Description : Which of the following performs modulation and demodulation? a. fiber optics b. satellite c. coaxial cable d. modem e. none of the above
Last Answer : modem
Description : Which of the following performs modulation and demodulation? a. fiber optics b. satellite c. coaxial cable d. Modem
Last Answer : d. Modem
Description : Modulation and demodulation is performed by (a) Microwave (b) Satellite (c) Modem -Technology
Last Answer : (c) Modem converts digital signals to analog signals or analog signals to digital signals for the purpose of transmitting data over telephone lines or vice-versa.
Description : The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred to as: a. modulation b. demodulation c. synchronizing d. digitising
Last Answer : digitising
Description : The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred to as a. modulation b. demodulation c. synchronizing d. Digitizing
Last Answer : b. demodulation
Description : Modulation or demodulation alone cannot be an effective method- Explain ?
Last Answer : The process of converting digital signal to analog signal is called modulation and demodulation. Data communication is the combined result of both modulation and demodulation process. In order to facilitate ... the received signal are done by using modem at both the sender and the receiver.
Description : Write the types of modulation and demodulation ?
Last Answer : There are three main types of modulation. Namely: (a) Amplitude modulation: The modulation in which the amplitude of the carrier signal changes according to the modulating frequency is called ... the carrier signal changes according to the modulating frequency is called phase modulation.
Description : What is modulation and demodulation ?
Last Answer : Modulation: The method by which audio frequency is mixed with high frequency is called modulation. Demdulation: The method by which the original modulating signal is separated is called demodulation. That is, it separates the audio frequency from the high-frequency.
Description : The receive GCE system in an earth station performs what function(s)? A. Modulation and multiplexing B. Up conversion C. Demodulation and demultiplexing D. Down conversion
Last Answer : C. Demodulation and demultiplexing
Description : Demodulation is the process of A. converting digital signals toanalog signals B. converting analogsignals todigital signals C. combining many low speed channels into onehigh speed channel D. dividing the high-speed signals into frequency bands E. None of the above
Last Answer : converting analogsignals todigital signals
Description : Demodulation is aprocessof A. converting analog to digital signals B. converting digital to analogsignals C. multiplexing various signals intoone high speed line signals D. performing data description
Last Answer : converting analog to digital signals
Description : What is a Modem? What is the need of MODEM in data communication? Explain at least one modulation technique used for high speed modems.
Last Answer : Modems are essentially used to interface digital circuits to transmit information on analogue channels like telephone systems. Modem (from modulator-demodulator) is a device that modulates an analogue carrier ... caused by the lines makes the detection even harder than amplitude modulation.
Description : The purpose of the _______is to provide flow and error control for the upper-layer protocols that actually demand theseservices A) MAC B) LLC C) LLU D) none of the above
Last Answer : LLC
Description : Both Go-Back-N and Selective-Repeat Protocols use a_________. A) sliding frame B) sliding window C) sliding packet D) none of the above
Last Answer : sliding window
Description : To handleframesarrivingfrom other protocols, Frame Relay uses adevice calleda _________. A) VOFR B) FRAD C) MUX D) none of the above
Last Answer : FRAD
Description : In IPv6,a _______address is usedif aLAN uses the Internet protocols but isnot connected tothe Internet for security reasons. A) link local B) site local C) mapped D) none of the above
Last Answer : link local
Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame
Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above
Last Answer : Layer 7 protocols
Description : What device separates asingle network into two segmentsbut lets the twosegments appear as one tohigher protocols? A. Switch B. Bridge C. Gateway D. Router
Last Answer : Bridge
Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size
Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor
Last Answer : A) TCP/IP
Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP B) C) SNMP C) SMTP D) D) Rpe
Last Answer : A) FTP
Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt
Last Answer : A) UDP
Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC
Description : Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions ? a. Session Maintenance Protocol b. Real - time Streaming Protocol c. Real - time Transport Control Protocol d. Session Initiation Protocol
