The loss in signal power as light travels down the fiber is called .............
A) Attenuation
B) Propagation
C) Scattering
D) Interruption

1 Answer

Answer :

A) Attenuation

Related questions

Description : The loss in signal power as light travels down the fiber is called ............. A) Attenuation B) Propagation C) Scattering D) Interruption

Last Answer : A) Attenuation

Description : The loss in signal power as light travels down the fiber is called ............. A) Attenuation B) Propagation C) Scattering D) Interruption

Last Answer : A) Attenuation

Description : The loss in signal power as light travels down the fiber is called a. attenuation b. progragation c. scattering d. interruption

Last Answer : attenuation

Description : ECE Board Exam November 1996 The loss in signal power as light travels down a fiber is A. attenuation B. propagation C. absorption D. scattering

Last Answer : A. attenuation

Description : The loss in signal power as light travels down a fiber is called a. Dispersion b. Scattering c. Absorption d. Attenuation

Last Answer : d. Attenuation

Description : The loss in signal power as light travels down a fiber is called ∙ a. Dispersion ∙ b. Scattering ∙ c. Absorption ∙ d. Attenuation

Last Answer : ∙ d. Attenuation

Description : Loss due to the diffraction of light when it strikes on the irregularities formed during the manufacturing process of the fiber optics. A. Absorption loss B. Attenuation C. Bending loss D. Rayleigh scattering loss

Last Answer : D. Rayleigh scattering loss

Description : It is caused by the difference in the propagation time of light rays that take different paths down the fiber. ∙ A. modal dispersion ∙ B. microbending ∙ C. Rayleigh scattering ∙ D. chromatic dispersion

Last Answer : A. modal dispersion

Description : Band loss is ∙ a. A reduction in transmitter power caused by earth’s surface curvature ∙ b. A reduction in strength of the signal caused by folded dipole bends ∙ c. An attenuation increase caused by bends radiating from the side of the fiber ∙ d. All of these

Last Answer : c. An attenuation increase caused by bends radiating from the side of the fiber

Description : Draw and explain fiber optic cable.

Last Answer : As shown in the figure, at the center is the glass core through which the light propagates. In multimode fibers, the core is typically 50 microns in diameter. In single mode fibers, the core is ... be fused to form a solid connection. A fusion splice is almost as good as a single drawn fiber.

Description : Why are visible-light LEDs not used for fiber optics? ∙ a. It has high losses ∙ b. It has short wave ∙ c. It has low attenuation ∙ d. It has weak signal

Last Answer : ∙ a. It has high losses

Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the busspeed. ii) It is multipoint configuration. A) True, True B) True, False C) False, True D) False, False

Last Answer : A) True, True

Description : ________ is a typeof transmission impairment in which the signal loses strength due to the different propagation speeds of each frequency that makes up the signal. A) Attenuation B) Distortion C) Noise D) Decibel

Last Answer : Distortion

Description : The loss tangent is also referred to as a) Attenuation b) Propagation c) Dissipation factor d) Polarization

Last Answer : c) Dissipation factor

Description : The ratio of conduction to displacement current density is referred to as a) Attenuation constant b) Propagation constant c) Loss tangent d) Dielectric constant

Last Answer : c) Loss tangent

Description : The term power budgeting refers to ∙ A. the cost of cable, connectors, equipment and installation ∙ B. the loss of power due to defective components ∙ C. the total power available minus the attenuation losses ∙ D. the comparative costs of fiber and copper installations

Last Answer : C. the total power available minus the attenuation losses

Description : When connector losses, splice losses and coupler losses are added, what is the limiting factor? ∙ A. source power ∙ B. fiber attenuation ∙ C. connector and splice loss ∙ D. detector sensitivity

Last Answer : D. detector sensitivity

Description : If the length of the fiber point defect changes with pulse duration, is the OTDR signal deviation a point defect or a region of high fiber attenuation?

Last Answer : A point defect.

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol

Last Answer : A) SSL handshake protocol

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : The data unit in the TCP/IP layer called a ..... A) Message B) Segment C) Datagram D) Frame

Last Answer : D) Frame

Description : If all devices are connected to a central hub, then topology is called

Last Answer : C) Star Topology

Description : It is desired to connect five computers that are joined at a single point called central node. i) Draw the setup. ii) Name the topology. iii) State two advantages and disadvantages of this topology.

Last Answer : i. Setup:  ii. Name of topology: Star topology iii. Advantages of Star Topology 1) As compared to Bus topology it gives far much better performance, signals don't necessarily get ... as well number of nodes which can be added in such topology is depended on capacity of central device.

Description : ..................mode is used whenever either end of a security association is gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway

Last Answer : A) Tunnel

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : In.................. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B

Last Answer : A) Tunnel

Description : .................... is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling

Last Answer : A) Tunneling

Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above

Last Answer : D) All of the above

Description : Which of the following is / are the types of firewall? A) Packet Filtering Firewall B) Dual Homed Gateway Firewall C) Screen Host Firewall D) All of the above

Last Answer : D) All of the above

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : ................is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Description : A WAN typically spans a set of countries that have data ratesless than................ Mbps. A) 2 B) 1 C) 4 D) 100

Last Answer : B) 1

Description : A simple cabling method, known as the..................topology allows about 30 computers on a maximum cable length of about 600 feet. A) Ring B) Bus C) Star D) Mesh

Last Answer : Bus

Description : ............. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie

Last Answer : C) cookie

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : FTP server listens to connections on port ……………………. A) 19 and 20 B) 20 and 21 C) 21 and 22 D) 20 and 22

Last Answer : B) 20 and 21

Description : The examples of Interior Gateway Protocols (IGP) are. i) Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii

Last Answer : B) i, and ii only

Description : Which of the following is not a mechanism that DHCP supports for IP address allocation? A) Automatic allocation B) Static allocation C) Dynamic allocation D) Manual allocation

Last Answer : B) Static allocation

Description : Which of the following is not a mechanism that DHCP supports for IP address allocation? A) Automatic allocation B) Static allocation C) Dynamic allocation D) Manual allocation

Last Answer : B) Static allocation

Description : ........... is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)