0% found this document useful (0 votes)
39 views26 pages

Networking Concepts 15 Completed

Uploaded by

prasanthboddu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views26 pages

Networking Concepts 15 Completed

Uploaded by

prasanthboddu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 26

CH .

15 NETWORKING CONCEPTS

ONE MARK MCQ QUESTIONS:-


1. UDP stands for .

a. User Data Power b) User Datagram Protocol

c) Uniform data protocol d) User protocol

2. HTTP stands for

a. Hyper Text Transfer Protocol b) High Text Transfer Protocol

c)Hyper Text Transmission Protocol d) Hyper Text Trivial Protocol

3. URL stands for

a. Uniform Resource Location b) Uniform Resource Locator

c) Uniform Reservation Location d) Uniform Road Location

4. is the process of efficiently selecting a path in a network along which the data

packets will travel their destination.

a. Routing b) bridging c) switching d) NIC

5. Address refers to the unique physical address to each NIC card assigned by NIC

manufacture.

a. NIC b) NAC c) MAC d) MIC

6. Most commonly used transmission media in wireless networks are.

a. Microwave b) Radio wave c) Satellite wave d) All of these

7. Most commonly used transmission media in wired networks are.

a. Twisted pair cable b) Co-axial cable c) Optical-fiber d) All of these

8. is a device that connects dissimilar networks.

a. Gateway b) Bridge c) Hub d) Switch

9. __is a phenomenon that connects the things (smart devices) to the internet over wired or

wireless connections.

a. FM b) RFID c) IoT d) AM
10. On a channel each interface serves as both transmitter and receiver but only

one interface can transmit at a time.

a. Simplex b) Half-duplex c) Full-duplex d) None of these

11. can be classified by frequency and wave length

a. Radio wave b) IR rays c) Micro wave d) All of these

12. is host computer that requests for some services from a server

a. Peer to peer b) client - server c) client d) server

13. is a computer on the network that facilitate the sharing of data, software and

hardware resources

a. Peer to peer b) client - server c) client d) server

14. A work station that can be doubled up as a server and client is known as

a. Client b) server

c) dedicated server d) non-dedicated server

15. may have a geographical area up to 1km

a. LAN b) WAN c) MAN d) PAN

16. A refers to a pre-decided set of rules using which all parties of a network

connect and interact with one another

a. VOIP b) Protocol c) HTTP d) SLIP

17. is not a component of computer network

a. HUB b) Router c) switch d) Volt meter

18. is attached to a host so as to establish network connections.

a. Cable b) LAN c) NIC d) WAN

19. The networks spread across countries or on a very big geographical area

a. LAN b) WAN c) MAN d) PAN

20. refers to all the legal and regulatory aspects of Internet and World Wide Web.

a. Cyber law b) Criminal law d) Police law d) online law

21. Server exclusively used for serving files related requests are called .

a. Print server b) Cache memory c) file server d) none of these


22. Which of the following is not a type of network
a) LAN b) MAN c) PAN d) WAN

23. What does the ancronyn for MAN stands for ________
a) magnetic access network b) metropolitan area network
c) multi area network d) multi access network

24. What does the ancronym for LAN stands for _________
a) local area network b) large area network
c) list area network d) line area network

25. Which of the following is the first computers network?


a) TCP/IP b) TELNET c) ARPANET d) INTERNET

26. Which protocol handles the address part of each pocket to that it sends to the exact destination?
a) TCP b) HTTP c) IP d) PPP

27. Privately owned network are confined to a localized area called ______
a) LAN b) WAN c) CAN d) MAN

28. In which toplogy all computers are connected through single hub?
a) ring to pology b) mesh topology c) star topoplgy d) bustopology

29. Which of the following is not example for guide media


a) UTP b) satellite c) coaxial cable d) optical fiber

30. Expand GRPS ______


a) general packet radio service b) general process radio system
c) general packet radio system d) general program radio service

31. Where is a hub specified in the OSI model.


a) session layer b) physical layer c) data link layer d) application layer
32. How many layers are there in OSI model?
a) 3 b) 4 c) 6 d) 7

33. Which one is not a type of protocol?


a) TCP/IP b) HTTP c) SMTP d) TTP

34. Expand OSI __________


a) open system interconnection b) open service internet
c) open source internet d) none of the above

