ACTIVITY NO.
4
ITS 302| Data Communication and Networking II
NAME: TIME | SECTION:
COURSE: YEAR LEVEL:
MULTIPLE CHOICE: Underline the BEST answer among the choices written. There should only be ONE BEST on each
number. (10 pts.)
1. This allows an application to interpret the meaning of information exchanged, Information is formatted and
translated.
a. Cryptography b. ISO c. Presentation Layer d. Session Layer
2. Which layer manages sessions between servers to coordinate communication?
a. Cryptography b. ISO c. Presentation Layer d. Session Layer
3. It is a process which transforms the original information into an unrecognizable form.
a. Compression b. Cryptography c. Encryption d. Decryption
4. It is process of converting encoded/encrypted data in a form that is readable and understood by a human or a
computer.
a. Compression b. Cryptography c. Encryption d. Decryption
5. A method done to make a file, message, or any other chunk of data smaller.
a. Compression b. Cryptography c. Encryption d. Decryption
6. This data compression method losses data. It gets rid of data that is why we need to distinguish data from
information.
a. Compression b. Cryptography c. Lossless Compression d. Lossy Compression.
7. This data Compression method allows the potential for a file to return to its original size, without the loss of a single
bit of data, when the file is uncompressed
a. Compression b. Cryptography c. Lossless Compression d. Lossy Compression.
8. This method used to secure and protect data during communication and is helpful to prevent unauthorized person or
group of users from accessing any confidential data.
a. Compression b. Cryptography c. Lossless Compression d. Lossy Compression.
9. It is a protocol that one program can use to request a service from a program located in another computer on
a network without having to understand the network's details.
a. PPTP b. RPC c. SCP d. SDP
10.It is a protocol (set of communication rules) that allows corporations to extend their own corporate network through
private "tunnels" over the public Internet.
a. PPTP b. RPC c. SCP d. SDP
11.A type of encryption which use the same cryptographic keys for both encryption of plaintext and decryption of cipher
text.
a. Asymmetric Key b. Symmetric Key c. Public Key d. Private Key
12.This cryptography method is an encryption system which is based on two pairs of keys and are used to encrypt
message for the receiver.
a. Asymmetric Key b. Symmetric Key c. Public Key d. Private Key
13.It is method of creating multiple light-duty connections from a single TCP) connection
a. PPTP b. RPC c. TCP d. SCP
14.It is a set of rules used along with the Internet Protocol (IP) to send data in the form of message units between
computers over the Internet.
a. PPTP b. RPC c. TCP d. SCP
15. This layer allows two nodes to hold ongoing messaging called a session.
a. Cryptography b. ISO c. Presentation Layer d. Session Layer
INSTRUCTION: Write “Agree” if the statement is correct and “Disagree” if the statement is incorrect. Write your
answers on the space provided before the number. (10 points)
___________16. RPC is used to call other processes on the remote systems like a local system.
___________17.Compression enhances backup storage operation and has also affected primary storage data
reduction.
___________18. When data needs to be transferred over the internet, larger files can be sent in a ZIP, GZIP or other
compressed format.
___________19. The packing of the procedure parameters is called unmarshalling.
___________20. As a tunneling protocol, PPTP encapsulates network protocol datagrams within an IP envelope.
___________21. Data is decrypted to make it safe from stealing.
___________22. Encryption is conversion of an obscure message into an understandable form which is easy to
understand by a human.
___________23. The major function of data decryption is transforming humanly understandable messages into an
incomprehensible and obscure form that cannot be interpreted.
___________24. The Session Layer is responsible for a range of functions including opening, closing and re-establishing
session activities.
___________25. RPC is used to call other processes on the remote systems like a local system.
ABBREVIATION: Give the meaning of each letter for the following Abbreviation.
26. OSI
27. IP
28. SDP
29. TCP
30. PPTP
31. VPN
32. HTTP
33. RPC
34. SCP
35. SDP
36. ISP
37. LAN
38. DNS
39. SMP
40. FTP
***Good Luck****