Description : An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above
Last Answer : Frame check sequence
Description : Error rate is A. an error-detectingcode based ona summation operation performed onthebits to be checked. B. a checkbit appended to anarrayof binary digits to make thesum of all thebinary digits. C. a ... ratioof the number ofdata units in error to the total number of dataunits E. None of the above
Last Answer : the ratioof the number ofdata units in error to the total number of dataunits
Description : The vehicle through which the coded message is transmitted from the source to the receiver is called a(n) A)coder. B)decoder. C)encoder. D)relay channel. E)medium of transmission.
Last Answer : E)medium of transmission.
Description : Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to verification for ICMP messages? a. Type b. Code c. Checksum d. All of the above
Last Answer : c. Checksum
Description : The hardware that does this isan ___ a. Error detecting decoder b. Error correcting decoder c. Both d. None of these
Last Answer : b. Error correcting decoder
Description : Most popular modems availableare based onthe ________standards. A) V-series B) X-series C) VX-series D) none of the above
Last Answer : V-series
Description : Based onthe Clos criteria, if N = 200, then the minimum number of crosspoints isgreater thanor equal to _______. A) 15,200 B) 18,000 C) 42,000 D) 20,000
Last Answer : 15,200
Description : Based onthe Clos criteria, if N = 200, then k mustbe equal to or greater than____. A) 21 B) 19 C) 31 D) 41
Last Answer : 19
Description : Based onthe Clos criteria, if N = 200, then n mustbe equal to or greater than____. A) 10 B) 20 C) 30 D) 40
Last Answer : 10
Description : In the multimedia contents, coding and decoding is performed by a software component known as _______. a) codec b) modec c) sodec d) bodec
Last Answer : a) codec
Description : In the multimedia contents, coding and decoding is performed by a software component known as: a. codec b. modec c. sodec
Last Answer : a. codec
Description : Actual data processing operations are performed in the arithmetic logic section, but not in the “. Storage section of a processor unit a. Primary b. Accumulator c. Buffer d. Secondary
Last Answer : Primary
Description : Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - ... * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data
Last Answer : Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits Data xx bits
Description : The checksum of0000 and0000 is__________. A) 1111 B) 0000 C) 1110 D) 0111
Last Answer : 0111
Description : The checksum of1111 and1111 is_________. A) 1111 B) 0000 C) 1110 D) 0111
Last Answer : 1110
Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum
Last Answer : Simple parity check
Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum
Last Answer : Checksum
Description : The IPv4header field formerly knownas the service type field is now calledthe _______ field. A) IETF B) checksum C) differentiatedservices D) noneof the above
Last Answer : differentiatedservices
Description : DNS can obtain the of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum
Last Answer : B) IP address
Description : Which of the following is not a field in TCP header? a. Sequence number b. Fragment offset c. Checksum d. Window size
Last Answer : b. Fragment offset
Description : UDP packets are called as _________ a. Segments b. Checksum c. Frames d. Datagrams
Last Answer : d. Datagrams
Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes
Last Answer : a. Checksum
Description : Which one of the following fields of an IP header is NOT modified by a typical IP router? a. Checksum b. Source address c. Time to Live (TTL) d. Length
Last Answer : b. Source address
Description : Which of the following statements is TRUE? a. Both Ethernet frame and IP packet include checksum fields b. Ethernet frame includes a checksum field and IP packet includes a CRC field c. Ethernet ... and IP packet includes a checksum field d. Both Ethernet frame and IP packet include CRC fields
Last Answer : Ethernet frame includes a CRC field and IP packet includes a checksum field
Description : If the frame to be transmitted is 1101011011 and the CRC polynomial to be used for generating checksum is x 4+ x + 1, then what is the transmitted frame? a. 11010110111011 b. 11010110111101 c. 11010110111110 d. 11010110111001
Last Answer : c. 11010110111110
Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above
Last Answer : Provision of sequence number in the header of message
Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check
Last Answer : a. piggybacking
Description : Which error detection method uses one's complement arithmetic? A. Simple parity check B. Two-dimensional parity check C. CRC D. Checksum
Last Answer : D. Checksum
Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check
Last Answer : A. piggybacking
Description : Define checksum. What are the steps followedinchecksumgenerator?