35. Indentify the layer which provides service to the user


a) session layer b) application layer c) presentation error d) physical layer

36. What is hub?


a) software b) computing device c) network device d) calculating device

37. A software and coding which is freely available on internet is ________


a) community software b) free software
c) open-source software d) unclinsed software

38. What does URL stands for?


a) uniform resources locator b) uniform resources latch
c) universal resource locator d) universal resource latch
39. Which is not a type of e-commerce?
a) B2B b) B2C c) B2D d) C2B

40. Which of the following is an example for full duplex communication mode?
a) television broadcasting b) walkie – talkie
c) internet browing d) modern telephone system

41. Which networking device is used to connect two networks together?


a) Hub b) bridge c) switch d) repeaters
42. CDMA stands for __________
a) common division multiple access
b) common data multiple access
c) code division multiple acces
d) none of the above

43. Which of the following is not a type of virus


a) Macro virus b) micro virus
c) file virus d) network virus

TWO MARK QUESTIONS


1. List the goals for networking?
a). The goals for networking are:
i. Resource sharing ii. Reliability iii. Cost factor iv. Communication medium.
2. What do you mean by transmission modes?
a). The way of transmitting data from one place to another using transmitting media is called transmission
mode. This can be done in two ways.
1. Serial mode. 2. Parallel mode.

3. Which is the switching technology used?


a). Circuit switching, packet switching and message switching are used to provide communication between
two computers.
4. What is SIM card?
a). SIM is a tiny chip that gives a cellular device its unique phone number, memory, process and the ability to
interact with the user.
5. What is network security?
a). Network security is an over-arching term that describes that the polices and procedures implemented by a
network administrator to avoid and keep track of unauthorized access, modification of the network and
network resources.

6. What are the advantages of EDGE?


a). EDGE-enhanced data rates for global evolution.
The advantages of EDGE are:
i. specially developed to meet the bandwidth needs of 3G.
ii. EDGE formally called GSM384.
iii. EDGEs are ratio based mobile high speed standards.
iv. it allows data transmission speech of 384 kbps is achieved when all eight time slots are used.
vii. Even higher speed may be possible like 48kpbs per time slot in good ratio conditions.
THREE MARK QUESTIONS
1. Explain the HTTP?
a). i. The hypertext transfer protocol is an application level protocol.
ii. HTTP allows an open-ended set of methods to be used to indicate the purpose of a request.
iii. By the Uniform Resource Locator(URL) for indicating the resource on which a method is to be
applied.
2. Classify and explain servers?
a). Servers can be of two types:
1. Non-dedicated servers 2. Dedicated servers
Non-dedicated servers: A computer works as a work station and as well as a server, it is slower, and
requires more memory. The network uses such servers known as PEER-TO-PEER networks.
Dedicated servers: A computer reserved to help work stations for access data, software and hardware
resources. Ex: File server, Printer server, and Modem servers.

3. Explain the types of networking?


a) Networks are classified into three types on the basis of geographical spread ,they are
*Local area network (LAN)
*Metropolitan area network (MAN)
*Wide area network (WAN)
LAN: Small computer networks that are conformed to a localized area are known as LANs.
The key purpose is to serve its uses in resource sharing.
MAN: MANs are networks spread over a city. The purpose of MAN is the sharing of the hardware and the
software resources among its users.
WAN: WAN is a group of computers that are separated by large distances and ties together. WAN spreads
across the countries. It facilitates fast and efficient exchange of information at lesser cost and higher speed.

4. What are the different networking techniques?


a). There are three different networking /switching techniques which are employed to provide
communication between two computers, they are
1. Circuit switching 2. Message switching 3. Packet switching
Circuit switching: In this technique, first the complete physical connection between two computers is
established and then data are transmitted from source to destination computer in unbroken path.
Message switching: This technique is also called as store and forward method. In this there is no need to
establish a dedicated path between two stations. The message which is sent by a station will get transmitted
through the network from node to node.
Packet switching: In this method a message is broken into small parts called packets. Each packet is tagged
with appropriate source and destination address. These packets transmit through multiple paths and search the
destination.

