Choice > { 2917 | new Choice { 2918 | Order = 1, 2919 | Description = "Extensible" 2920 | }, 2921 | new Choice { 2922 | Order = 2, 2923 | Description = "Fault Tolerant" 2924 | }, 2925 | new Choice { 2926 | Order = 3, 2927 | Description = "Lawsuit-proof" 2928 | } 2929 | } 2930 | }, 2931 | new Question { 2932 | Title = "Q #159: The centralized + ring hybrid P2P topology is a common architecture for web applications", 2933 | CorrectAnswer = 1, 2934 | Marks = 8, 2935 | Choices = new List < Choice > { 2936 | new Choice { 2937 | Order = 1, 2938 | Description = "True" 2939 | }, 2940 | new Choice { 2941 | Order = 2, 2942 | Description = "False" 2943 | } 2944 | } 2945 | }, 2946 | new Question { 2947 | Title = "Q #160: Which of the following is not an attribute of a centralized + decentralized hybrid P2P topology?", 2948 | CorrectAnswer = 1, 2949 | Marks = 1, 2950 | Choices = new List < Choice > { 2951 | new Choice { 2952 | Order = 1, 2953 | Description = "Managable" 2954 | }, 2955 | new Choice { 2956 | Order = 2, 2957 | Description = "Lawsuit-proof" 2958 | }, 2959 | new Choice { 2960 | Order = 3, 2961 | Description = "Fault Tolerant" 2962 | } 2963 | } 2964 | }, 2965 | new Question { 2966 | Title = "Q #161: Which of the following is an attribute of a centralized + decentralized hybrid P2P topology?", 2967 | CorrectAnswer = 1, 2968 | Marks = 5, 2969 | Choices = new List < Choice > { 2970 | new Choice { 2971 | Order = 1, 2972 | Description = "Managable" 2973 | }, 2974 | new Choice { 2975 | Order = 2, 2976 | Description = "Secure" 2977 | }, 2978 | new Choice { 2979 | Order = 3, 2980 | Description = "Lawsuit-proof" 2981 | } 2982 | } 2983 | }, 2984 | new Question { 2985 | Title = "Q #162: Which of the following is the best topology for P2P networks?", 2986 | CorrectAnswer = 1, 2987 | Marks = 2, 2988 | Choices = new List < Choice > { 2989 | new Choice { 2990 | Order = 1, 2991 | Description = "Centralized" 2992 | }, 2993 | new Choice { 2994 | Order = 2, 2995 | Description = "Ring" 2996 | }, 2997 | new Choice { 2998 | Order = 3, 2999 | Description = "Hierarchical" 3000 | }, 3001 | new Choice { 3002 | Order = 4, 3003 | Description = "Decentralized" 3004 | } 3005 | } 3006 | }, 3007 | new Question { 3008 | Title = "Q #163: After Napster, new file-sharing P2P systems bypass the legal problems by not holding a central directory", 3009 | CorrectAnswer = 1, 3010 | Marks = 6, 3011 | Choices = new List < Choice > { 3012 | new Choice { 3013 | Order = 1, 3014 | Description = "True" 3015 | }, 3016 | new Choice { 3017 | Order = 2, 3018 | Description = "False" 3019 | } 3020 | } 3021 | }, 3022 | new Question { 3023 | Title = "Q #164: Which of the following is not a Gnutella protocol message?", 3024 | CorrectAnswer = 1, 3025 | Marks = 5, 3026 | Choices = new List < Choice > { 3027 | new Choice { 3028 | Order = 1, 3029 | Description = "PING" 3030 | }, 3031 | new Choice { 3032 | Order = 2, 3033 | Description = "PONG" 3034 | }, 3035 | new Choice { 3036 | Order = 3, 3037 | Description = "QUERY" 3038 | }, 3039 | new Choice { 3040 | Order = 4, 3041 | Description = "RESPONSE" 3042 | } 3043 | } 3044 | }, 3045 | new Question { 3046 | Title = "Q #165: Which of the following is a P2P protocol which allows peers to download a file from a group of other peers", 3047 | CorrectAnswer = 1, 3048 | Marks = 1, 3049 | Choices = new List < Choice > { 3050 | new Choice { 3051 | Order = 1, 3052 | Description = "BitTorrent" 3053 | }, 3054 | new Choice { 3055 | Order = 2, 3056 | Description = "Gnutella" 3057 | }, 3058 | new Choice { 3059 | Order = 3, 3060 | Description = "Napster" 3061 | }, 3062 | new Choice { 3063 | Order = 4, 3064 | Description = "Limewire" 3065 | } 3066 | } 3067 | }, 3068 | new Question { 3069 | Title = "Q #166: A torrent is a set of all peers that take part in downloading a file using the BitTorrent protocol", 3070 | CorrectAnswer = 1, 3071 | Marks = 9, 3072 | Choices = new List < Choice > { 3073 | new Choice { 3074 | Order = 1, 3075 | Description = "True" 3076 | }, 3077 | new Choice { 3078 | Order = 2, 3079 | Description = "False" 3080 | } 3081 | } 3082 | }, 3083 | new Question { 3084 | Title = "Q #167: The set of all peers that takes part in a torrent is refered to as a(n) _________________", 3085 | CorrectAnswer = 1, 3086 | Marks = 5, 3087 | Choices = new List < Choice > { 3088 | new Choice { 3089 | Order = 1, 3090 | Description = "Swarm" 3091 | }, 3092 | new Choice { 3093 | Order = 2, 3094 | Description = "Seed" 3095 | }, 3096 | new Choice { 3097 | Order = 3, 3098 | Description = "Leech" 3099 | }, 3100 | new Choice { 3101 | Order = 4, 3102 | Description = "Tracker" 3103 | } 3104 | } 3105 | }, 3106 | new Question { 3107 | Title = "Q #168: A peer in a swarm that has the complete content file is called a(n) _________________", 3108 | CorrectAnswer = 1, 3109 | Marks = 1, 3110 | Choices = new List < Choice > { 3111 | new Choice { 3112 | Order = 1, 3113 | Description = "Swarm" 3114 | }, 3115 | new Choice { 3116 | Order = 2, 3117 | Description = "Seed" 3118 | }, 3119 | new Choice { 3120 | Order = 3, 3121 | Description = "Leech" 3122 | }, 3123 | new Choice { 3124 | Order = 4, 3125 | Description = "Tracker" 3126 | } 3127 | } 3128 | }, 3129 | new Question { 3130 | Title = "Q #169: A peer that has only part of the file and wants to download the rest is called a(n) _________________", 3131 | CorrectAnswer = 1, 3132 | Marks = 3, 3133 | Choices = new List < Choice > { 3134 | new Choice { 3135 | Order = 1, 3136 | Description = "Swarm" 3137 | }, 3138 | new Choice { 3139 | Order = 2, 3140 | Description = "Seed" 3141 | }, 3142 | new Choice { 3143 | Order = 3, 3144 | Description = "Leech" 3145 | }, 3146 | new Choice { 3147 | Order = 4, 3148 | Description = "Tracker" 3149 | } 3150 | } 3151 | }, 3152 | new Question { 