Description : A _______ is a three-layer device that handles packets based on their logical addresses
Last Answer : router
Description : Classification of protocol that interprets a frame of data as a group of successive bit combined into predetermined pattern of fixed length, usually 8 bits each.
Last Answer : Character and Byte-oriented protocols
Description : ____ is a dynamic mapping protocol in which a physical address is found for a given logical address
Last Answer : ARP
Description : One of the responsibilities of the transport layer protocol is to create a ______ communication.
Last Answer : process to process
Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes
Last Answer : a. Checksum
Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes
Last Answer : A. Checksum
Description : Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - ... * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data
Last Answer : Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits Data xx bits
Description : The upper pulse rate and information carrying capacity of a cable is limited by:
Last Answer : modal dispersion
Description : Dividing the data block by a constant produces a remainder that is used for error detection.
Last Answer : Cyclic redundancy check
Description : The OSI layer that provides the control functions necessary to establish, manage and terminated the connections as required to satisfy the user reques
Last Answer : Session layer
Description : An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above
Last Answer : Frame check sequence
Description : In NetBill's protocol for small payments for internet services (i) Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account (ii) The vendor supplies the key to NetBill server when he ... i, ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv
Last Answer : b. i, ii, iii
Description : _________ is the protocol suite for the Internet.
Last Answer : TCP/IP
Description : _______ is the cell relay protocol designed by the corresponding Forum and adopted by the ITU-T.
Last Answer : ATM
Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____
Last Answer : a. all UDP packets are treated independently by transport layer
Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above
Last Answer : Provision of sequence number in the header of message
Description : In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400 bytes?
Last Answer : 428
Description : It is the symmetrical expectation of the bit error rate in the system.
Last Answer : probability of errors
Description : The property of interchangeability for the transmitting and receiving operations is known as ____
Last Answer : reciprocity
Description : Optical power is sometimes called ____
Last Answer : Radiant flux
Description : Image frequencies occur when two signals ____.
Last Answer : enter the mixer, one below and one above the local oscillator by a difference equal to the IF
Description : Quantizing is ____
Last Answer : . A/D converter
Description : The main circuit in a PSN generator is ____.
Last Answer : Shift register
Description : ____ is a virtual-circuit wide-area network that was designed in response to demands for a new type of WAN in the late 1980s and early 1990s.
Last Answer : . Frame Relay
Description : The ISDN channel D designates _____ which contains control information
Last Answer : Data
Description : Set rules implementing and governing an orderly exchange of data between layers of two devices, such as line control units and front – end processors.
Last Answer : Data Link Protocol
Description : It is proposed network designed by major telephone companies in conjunction with the ITU-T with the intent of providing worldwide telecommunications support for voice, data, video and facsimile information within the same networ
Last Answer : ISDN
Description : A repeater is a connecting device that operates in the _______ layer of the Internet model.
Last Answer : physical
Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum
Last Answer : Simple parity check
Description : Checksum is used in Internet by several protocols although not at the _________ a) Session layer b) Transport layer c) Network layer d) Data link layer
Last Answer : d) Data link layer
Description : The purpose of the _______is to provide flow and error control for the upper-layer protocols that actually demand theseservices A) MAC B) LLC C) LLU D) none of the above
Last Answer : LLC
Description : At the data link layer, Frame Relayusesa protocol that supports _____control. A) flow B) error C) either (a) or (b D) neither (a) nor (b)
Last Answer : neither (a) nor (b)
Description : The size, shape, and dielectric material of a waveguide must be constant throughout its length for energy to move from one end to the other without reflections. What could be the effect in any abrupt change in its size or shape?
Last Answer : Reflections.
Description : A mode where the entire magnetic field is in the transverse plane and has no portion parallel to the length axis.
Last Answer : TM mode
Description : The reason a CSMA/CD network has a minimum length for packets is:
Last Answer : to make sure all other nodes hear a collision in progress
Description : DNS can obtain the of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum
Last Answer : B) IP address
Description : DNS can obtain the ................. of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum
Description : DNS can obtain the ..................of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum
Description : Which of the following statement is incorrect? A. The Addresses Resolution Protocol, ARP, allows a host to find the physicaladdress ofa target host on the samephysical network, given only the target IP address. ... -addresses of our choice to every machine. D. All of theabove E. None of the above
Last Answer : All of theabove
Description : Product planners need to think about product products and s s and services on three levels. Each level adds more customer value. adds more customer value. The most basic level is The most basic ... buying? a. actual product b. augmented product augmented product c. core benefit d. co-branding
Last Answer : c. core benefit
Description : __________ defines how a user gets control of the channel so as to allow transmission.
Last Answer : channel access
Description : It is the transmission of information in any form from one source to one or more destination.
Last Answer : Multiplexing
Description : It is used to encode the minimum amount of speech information necessary to reproduce a perceptible message with a fewer bits that those needed by a conventional encoder/decoder
Last Answer : vocoders
Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol
Last Answer : A) SSL handshake protocol
Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol
Description : _______ refers to the structure or format of the data, meaning the order in which they are presented.
Last Answer : Semantics
Description : A ________ is a set of rules that governs data communication
Last Answer : protocol
Description : Sixteen different levels (symbols) are used to encode binary data. The channel bandwidth is 36 MHz. The maximum channel capacity is
Last Answer : 288 Mbps
Description : The characters making up the message in a synchronous transmission are collectively referred to as the data
Last Answer : block
Description : A transmission of binary data which involves the transmission of two non – zero voltage level
Last Answer : Bipolar