An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as
A.
Frame check sequence
B.
Error detecting code
C.
Checksum
D.
flow control
E.
None of the above

1 Answer

Answer :

Frame check sequence

Related questions

Description : Error rate is A. an error-detectingcode based ona summation operation performed onthebits to be checked. B. a checkbit appended to anarrayof binary digits to make thesum of all thebinary digits. C. a ... ratioof the number ofdata units in error to the total number of dataunits E. None of the above

Last Answer : the ratioof the number ofdata units in error to the total number of dataunits

Description : Which of the following summation operations is performed onthe bits to checkanerror-detecting code? A. Codec B. Coder-decoder C. Checksum D. Attenuation

Last Answer : Checksum

Description : If the frame to be transmitted is 1101011011 and the CRC polynomial to be used for generating checksum is x 4+ x + 1, then what is the transmitted frame? a. 11010110111011 b. 11010110111101 c. 11010110111110 d. 11010110111001

Last Answer : c. 11010110111110

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check

Last Answer : a. piggybacking

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check

Last Answer : A. piggybacking

Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Simple parity check

Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Checksum

Description : Which error detection method uses one's complement arithmetic? A. Simple parity check B. Two-dimensional parity check C. CRC D. Checksum

Last Answer : D. Checksum

Description : Which of the following statements is TRUE? a. Both Ethernet frame and IP packet include checksum fields b. Ethernet frame includes a checksum field and IP packet includes a CRC field c. Ethernet ... and IP packet includes a checksum field d. Both Ethernet frame and IP packet include CRC fields

Last Answer : Ethernet frame includes a CRC field and IP packet includes a checksum field

Description : Which of the following is not a field in TCP header? a. Sequence number b. Fragment offset c. Checksum d. Window size

Last Answer : b. Fragment offset

Description : Which among the following represents the objectives/requirements of Data Link Layer? a. Frame Synchronization b. Error & Flow Control c. Both a & b d. None of the above

Last Answer : c. Both a & b

Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above

Last Answer : Provision of sequence number in the header of message

Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes

Last Answer : a. Checksum

Description : Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to verification for ICMP messages? a. Type b. Code c. Checksum d. All of the above

Last Answer : c. Checksum

Description : In IPv6,options are inserted between the _________and the ___________ data. A) baseheader;extensionheader B) baseheader;upper-layer data C) base header; frame header D) noneof the abov

Last Answer : baseheader;upper-layer data

Description : In IPv6, options are inserted between the _________ and the ___________ data A. base header; extension header B. base header; upper-layer data C. base header; frame header D. none of the above

Last Answer : B. base header; upper-layer data

Description : The information tobe communicated ina data communications system is the_______. A) Medium B) Protocol C) Message D) Transmission

Last Answer : Message

Description : At the data link layer, Frame Relayusesa protocol that supports _____control. A) flow B) error C) either (a) or (b D) neither (a) nor (b)

Last Answer : neither (a) nor (b)

Description : Find the transmitted code if the frame is (MSB) 1101011011 (LSB) and generator polynomial is x4 + x + 1. A. 1101011011 1110 B. 1101011111 1110 C. 1101011011 1111 D. 1101011011

Last Answer : A. 1101011011 1110

Description : Which category of HDLC frames undergoes error and flow control mechanisms by comprising send and receive sequence numbers? a. Uframes b. Iframes c. Sframes d. All of the above

Last Answer : Sframes

Description : What is the lastaddress of a blockof classless addresses ifone of the addresses is 12.2.2.6/30? A) 12.2.2.2 B) 12.2.2.6 C) 12.2.2.7 D) none of the above

Last Answer : 12.2.2.7

Description : What is the lastaddress of a blockof classless addresses ifone of the addresses is 12.2.2.127/28? A) 12.2.2.16 B) 12.2.2.112 C) 12.2.2.127 D) none of the above

Last Answer : 12.2.2.127

Description : ____ is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer.