5. Explain the cables and different types of cables used in transmission?


a) Cables are the physical infra sturcture components that carry data from one computer to another. The
different types of cables used in transmission are
*Twisted pair cables *Coaxial cables *Fiber optical cable
Twisted pair cables and Coaxial cables carry signals in the form of electrical current.
Fiber optical cable carries signals in the form of light.

6. Write the differences between simplex, half duplex, and full duplex?
a) Simplex:
1. The communication is uni-directional.
2. One of the communicating devices can only send data, where as the other can only receive it.
3. Communication is fast because full bandwidth of channel used for transmission.
b) Half duplex:
1. The communication is bi-directional.
2. Both devices can transmit data but not at the same time.
3. This requires a definite turn around time, during which the device changes from the receiving mode to
the transmitting mode.
4. Due to this delay, communication is slower.
c). Full duplex:
1. The communication is bi-directional.
2. Both devices capable of sending as well as receiving data at the same time.
3. The bandwidth of the wire for the data is divided into two channels for carrying data in either
direction.
4. Communication is faster.

7. Explain the applications of network?


a) Network applications:
1. Group Wave :
1. Video conferencing: This is the process of conducting a conference between two or more
participants at different sites by using computer networks to transmit audio and video data.
2. Chatting: it is a real time communication between two users via computer. The two computers
must be online for a chat to be initialed.
3. Email: This allows the user to type messages at their local nodes and then sent to same one on the
network.
4. File transfer: This application facilitates transfer of files from one computer to another.
Uploading: This is obtaining of files from a workstation to a server.
Downloading: this is obtaining files from a server to a workstation or client.
FIVE MARK QUESTIONS

1. Explain the working of OSI and TCP/IP model?


a). The open systems interconnection (OSI) model is a conceptual model that characterized and standardizes
the internal functions of a communication system by partitioning it into abstract layers. They are Layers

Application Layer

Presentation Layer

Session Layer
Transport Layer

Network Layer
Data link Layer

Physical Layer
The physical layer: It is connected with transmitting raw bits over a communication channel.
Data link layer: It provides a reliable link between two directly connected nodes, by deleting and possibly
correcting errors that may occur in physical layer.
Network layer: It controls the operations of the subnet. The main function is to determine how
packets/datagram is routed from source to destination.
Transport layer: It keeps the track of all the segments and retransmits those that fail. It creates packets out of
the message received from the application layer.
Session layer: It controls the connection between computers. It establishes messages and terminates the
connections between the local and remote application.
Presentation layer: It is concerned with the syntax and semantics of the information transmitted, concerned
with moving bits among the layers.
Application layer: This layer functions typically include identifying communication partness, determining
resource availability and synchronizing communications.
TCP/IP model: TCP/IP protocols map to a four layer conceptual model known as the DARPA model.
Application
Transport
Network
interface
Internet
(Department of Defense Advanced Resources Projects Agency model).
Each layer in DARAP model corresponds to one or more layers of the seven layers OSI model.
Network Interface layer: It encompasses the data link and physical layers of the OSI model. It handles placing
TCP/IP packets on the network medium and receiving TCP/IP packets of the network medium.
Internet layer: It encompasses the network layer of OSI model. It handles addressing packing and routing
functions. The core protocols of the internet layer are IP, ARP, ICMP and IGMP.
IP: internet protocol ARP: Address Resolution protocol
ICMP: internet Control Message protocol IGMP: Internet group management protocol.
Transport layer: It encompasses the responsibilities of the OSI transport protocol. It handles providing the
application layer with session and datagram communication services. The core protocols are transmission
control protocol (TCP) and user datagram protocol (UDP).
Application layer: It allows the applications to access the services of the other layers and defines the protocols
that applications used to exchange data. Common protocols are HTTP, FTP etc.

2. Explain various networking devices used?

a). In functioning of networks many devices play important roles few of them are

Modem: A device that converts digital signals to analog signals and vice-versa.

Workstations: All the user computers connected to a network are called workstations.

Network Interface card: A circuit board that controls the exchange of data over a network.

Bridge: A device that connects two LANs and controls data flow between them.

Repeater: A device used to boost the signal. Router: A device that works like a bridge but can handle different
protocols.

Switch: A device that provides a central connection point for cables form workstations, servers and
peripherals.

