Which of the following summation operations is performed onthe bits to checkanerror-detecting code?
A.
Codec
B.
Coder-decoder
C.
Checksum
D.
Attenuation

1 Answer

Answer :

Checksum

Related questions

Description : An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above

Last Answer : Frame check sequence

Description : Error rate is A. an error-detectingcode based ona summation operation performed onthebits to be checked. B. a checkbit appended to anarrayof binary digits to make thesum of all thebinary digits. C. a ... ratioof the number ofdata units in error to the total number of dataunits E. None of the above

Last Answer : the ratioof the number ofdata units in error to the total number of dataunits

Description : The vehicle through which the coded message is transmitted from the source to the receiver is called a(n) A)coder. B)decoder. C)encoder. D)relay channel. E)medium of transmission.

Last Answer : E)medium of transmission.

Description : Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to verification for ICMP messages? a. Type b. Code c. Checksum d. All of the above

Last Answer : c. Checksum

Description : The hardware that does this isan ___ a. Error detecting decoder b. Error correcting decoder c. Both d. None of these

Last Answer : b. Error correcting decoder

Description : Most popular modems availableare based onthe ________standards. A) V-series B) X-series C) VX-series D) none of the above

Last Answer : V-series

Description : Based onthe Clos criteria, if N = 200, then the minimum number of crosspoints isgreater thanor equal to _______. A) 15,200 B) 18,000 C) 42,000 D) 20,000

Last Answer : 15,200

Description : Based onthe Clos criteria, if N = 200, then k mustbe equal to or greater than____. A) 21 B) 19 C) 31 D) 41

Last Answer : 19

Description : Based onthe Clos criteria, if N = 200, then n mustbe equal to or greater than____. A) 10 B) 20 C) 30 D) 40

Last Answer : 10

Description : In the multimedia contents, coding and decoding is performed by a software component known as _______. a) codec b) modec c) sodec d) bodec

Last Answer : a) codec

Description : In the multimedia contents, coding and decoding is performed by a software component known as: a. codec b. modec c. sodec

Last Answer : a. codec

Description : Actual data processing operations are performed in the arithmetic logic section, but not in the “. Storage section of a processor unit a. Primary b. Accumulator c. Buffer d. Secondary

Last Answer : Primary

Description : Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - ... * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data

Last Answer : Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits Data xx bits

Description : The checksum of0000 and0000 is__________. A) 1111 B) 0000 C) 1110 D) 0111

Last Answer : 0111

Description : The checksum of1111 and1111 is_________. A) 1111 B) 0000 C) 1110 D) 0111

Last Answer : 1110

Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Simple parity check

Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Checksum

Description : The IPv4header field formerly knownas the service type field is now calledthe _______ field. A) IETF B) checksum C) differentiatedservices D) noneof the above

Last Answer : differentiatedservices

Description : DNS can obtain the of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : Which of the following is not a field in TCP header? a. Sequence number b. Fragment offset c. Checksum d. Window size

Last Answer : b. Fragment offset

Description : UDP packets are called as _________ a. Segments b. Checksum c. Frames d. Datagrams

Last Answer : d. Datagrams

Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes

Last Answer : a. Checksum

Description : Which one of the following fields of an IP header is NOT modified by a typical IP router? a. Checksum b. Source address c. Time to Live (TTL) d. Length

Last Answer : b. Source address

Description : Which of the following statements is TRUE? a. Both Ethernet frame and IP packet include checksum fields b. Ethernet frame includes a checksum field and IP packet includes a CRC field c. Ethernet ... and IP packet includes a checksum field d. Both Ethernet frame and IP packet include CRC fields

Last Answer : Ethernet frame includes a CRC field and IP packet includes a checksum field

Description : If the frame to be transmitted is 1101011011 and the CRC polynomial to be used for generating checksum is x 4+ x + 1, then what is the transmitted frame? a. 11010110111011 b. 11010110111101 c. 11010110111110 d. 11010110111001

Last Answer : c. 11010110111110

Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above

Last Answer : Provision of sequence number in the header of message

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check

Last Answer : a. piggybacking

Description : Which error detection method uses one's complement arithmetic? A. Simple parity check B. Two-dimensional parity check C. CRC D. Checksum

Last Answer : D. Checksum

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check

Last Answer : A. piggybacking

Description : Define checksum. What are the steps followedinchecksumgenerator?