Last Answer : UDP

Description : _____defines how a particular pattern to be interpreted,and whataction is tobe taken based on that interpretation. A) Semantics B) Syntax C) Timing D) None of the abov

Last Answer : Semantics

Description : The IPv4header field formerly knownas the service type field is now calledthe _______ field. A) IETF B) checksum C) differentiatedservices D) noneof the above

Last Answer : differentiatedservices

Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D

Last Answer : c. C

Description : the maximum window size for data transmission using the selective reject protocol with n-bit frame sequence numbers is: a. 2^n b. 2^(n-1) c. 2^n – 1 d. 2^(n-2)

Last Answer : b. 2^(n-1)

Description : The layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation

Last Answer : A) Physical

Description : In which layer of OSI session is first check and then data is transmitted a. Application layer b. Presentation layer c. Session layer d. Transport layer

Last Answer : c. Session layer

Description : DNS can obtain the of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : In SONET, for each frame, the bytes are transmitted __________. A) from left to the right, top to bottom B) from right to theleft, bottom to top C) from left to the right, bottom to top D) from right to the left, top to bottom

Last Answer : from left to the right, bottom to top

Description : Ductal lavage is used for a) women at higher risk for benign proliferative breast disease. Performed in the doctor's office, a microcatheter is inserted through the nipple while instilling saline ... risk for benign proliferative breast disease; it is not specific for women with breast implants.

Last Answer : a) women at higher risk for benign proliferative breast disease. Performed in the doctor's office, a microcatheter is inserted through the nipple while instilling saline and retrieving the fluid ... population and has been found to be adept at detecting cellular changes within the breast tissue.

Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes

Last Answer : A. Checksum 

Description : has the property that corrupting or garbling a code word will likely produce a bit string that is not a code word: a. Error deleting codes b. Error detecting codes c. Error string codes

Last Answer : b. Error detecting codes

Description : A code that is used to correct error is calledan a. Error detecting code b. Error correcting code c. Both d. None of these

Last Answer : b. Error correcting code

Description : In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called a. Preamble b. Postamble c. Jam d. None of the above

Last Answer : c. Jam

Description : The checksum of0000 and0000 is__________. A) 1111 B) 0000 C) 1110 D) 0111

Last Answer : 0111

Description : The checksum of1111 and1111 is_________. A) 1111 B) 0000 C) 1110 D) 0111

Last Answer : 1110

Description : UDP packets are called as _________ a. Segments b. Checksum c. Frames d. Datagrams

Last Answer : d. Datagrams

Description : Which one of the following fields of an IP header is NOT modified by a typical IP router? a. Checksum b. Source address c. Time to Live (TTL) d. Length

Last Answer : b. Source address

Description : Define checksum. What are the steps followedinchecksumgenerator?

Last Answer : The error detection method used by the higher layer protocol iscalledchecksum. Checksumisbased on redundancy. a) Units are divided into k sections eachof n bits. b) All sectionsareaddedtogetherusing ... get the sum. c) The sumis complemented andbecomethechecksum.d)Thechecksumissent with the data.

Description : The range of sequence number which is the concern of the receiver is called the receive sliding window. A. receive sliding window. B. sliding window C. frame buffer D. both a and b

Last Answer : A. receive sliding window.

Description : PIM-SM is usedin a _______multicastenvironment such asa WAN. A) dense B) sparse C) a or b D) none of the above

Last Answer : sparse

Description : In the Ethernet frame, the_______field contains error detection information. A) CRC B) preamble C) address D) none of the above

Last Answer : CRC

Description : Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x) to detect odd number of bits in error? a. G(x) contains more than two terms b. G(x) does ... exceeding the frame length c. 1+x is a factor of G(x) d. G(x) has an odd number of terms

Last Answer : c. 1+x is a factor of G(x)

Description : When does the station B send a positive acknowledgement (ACK) to station A in Stop and Wait protocol? a. only when no error occurs at the transmission level b. when retransmission of old packet in a novel frame is necessary c. only when station B receives frame with errors d. all of the above

Last Answer : only when no error occurs at the transmission level

Description : When does the station B send a positive acknowledgement (ACK) to station A in Stop and Wait protocol? a. only when no error occurs at the transmission level b. when retransmission of old packet in a novel frame is necessary c. only when station B receives frame with errors d. all of the above

Last Answer : only when no error occurs at the transmission level

Description : The purpose of the _______is to provide flow and error control for the upper-layer protocols that actually demand theseservices A) MAC B) LLC C) LLU D) none of the above

Last Answer : LLC