CS601 FINALTERM MCQS SOLVED REFERENCE
An unauthorized user is a
network ___________ issue.
► Performance
► Reliability
► Security
► All of the given
Which is not an element of
protocol
► semantics
► timing
► communication service module
_______ is a multipoint
topology.
► Ring
► Mesh
► Tree
► Bus
Unidirectional traffic
movement is overcome by dual ring technology.
► True
► False
Physical layer define characteristics
of interface between device and _________
► transmission medium
► another device
► another peer physical layer at other side
► modem
________ layer deals with syntax
and semantics of information exchange.
► presentation
► session
► application
► physical
To allow access to network
resources is the function of ___________
► application layer
► physical layer
► network layer
Time domain plot show changes
in signal phase with respect to time.
► True
► False
In 8QAM each signal shift or
one baud represents ______.
► 4 bits
► 2 bits
► 5 bits
► 3 bits
Modulation of an analog
signal can be accomplished through changing the ___________ of the carrier
signal.
► amplitude
► frequency
► phase
► all of the given
EIA 449 provides much better
functionality than EIA ________
► 232
► 223
► 262
► 222
Which of the following is an
example of ITU-T modem standards:
► T-series
► X-series
► N-series
► V-series
Traditional modems are wide
spread now to a data rate of __________.
► 56 Kbps
► 72 Kbps
► 42 Kbps
► 96 Kbps
In case of uploading at the
switching station, data is converted to digital signal using ___________.
► TCP
► PCM
► ICP
► TDM
The RG number gives us
information about ________.
► Twisted pairs
► Coaxial cables
► Optical fibers
► all of the given
The _________ is an
association that sponsors the use of infrared waves.
► IrDA
► EIA
► FCC
► PUD
Optical fibers are defined by
the ratio of the ___________ of their core to the diameter of their cladding.
► Diameter
► Radius
► Length
► Width
The section of EM spectrum
defined as Radio Communication is divided into _____ ranges called BANDS.
► 8
► 10
► 5
► 6
Radio wave transmission
utilizes ___________ different types of propagation.
► Four
► Three
► Two
► Five
The VLF and LF bands use
_________ propagation for communications.
► Ground
► Sky
► Line of sight
► Space
In __________ propagation,
low-frequency radio waves hug the earth.
► Ground
► Sky
► Line of Sight
► Space
dB is ____________ if a
signal is amplified.
► Negative
► Positive
► Null
► Zero
Distortion occurs in a
___________ signal.
► Rectified
► Composite
► Amplified
► none of the given
There are ________ basic
categories of multiplexing.
► 3
► 4
► 2
► 5
In bit ____________, MUX adds
extra bits to a device.
► Stuffing
► Adding
► Multiplication
► Exchanging
The local loop has
___________ cable that connects the subscriber telephone to the nearest end
office.
► Twisted-pair
► Coaxial
► Fiber-optic
► None of the given
FTTC
stands for _____________
► flexible to the curb
► fiber to the curb
► fiber to the cable
► fiber to the center
If
the ASCII character G is sent and the character D is received, what type of
error is this?
► Single-bit
► Multiple-bit
► Burst
► Recoverable
Which error detection method
can detect a single-bit error?
► Simple parity check
► Two-dimensional parity check
► CRC
► All of the given
Flow control is needed to
prevent ____________
► Bit errors
► Overflow of the sender buffer
► Overflow of the receiver buffer
► Collision between sender and receiver
In data link layer,
communication requires at least ___________ devices working together
► 3
► 2
► 4
► 5
Data link control is composed
of ____________ important functions.
► 2
► 3
► 4
► 5
____________ coordinates the
amount of data that can be sent before receiving acknowledgment
► flow control
► error control
► data control
Primary device uses
____________ to receive transmission from the secondary devices.
► ACK
► ENQ
► POLL
In a
Go-Back-N ARQ, if the window size is 63, what is the range of sequence number?
► 0 to 63
► 0 to 64
► 1 to 63
► 1 to 64
Data
link protocols can be divided into ______________ sub-groups.
► two
► three
► four
► five
XMODEM
is a ______________ protocol designed for telephone-line communication b/w PCs.
► file transfer
► hardware
► software
► application exchange
YMODEM uses ITU-T
CRC-_____ for Error Checking
► 16
► 32
► 8
► 4
In Y-MODEM Multiple files can
be sent simultaneously
► True
► False
HDLC
is an acronym for ______________.
► High-duplex line communication
► High-level data link control
► Half-duplex digital link combination
► Host double-level circuit
What
is present in all HDLC control fields?
► P/F bit
► N(R)
► N(S)
► Code bits
Which of the following
sublyer, resolves the contention for the shared media
► MAC
► LLC
► Phyical
Ethernet
LANs can support data rates between _____________
► 1 and 100 Mbps
► 1 and 200 Mbps
► 1 and 500 Mbps
► 1 and 100 Gbps
In FDDI, Token Passing is
used as Access method.
► True
► False
Bridges
can divide a large ________ into smaller segments
► Network
► Packet
► Frame
► Address
Like VRC, LRC and CRC,
Checksum is also based on _______________.
► Redundency
► Decimal Division
► Encryption
► Encoding
Check sum method is used for
_______________ layers.
► Physical
► Application
► Transport
► Datalink
Which of the following
___________ uses a series of filters to decompose multiplexed signal into its
constituent signals.
► Bridge
► MUX
► DEMUX
► Switch
We need ____________ to
decompose a composite signal into its components.
► fourier transform
► nyquist theorem
► shannon capacity
Data from computer is in
____________ form and the local loop handles _________ signals.
► Analog; analog
► Analog; digital
► Digital; digital
► Digital; analog