3153 | Title = "Q #170: A swarm is a combination of seeds and trackers", 3154 | CorrectAnswer = 1, 3155 | Marks = 2, 3156 | Choices = new List < Choice > { 3157 | new Choice { 3158 | Order = 1, 3159 | Description = "True" 3160 | }, 3161 | new Choice { 3162 | Order = 2, 3163 | Description = "False" 3164 | } 3165 | } 3166 | }, 3167 | new Question { 3168 | Title = "Q #171: In BitTorrent, the __________ group is the list of peers that the current peer has concurrently connected to; it continuously uploads and downloads pieces from this group.", 3169 | CorrectAnswer = 1, 3170 | Marks = 2, 3171 | Choices = new List < Choice > { 3172 | new Choice { 3173 | Order = 1, 3174 | Description = "Unchoked" 3175 | }, 3176 | new Choice { 3177 | Order = 2, 3178 | Description = "Choked" 3179 | } 3180 | } 3181 | }, 3182 | new Question { 3183 | Title = "Q #172: In BitTorrent, the __________ group is the list of neighbours that the peer is not currently connected to but may connect to in the future", 3184 | CorrectAnswer = 1, 3185 | Marks = 4, 3186 | Choices = new List < Choice > { 3187 | new Choice { 3188 | Order = 1, 3189 | Description = "Unchoked" 3190 | }, 3191 | new Choice { 3192 | Order = 2, 3193 | Description = "Choked" 3194 | } 3195 | } 3196 | }, 3197 | new Question { 3198 | Title = "Q #173: In BitTorrent, optimistic choking is when the system promotes a single interested peer every 30 seconds, regardless of its uploading rate, from the choked group and flags it as unchoked", 3199 | CorrectAnswer = 1, 3200 | Marks = 8, 3201 | Choices = new List < Choice > { 3202 | new Choice { 3203 | Order = 1, 3204 | Description = "True" 3205 | }, 3206 | new Choice { 3207 | Order = 2, 3208 | Description = "False" 3209 | } 3210 | } 3211 | }, 3212 | new Question { 3213 | Title = "Q #174: In BitTorrent, the strategy \"common-last\" is when a peer tries to first download the pieces with the fewest repeated copies amoung the neighbours", 3214 | CorrectAnswer = 1, 3215 | Marks = 4, 3216 | Choices = new List < Choice > { 3217 | new Choice { 3218 | Order = 1, 3219 | Description = "True" 3220 | }, 3221 | new Choice { 3222 | Order = 2, 3223 | Description = "False" 3224 | } 3225 | } 3226 | }, 3227 | new Question { 3228 | Title = "Q #175: Which of the following is not a common feature of P2P applications", 3229 | CorrectAnswer = 1, 3230 | Marks = 2, 3231 | Choices = new List < Choice > { 3232 | new Choice { 3233 | Order = 1, 3234 | Description = "Protocols are constructed at the application layer" 3235 | }, 3236 | new Choice { 3237 | Order = 2, 3238 | Description = "Peers have a unique identifier" 3239 | }, 3240 | new Choice { 3241 | Order = 3, 3242 | Description = "P2P protocols support some type of message-routing capability" 3243 | }, 3244 | new Choice { 3245 | Order = 4, 3246 | Description = "Applications mask the IP address of peers so they cannot be tracked" 3247 | } 3248 | } 3249 | }, 3250 | new Question { 3251 | Title = "Q #176: A(n) ______________________ is the collection of peer connections in a P2P network", 3252 | CorrectAnswer = 1, 3253 | Marks = 5, 3254 | Choices = new List < Choice > { 3255 | new Choice { 3256 | Order = 1, 3257 | Description = "Overlay" 3258 | }, 3259 | new Choice { 3260 | Order = 2, 3261 | Description = "Swarm" 3262 | }, 3263 | new Choice { 3264 | Order = 3, 3265 | Description = "Tracker" 3266 | }, 3267 | new Choice { 3268 | Order = 4, 3269 | Description = "Torrent" 3270 | } 3271 | } 3272 | }, 3273 | new Question { 3274 | Title = "Q #177: Which of the following is not an attribute of unstructured networks?", 3275 | CorrectAnswer = 1, 3276 | Marks = 6, 3277 | Choices = new List < Choice > { 3278 | new Choice { 3279 | Order = 1, 3280 | Description = "The nodes are linked randomly" 3281 | }, 3282 | new Choice { 3283 | Order = 2, 3284 | Description = "Searching is inefficient" 3285 | }, 3286 | new Choice { 3287 | Order = 3, 3288 | Description = "Queries may not be resolved" 3289 | }, 3290 | new Choice { 3291 | Order = 4, 3292 | Description = "Uses predefined set of rules to link nodes" 3293 | } 3294 | } 3295 | }, 3296 | new Question { 3297 | Title = "Q #178: A structured P2P network uses a predefined set of rules to link nodes so that a query can be effectively and efficiently resolved", 3298 | CorrectAnswer = 1, 3299 | Marks = 7, 3300 | Choices = new List < Choice > { 3301 | new Choice { 3302 | Order = 1, 3303 | Description = "True" 3304 | }, 3305 | new Choice { 3306 | Order = 2, 3307 | Description = "False" 3308 | } 3309 | } 3310 | }, 3311 | new Question { 3312 | Title = "Q #179: A common technique used in unstructured P2P networks is the distributed hash table (DHT)", 3313 | CorrectAnswer = 1, 3314 | Marks = 6, 3315 | Choices = new List < Choice > { 3316 | new Choice { 3317 | Order = 1, 3318 | Description = "True" 3319 | }, 3320 | new Choice { 3321 | Order = 2, 3322 | Description = "False" 3323 | } 3324 | } 3325 | }, 3326 | new Question { 3327 | Title = "Q #180: The address space of a distributed hash table ranges from", 3328 | CorrectAnswer = 1, 3329 | Marks = 1, 3330 | Choices = new List < Choice > { 3331 | new Choice { 3332 | Order = 1, 3333 | Description = "0 to 2^m - 1" 3334 | }, 3335 | new Choice { 3336 | Order = 2, 3337 | Description = "1 to 2^m - 1" 3338 | }, 3339 | new Choice { 3340 | Order = 3, 3341 | Description = "0 to 2^m" 3342 | }, 3343 | new Choice { 3344 | Order = 4, 3345 | Description = "1 to 2^m" 3346 | } 3347 | } 3348 | }, 3349 | new Question { 3350 | Title = "Q #181: A distributed hash table distributes data items among a set of nodes according to some predefined rules", 3351 | CorrectAnswer = 1, 3352 | Marks = 4, 3353 | Choices = new List < Choice > { 3354 | new Choice { 3355 | Order = 1, 3356 | Description = "True" 3357 | }, 3358 | new Choice { 3359 | Order = 2, 3360 | Description = "False" 3361 | } 3362 | } 3363 | }, 3364 | new Question { 3365 | Title = "Q #182: The addresses in a distributed hash table are distributed in a counter-clockwise direction", 3366 | CorrectAnswer = 1, 3367 | Marks = 4, 3368 | Choices = new List < Choice > { 3369 | new Choice { 3370 | Order = 1, 3371 | Description = "True" 3372 | }, 3373 | new Choice { 3374 | Order = 2, 3375 | Description = "False" 3376 | } 3377 | } 3378 | }, 3379 | new Question { 3380 | Title = "Q #183: Most DHT implementations use a value of m equal to", 3381 | CorrectAnswer = 1, 3382 | Marks = 3, 3383 | Choices = new List < Choice > { 3384 | new Choice { 3385 | Order = 1, 3386 | Description = "256" 3387 | }, 3388 | new Choice { 3389 | Order = 2, 3390 | Description = "128" 3391 | }, 3392 | new Choice { 3393 | Order = 3, 3394 | Description = "160" 3395 | }, 3396 | new Choice { 3397 | Order = 4, 3398 | Description = "150" 3399 | } 3400 | } 3401 | }, 3402 | new Question { 3403 | Title = "Q #184: The _______________ method of storing objects in the DHT address space stores the node whose ID is \"closest\" to the key in the ring", 3404 | CorrectAnswer = 1, 3405 | Marks = 5, 3406 | Choices = new List < Choice > { 3407 | new Choice { 3408 | Order = 1, 3409 | Description = "Direct" 3410 | }, 3411 | new Choice { 3412 | Order = 2, 3413 | Description = "Indirect" 3414 | } 3415 | } 3416 | }, 3417 | new Question { 3418 | Title = "Q #185: The _______________ method of storing objects in the DHT address space stores the physical object and the reference to the object in different locations (peers).", 3419 | CorrectAnswer = 1, 3420 | Marks = 7, 3421 | Choices = new List < Choice > { 3422 | new Choice { 3423 | Order = 1, 3424 | Description = "Direct" 3425 | }, 3426 | new Choice { 3427 | Order = 2, 3428 | Description = "Indirect" 3429 | } 3430 | } 3431 | }, 3432 | new Question { 3433 | Title = "Q #186: _______________ overlays in a P2P network organize nodes into a random graph, and then use floods/random walks to discover data stored by overlay nodes", 3434 | CorrectAnswer = 1, 3435 | Marks = 8, 3436 | Choices = new List < Choice > { 3437 | new Choice { 3438 | Order = 1, 3439 | Description = "Unstructured" 3440 | }, 3441 | new Choice { 3442 | Order = 2, 3443 | Description = "Structured" 3444 | } 3445 | } 3446 | }, 3447 | new Question { 3448 | Title = "Q #187: Which unstructured overlay algorithm prevents messages from circulating endlessly by attaching message identifiers/TTL values (and does not alter the TTL if the query fails)", 3449 | CorrectAnswer = 1, 3450 | Marks = 8, 3451 | Choices = new List < Choice > { 3452 | new Choice { 3453 | Order = 1, 3454 | Description = "Flooding" 3455 | }, 3456 | new Choice { 3457 | Order = 2, 3458 | Description = "Expanding ring" 3459 | }, 3460 | new Choice { 3461 | Order = 3, 3462 | Description = "Random walk" 3463 | }, 3464 | new Choice { 3465 | Order = 4, 3466 | Description = "Pastry" 3467 | } 3468 | } 3469 | }, 3470 | new Question { 3471 | Title = "Q #188: Which unstructured overlay algorithm increases the TTL value by a small amount if the query fails?", 3472 | CorrectAnswer = 1, 3473 | Marks = 4, 3474 | Choices = new List < Choice > { 3475 | new Choice { 3476 | Order = 1, 3477 | Description = "Flooding" 3478 | }, 3479 | new Choice { 3480 | Order = 2, 3481 | Description = "Expanding ring" 3482 | }, 3483 | new Choice { 3484 | Order = 3, 3485 | Description = "Dijkstra" 3486 | }, 3487 | new Choice { 3488 | Order = 4, 3489 | Description = "Pastry" 3490 | } 3491 | } 3492 | }, 3493 | new Question { 3494 | Title = "Q #189: Which unstructured overlay algorithm randomly traverses nodes, and decrements a TTL at each hop?", 3495 | CorrectAnswer = 1, 3496 | Marks = 7, 3497 | Choices = new List < Choice > { 3498 | new Choice { 3499 | Order = 1, 3500 | Description = "Flooding" 3501 | }, 3502 | new Choice { 3503 | Order = 2, 3504 | Description = "Expanding ring" 3505 | }, 3506 | new Choice { 3507 | Order = 3, 3508 | Description = "Dijkstra" 3509 | }, 3510 | new Choice { 3511 | Order = 4, 3512 | Description = "Pastry" 3513 | } 3514 | } 3515 | }, 3516 | new Question { 3517 | Title = "Q #190: Random walk queries in an unstructured overlay must be carried out sequentially", 3518 | CorrectAnswer = 1, 3519 | Marks = 7, 3520 | Choices = new List < Choice > { 3521 | new Choice { 3522 | Order = 1, 3523 | Description = "True" 3524 | }, 3525 | new Choice { 3526 | Order = 2, 3527 | Description = "False" 3528 | } 3529 | } 3530 | }, 3531 | new Question { 3532 | Title = "Q #191: _______________ overlays in a P2P network combines a specific geometrical structure with appropriate routing and maintenance mechanisms", 3533 | CorrectAnswer = 1, 3534 | Marks = 2, 3535 | Choices = new List < Choice > { 3536 | new Choice { 3537 | Order = 1, 3538 | Description = "Unstructured" 3539 | }, 3540 | new Choice { 3541 | Order = 2, 3542 | Description = "Structured" 3543 | } 3544 | } 3545 | }, 3546 | new Question { 3547 | Title = "Q #192: Which of the following is not a structured overlay protocol?", 3548 | CorrectAnswer = 1, 3549 | Marks = 8, 3550 | Choices = new List < Choice > { 3551 | new Choice { 3552 | Order = 1, 3553 | Description = "Kademlia" 3554 | }, 3555 | new Choice { 3556 | Order = 2, 3557 | Description = "Chord" 3558 | }, 3559 | new Choice { 3560 | Order = 3, 3561 | Description = "Pastry" 3562 | }, 3563 | new Choice { 3564 | Order = 4, 3565 | Description = "Finger" 3566 | } 3567 | } 3568 | }, 3569 | new Question { 3570 | Title = "Q #193: What is a Distributed Object Location and Routing (DOLR) system?", 3571 | CorrectAnswer = 1, 3572 | Marks = 2, 3573 | Choices = new List < Choice > { 3574 | new Choice { 3575 | Order = 1, 3576 | Description = "A P2P system that uses key-based