A communication device that combines transmissions from several I/O devices into one line is a
A) Concentrator B) Modifier
C) Multiplexer D) Full duplex file

1 Answer

Answer :

C) Multiplexer

Related questions

Description : A communication device that combines transmissions from several I/O devices into one line is a A) Concentrator B) Modifier C) Multiplexer D) Full duplex file

Last Answer : C) Multiplexer

Description : A communication device that combines transmissions from several I/O devices into one line is a A) Concentrator B) Modifier C) Multiplexer D) Full duplex file

Last Answer : C) Multiplexer

Description : A communications device that combines transmissions from several I/O devices into one line is a a. concentrator b. modifier c. multiplexer d. full-duplex line

Last Answer : multiplexer

Description : Which of the following does not allow multiple uses or devices to share one communication line? a. doubleplexer b. multiplexer c. concentrator d. controller

Last Answer : concentrator

Description : Which of the communication modes support two way traffic but in only once direction of a time? A) Simplex B) Half-duplex C) Three - quarter's duplex D) Full duplex

Last Answer : B) Half-duplex

Description : Devices on one network can communicate with devices on another network via a ....... A) File Server B) Utility Server C) Printer Server D) Gateway

Last Answer : D) Gateway

Description : In a................ topology, if there are n devices in a network, each device has n-1 ports for cables. A) Mesh B) Star C) Bus D) Ring

Last Answer : Mesh

Description : Which of the following statement is incorrect? a. The difference between synchronous and asynchronous transmission is the clocking derived from the data in synchronous transmission. b. Half ... in online activities d. Batch processing is the prefered processing mode for telecommunication operation.

Last Answer : Batch processing is the prefered processing mode for telecommunication operation.

Description : If all devices are connected to a central hub, then topology is called

Last Answer : C) Star Topology

Description : State features of any one network control devices. 

Last Answer : A hardware device that are used to connect computers, printers, fax machine and other electronic devices to a network are called network devices. These devices transfer data in a fast, ... transforms incoming analog signals into their digital equivalents. A two way communication is established.

Description :  Write in brief any two roles of network control devices in computer network.

Last Answer : Two roles of network control devices in computer: Role of repeater: Generates the original signal. Operates in the physical layer. Role of Bridges: Bridges utilize the address ... Role of Gateways: Gateways provide translation services between incompatible networks and works in all layers.

Description : Explain handoff procedure in mobile communication.

Last Answer : Assume that there is a call going on between two parties over a voice channel. When the mobile unit moves out of coverage area of a particular cell site the reception becomes weak. Then the cell ... arranges the handoff requests in a queue instead of rejecting them, if the new cell sites are busy.

Description : State the reason for keeping uplink and downlink frequency different in satellite communication.

Last Answer : Uplink frequency is used for transmission of signals from earth station transmitter to satellite. Downlink frequency is used for transmission of signals from satellite to earth station receiver. ... the same antenna to be used for both receiving and transmitting simplifying satellite hardware.

Description : Explain Satellite communication with neat diagram

Last Answer : SATELLITE COMMUNICATION: In satellite communication, signal transferring between the sender and receiver is done with the help of satellite. In this process, the signal which is basically a beam ... of satellite: Satellite television digital cinema satellite radio satellite internet access

Description : Explain horizontal and vertical communication.

Last Answer : Horizontal communication Fig: Horizontal Communication in OSI Model. 1) The horizontal communication is the logical connection between the layers, there is no direct communication ... communication, it becomes protocol at each layer simultaneously. Fig:Vertical communication

Description : Explain infrared communication. List any two disadvantages of infrared communication.

Last Answer : Infrared communication (IR) is an example of wireless communication. However, it is limited to very simple applications & suffers from several disadvantages, mainly very small bandwidth & distances ... areas require multiple emitter panels, which will increase the cost of the system.

Description : Which of the following might be used by a company to satisfy its growing communications needs? a. front end processor b. multiplexer c. controller d. concentrator e. all of the above

Last Answer : all of the above

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : Write the name of layers that perform the following functions in OSI : I. Data Encryption II. Error Correction III. File Transfer IV. Data Encoding

Last Answer : 1. Data Encryption-Presentation Layer 2. Error Correction-Data link layer and Transport layer 3. File Transfer-Application layer 4. Data Encoding-Presentation layer

Description : In star topology which device is preferable as a star device between switch and hub? Justify. 

Last Answer : Switch in star Topology: Switch is used as a central device to connect different nodes in star topology. Switch is an intelligent device. When switch receives a data packet it reads destination ... whose destination address matches with the address contained in the data packet. Diagram:

Description : A network consists of several inductances connected in parallel. The equivalent inductance of the network is given by (A) the sum of the individual inductances. (B) the reciprocal of the ... of individual inductances. (D) the reciprocal of the sum of reciprocals of individual inductances.

Last Answer : A network consists of several inductances connected in parallel. The equivalent inductance of the network is given by the reciprocal of the sum of reciprocals of individual inductances.

Description : A closed path made by several branches of the network is known as?

Last Answer : A closed path made by several branches of the network is known as loop.

Description : Which of the following statement is incorrect? a. Multiplexers are designed to accept data from several I/O devices and transmit a unified stream of data on one communication line b. HDLC is a standard ... indicates that it is ready to accept data d. RTS/CTS is the way the terminal indicates ringing

Last Answer : RTS/CTS is the way the DTE indicates that it is ready to transmit data and the way the DCW indicates that it is ready to accept data

Description : Sending messages to devices on my network.

Last Answer : What kind of “messages” were you looking to send? Even though they might all be connected to a single wireless network, they still each have their own protocol for “messages”.

Description : A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate? (A) 100 Kbps (B) 200 Kbps (C) 400 kbps (D) 1000 Kbps

Last Answer : (C) 400 kbps

Description : Which of the following does not allow multiple users or devices toshare onecommunications line? A. doubleplexer B. multipplexer C. concentrator D. controller E. None of the above

Last Answer : doubleplexer

Description : The transmission mode which allows both communicating devices to transmit and receive data simultaneously is: a) Full Duplex b) Simplex c) Half Duplex d) Simple Complex e) None of These

Last Answer : a) Full Duplex

Description : The device that converts digital signals to analog signals at the start of long distance transmissions is (1) peripheral (2) modem (3) telephone (4) antenna

Last Answer : modem

Description : ..................mode is used whenever either end of a security association is gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway

Last Answer : A) Tunnel

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol

Last Answer : A) SSL handshake protocol

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : In.................. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B

Last Answer : A) Tunnel

Description : .................... is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling

Last Answer : A) Tunneling

Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above

Last Answer : D) All of the above

Description : Which of the following is / are the types of firewall? A) Packet Filtering Firewall B) Dual Homed Gateway Firewall C) Screen Host Firewall D) All of the above

Last Answer : D) All of the above

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : ................is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Description : A WAN typically spans a set of countries that have data ratesless than................ Mbps. A) 2 B) 1 C) 4 D) 100

Last Answer : B) 1

Description : A simple cabling method, known as the..................topology allows about 30 computers on a maximum cable length of about 600 feet. A) Ring B) Bus C) Star D) Mesh

Last Answer : Bus