3) What is topology? Explain in detail?

a). A topology is the actual appearance or layout of networking. Some of the most popular topologies are:

Bus Topology: The linear bus topology connects all the nodes to a single length of transmission medium. The
transmission of data will be in both directions.
Star Topology: In star network each node is connected directly to the central node by a single path. All
communications between nodes have to be passing through central node.

Ring topology: In a ring network all nodes are connected to a common cable and communication is always in
one direction. The data being transmitted is passed through each node in the ring.

Mesh: In this topology, each node is connected to more than one node to provide an alternative root in the
case the host is either down or too busy.

Tree topology: It consists of group of star configured workstations connected to a linear bus backbone cable.

4.What is gateway? Explain?


a). * A gateway is actually a node on a network that serves as an entrance to another network.
*A gateway is also associated with both a router and a switch.
*In homes the gateway is internet service provides (ISP) that connects the user to the internet.
* It enterprises, that the gateway is the computer that routes the traffic from a work station to the outside
network, that is serving the webpage.
*In enterprises, the gateway node often acts as a proxy server and a firewall.
*proxy server: A machine that is not actually a server but appears as a server.
*firewall: A system designed to prevent unauthorized access to or from a private network.
5. Explain network security in detail?
a). Network security consists of the provisions and policies adopted by network administrator to prevent and
monitor unauthorized access, misuse, modification or denial of a computer network and network resources.
Protection Methods:
Authorization: If the user is able to provide a legal login Id/password, then considered as authorized.
Authentication: It involves accepting credentials from the entity and validating them against an authority.
One-factor Authentication: User name and password.
Two factor Authentication: User name and password & security tokens, TM cards/mobile phone.
Three factor Authentication: User name and password/finger print/retinal scan.
Firewall: Once authenticated a firewall enforces access policies such as what services are allowed to be
accessed by the network users.
Security management: Security management for networks is difficult for all kinds of situations. A home or
small office may only require basic security while large business may require high maintenance, advanced
software and hardware to prevent malicious attacks from hacking and spooling.

6. Give the measures for preventing virus?


a) Virus prevention is not a difficult task. By taking by taking extra care and by following the guidelines we
can system virus free.
Guidelines are:
 Never use a foreign or cd without scanning it for virus.
 Always scan files down load from the internet or other source.
 Never boot a pc from a disk unless you find a disk is virus free.
 Write protects your disk.
 Use licensed software’s.
 Use password for pc to prevent unauthorized users
 Install and use antivirus software
 Keep antivirus software up to data.
Key Answers:-
1 2 3 4 5 6 7 8 9 10
b a b a c d d a c b
11 12 13 14 15 16 17 18 19 20
a c d c a b d c b a
21 22 23 24 25 26 27 28 29 30
c c b a c a a c b a
31 32 33 34 35 36 37 38 39 40
b d d a b c b a c d
41 42 43
a c a

1. Interconnection of autonomous computer is called

a) Internet b) Hotspot c) Wi-Fi d) Network

2. ARPANET stands for

a) Advanced Report Projects Agency Network

b) Advanced Report Projects Agent Network

c) Advanced Report Projects Area Network

d) Advanced Research Projects Agency Network

3. OSI stands for

a) Open system Integrated b) Open source interconnection

c) Open system Internet d) Online system interconnection

4. is concerned with transmitting raw bits

a) Application layer b) Presentation layer c) Networking layer d) Physical layer

5. contains a variety of protocols

a) Physical layer b) Presentation layer c) Transporting layer d) Application layer


6. layer concerned with syntax and semantics of the information.

