Skuska Kt 2 (Otazky Z Testov Zo Semestra)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Lenka
L
Lenka
Community Contributor
Quizzes Created: 1 | Total Attempts: 446
| Attempts: 446
SettingsSettings
Please wait...
  • 1/84 Questions

    Socket je pouzitelny len v pripade programovacieho jazyka C formou dostupnych aplikacnych kniznic.

    • Pravda
    • Nepravda
Please wait...
Skuska Kt 2 (Otazky Z Testov Zo Semestra) - Quiz
About This Quiz

.


Quiz Preview

  • 2. 

    Socket mozeme pouzivat vyhradne v OS Linux.

    • Pravda

    • Nepravda

    Correct Answer
    A. Nepravda
    Explanation
    The statement "Socket mozeme pouzivat vyhradne v OS Linux" is not true. Sockets can be used in various operating systems, not just Linux. Sockets are a communication mechanism that allows processes to communicate with each other, both on the same machine and across different machines. They are widely supported in different operating systems, including Windows, macOS, and various Unix-based systems, not just Linux.

    Rate this question:

  • 3. 

    Socket je pouzitelny len v pripade programovacieho jazyka C formou dostupnych aplikacnych kniznic.

    • Pravda

    • Nepravda

    Correct Answer
    A. Nepravda
    Explanation
    The statement is false. A socket is not limited to the C programming language. It is a programming concept that is available in various programming languages, including C, C++, Java, Python, and more. Sockets allow communication between different processes or machines over a network.

    Rate this question:

  • 4. 

    Trend IoT prinasa so sebou nove bezpecnostne hrozby

    • Pravda

    • Nepravda

    Correct Answer
    A. Pravda
    Explanation
    The statement "Trend IoT prinasa so sebou nove bezpecnostne hrozby" translates to "The IoT trend brings new security threats." The correct answer is "Pravda," which means "True" in English. This suggests that the statement is accurate, implying that the IoT trend does indeed bring new security threats.

    Rate this question:

  • 5. 

    Broadcastova poziadavka protokolu ARP (ARP Query) sa posiela s cielovou adresou:

    • CC-CC-CC-CC-CC

    • AA-AA-AA-AA-AA

    • FF-FF-FF-FF-FF-FF

    Correct Answer
    A. FF-FF-FF-FF-FF-FF
    Explanation
    The correct answer is FF-FF-FF-FF-FF-FF. This is the broadcast address in Ethernet, which means that the ARP query is sent to all devices on the network. When a device receives this broadcast, it will check if the target IP address in the ARP query matches its own IP address. If it does, the device will respond with its MAC address. By using the broadcast address, the ARP query ensures that all devices on the network receive the request and have the opportunity to respond.

    Rate this question:

  • 6. 

    Trend IoT prinasa so sebou nove bezpecnostne hrozby.

    • Pravda

    • Nepravda

    Correct Answer
    A. Pravda
    Explanation
    The statement "Trend IoT prinasa so sebou nove bezpecnostne hrozby" translates to "The IoT trend brings new security threats." The correct answer, "Pravda," means "True" in Slovak. This suggests that the statement is indeed true, implying that the IoT trend does bring new security threats.

    Rate this question:

  • 7. 

    Ktore aplikacne modely (architektury) z pohladu vzajomnej komunikacie entit pozname? (Vyberte 2)

    • Client-server

    • Peer-server

    • Peer-to-peer

    • Peer-to-client

    Correct Answer(s)
    A. Client-server
    A. Peer-to-peer
    Explanation
    Client-server and peer-to-peer are two well-known application models/architectures in terms of mutual communication between entities. In a client-server model, there is a central server that provides services to multiple clients. The clients send requests to the server, and the server responds with the requested data or performs the requested actions. In a peer-to-peer model, all entities (peers) have equal capabilities and can act as both clients and servers. Peers can communicate directly with each other without the need for a central server.

    Rate this question:

  • 8. 

    Funkcia senzora v IoT :

    • Zistovanie udajov z prostredia

    • Generovanie nahodnych udajov

    • Cloud computing

    • Analyza ziskanych udajov

    Correct Answer
    A. Zistovanie udajov z prostredia
    Explanation
    The correct answer is "Zistovanie udajov z prostredia" which translates to "Collecting data from the environment" in English. In the context of IoT (Internet of Things), sensors play a crucial role in gathering data from the surrounding environment. These sensors can detect and measure various parameters such as temperature, humidity, light, motion, etc. This collected data is then utilized for further analysis, decision-making, and automation processes.

