What is the commonly used unit for measuring the speed of data transmission?
A) Bytes per second
B) BaudC) Bits per second
D) Both B and C

2 Answers

Answer :

Mesh

Answer :

B) Baud

Related questions

Description : What is the commonly used unit for measuring the speed of data transmission? A) Bytes per second B) Baud C) Bits per second D) Both B and C

Last Answer : B) Baud

Description : What is the commonly used unit for measuring the speed of data transmission ? (1) Mega Hertz (2) Characters per second (3) Bits per second (4) Nano seconds

Last Answer : Bits per second 

Description : What is the commonly used unit for measuring the sped of data transmission? 1) Bits per second 2) Nano seconds 3) Characters per second 4) Mega Hertz

Last Answer : 1) Bits per second

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : How many 8-bit characters can be transmitted per second over a 9600 baud serial communication link using asynchronous mode of transmission with one start bit, eight data bits, two stop bits, and one parity bit ? a. 600 b. 800 c. 876 d. 1200

Last Answer : b. 800

Description : What is the commonly used unit for measuring the speed of data transmission? -Do You Know?

Last Answer : answer:

Description : What is the commonly used unit for measuring the speed of data transmission

Last Answer : Bits per second

Description : 1. If the current in the core decreases, what will the strength of the magnetic field be? 2. What is the commonly used unit for measuring the speed of data transmission? 3. The Govt. of ... flows between the Vindhya and Satpura ranges? 20. Which was a journal brought out by Abul Kalam Azad ?

Last Answer : Answer : 1. Decreases 2. Bits per second 3. Jeevan Sathi Yojana 4. Because warm and cold currents meet 5. Ranga II 6. Fatty tissue 7. Uttar Pradesh 8. Oil gas 9. Silvassa 10. Hunter 11. Sports ... 16. Speaker 17. Because of inadequate supply of air 18. Growth of GNP 19. Narmada 20. Al -Hilal

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : The data unit in the TCP/IP layer called a ..... A) Message B) Segment C) Datagram D) Frame

Last Answer : D) Frame

Description : IEEE 802.3ab defines Gigabit Ethernet transmission over unshielded twisted pair (UTP) category 5, 5e or 6 cabling known as .................... A) 1000 BASE-T B) 1000 BASE-SX C) 1000 BASE-LX D) 1000 BASE-CX

Last Answer : A) 1000 BASE-T

Description : State the factors to be considered for selecting transmission media.

Last Answer : Eight factors to be considered:  1. Type of medium.  2. No of conductors/connectors.  3. Flexibility.  4. Durability.  5. Bandwidth.  6. Reliability of connection  7. Required ... parallel wires  12. Resistance to external EMI outside the cable.  13. Attenuation characteristics  14. Cost

Description : How many bytes of data can be sent in 15 seconds over a serial link with baud rate of 9600 in asynchronous mode with odd parity and two stop bits in the frame? a. 10,000 bytes b. 12,000 bytes c. 15,000 bytes d. 27,000 bytes

Last Answer : b. 12,000 bytes

Description : is a collective term for a number of Ethernet Standards that carry traffic at the nominal rate of 1000 Mbits/s against the original Ethernet speed of 10 Mbit/s. A) Ethernet B) Fast Ethernet C) Gigabit Ethernet D) All of the above

Last Answer : B) Fast Ethernet

Description : An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit rate of the signal are ............... and .............. (A) 4000 bauds \ sec & ... (B) 2000 bauds \ sec & 1000 bps (C) 1000 bauds \ sec & 500 bps (D) 1000 bauds \ sec & 4000 bps

Last Answer : (D) 1000 bauds \ sec & 4000 bps Explanation: Bit rate is the number of bits per second. Baud rate is the number of signal units per second. Baud rate is less than or equal to the bit rate. Baud rate = 1000 bauds per second (baud/s) Bit rate = 1000 x 4 = 4000 bps

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : ................is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : A WAN typically spans a set of countries that have data ratesless than................ Mbps. A) 2 B) 1 C) 4 D) 100

Last Answer : B) 1

Description : The............ layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation

Last Answer : A) Physical

Description : In FDDI, data normally travel on ..................A) The primary ring B) The Secondary ring C) Both rings D) Neither ring

Last Answer : A) The primary ring

Description : In which OSI layers does the FDDI protocol operate? A) Physical B) Data link C) Network D) A and B

Last Answer : D) A and B

Description : Which layers of the OSI determines the interface often system with the user? A) Network B) Application C) Data link D) Session

Last Answer : B) Application

Description : Write the name of layers that perform the following functions in OSI : I. Data Encryption II. Error Correction III. File Transfer IV. Data Encoding

Last Answer : 1. Data Encryption-Presentation Layer 2. Error Correction-Data link layer and Transport layer 3. File Transfer-Application layer 4. Data Encoding-Presentation layer

Description : The power flow problem mathematical model for a linear transmission network (A) is non-linear (B) is linear (C) considers time variation of generation (D) does not consider tap-changing transformers

Last Answer : The power flow problem mathematical model for a linear transmission network is non-linear

Description : Which of the following Unit can be used to measure the speed of a computer? A. BAUD B. SYPS C. MIPS D. None of the Above

Last Answer : C. MIPS

Description : What is the unit used to measure the data wf is transmitted through modem? (a) Bytes per second (b) Band -Technology

Last Answer : (c) Bits per second is the unit used to measure the data through modem.

Description : Consider a CSMA/CD network that transmits data at a rate of 100 Mbps (108 bits per second) over a 1 km (kilometre) cable with no repeaters. If the minimum frame size required for this network is 1250 bytes, what is the signal speed (km/sec) in the cable? a. 8000 b. 10000 c. 16000 d. 20000

Last Answer : d. 20000

Description : ..................mode is used whenever either end of a security association is gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway

Last Answer : A) Tunnel

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol

Last Answer : A) SSL handshake protocol

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : In.................. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B

Last Answer : A) Tunnel

Description : .................... is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling

Last Answer : A) Tunneling

Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above

Last Answer : D) All of the above

Description : Which of the following is / are the types of firewall? A) Packet Filtering Firewall B) Dual Homed Gateway Firewall C) Screen Host Firewall D) All of the above

Last Answer : D) All of the above

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Description : A simple cabling method, known as the..................topology allows about 30 computers on a maximum cable length of about 600 feet. A) Ring B) Bus C) Star D) Mesh

Last Answer : Bus

Description : ............. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie

Last Answer : C) cookie

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : FTP server listens to connections on port ……………………. A) 19 and 20 B) 20 and 21 C) 21 and 22 D) 20 and 22

Last Answer : B) 20 and 21

Description : The examples of Interior Gateway Protocols (IGP) are. i) Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii

Last Answer : B) i, and ii only