a) Presentation b) Network c) Transport d) Physical

7. Layer controls the operation of the subnet.

a) Application b) Transport c) Network d) Physical

8. Layer is to accept data from above layer and split it up into smaller units

a) Transport b) Session c) Network d) Presentation

9. IP stands for

a) Internet protocol b) Internet process

c) Interconnection process d) Interspace protocol

10. HTTP stands for

a) Hypertext transfer protocol b) High text transfer protocol

c) High text typing process d) Hyper texting text process

11. is the standard protocol to transfer any types of files

a) FTP b) SLIP c) PPP d) LAN

12. SLIP stands to

a) Serial line internet protocol b) Serial line interconnection protocol

c) Serial line interspace process d) Server line internet protocol

13. PPP stands for

a) Point to point process b) Process to point process

c) Point to process point d) Point to point protocol

14. is a client / server software program

a) Interconnection b) Independent

c) Interspace d) Internet

15. Server can be of types dedicated server and non – dedicated server

a) 2 b) 4 c) 3 d) 5

16. LAN stands for


a) Local area network b) Loss area networking

c) Local architecture network d) Local across network

17. The networks spread across the countries are known as

a) MANs b) LANs c) WANs d) WAN

18. Appearance or layout of a network is called

a) Internet b) topology c) Interconnection d) Session

19. topology consists of a single length of transmission medium into which


the various nodes are attached.

a) Star b) Ring c) Mesh d) Bus

20. topology is the combination of bus and star topology.

a) Root b) Branch c) Tree d) Mesh

21. refer to the computer that are attached to a network and are seeking to
share the resource of the network.

a) Client b) Nodes c) Server d) All the above

22. is an application level protocol with the lightness and speed necessary for
distributed, collaborative, hypermedia information system.

a) FTP b) IP c) HTTP d) TCP

23. is a layered set of protocol

a) IP b) HTTP c) FTP d) PPP

24. The layer allows users on different machines to establish sessions


between them.

a) Application b) Presentation c) Physical d) Session

25. MIME stands for

a) Mail interconnected multi electronics b) Mail internet mail electric

c) Multipurpose internet mail extensions d) Multipurpose interspace mail extensions

26. UTP stands for

a) Universal twisted pair cable b) Universal tested pair cable

c) Unshielded twisted pair cable d) Upper twisted process cable

27. DGM stands for

a) Data grade medium b) Data general medium


c) Digital grade medium d) Digital general medium

28. is used to segment networks into different sub networks

a) Bridge b) Switch c) Shielded d) Network

29. A is a device that lets you link two similar type networks together

a) Switch b) Bridge c) Router d) Hub

30. On small networks, a workstation that can double as a server is known

a) Dedicated server b) Non – dedicated server

c) Dedicated client d) Non – dedicated client

31. LCP stands for

a) Loss control process b) Link control protocol

c) Least control process d) Load control protocol

32. topology, nodes are connected together in an arbitrary fashion.

a) Tree topology b) Ring topology c) Graph topology d) Mesh topology

33. The transmission making use of radio frequency is termed as

a)Radio wave b) Micro wave c) Satellite wave d)None of these

34. A is a device that can handle different protocols

a) Bridge b) Router c) Gateway d) Physical

35. A is a hardware device used to connect several computers together.

a) Network b) System c) Protocol d) Hub

36. is a device that amplifies a signal being transmitted on the network

a) Repeater b) Bridge c) Gateway d) Switch

37. SMS stands for

a) Super message service b) Short message service

c) Short message sending d) Sending more service

38. Sim typically have memory from

a) 15 to 84kb b) 20 to 64kb c) 25 to 84kb d) 16 to 256kb

39. SIM stands for

a) Super internet message b) Subscriber identity module


c) Short internet message d) Slow internet module

40. Wimax can provide broadband wireless access upto 30 miles for

a) Fixed station b) Wireless c) Identity d) Cookies

41. are messages that a web server transmits to a web browser so that a web
server can keep track of the user’s activity on a specific web site.

a) Crackers b) Hackers c) Cookies d) Virus

42. The are malicious programmers who break into secure systems.

a) Crackers b) Network c) Topologies d) Network

43. is a malicious program that requires a host and is designed to make a


system sick

a) Quick heal b) Computer virus c) Kaspersky d) K7

44. Wi – Fi refer

a) Wireless fixing b) Wireless fidelity c) Wired fixing d) None of the above

45. Radio wave can be classified by frequency and

a) Width b) Velocity c) Wavelength d) Length

46. The transmission used direct line – of – slight

a) Circuit b) Infrared c) Switch d) Laser

47. allow you to combine the power of your digital computer with the global
reach of the telephone system.

a) Modem b) Telephone c) Circuit d) Switch

48. A is a device that connects dissimilar networks.

a) Bridge b) Gateway c) Router d) All the above

49. is meant to server subscribers at homes or offices.