routing" 3577 | }, 3578 | new Choice { 3579 | Order = 2, 3580 | Description = "A distributed naming system for resources connected to the internet" 3581 | }, 3582 | new Choice { 3583 | Order = 3, 3584 | Description = "A method of routing resources from a centralized server to a client" 3585 | }, 3586 | new Choice { 3587 | Order = 4, 3588 | Description = "A client-server system which distributes files evenly across the server" 3589 | } 3590 | } 3591 | }, 3592 | new Question { 3593 | Title = "Q #194: For the Chord protocol, the closest peer with N >= k hosts the value (k, v), where k is the hash of the data name, and v is the information about the peer that has the actual object", 3594 | CorrectAnswer = 1, 3595 | Marks = 6, 3596 | Choices = new List < Choice > { 3597 | new Choice { 3598 | Order = 1, 3599 | Description = "True" 3600 | }, 3601 | new Choice { 3602 | Order = 2, 3603 | Description = "False" 3604 | } 3605 | } 3606 | }, 3607 | new Question { 3608 | Title = "Q #195: The Pastry protocol utilizes a finger table to resolve a query/lookup", 3609 | CorrectAnswer = 1, 3610 | Marks = 7, 3611 | Choices = new List < Choice > { 3612 | new Choice { 3613 | Order = 1, 3614 | Description = "True" 3615 | }, 3616 | new Choice { 3617 | Order = 2, 3618 | Description = "False" 3619 | } 3620 | } 3621 | }, 3622 | new Question { 3623 | Title = "Q #196: In a finger table for the Chord protocol, each node needs to know about m successor nodes and one predecessor node", 3624 | CorrectAnswer = 1, 3625 | Marks = 6, 3626 | Choices = new List < Choice > { 3627 | new Choice { 3628 | Order = 1, 3629 | Description = "True" 3630 | }, 3631 | new Choice { 3632 | Order = 2, 3633 | Description = "False" 3634 | } 3635 | } 3636 | }, 3637 | new Question { 3638 | Title = "Q #197: What is the successor of a target key in a finger table? (N=current node, i=record number starting at 1)", 3639 | CorrectAnswer = 1, 3640 | Marks = 2, 3641 | Choices = new List < Choice > { 3642 | new Choice { 3643 | Order = 1, 3644 | Description = "Successor(N + 2^(i - 1))" 3645 | }, 3646 | new Choice { 3647 | Order = 2, 3648 | Description = "Successor(N + 2^(i + 1))" 3649 | }, 3650 | new Choice { 3651 | Order = 3, 3652 | Description = "Successor(N - 2^(i - 1))" 3653 | }, 3654 | new Choice { 3655 | Order = 4, 3656 | Description = "Successor(N - 2^(i + 1))" 3657 | } 3658 | } 3659 | }, 3660 | new Question { 3661 | Title = "Q #198: In a finger table, a node is responsible for all keys less than the current node, but greater than the preceeding node (i.e. N > K > N - 1)", 3662 | CorrectAnswer = 1, 3663 | Marks = 6, 3664 | Choices = new List < Choice > { 3665 | new Choice { 3666 | Order = 1, 3667 | Description = "True" 3668 | }, 3669 | new Choice { 3670 | Order = 2, 3671 | Description = "False" 3672 | } 3673 | } 3674 | }, 3675 | new Question { 3676 | Title = "Q #199: Which Chord operation is used to find where an object is located among the available peers in the ring?", 3677 | CorrectAnswer = 1, 3678 | Marks = 3, 3679 | Choices = new List < Choice > { 3680 | new Choice { 3681 | Order = 1, 3682 | Description = "Lookup" 3683 | }, 3684 | new Choice { 3685 | Order = 2, 3686 | Description = "Stabilize" 3687 | }, 3688 | new Choice { 3689 | Order = 3, 3690 | Description = "Fix_Finger" 3691 | }, 3692 | new Choice { 3693 | Order = 4, 3694 | Description = "Join" 3695 | } 3696 | } 3697 | }, 3698 | new Question { 3699 | Title = "Q #200: Which Chord operation is used to validate its information about its successor, and let the success validate its information about its predecessor?", 3700 | CorrectAnswer = 1, 3701 | Marks = 9, 3702 | Choices = new List < Choice > { 3703 | new Choice { 3704 | Order = 1, 3705 | Description = "Lookup" 3706 | }, 3707 | new Choice { 3708 | Order = 2, 3709 | Description = "Stabilize" 3710 | }, 3711 | new Choice { 3712 | Order = 3, 3713 | Description = "Fix_Finger" 3714 | }, 3715 | new Choice { 3716 | Order = 4, 3717 | Description = "Join" 3718 | } 3719 | } 3720 | }, 3721 | new Question { 3722 | Title = "Q #201: Which Chord operation is used to update a finger table?", 3723 | CorrectAnswer = 1, 3724 | Marks = 2, 3725 | Choices = new List < Choice > { 3726 | new Choice { 3727 | Order = 1, 3728 | Description = "Lookup" 3729 | }, 3730 | new Choice { 3731 | Order = 2, 3732 | Description = "Stabilize" 3733 | }, 3734 | new Choice { 3735 | Order = 3, 3736 | Description = "Fix_Finger" 3737 | }, 3738 | new Choice { 3739 | Order = 4, 3740 | Description = "Join" 3741 | } 3742 | } 3743 | }, 3744 | new Question { 3745 | Title = "Q #202: In the Chord protocol, when a node leaves, the data/references must be duplicated on other nodes", 3746 | CorrectAnswer = 1, 3747 | Marks = 5, 3748 | Choices = new List < Choice > { 3749 | new Choice { 3750 | Order = 1, 3751 | Description = "True" 3752 | }, 3753 | new Choice { 3754 | Order = 2, 3755 | Description = "False" 3756 | } 3757 | } 3758 | }, 3759 | new Question { 3760 | Title = "Q #203: What is a common value for m in the Pastry protocol?", 3761 | CorrectAnswer = 1, 3762 | Marks = 2, 3763 | Choices = new List < Choice > { 3764 | new Choice { 3765 | Order = 1, 3766 | Description = "256" 3767 | }, 3768 | new Choice { 3769 | Order = 2, 3770 | Description = "128" 3771 | }, 3772 | new Choice { 3773 | Order = 3, 3774 | Description = "160" 3775 | }, 3776 | new Choice { 3777 | Order = 4, 3778 | Description = "150" 3779 | } 3780 | } 3781 | }, 3782 | new Question { 3783 | Title = "Q #204: In the Pastry protocol, a key is stored in the node whose identifier is numerically closest to the key", 3784 | CorrectAnswer = 1, 3785 | Marks = 5, 3786 | Choices = new List < Choice > { 3787 | new Choice { 3788 | Order = 1, 3789 | Description = "True" 3790 | }, 3791 | new Choice { 3792 | Order = 2, 3793 | Description = "False" 3794 | } 3795 | } 3796 | }, 3797 | new Question { 3798 | Title = "Q #205: In the Pastry protocol, the number of rows in the routing table is equal to", 3799 | CorrectAnswer = 1, 3800 | Marks = 9, 3801 | Choices = new List < Choice > { 3802 | new Choice { 3803 | Order = 1, 3804 | Description = "M / b" 3805 | }, 3806 | new Choice { 3807 | Order = 2, 3808 | Description = "M * b" 3809 | }, 3810 | new Choice { 3811 | Order = 3, 3812 | Description = "B / m" 3813 | }, 3814 | new Choice { 3815 | Order = 4, 3816 | Description = "2^b" 3817 | } 3818 | } 3819 | }, 3820 | new Question { 3821 | Title = "Q #206: In the Pastry protocol, the number of columns in the routing table is equal to", 3822 | CorrectAnswer = 1, 3823 | Marks = 1, 3824 | Choices = new List < Choice > { 3825 | new Choice { 3826 | Order = 1, 3827 | Description = "M / b" 3828 | }, 3829 | new Choice { 3830 | Order = 2, 3831 | Description = "M * b" 3832 | }, 3833 | new Choice { 3834 | Order = 3, 3835 | Description = "B / m" 3836 | }, 3837 | new Choice { 3838 | Order = 4, 3839 | Description = "2^b" 3840 | } 3841 | } 3842 | }, 3843 | new Question { 3844 | Title = "Q #207: In the Pastry protocol, a cell in the routing table can contain multiple values", 3845 | CorrectAnswer = 1, 3846 | Marks = 2, 3847 | Choices = new List < Choice > { 3848 | new Choice { 3849 | Order = 1, 3850 | Description = "True" 3851 | }, 3852 | new Choice { 3853 | Order = 2, 3854 | Description = "False" 3855 | } 3856 | } 3857 | }, 3858 | new Question { 3859 | Title = "Q #208: In the Pastry protocol, the leaf set is a list of IDs that are numerically larger than the current node ID", 3860 | CorrectAnswer = 1, 3861 | Marks = 7, 3862 | Choices = new List < Choice > { 3863 | new Choice { 3864 | Order = 1, 3865 | Description = "True" 3866 | }, 3867 | new Choice { 3868 | Order = 2, 3869 | Description = "False" 3870 | } 3871 | } 3872 | }, 3873 | new Question { 3874 | Title = "Q #209: In the Pastry protocol, the leaf set contains _________ identifiers", 3875 | CorrectAnswer = 1, 3876 | Marks = 6, 3877 | Choices = new List < Choice > { 3878 | new Choice { 3879 | Order = 1, 3880 | Description = "M / b" 3881 | }, 3882 | new Choice { 3883 | Order = 2, 3884 | Description = "M * b" 3885 | }, 3886 | new Choice { 3887 | Order = 3, 3888 | Description = "B / m" 3889 | }, 3890 | new Choice { 3891 | Order = 4, 3892 | Description = "2^b" 3893 | } 3894 | } 3895 | }, 3896 | new Question { 3897 | Title = "Q #210: Which of the following structured overlay protocols routes messages based on the distance between the nodes?", 3898 | CorrectAnswer = 1, 3899 | Marks = 6, 3900 | Choices = new List < Choice > { 3901 | new Choice { 3902 | Order = 1, 3903 | Description = "Kademlia" 3904 | }, 3905 | new Choice { 3906 | Order = 2, 3907 | Description = "Chord" 3908 | }, 3909 | new Choice { 3910 | Order = 3, 3911 | Description = "Pastry" 3912 | } 3913 | } 3914 | }, 3915 | new Question { 3916 | Title = "Q #211: In the Kademlia protocol, the distance between nodes is determined by bitwise", 3917 | CorrectAnswer = 1, 3918 | Marks = 6, 3919 | Choices = new List < Choice > { 3920 | new Choice { 3921 | Order = 1, 3922 | Description = "XOR" 3923 | }, 3924 | new Choice { 3925 | Order = 2, 3926 | Description = "XAND" 3927 | }, 3928 | new Choice { 3929 | Order = 3, 3930 | Description = "OR" 3931 | }, 3932 | new Choice { 3933 | Order = 4, 3934 | Description = "AND" 3935 | } 3936 | } 3937 | }, 3938 | new Question { 3939 | Title = "Q #212: In the Kademlia protocol, if m=5, how many subtrees does a node divide the binary tree into?", 3940 | CorrectAnswer = 1, 3941 | Marks = 9, 3942 | Choices = new List < Choice > { 3943 | new Choice { 3944 | Order = 1, 3945 | Description = "5" 3946 | }, 3947 | new Choice { 3948 | Order = 2, 3949 | Description = "32" 3950 | }, 3951 | new Choice { 3952 | Order = 3, 3953 | Description = "64" 3954 | }, 3955 | new Choice { 3956 | Order = 4, 3957 | Description = "25" 3958 | } 3959 | } 3960 | }, 3961 | new Question { 3962 | Title = "Q #213: The Kademlia protocol, requires that each row in the routing table keeps at least up to __________ nodes from the corresponding subtree", 3963 | CorrectAnswer = 1, 3964 | Marks = 9, 3965 | Choices = new List < Choice > { 3966 | new Choice { 3967 | Order = 1, 3968 | Description = "5" 3969 | }, 3970 | new Choice { 3971 | Order = 2, 3972 | Description = "10" 3973 | }, 3974 | new Choice { 3975 | Order = 3, 3976 | Description = "15" 3977 | }, 3978 | new Choice { 3979 | Order = 4, 3980 | Description = "20" 3981 | } 3982 | } 3983 | }, 3984 | new Question { 3985 | Title = "Q #214: In Kademlia, each row is referred to as a", 3986 | CorrectAnswer = 1, 3987 | Marks = 8, 3988 | Choices = new List < Choice > { 3989 | new Choice { 3990 | Order = 1, 3991 | Description = "K-bucket" 3992 | }, 3993 | new Choice { 3994 | Order = 2, 3995 | Description = "N-bucket" 3996 | }, 3997 | new Choice { 3998 | Order = 3, 3999 | Description = "Subrecord" 4000 | }, 4001 | new Choice { 4002 | Order = 4, 4003 | Description = "Finger" 4004 | } 4005 | } 4006 | }, 4007 | new Question { 4008 | Title = "Q #215: _____________ refers to what Alice does with the message and the key to obtain a ciphertext", 4009 | CorrectAnswer = 1, 4010 | Marks = 7, 4011 | Choices = new List < Choice > { 4012 | new Choice { 4013 | Order = 1, 4014 | Description = "Key generation" 4015 | }, 4016 | new Choice { 4017 | Order = 2, 4018 | Description = "Encryption" 4019 | }, 4020 | new Choice { 4021 | Order = 3, 4022 | Description = "Decryption" 4023 | }, 4024 | new Choice { 4025 | Order = 4, 4026 | Description = "Signing" 4027 | } 4028 | } 4029 | }, 4030 | new Question { 4031 | Title = "Q #216: _____________ refers to what Bob does with the ciphertext and the key to obtain the