Last Answer : The error detection method used by the higher layer protocol iscalledchecksum. Checksumisbased on redundancy. a) Units are divided into k sections eachof n bits. b) All sectionsareaddedtogetherusing ... get the sum. c) The sumis complemented andbecomethechecksum.d)Thechecksumissent with the data.

Description : It is used to encode the minimum amount of speech information necessary to reproduce a perceptible message with a fewer bits that those needed by a conventional encoder/decoder

Last Answer : vocoders

Description : A structure that stores a number of bits taken "together as a unit" is a a. gate b. mux c. decoder d. register

Last Answer : d. register

Description : Number of bits per symbol used in Baudot code is a. 7 b. 5 c. 8 d. 9

Last Answer : 5

Description : The ________ between two words is the number ofdifferences between corresponding bits. A) Hamming code B) Hamming distance C) Hamming rule D) none of the above

Last Answer : Hamming distance

Description : _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. a. Hamming Code b. CRC c. VRC d. None of the above

Last Answer : b. CRC

Description : Let C be a binary linear code with minimum distance 2t + 1 then it can correct upto _____ bits of error. a. t + 1 b. t c. t - 2 d. t / 2

Last Answer : b. t

Description : Which type of Sframe in HDLC exhibit the correspondence of last three bits [N(R)] by defining the negative acknowledgement (NAK) number with the code value of '01'? a. Receive ready b. Receive not ready c. Reject d. Selective Reject

Last Answer : c. Reject

Description : The ________ between two words is the number of differences between corresponding bits A. Hamming code B. Hamming distance C. Hamming rule D. none of the above

Last Answer : B. Hamming distance

Description : Ductal lavage is used for a) women at higher risk for benign proliferative breast disease. Performed in the doctor's office, a microcatheter is inserted through the nipple while instilling saline ... risk for benign proliferative breast disease; it is not specific for women with breast implants.

Last Answer : a) women at higher risk for benign proliferative breast disease. Performed in the doctor's office, a microcatheter is inserted through the nipple while instilling saline and retrieving the fluid ... population and has been found to be adept at detecting cellular changes within the breast tissue.

Description : The proper definition of a modern digital computer is a. An electronic automated machine that can solve problems involving words and numbers b. A more sophistic and modified electronic pocket calculator c. Any machine that can perform mathematical operations d. A machine that works on binary code

Last Answer : A machine that works on binary code

Description : The loss in signal power as light travels down the fiber is called a. attenuation b. progragation c. scattering d. interruption

Last Answer : attenuation

Description : Block coding can help in _______at the receiver. A) Synchronization B) Error detection C) Attenuation D) (a) and (b)

Last Answer : (a) and (b)

Description : _________can impair a signal. A) Attenuation B) Distortion C) Noise D) All of theabove

Last Answer : All of theabove

Description : _______ is a typeof transmission impairment in which an outside sourcesuch as crosstalk corrupts asignal. A) Attenuation B) Distortion C) Noise D) Decibel

Last Answer : Noise

Description : ________ is a typeof transmission impairment in which the signal loses strength due to the different propagation speeds of each frequency that makes up the signal. A) Attenuation B) Distortion C) Noise D) Decibel

Last Answer : Distortion

Description : ________ is a typeof transmission impairment in which the signal loses strength due to theresistance of the transmission medium. A) Attenuation B) Distortion C) Noise D) Decibel

Last Answer : Attenuation

Description : Computers cannot communicate with each other directly over telephone lines because they usedigitalpulses whereas telephone lines useanalog sound frequencies. What is the name of the device which permits digital to analog ... A. Interface B. Modem C. Attenuation D. Teleprocessor E. None of the above

Last Answer : Modem

Description : The loss in signal power as light travels down the fiber is called ............. A) Attenuation B) Propagation C) Scattering D) Interruption

Last Answer : A) Attenuation

Description : Attenuation and noise can impair a signal. True False

Last Answer : True

Description : why Novelty Chemicals bought a Motor Vehicle for$110,000 on January 5, 2016. The estimated usefullife of the vehicle is ten years. The disposal valueis estimated at $10,000. Annual depreciation is onthe straight line method?

Last Answer : Novelty Chemicals bought a Motor Vehicle for$110,000 on January 5, 2016. The estimated usefullife of the vehicle is ten years. The disposal valueis estimated at $10,000. Annual ... for annualdepreciation.d) The Balance Sheet extracts for motor vehicle and itsrelated depreciation.full question