    Rate this question:

  • 9. 

    Protokol TCP je

    • Nespolahlivy

    • Spolahlivy

    Correct Answer
    A. Spolahlivy
    Explanation
    The correct answer is "Spolahlivy" which means "Reliable" in English. The question is asking about the TCP protocol, and TCP (Transmission Control Protocol) is indeed a reliable protocol. It ensures that data packets are delivered in the correct order and without errors by using acknowledgments, retransmissions, and flow control mechanisms. Unlike UDP (User Datagram Protocol), TCP provides a guaranteed and error-free delivery of data, making it suitable for applications that require reliable transmission, such as web browsing, email, and file transfer.

    Rate this question:

  • 10. 

    Startovaci riadok hlavicky SIP dotazu je tvoreny: meno metody + tzv. "Request URI" (SIP adresa pouzivatela alebo sluzby) + cislo verzie SIP protokolu

    • Pravda

    • Nepravda

    Correct Answer
    A. Pravda
    Explanation
    The starting line of the SIP request header consists of the method name, the "Request URI" (SIP address of the user or service), and the version number of the SIP protocol. This statement is true because the SIP request header follows a specific format which includes these elements.

    Rate this question:

  • 11. 

    Funkcia senzora v IoT je 

    • Zistovanie udajov z prostredia

    • Analyza ziskanych udajov

    • Cloud computing

    • Generovanie nahodnych udajov

    Correct Answer
    A. Zistovanie udajov z prostredia
    Explanation
    The correct answer is "Zistovanie udajov z prostredia" which translates to "Collecting data from the environment." In the context of IoT (Internet of Things), a sensor's function is to gather data from its surroundings. This data can include information about temperature, humidity, light intensity, motion, etc. The sensor detects and measures these environmental variables, which can then be used for analysis, decision-making, or triggering certain actions in the IoT system. Cloud computing and generating random data are not directly related to the primary function of a sensor in IoT.

    Rate this question:

  • 12. 

    Jedno z rieseni pre velko-objemove streamovanie ulozeneho videa je CDN (Content delivery network).

    • Pravda

    • Nepravda

    Correct Answer
    A. Pravda
    Explanation
    One of the solutions for high-volume streaming of stored video is CDN (Content delivery network). A CDN is a network of servers distributed geographically to deliver content to users more efficiently. By storing copies of the video in multiple servers across different locations, CDN reduces the distance between the user and the content, resulting in faster and more reliable streaming. This improves the user experience by minimizing buffering and latency issues. Therefore, the statement "Pravda" (True) is correct.

    Rate this question:

  • 13. 

    Ktore protokoly transportnej vrstvy mozeme pouzit pri vytvoreni a pouzivani socketu?

    • HTTP

    • UDP

    • TCP

    • RTP

    Correct Answer(s)
    A. UDP
    A. TCP
    Explanation
    UDP and TCP are the protocols that can be used for creating and using a socket. UDP (User Datagram Protocol) is a connectionless protocol that provides a simple and lightweight way to send datagrams over the network. It is commonly used for applications that require low latency and can tolerate some data loss, such as real-time streaming or online gaming. TCP (Transmission Control Protocol) is a connection-oriented protocol that provides reliable and ordered delivery of data. It establishes a connection between the sender and receiver and ensures that all data is received correctly. TCP is commonly used for applications that require reliable data transmission, such as web browsing or file transfer.

    Rate this question:

  • 14. 

    Protokol TCP je (vyberte 2):

    • Nespolahlivy

    • Spojovany

    • Nespojovany

    • Spolahlivy

    Correct Answer(s)
    A. Spojovany
    A. Spolahlivy
    Explanation
    The correct answer is "spojovany, spolahlivy". TCP (Transmission Control Protocol) is a connection-oriented and reliable protocol. It establishes a connection between the sender and receiver before data transmission and ensures that all data packets are delivered in the correct order without loss or duplication.

    Rate this question:

  • 15. 

    Protokol SIP umoznuje, aby si sami koncovi pouzivatelia programovali funkcie danej sluzby bez potreby zasahu zo strany operatora.