Last Answer : The error detection method used by the higher layer protocol iscalledchecksum. Checksumisbased on redundancy. a) Units are divided into k sections eachof n bits. b) All sectionsareaddedtogetherusing ... get the sum. c) The sumis complemented andbecomethechecksum.d)Thechecksumissent with the data.
Description : It is used to encode the minimum amount of speech information necessary to reproduce a perceptible message with a fewer bits that those needed by a conventional encoder/decoder
Last Answer : vocoders
Description : A structure that stores a number of bits taken "together as a unit" is a a. gate b. mux c. decoder d. register
Last Answer : d. register
Description : Number of bits per symbol used in Baudot code is a. 7 b. 5 c. 8 d. 9
Last Answer : 5
Description : The ________ between two words is the number ofdifferences between corresponding bits. A) Hamming code B) Hamming distance C) Hamming rule D) none of the above
Last Answer : Hamming distance
Description : _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. a. Hamming Code b. CRC c. VRC d. None of the above
Last Answer : b. CRC
Description : Let C be a binary linear code with minimum distance 2t + 1 then it can correct upto _____ bits of error. a. t + 1 b. t c. t - 2 d. t / 2
Last Answer : b. t
Description : Which type of Sframe in HDLC exhibit the correspondence of last three bits [N(R)] by defining the negative acknowledgement (NAK) number with the code value of '01'? a. Receive ready b. Receive not ready c. Reject d. Selective Reject
Last Answer : c. Reject
Description : The ________ between two words is the number of differences between corresponding bits A. Hamming code B. Hamming distance C. Hamming rule D. none of the above
Last Answer : B. Hamming distance
Description : Ductal lavage is used for a) women at higher risk for benign proliferative breast disease. Performed in the doctor's office, a microcatheter is inserted through the nipple while instilling saline ... risk for benign proliferative breast disease; it is not specific for women with breast implants.
Last Answer : a) women at higher risk for benign proliferative breast disease. Performed in the doctor's office, a microcatheter is inserted through the nipple while instilling saline and retrieving the fluid ... population and has been found to be adept at detecting cellular changes within the breast tissue.
Description : The proper definition of a modern digital computer is a. An electronic automated machine that can solve problems involving words and numbers b. A more sophistic and modified electronic pocket calculator c. Any machine that can perform mathematical operations d. A machine that works on binary code
Last Answer : A machine that works on binary code
Description : The loss in signal power as light travels down the fiber is called a. attenuation b. progragation c. scattering d. interruption
Last Answer : attenuation
Description : Block coding can help in _______at the receiver. A) Synchronization B) Error detection C) Attenuation D) (a) and (b)
Last Answer : (a) and (b)
Description : _________can impair a signal. A) Attenuation B) Distortion C) Noise D) All of theabove
Last Answer : All of theabove
Description : _______ is a typeof transmission impairment in which an outside sourcesuch as crosstalk corrupts asignal. A) Attenuation B) Distortion C) Noise D) Decibel
Last Answer : Noise
Description : ________ is a typeof transmission impairment in which the signal loses strength due to the different propagation speeds of each frequency that makes up the signal. A) Attenuation B) Distortion C) Noise D) Decibel
Last Answer : Distortion
Description : ________ is a typeof transmission impairment in which the signal loses strength due to theresistance of the transmission medium. A) Attenuation B) Distortion C) Noise D) Decibel
Last Answer : Attenuation
Description : Computers cannot communicate with each other directly over telephone lines because they usedigitalpulses whereas telephone lines useanalog sound frequencies. What is the name of the device which permits digital to analog ... A. Interface B. Modem C. Attenuation D. Teleprocessor E. None of the above
Last Answer : Modem
Description : The loss in signal power as light travels down the fiber is called ............. A) Attenuation B) Propagation C) Scattering D) Interruption
Last Answer : A) Attenuation
Description : Attenuation and noise can impair a signal. True False
Last Answer : True
Description : why Novelty Chemicals bought a Motor Vehicle for$110,000 on January 5, 2016. The estimated usefullife of the vehicle is ten years. The disposal valueis estimated at $10,000. Annual depreciation is onthe straight line method?
Last Answer : Novelty Chemicals bought a Motor Vehicle for$110,000 on January 5, 2016. The estimated usefullife of the vehicle is ten years. The disposal valueis estimated at $10,000. Annual ... for annualdepreciation.d) The Balance Sheet extracts for motor vehicle and itsrelated depreciation.full question