a) WLL b) WLC c) GSM d) SIM

50. A is a live, visual connection between two or more people residing in


separate locations for the purpose of communication.

a) PPP b) OSI c) SMS d) VC

51. A is a venue that offers wi – fi access.

a) Wi – fi b) Chat c) VC d) Wi Max

52. The GSM standard for digital cell phones was established in Europe in the mid
a) 1960 b) 1975 c) 1980 d) 8019

53. The in wireless networks refers to the “generation” of the underlying


wireless technology.

a) G b) B c) M d) N

54. The technology is providing up to 25 Mbps connectivity speed.

a) 2G b) 4G c) 3G d) 5G

55. form the most secure level of authorization.

a) Bio metric system b) Firewall c) Authorization d) Authentication

56. applies security mechanisms when a connection is established.

a) Proxy server b) Application gateway

c) Packet filter d) Circuit level gateway

57. In India the cyber laws are contained in the information technology act, 2000 which was
notified on October 2000.

a) 15 b) 17 c) 20 d) 10

58. virus use protocols and commands of computer network to spread themselves on
the network.

a) Macro b) File infectors c) Network d) Boot sector


59. is more commonly known today is a computing platform widely used by IT
service companies.

a) Cloud Technology b) Python c) C++ d) Network

60. form of coaxial cable is thinner and it can have maximum segment
length of 185 meters.

a) Thick net b) UTP cable c) Co axial d) Thin net

61. is the basis for most internal office telephone wiring.

a) VGM b) DGM c) HTTP d) IP

62. A variation of bus topology is the topology.

a) Ring b) Tree c) Mesh d) Root

63. The purpose of a is also sharing of the hardware and the software
resources among its users.

a) LAN b) WAN c) MAN d) Network

64. Dedicated server is known as server.

a) Printer b) Modem c) File d) Non – dedicated

65. was the first protocol for relaying the IP packets over dial – up lines.

a) FTP b) SLIP c) MIME d) URI

66. A is a physical thing, appearing on an Ethernet or some wire.

a) Session b) ARPANET c) Transport d) Packet

67. A is a unit of data, which is what the protocols deal with

a) Data link b) Data gram c) Physical d) Application

68. is the base communication protocol of the internet.

a) TCP b) HTTP c) FTP d) PPP

69. sharing provides sharing and grouping of data files over the network.

a) Print b) File c) Email d) Scanner

70. The layer is used to transform a raw transmission facility into a line that
appears free of undetected transmission errors to the network layer.

a) Application b) Physical c) Data link d) Session


KEY ANSWERS

1. d) Network

2. d) Advanced Research Projects Agency Network

3. d) Online system interconnection

4. d) Physical layer

5. d) Application layer

6. a) Presentation

7. c) Network

8. a) Transport

9. a) Internet protocol

10. b) High text transfer protocol

11. a) FTP

12. a) Serial line internet protocol

13. d) Point to point protocol

14. c) Interspace

15. a) 2

16. a) Local area network

17. c) WANs

18. b) Network

19. d) Bus

20. c) Tree

21. b) Nodes

22. c) HTTP

23. a) IP

24. d) Session

25. c) Multipurpose internet mail extensions

26. c) Unshielded twisted pair cable

27. a) Data grade medium

28. b) Switch
29. d) Hub

30. b) Non – dedicated server

31. b) Link control protocol

32. d) Mesh topology

33. a) Radio wave

34. c) Gateway

35. d) Hub

36. a) Repeater

37. b) Short message service

38. d) 16 to 64kb

39. b) Subscriber identity module

40. a) Fixed station

41. c) Cookies

42. a) Crackers

43. b) Computer virus

44. b) Wireless fidelity

45. c) Wavelength

46. d) Laser

47. a) Modem

48. b) Gateway

49. a) WLL

50.

51.

52. c) 1980

53. a) G

54. d) 5G

55. a) Bio metric system

56. d) Circuit level gateway

57. b) 17

58. c) Network
59. a) Cloud Technology
60. d) Thinnet

61.

62. b) Tree

63. c) MAN

64. c) File

65. b) SLIP

66. d) Packet

67. b) Data gram

68. a) TCP

69. c) Email

70. c) Data Link


NETWORKING CONCEPTS NANDI PU COLLEGE

Page 26

You might also like