    • Pravda

    • Nepravda

    Correct Answer
    A. Pravda
    Explanation
    The statement is true because the SIP protocol allows end users to program the functions of a service themselves, without needing any intervention from the operator. This means that users have the flexibility to customize and personalize their experience with the service according to their own preferences and needs.

    Rate this question:

  • 16. 

    Protokol SIP umoznuje aby si sami koncovi pouzivatelia programovali funkcie danej sluzby bez potreby zasahu zo strany operatora.

    • Pravda

    • Nepravda

    Correct Answer
    A. Pravda
    Explanation
    The given statement is true. The SIP protocol allows end users to program the functions of a service without the need for intervention from the operator. This means that users have the flexibility to customize and control the features of the service according to their specific needs and preferences.

    Rate this question:

  • 17. 

    Startovaci riadok hlavicky SIP dotazu je tvoreny : meno metody + tzv. "Request URI" (SIP adresa pouzivatela alebo sluzby) + cislo verzie SIP protokolu

    • Pravda

    • Nepravda

    Correct Answer
    A. Pravda
    Explanation
    The starting line of a SIP request header consists of the method name, the "Request URI" (SIP address of the user or service), and the version number of the SIP protocol. This statement is true because the SIP request header follows a specific format that includes these elements.

    Rate this question:

  • 18. 

    Transportny port cislo 22 patri do kategorie portov:

    • Registered ports

    • Well-known ports

    • Private.Dynamic

    Correct Answer
    A. Well-known ports
    Explanation
    Well-known ports are those ports that are assigned by the Internet Assigned Numbers Authority (IANA) and are commonly used for specific services. These ports range from 0 to 1023 and are well-known and widely used by various applications and protocols. Therefore, transportny port cislo 22 belongs to the category of well-known ports.

    Rate this question:

  • 19. 

    Ktore prvky musia mat aplikacie rovnake, aby mohli navzajom uspesne komunikovat cez sockety?

    • Transportny protokol

    • Aplikacny protokol

    • Operacny system

    • Programovaci jazyk

    Correct Answer(s)
    A. Transportny protokol
    A. Aplikacny protokol
    Explanation
    In order for applications to communicate successfully through sockets, they must have the same transport protocol and application protocol. The transport protocol determines how data is transmitted over the network, while the application protocol defines the rules and formats for communication between applications. The operating system and programming language used by the applications do not necessarily need to be the same for successful communication.

    Rate this question:

  • 20. 

    Ktora z nasledujucich vlastnosti je nevyhoda standardu IEEE 802.1X

    • Blokovanie neautorizovanych osob

    • Umiestnenie zariadenia do specifickej VLAN

    • Akceptuje len EAP ramce

    • Chrani ken pristup k sieti

    Correct Answer
    A. Chrani ken pristup k sieti
    Explanation
    The correct answer is "Chrani ken pristup k sieti" (Protects access to the network). This is a disadvantage of the IEEE 802.1X standard because it adds an extra layer of security to the network, which can be time-consuming and complex to implement. It requires authentication of devices before granting access to the network, which can cause delays and inconvenience for users. Additionally, if the authentication process fails, legitimate users may be denied access to the network.

    Rate this question:

  • 21. 

    Aky je rozdiel medzi Fog computing a Cloud computing?

    • Su rovnake

    • Pri Fog computingu je cast vypoctov realizovana aj u samotneho klienta

    • Cloud computing sa v IoT nepouziva

    • Pri Cloud computingu je cast vypoctov realizovana aj u samotneho klienta

    Correct Answer
    A. Pri Fog computingu je cast vypoctov realizovana aj u samotneho klienta
    Explanation
    The correct answer is "Pri Fog computingu je cast vypoctov realizovana aj u samotneho klienta" which translates to "In Fog computing, a part of the computation is also done at the client side." This means that in Fog computing, the processing and analysis of data is not only done in the cloud but also at the edge devices or client devices. This allows for faster processing and real-time decision-making, making it suitable for applications that require low latency and immediate response. Cloud computing, on the other hand, primarily focuses on offloading computation and storage to remote servers or the cloud.

    Rate this question:

  • 22. 

    Ktore prvky musia mat aplikacie rovnake, aby mohli navzajom uspesne komunikovat cez sockety?