Last Answer : d. Session Initiation Protocol
Description : Which of the following protocols is used by email server to maintain a central repository that can be accessed from any machine ? a. POP3 b. IMAP c. SMTP d. DMSP
Last Answer : b. IMAP
Description : Which of the following is/are example(s) of stateful application layer protocols? (i) HTTP (ii) FTP (iii) TCP (iv) POP3 a. (i) and (ii) only b. (ii) and (iii) only c. (ii) and (iv) only d. (iv) only
Last Answer : c. (ii) and (iv) only
Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP
Last Answer : a. HTTP, FTP
Description : Which among the below mentioned protocols provides a mechanism of acquiring an IP address without manual intervention in addition to plug and play type of networking? a. BOOTP b. DHCP c. Both a & b d. None of the above
Last Answer : b. DHCP
Description : TELNET, FTP, SMTP, Protocols fall in the following layer of OSI reference model? a. Transport layer b. Internet layer c. Network layer d. Application layer
Last Answer : d. Application layer
Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications
Last Answer : b. It does three way handshake before sending datagrams
Description : Which of the following transport layer protocols is used to support electronic mail? a. SMTP b. IP c. TCP d. UDP
Last Answer : c. TCP
Description : The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are: a. TCP, UDP, UDP and TCP b. UDP, TCP, TCP and UDP c. UDP, TCP, UDP and TCP d. TCP, UDP, TCP and UDP
Last Answer : c. UDP, TCP, UDP and TCP
Description : TCP and UDP are called ________ a. Application protocols b. Session protocols c. Transport protocols d. Network protocols
Last Answer : c. Transport protocols
Description : Transport layer protocols deals with _____ a. application to application communication b. process to process communication c. node to node communication d. man to man communication
Last Answer : b. process to process communication
Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP
Last Answer : c. TCP and UDP
Description : What are the common protocols associated with the network layer? a. Address Resolution Protocol b. Reverse Address Resolution Protocol c. Internet protocol d. Neighbour Discovery Protocol
Last Answer : c. Internet protocol
Description : Which protocols adopted the standards of HDLC (High Level Link Control) protocol? a. X.25 protocol as LAPB (Link Access Procedure Balanced, V.42 protocol as LAPM (Link Access Procedure for ... Services Digital Network) protocol as LAPD (Link Access Procedure on D channel) d. All the above
Last Answer : d. All the above
Description : Choose the Protocols working in the Data Link Control Layer of OSI model below. a. ATM (Asynchronous Transfer Mode), Frame Relay b. HDLC (High Level Data Link Control), SDLC (Synchronous Data Link Control) c. ARP (Address Resolution Protocol), IEEE802.3 d. All the above
Description : A set of rules that governs data communication is called a. Protocols b. Standards c. RFCs d. Servers
Last Answer : a. Protocols
Description : A list of protocols used by a system, one protocol per layer, is called ________ a) protocol architecture b) protocol stack c) protocol suite d) protocol system
Last Answer : b) protocol stack
Description : Routes are built automatically by………………….., manually by the system administrator, or dynamically by routing protocols. A. route B. traceroute C. ifconfig D. netstat
Last Answer : C. ifconfig
Description : A ……………………….. is built from the information exchanged by routing protocols. A. static routing table B. dynamic routing table C. both a and b D. neither a nor b
Last Answer : B. dynamic routing table
Description : State weather the following statement is true or false for Sendmail. 1).Sendmail is a command-line tool designed for most UNIX-like operating systems. 2).It define a method of transferring mail, and acts as a client/server ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : A. 1. True, 2. False, 3. true
Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : A. 1. True, 2. false, 3. true
Description : State weather the following statement is true or false for Internetwork layer. 1).Other internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP. 2). Internet Protocol (IP) is the least important protocol in this layer ... 3.true C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : B. 1. true, 2. false, 3.true
Description : PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ………. A. application layer, e-mails. B. Network layer, packets C. application layer, packets D. network layer , e-mails
Last Answer : A. application layer, e-mails
Description : What does HTTPS stands for? A. Hyper Text Transmission Protocols B. Hyper Text Tile Protocols C. Hyper Text Transfer Protocol Secure D. None
Last Answer : C. Hyper Text Transfer Protocol Secure