plaintext", 4032 | CorrectAnswer = 1, 4033 | Marks = 2, 4034 | Choices = new List < Choice > { 4035 | new Choice { 4036 | Order = 1, 4037 | Description = "Key generation" 4038 | }, 4039 | new Choice { 4040 | Order = 2, 4041 | Description = "Encryption" 4042 | }, 4043 | new Choice { 4044 | Order = 3, 4045 | Description = "Decryption" 4046 | }, 4047 | new Choice { 4048 | Order = 4, 4049 | Description = "Signing" 4050 | } 4051 | } 4052 | }, 4053 | new Question { 4054 | Title = "Q #217: _____________ refers to what Alice and Bob do to create the shared secret key", 4055 | CorrectAnswer = 1, 4056 | Marks = 8, 4057 | Choices = new List < Choice > { 4058 | new Choice { 4059 | Order = 1, 4060 | Description = "Key generation" 4061 | }, 4062 | new Choice { 4063 | Order = 2, 4064 | Description = "Encryption" 4065 | }, 4066 | new Choice { 4067 | Order = 3, 4068 | Description = "Decryption" 4069 | }, 4070 | new Choice { 4071 | Order = 4, 4072 | Description = "Signing" 4073 | } 4074 | } 4075 | }, 4076 | new Question { 4077 | Title = "Q #218: What is cryptology?", 4078 | CorrectAnswer = 1, 4079 | Marks = 2, 4080 | Choices = new List < Choice > { 4081 | new Choice { 4082 | Order = 1, 4083 | Description = "The art and science of making and breaking \"secret codes\"" 4084 | }, 4085 | new Choice { 4086 | Order = 2, 4087 | Description = "Making \"secret codes\"" 4088 | }, 4089 | new Choice { 4090 | Order = 3, 4091 | Description = "Breaking \"secret codes\"" 4092 | }, 4093 | new Choice { 4094 | Order = 4, 4095 | Description = "All of the above" 4096 | } 4097 | } 4098 | }, 4099 | new Question { 4100 | Title = "Q #219: What is cryptography?", 4101 | CorrectAnswer = 1, 4102 | Marks = 7, 4103 | Choices = new List < Choice > { 4104 | new Choice { 4105 | Order = 1, 4106 | Description = "The art and science of making and breaking \"secret codes\"" 4107 | }, 4108 | new Choice { 4109 | Order = 2, 4110 | Description = "Making \"secret codes\"" 4111 | }, 4112 | new Choice { 4113 | Order = 3, 4114 | Description = "Breaking \"secret codes\"" 4115 | }, 4116 | new Choice { 4117 | Order = 4, 4118 | Description = "All of the above" 4119 | } 4120 | } 4121 | }, 4122 | new Question { 4123 | Title = "Q #220: What is cryptoanalysis?", 4124 | CorrectAnswer = 1, 4125 | Marks = 2, 4126 | Choices = new List < Choice > { 4127 | new Choice { 4128 | Order = 1, 4129 | Description = "The art and science of making and breaking \"secret codes\"" 4130 | }, 4131 | new Choice { 4132 | Order = 2, 4133 | Description = "Making \"secret codes\"" 4134 | }, 4135 | new Choice { 4136 | Order = 3, 4137 | Description = "Breaking \"secret codes\"" 4138 | }, 4139 | new Choice { 4140 | Order = 4, 4141 | Description = "All of the above" 4142 | } 4143 | } 4144 | }, 4145 | new Question { 4146 | Title = "Q #221: What is crypto?", 4147 | CorrectAnswer = 1, 4148 | Marks = 1, 4149 | Choices = new List < Choice > { 4150 | new Choice { 4151 | Order = 1, 4152 | Description = "The art and science of making and breaking \"secret codes\"" 4153 | }, 4154 | new Choice { 4155 | Order = 2, 4156 | Description = "Making \"secret codes\"" 4157 | }, 4158 | new Choice { 4159 | Order = 3, 4160 | Description = "Breaking \"secret codes\"" 4161 | }, 4162 | new Choice { 4163 | Order = 4, 4164 | Description = "All of the above" 4165 | } 4166 | } 4167 | }, 4168 | new Question { 4169 | Title = "Q #222: A symmetric key cryptosystem uses ____________ to encrypt as to decrypt", 4170 | CorrectAnswer = 1, 4171 | Marks = 2, 4172 | Choices = new List < Choice > { 4173 | new Choice { 4174 | Order = 1, 4175 | Description = "The same key" 4176 | }, 4177 | new Choice { 4178 | Order = 2, 4179 | Description = "A public key and a private key" 4180 | }, 4181 | new Choice { 4182 | Order = 3, 4183 | Description = "No keys" 4184 | } 4185 | } 4186 | }, 4187 | new Question { 4188 | Title = "Q #223: A public key cryptosystem uses ____________ to encrypt as to decrypt", 4189 | CorrectAnswer = 1, 4190 | Marks = 4, 4191 | Choices = new List < Choice > { 4192 | new Choice { 4193 | Order = 1, 4194 | Description = "The same key" 4195 | }, 4196 | new Choice { 4197 | Order = 2, 4198 | Description = "A public key and a private key" 4199 | }, 4200 | new Choice { 4201 | Order = 3, 4202 | Description = "No keys" 4203 | } 4204 | } 4205 | }, 4206 | new Question { 4207 | Title = "Q #224: A public key cryptosystem uses a private key to encrypt and a public key to decrypt", 4208 | CorrectAnswer = 1, 4209 | Marks = 6, 4210 | Choices = new List < Choice > { 4211 | new Choice { 4212 | Order = 1, 4213 | Description = "True" 4214 | }, 4215 | new Choice { 4216 | Order = 2, 4217 | Description = "False" 4218 | } 4219 | } 4220 | }, 4221 | new Question { 4222 | Title = "Q #225: Polynomial time is considered infeasible", 4223 | CorrectAnswer = 1, 4224 | Marks = 1, 4225 | Choices = new List < Choice > { 4226 | new Choice { 4227 | Order = 1, 4228 | Description = "True" 4229 | }, 4230 | new Choice { 4231 | Order = 2, 4232 | Description = "False" 4233 | } 4234 | } 4235 | }, 4236 | new Question { 4237 | Title = "Q #226: What is Kerckhoff's Principle?", 4238 | CorrectAnswer = 1, 4239 | Marks = 3, 4240 | Choices = new List < Choice > { 4241 | new Choice { 4242 | Order = 1, 4243 | Description = "Crypto algorithms are not a secret" 4244 | }, 4245 | new Choice { 4246 | Order = 2, 4247 | Description = "The algebraic sum of currents in a network of conductors meeting at a point is zero" 4248 | }, 4249 | new Choice { 4250 | Order = 3, 4251 | Description = "Public key encryption is more secure than symmetric key encryption" 4252 | }, 4253 | new Choice { 4254 | Order = 4, 4255 | Description = "The cryptosystem should depend on the secrecy of the algorithm" 4256 | } 4257 | } 4258 | }, 4259 | new Question { 4260 | Title = "Q #227: In Ouda's Key Crypto notation, P refers to", 4261 | CorrectAnswer = 1, 4262 | Marks = 3, 4263 | Choices = new List < Choice > { 4264 | new Choice { 4265 | Order = 1, 4266 | Description = "Plaintext block" 4267 | }, 4268 | new Choice { 4269 | Order = 2, 4270 | Description = "Cipertext block" 4271 | }, 4272 | new Choice { 4273 | Order = 3, 4274 | Description = "Signature" 4275 | }, 4276 | new Choice { 4277 | Order = 4, 4278 | Description = "Public key" 4279 | } 4280 | } 4281 | }, 4282 | new Question { 4283 | Title = "Q #228: In Ouda's Key Crypto notation, C refers to", 4284 | CorrectAnswer = 1, 4285 | Marks = 3, 4286 | Choices = new List < Choice > { 4287 | new Choice { 4288 | Order = 1, 4289 | Description = "Plaintext block" 4290 | }, 4291 | new Choice { 4292 | Order = 2, 4293 | Description = "Cipertext block" 4294 | }, 4295 | new Choice { 4296 | Order = 3, 4297 | Description = "Signature" 4298 | }, 4299 | new Choice { 4300 | Order = 4, 4301 | Description = "Public key" 4302 | } 4303 | } 4304 | }, 4305 | new Question { 4306 | Title = "Q #229: In cryptography, C = D(P, K)", 4307 | CorrectAnswer = 1, 4308 | Marks = 6, 4309 | Choices = new List < Choice > { 4310 | new Choice { 4311 | Order = 1, 4312 | Description = "True" 4313 | }, 4314 | new Choice { 4315 | Order = 2, 4316 | Description = "False" 4317 | } 4318 | } 4319 | }, 4320 | new Question { 4321 | Title = "Q #230: In cryptography, P = D(E(P, K), K)", 4322 | CorrectAnswer = 1, 4323 | Marks = 6, 4324 | Choices = new List < Choice > { 4325 | new Choice { 4326 | Order = 1, 4327 | Description = "True" 4328 | }, 4329 | new Choice { 4330 | Order = 2, 4331 | Description = "False" 4332 | } 4333 | } 4334 | }, 4335 | new Question { 4336 | Title = "Q #231: In Ouda's Key Crypto notation, [M]_Alice refers to", 4337 | CorrectAnswer = 1, 4338 | Marks = 3, 4339 | Choices = new List < Choice > { 4340 | new Choice { 4341 | Order = 1, 4342 | Description = "Signing a message with Alice's private key" 4343 | }, 4344 | new Choice { 4345 | Order = 2, 4346 | Description = "Signing a message with Alice's public key" 4347 | }, 4348 | new Choice { 4349 | Order = 3, 4350 | Description = "Encrypting a message with Alice's private key" 4351 | }, 4352 | new Choice { 4353 | Order = 4, 4354 | Description = "Encrypting a message with Alice's public key" 4355 | } 4356 | } 4357 | }, 4358 | new Question { 4359 | Title = "Q #232: In Ouda's Key Crypto notation, {M}_Alice refers to", 4360 | CorrectAnswer = 1, 4361 | Marks = 1, 4362 | Choices = new List < Choice > { 4363 | new Choice { 4364 | Order = 1, 4365 | Description = "Signing a message with Alice's private key" 4366 | }, 4367 | new Choice { 4368 | Order = 2, 4369 | Description = "Signing a message with Alice's public key" 4370 | }, 4371 | new Choice { 4372 | Order = 3, 4373 | Description = "Encrypting a message with Alice's private key" 4374 | }, 4375 | new Choice { 4376 | Order = 4, 4377 | Description = "Encrypting a message with Alice's public key" 4378 | } 4379 | } 4380 | }, 4381 | new Question { 4382 | Title = "Q #233: In cryptography, {[M]_Alice}_Alice = M", 4383 | CorrectAnswer = 1, 4384 | Marks = 5, 4385 | Choices = new List < Choice > { 4386 | new Choice { 4387 | Order = 1, 4388 | Description = "True" 4389 | }, 4390 | new Choice { 4391 | Order = 2, 4392 | Description = "False" 4393 | } 4394 | } 4395 | }, 4396 | new Question { 4397 | Title = "Q #234: In cryptography, {[M]_Bob}_Alice = M", 4398 | CorrectAnswer = 1, 4399 | Marks = 6, 4400 | Choices = new List < Choice > { 4401 | new Choice { 4402 | Order = 1, 4403 | Description = "True" 4404 | }, 4405 | new Choice { 4406 | Order = 2, 4407 | Description = "False" 4408 | } 4409 | } 4410 | }, 4411 | new Question { 4412 | Title = "Q #235: A cryptographic nonce is an arbitrary number that can be used multiple times", 4413 | CorrectAnswer = 1, 4414 | Marks = 8, 4415 | Choices = new List < Choice > { 4416 | new Choice { 4417 | Order = 1, 4418 | Description = "True" 4419 | }, 4420 | new Choice { 4421 | Order = 2, 4422 | Description = "False" 4423 | } 4424 | } 4425 | }, 4426 | new Question { 4427 | Title = "Q #236: Timestamps in cryptography must account for clock skew", 4428 | CorrectAnswer = 1, 4429 | Marks = 8, 4430 | Choices = new List < Choice > { 4431 | new Choice { 4432 | Order = 1, 4433 | Description = "True" 4434 | }, 4435 | new Choice { 4436 | Order = 2, 4437 | Description = "False" 4438 | } 4439 | } 4440 | }, 4441 | new Question { 4442 | Title = "Q #237: For entity authentication with a public key signature, which key pair is not needed?", 4443 | CorrectAnswer = 1, 4444 | Marks = 3, 4445 | Choices = new List < Choice > { 4446 | new Choice { 4447 | Order = 1, 4448 | Description = "Encryption/decryption key pair" 4449 | }, 4450 | new Choice { 4451 | Order = 2, 4452 | Description = "Signing/verifying key pair" 4453 | }, 4454 | new Choice { 4455 | Order = 3, 4456 | Description = "Key exchange key pair" 4457 | }, 4458 | new Choice { 4459 | Order = 4, 4460 | Description = "Session key pair" 4461 | } 4462 | } 4463 | }, 4464 | new Question { 4465 | Title = "Q #238: One session key is used per session when it is required", 4466 | CorrectAnswer = 1, 4467 | Marks = 8, 4468 | Choices = new List < Choice > { 4469 | new Choice { 4470 | Order = 1, 4471 | Description = "True" 4472 | }, 4473 | new Choice { 4474 | Order = 2, 4475 | Description = "False" 4476 | } 4477 | } 4478 | }, 4479 | new Question { 4480 | Title = "Q #239: What is perfect forward secrecy?", 4481 | CorrectAnswer = 1, 4482 | Marks = 6, 4483 | Choices = new List < Choice > { 4484 | new Choice { 4485 | Order = 1, 4486 | Description = "A type of encryption where a compromise of a private key can't be used to decrypt past communications" 4487 | }, 4488 | new Choice { 4489 | Order = 2, 4490 | Description = "An encryption method where each bit or character of the plaintext is encrypted by combining it with the corresponding bit or character from the pad using modular addition" 4491 | }, 4492 | new Choice { 4493 | Order = 3, 4494 | Description = "A type of encryption where one of the encryption keys are private and the other is public" 4495 | }, 4496 | new Choice { 4497 | Order = 4, 4498 | Description = "A technique used to secure both the public and private keys when communicating insecurely" 4499 | } 4500 | } 4501 | }, 4502 | new Question { 4503 | Title = "Q #240: How can Alice and Bob ensure perfect forward secrecy?", 4504 | CorrectAnswer = 1, 4505 | Marks = 7, 4506 | Choices = new List < Choice > { 4507 | new Choice { 4508 | Order = 1, 4509 | Description = "Encrypt with the session key" 4510 | }, 4511 | new Choice { 4512 | Order = 2, 4513 | Description = "Encrypt with the public key" 4514 | }, 4515 | new Choice { 4516 | Order = 3, 4517 | Description = "Encrypt with the private key" 4518 | }, 4519 | new Choice { 4520 | Order = 4, 4521 | Description = "Encrypt with the one time pad" 4522 | } 4523 | } 4524 | }, 4525 | new Question { 4526 | Title = "Q #241: What is Diffie-Hellman?", 4527 | CorrectAnswer = 1, 4528 | Marks = 7, 4529 | Choices = new List < Choice > { 4530 | new Choice { 4531 | Order = 1, 4532 | Description = "A specific method of securely exchanging cryptographic keys over a public channel" 4533 | }, 4534 | new Choice { 4535 | Order = 2, 4536 | Description = "A method of factoring an RSA key" 4537 | }, 4538 | new Choice { 4539 | Order = 3, 4540 | Description = "An authenticated protocol for key agreement" 4541 | }, 4542 | new Choice { 4543 | Order = 4, 4544 | Description = "An augmented password-authenticated key agreement" 4545 | } 4546 | } 4547 | }, 4548 | new Question { 4549 | Title = "Q #242: What is a man in the middle attack?", 4550 | CorrectAnswer = 1, 4551 | Marks = 2, 4552 | Choices = new List < Choice > { 4553 | new Choice { 4554 | Order = 1, 4555 | Description = "An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other" 4556 | }, 4557 | new Choice { 4558 | Order = 2, 4559 | Description = "An attack where the attacker uses expired session keys to decrypt messages" 4560 | }, 4561 | new Choice { 4562 | Order = 3, 4563 | Description = "An attack in which each possibility is tried until success is obtained" 4564 | }, 4565 | new Choice { 4566 | Order = 4, 4567 | Description = "A known plaintext attack against double encryption with two separated keys where the attacker encrypts a plaintext with a key and \"decrypts\" the original ciphertext with another key and hopes to get the same value." 4568 | } 4569 | } 4570 | }, 4571 | new Question { 4572 | Title = "Q #243: The socket layer lives between the", 4573 | CorrectAnswer = 1, 4574 | Marks = 7, 4575 | Choices = new List < Choice > { 4576 | new Choice { 4577 | Order = 1, 4578 | Description = "Application and transport layers" 4579 | }, 4580 | new Choice { 4581 | Order = 2, 4582 | Description = "Transport and network layers" 4583 | }, 4584 | new Choice { 4585 | Order = 3, 4586 | Description = "Network and link layers" 4587 | }, 4588 | new Choice { 4589 | Order = 4, 4590 | Description = "Application and network layers" 4591 | } 4592 | } 4593 | }, 4594 | new Question { 4595 | Title = "Q #244: ___________ is a standard security technology for establishing an encrypted link between a server and a client", 4596 | CorrectAnswer = 1, 4597 | Marks = 1, 4598 | Choices = new List < Choice > { 4599 | new Choice { 4600 | Order = 1, 4601 | Description = "SSL" 4602 | }, 4603 | new Choice { 4604 | Order = 2, 4605 | Description = "RSA" 4606 | }, 4607 | new Choice { 4608 | Order = 3, 4609 | Description = "SHA-2" 4610 | }, 4611 | new Choice { 4612 | Order = 4, 4613 | Description = "TCP" 4614 | } 4615 | } 4616 | }, 4617 | new Question { 4618 | Title = "Q #245: A ___________ is a small data file that digitally binds a cryptographic key to an organization's details. It allows secure connections from a web server to a browser", 4619 | CorrectAnswer = 1, 4620 | Marks = 1, 4621 | Choices = new List < Choice > { 4622 | new Choice { 4623 | Order = 1, 4624 | Description = "SSL certificate" 4625 | }, 4626 | new Choice { 4627 | Order = 2, 4628 | Description = "Private key" 4629 | }, 4630 | new Choice { 4631 | Order = 3, 4632 | Description = "Public key" 4633 | }, 4634 | new Choice { 4635 | Order = 4, 4636 | Description = "RSA certificate" 4637 | } 4638 | } 4639 | }, 4640 | new Question { 4641 | Title = "Q #245: What is PAN", 4642 | CorrectAnswer = 1, 4643 | Marks = 2, 4644 | Choices = new List < Choice > { 4645 | new Choice { 4646 | Order = 1, 4647 | Description = "Let devices connect and communicate over the range of a person. E.g. connecting Bluetooth devices" 4648 | }, 4649 | new Choice { 4650 | Order = 2, 4651 | Description = "It is a privately owned network that operates within and nearby a single building like a home, office, or factory" 4652 | }, 4653 | new Choice { 4654 | Order = 3, 4655 | Description = "It is a privately owned network that operates within and nearby a single building like a home, office, or factory" 4656 | }, 4657 | new Choice { 4658 | Order = 4, 4659 | Description = "It is a privately owned network that operates within and nearby a single building like a home, office, or factory" 4660 | } 4661 | } 4662 | } 4663 | 4664 | }; 4665 | 4666 | private static List AllShuffled => All.OrderBy(x => random.Next()).ToList(); 4667 | } 4668 | } -------------------------------------------------------------------------------- /Shared/Shared.csproj: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | net6.0 5 | 6 | 7 | 8 | --------------------------------------------------------------------------------