    • Programovaci jazyk

    • Transportny protokol

    • Operacny system

    • Aplikacny porotokol

    Correct Answer(s)
    A. Transportny protokol
    A. Aplikacny porotokol
    Explanation
    To enable successful communication through sockets, applications must have the same transport protocol and application protocol. The transport protocol determines how data is transmitted over the network, while the application protocol defines the rules and formats for exchanging data between applications. The programming language and operating system are not relevant in this context as long as the applications can use the same transport and application protocols.

    Rate this question:

  • 23. 

    Sifrovanie asymetrickou sifrou - pre overenie verejneho kluca sa pouziva CRL (Certificate Revocation List)

    • Pravda

    • Nepravda

    Correct Answer
    A. Pravda
    Explanation
    The given statement states that for verifying the public key, CRL (Certificate Revocation List) is used in asymmetric encryption. This means that CRL is used to check if the certificate associated with the public key has been revoked or not. This helps ensure the security and validity of the encryption process.

    Rate this question:

  • 24. 

    Ktore protokoly transportnej vrstvy mozeme pouzit pri vytvoreni a pouzivani socketu?

    • TCP

    • HTTP

    • XML

    • IP

    • UDP

    Correct Answer(s)
    A. TCP
    A. UDP
    Explanation
    TCP and UDP are both transport layer protocols that can be used for creating and using sockets. TCP (Transmission Control Protocol) provides reliable and ordered delivery of data with error checking and flow control mechanisms. UDP (User Datagram Protocol) is a lightweight protocol that offers faster but unreliable delivery of data without error checking or flow control. HTTP (Hypertext Transfer Protocol) and XML (eXtensible Markup Language) are not transport layer protocols, but application layer protocols used for communication over the internet. IP (Internet Protocol) is a network layer protocol responsible for addressing and routing packets.

    Rate this question:

  • 25. 

    Protokoly sietovej vrstvy modelu OSI su? (vyberte dve)

    • ISL

    • DNS

    • IPv6

    • HTTP

    • IPv4

    Correct Answer(s)
    A. IPv6
    A. IPv4
    Explanation
    The correct answer is IPv6 and IPv4. These protocols belong to the network layer of the OSI model. IPv6 is the latest version of the Internet Protocol, which provides an expanded address space and improved security features compared to IPv4. IPv4 is the most widely used version of the Internet Protocol, which uses 32-bit addresses and is responsible for the routing and addressing of packets within a network. ISL, DNS, and HTTP are protocols that operate at different layers of the OSI model, not specifically at the network layer.

    Rate this question:

  • 26. 

    Konvergencia IP sieti znamena:

    • Vsetky sluzby by mali byt integrovane do jednej siete

    • Niektore sluzby su integrovane do roznych sieti

    • Vsetky sluzby nie su integrovane do jednej siete

    • Len niektore sluzby su integrovane do jednej siete

    Correct Answer
    A. Vsetky sluzby by mali byt integrovane do jednej siete
    Explanation
    The correct answer suggests that convergence of IP networks means that all services should be integrated into one network. This means that different services, such as voice, video, and data, can be transmitted over a single IP-based network, eliminating the need for separate networks for each service. This allows for more efficient and cost-effective communication and management of services.

    Rate this question:

  • 27. 

    Protokol TCP vnima udaje z aplikacnej vrstvy len ako prud bajtov bez vnutornej struktury

    • Pravda

    • Nepravda

    Correct Answer
    A. Pravda
    Explanation
    The given statement is true. TCP (Transmission Control Protocol) is a transport layer protocol that is responsible for establishing a reliable and error-free connection between two devices on a network. It treats data from the application layer as a stream of bytes without any internal structure. TCP breaks this stream into smaller segments and adds necessary information, such as sequence numbers and checksums, to ensure the reliable delivery of data. Therefore, TCP does not concern itself with the internal structure or format of the data being transmitted.

    Rate this question:

  • 28. 

    Protokol SIP je signalizacny protokol. 

    • Pravda

    • Nepravda

    Correct Answer
    A. Pravda
    Explanation
    The statement "Protokol SIP je signalizacny protokol" translates to "SIP protocol is a signaling protocol" in English. This statement is true because SIP (Session Initiation Protocol) is indeed a signaling protocol used for initiating, modifying, and terminating communication sessions in IP networks. It is commonly used for voice and video calls over the internet.

    Rate this question:

  • 29. 

    S/MIME ponuka jednoznacne urcenie povodu

    • Pravda

    • Nepravda

    Correct Answer
    A. Pravda
    Explanation
    S/MIME (Secure/Multipurpose Internet Mail Extensions) is a cryptographic protocol that provides a way to digitally sign and encrypt email messages. It ensures the authenticity and integrity of the message by allowing the recipient to verify the origin of the message and confirm that it has not been tampered with during transmission. Therefore, it can be concluded that S/MIME offers a clear determination of the origin of the message, making the statement "Pravda" (True) correct.

    Rate this question:

  • 30. 

    Ktora z nasledujucich vlastnosti je nevyhoda standardu IEEE 802.1X

    • Umiestnenie zariadenia do specifickej VLAN

    • Chrani len pristup k sieti

    • Akceptuje len EAP ramce

    • Blokovanie neautorizovanych osob

    Correct Answer
    A. Chrani len pristup k sieti
    Explanation
    The disadvantage of the IEEE 802.1X standard is that it only protects network access. This means that while it may prevent unauthorized individuals from accessing the network, it does not provide any additional security measures once a user is granted access. This can leave the network vulnerable to attacks or unauthorized activity once a user is authenticated.

    Rate this question:

  • 31. 

    Sifrovanie asymetrickou sifrou - pre overenie verejneho kluca sa pouziva CRL (Certificate Revocation List)

    • Pravda

    • Nepravda

    Correct Answer
    A. Pravda
    Explanation
    Asymmetric encryption involves the use of a public key for verification. To ensure the validity of the public key, a Certificate Revocation List (CRL) is used. The CRL contains a list of revoked certificates, allowing entities to verify the authenticity and trustworthiness of the public key. Therefore, the statement "Sifrovanie asymetrickou sifrou - pre overenie verejneho kluca sa pouziva CRL (Certificate Revocation List)" is true.

    Rate this question:

  • 32. 

    Multipurpose Internet Mail Extension (MIME) - telo spravy pozostava len z jednej casti

    • Pravda

    • Nepravda

    Correct Answer
    A. Nepravda
    Explanation
    The given statement is false. Multipurpose Internet Mail Extension (MIME) is a standard that allows email messages to contain multiple parts. These parts can include text, images, audio, video, or any other type of data. Each part is identified by a unique content type and can be encoded and decoded separately. Therefore, the statement that the message consists of only one part is incorrect.

    Rate this question:

  • 33. 

    RADIUS server sa pouziva na autentifikaciu pouzivatelov.

    • Pravda

    • Nepravda

    Correct Answer
    A. Pravda
    Explanation
    A RADIUS server is used for authenticating users. It acts as a central authentication server that receives authentication requests from network devices, such as routers or switches, and validates the credentials provided by the users. It ensures that only authorized users can access the network resources by verifying their identity through various authentication methods, such as username and password, digital certificates, or token-based authentication. Therefore, the statement "RADIUS server sa pouziva na autentifikaciu pouzivatelov" is true.

    Rate this question:

  • 34. 

    SIP komponenty nekomunikuju navzajom vymenou sprav (signalizacia)

    • Pravda

    • Nepravda

    Correct Answer
    A. Nepravda
    Explanation
    This statement is false. SIP (Session Initiation Protocol) components do communicate with each other through the exchange of messages or signaling. SIP is a protocol used for initiating, modifying, and terminating real-time sessions involving video, voice, messaging, and other communications applications and services. The signaling messages are used to establish and control the sessions between the SIP components, allowing them to communicate with each other. Therefore, the correct answer is false.

    Rate this question:

  • 35. 

    Ktory protokol pouziva internetove DNS-based adresovanie - URL?

    • SIP OSPF

    • SIP ARP

    • SIP USI

    • SIP URI

    Correct Answer
    A. SIP URI
    Explanation
    The correct answer is SIP URI. SIP (Session Initiation Protocol) is a communication protocol used for initiating, modifying, and terminating interactive user sessions involving multimedia elements such as video, voice, instant messaging, and virtual reality. URI (Uniform Resource Identifier) is a string of characters that identifies a resource on the internet. In the context of DNS-based addressing, SIP URI is used to address and locate resources such as users, services, or devices in a SIP-based communication system.

    Rate this question:

  • 36. 

    Konvergencia IP sieti je integracia dat, hlasu, videa a pod.

    • Pravda

    • Nepravda

    Correct Answer
    A. Pravda
    Explanation
    The statement is true because convergence of IP networks refers to the integration of various types of data, voice, video, and other forms of communication over a single network infrastructure. This integration allows for more efficient and cost-effective communication and sharing of resources.

    Rate this question:

  • 37. 

    RADIUS server sa pouziva na autentifikaciu pouzivatelov.

    • Pravda

    • Nepravda

    Correct Answer
    A. Pravda
    Explanation
    The given statement is true. A RADIUS server is used for authentication of users. RADIUS (Remote Authentication Dial-In User Service) is a networking protocol that provides centralized authentication, authorization, and accounting management for users who connect and use a network service. It is commonly used in networks such as Wi-Fi, Virtual Private Networks (VPNs), and dial-up connections to authenticate users and grant them access based on their credentials.

    Rate this question:

  • 38. 

    Ktora z nasledujucich vlastnosti je nevyhoda standardu IEE 802.1X

    • Blokovanie neautorizovanych osob

    • Umiestnenie zariadenia do specifickej VLAN

    • Akceptuje len EAP ramce

    • Chrani len pristup k sieti

    Correct Answer
    A. Chrani len pristup k sieti
    Explanation
    The correct answer is "Chrani len pristup k sieti" which means "It only protects network access" in English. This means that the disadvantage of the IEE 802.1X standard is that it only focuses on protecting network access and does not provide other security measures for the network. It does not provide protection for data transmission, network traffic, or other aspects of network security.

    Rate this question:

  • 39. 

    Polozka TTL v hlavicke IPv4 paketu znamena:

    • Priorita paketu

    • Zivotnost paketu

    • Ciel paketu

    • Zdroj paketu

    Correct Answer
    A. Zivotnost paketu
    Explanation
    The TTL (Time to Live) field in the IPv4 packet header represents the remaining time that a packet is allowed to exist in the network. It is decremented by each router that forwards the packet, and if it reaches zero, the packet is discarded. This mechanism prevents packets from circulating indefinitely in the network. Therefore, the correct answer is "Zivotnost paketu" which means "Packet lifetime" in English.

    Rate this question:

  • 40. 

    Standard protokolu SIP bol navrhnuty pre minimalnu skalovatelnost.

    • Pravda

    • Nepravda

    Correct Answer
    A. Nepravda
    Explanation
    The given statement is false. The SIP (Session Initiation Protocol) standard was designed specifically for its scalability. It allows for the establishment, modification, and termination of multimedia sessions, such as voice and video calls, over IP networks. SIP is highly scalable and can support a large number of users and devices, making it suitable for both small and large-scale deployments. Therefore, the correct answer is false.

    Rate this question:

  • 41. 

    SIP komponenty nekomunikuju navzajom vymenou sprav (signalizacia)

    • Pravda

    • Nepravda

    Correct Answer
    A. Nepravda
    Explanation
    This statement is false. SIP (Session Initiation Protocol) components do communicate with each other by exchanging messages or signaling. SIP is a protocol used for initiating, modifying, and terminating communication sessions between two or more participants. These sessions can include voice, video, messaging, and other communication applications. The signaling messages exchanged between SIP components allow them to establish and manage these sessions. Therefore, the correct answer is false.

    Rate this question:

  • 42. 

    Protokol TCP vnima udaje z aplikacnej vrstvy len ako prud bajtov bez vnutornej struktury

    • Pravda

    • Nepravda

    Correct Answer
    A. Pravda
    Explanation
    The statement is true because the Transmission Control Protocol (TCP) is a transport layer protocol that treats data from the application layer as a stream of bytes without any internal structure. TCP is responsible for breaking down the stream of bytes into packets, ensuring reliable delivery, and reassembling them at the receiving end. It does not interpret or manipulate the data based on its internal structure, such as headers or formatting. TCP's main focus is on the efficient and reliable transmission of the byte stream between the sender and receiver.

    Rate this question:

  • 43. 

    Protokol UDP je (vyberte 2) :

    • Spolahlivy

    • Nespojovany

    • Nespolahlivy

    • Spojovany

    Correct Answer(s)
    A. Nespojovany
    A. Nespolahlivy
    Explanation
    The correct answer is "nespojovany, nespolahlivy" because UDP (User Datagram Protocol) is an unreliable and connectionless transport protocol. It does not provide any guarantees for the delivery or ordering of packets, making it suitable for applications that prioritize speed over reliability, such as real-time streaming or online gaming.

    Rate this question:

  • 44. 

    Ako moze TCP server efektivne spracovat poziadavky viacerych klientov sucasne?

    • Vytvorenie potomkovych procesov pre kazdeho klienta

    • Operacny system nepodporuje obsluhu viacerych klientov sucasne pre protokol TCP.

    • Pre sucasne spracovanie viacerych klientov neexistuju ziadne programove prostriedky

    • Pouzitie viacerych vlakien

    Correct Answer(s)
    A. Vytvorenie potomkovych procesov pre kazdeho klienta
    A. Pouzitie viacerych vlakien
    Explanation
    The TCP server can effectively process requests from multiple clients simultaneously by either creating child processes for each client or by using multiple threads. By creating child processes for each client, the server can handle each client's request independently without interfering with other clients. Similarly, by using multiple threads, the server can allocate separate threads to handle each client's request concurrently, allowing for efficient processing of multiple clients at the same time.

    Rate this question:

  • 45. 

    Pri asymetrickom sifrovani vlastnik sukromneho kluca nedesifruje spravu

    • Pravda

    • Nepravda

    Correct Answer
    A. Nepravda
    Explanation
    In asymmetric encryption, the owner of the private key is actually able to decrypt the message. This is because asymmetric encryption uses a pair of keys - a public key for encryption and a private key for decryption. The public key is used by anyone who wants to send an encrypted message to the owner of the private key. Therefore, the statement "the owner of the private key does not decrypt the message" is false.

    Rate this question:

  • 46. 

    Adresu siete v protokole IP je:

    • Kazda ina adresa s danym predcislim

    • Najvyssia adresa s danym predcislim

    • Najnizsia adresa s danym predcislim

    Correct Answer
    A. Najnizsia adresa s danym predcislim
    Explanation
    The correct answer is "Najnizsia adresa s danym predcislim." This means that the network address in the IP protocol is the lowest address with a given prefix. In IP addressing, the network address is used to identify the network to which a device belongs. It is obtained by setting all host bits to 0 in the IP address. The lowest address with a given prefix is the one where all host bits are set to 0, indicating the network address.

    Rate this question:

  • 47. 

    Pri prenose hlasu v IP sieti sa uprednostnuje transportny protokol TCP pred UDP.

    • Pravda

    • Nepravda

    Correct Answer
    A. Nepravda
    Explanation
    Pri prenose hlasu v IP sieti sa uprednostňuje transportný protokol UDP pred TCP. UDP je vhodnejší pre prenos hlasu, pretože je rýchlejší a menej spoľahlivý. Pri prenose hlasu je dôležité, aby pakety dorazili v čo najkratšom čase, a nie je tak dôležité, či všetky pakety dorazili v správnom poradí. TCP je spoľahlivejší protokol, ktorý kontroluje doručenie paketov a ich poradie, čo môže spôsobiť oneskorenie a zvýšiť oneskorenie pri prenose hlasu.

    Rate this question:

  • 48. 

    Viacbajtove hodnoty (napr. IP adresa a port v prislusnych hlavickach) prenesene cez siet a precitane zo socketu na lokalnej stanici pouzivaju poradie bajtov zname ako:

    • Little-endian

    • Direct-endian

    • Reverse-endian

    • Big-endian

    Correct Answer
    A. Big-endian
    Explanation
    The correct answer is Big-endian. Big-endian is a byte order in which the most significant byte is stored first and the least significant byte is stored last. In this byte order, the higher-order bytes are stored at lower memory addresses. This is commonly used in network protocols such as TCP/IP.

    Rate this question:

  • 49. 

    Standard protokolu SIP bol navrhnuty pre minimalnu skalovatelnost.

    • Pravda

    • Nepravda

    Correct Answer
    A. Nepravda
    Explanation
    The statement is false. The SIP protocol was designed specifically for its scalability. It allows for easy addition of new users and devices without causing disruptions or performance issues. Therefore, the correct answer is false.

    Rate this question:

Quiz Review Timeline (Updated): Jul 22, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 22, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 17, 2017
    Quiz Created by
    Lenka
Back to Top Back to top
Advertisement