Description : An example of an analog communication method is a. laser beam b. microwave c. voice grade telephone line d. all of the above
Last Answer : all of the above
Description : The pieceof hardware that converts your computer'sdigital signal to ananalog signal that cantravel over telephone lines is called (A) red wire (B) blue cord (C) tower (D) modem (E) None of these
Last Answer : modem
Description : What are the datatransmission channels availablefor carrying datafrom one location to another? A. Narrowband B. Voice band C. Broadband D. All of theabove E. None of the above
Last Answer : All of theabove
Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above
Last Answer : protecting data indata communication systems
Description : The packets switching concept was first proposed A. in the late1980s for the Defense Ministry of US. B. in the early 1960s for military communication systems, mainly to handle speech C. in the late 1950s for Defense Ministry of US D. All of theabove E. None of the above
Last Answer : in the early 1960s for military communication systems, mainly to handle speech
Description : The geostationary satelliteused for communication systems A. rotates with the earth B. remains stationary relative to theearth C. is positioned overequator D. All of theabove E. None of the above
Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above
Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above
Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments
Description : Which of the following is not a transmission medium? a. telephone lines b. coaxial cables c. modem d. microwave systems
Last Answer : microwave systems
Description : To connect a computer with a device inthe same room, you might be likely to use A. a coaxial cable B. a dedicated line C. a groundstation D. All of theabove E. None of the above
Last Answer : a coaxial cable
Description : Which of the following transmission systems provide the highest data rate to in individual device? a. computer bus b. telephone lines c. voice and mode d. lease lines
Last Answer : computer bus
Description : To connect a computer with a device inthe same room, you might be likely to use A. a coaxial cable B. a dedicated line C. a groundstation D. All of theabove
Description : ________uses four pairsof voice-grade, or higher, twisted-pair cable. A) 100Base-TX B) 100Base-FX C) 100Base-T4 D) none of the above
Last Answer : 100Base-T4
Description : BSNL land line telephone network is an example of a network. A. Packet switched B. Circuit switched C. Bit switched D. Line switched
Last Answer : B. Circuit switched
Description : A local telephone network is an example of a _______ network. a) Packet switched b) Circuit switched c) Bit switched d) Line switched
Last Answer : b) Circuit switched
Description : A local telephone network is an example of a network. a. Packet switched b. Circuit switched c. Bit switched d. Line switched
Last Answer : b. Circuit switched
Description : Which of hte following is considered a broad band communication channel? a. coaxial cable b. fiber optics cable c. microwave circuits d. all of above
Last Answer : all of above
Description : The channel in the data communication model can be a. postal mail services b. telephone lines c. radio lines d. any of the above
Last Answer : any of the above
Description : A command that lets youchange one or more fields in a record is A. Insert B. Modify C. Look-up D. All of theabove E. None of the above
Last Answer : Modify
Description : The database administration function includes A. application programming B. computer operations management C. databaseaccessplanning D. All of theabove E. None of the above
Last Answer : databaseaccessplanning
Description : In SQL, the CREATE TABLESPACE isused A. to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace B. to createa database trigger C. to add/rename data files, to change storage D. All of theabove E. None of the above
Last Answer : to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace
Description : Which commandis usedto selectdistinct subject (SUB) from thetable (BOOK)? A. SELECT ALL FROM BOOK B. SELECT DISTINCT SUB FROM BOOK C. SELECT SUB FROM BOOK D. All of theabove E. None of the above
Last Answer : SELECT DISTINCT SUB FROM BOOK
Description : In SQL, which commandis used to select only onecopy of each setof duplicablerows A. SELECT DISTINCT B. SELECT UNIQUE C. SELECT DIFFERENT D. All of theabove E. None of the above
Last Answer : SELECT DISTINCT
Description : . In order to use arecord management system A. You needto understand thelow-level details of how informationin stored B. You needto understand the model the record management system uses. C. Both (a)and (b) D. All of theabove E. None of the above
Last Answer : You needto understand the model the record management system uses.
Description : Queries to a database A. are written in English B. can use aggregatefunctions like SUM and COUNT C. both (a)and (b) D. All of theabove E. None of the above
Last Answer : can use aggregatefunctions like SUM and COUNT
Description : A logical schema A. is the entire database B. is a standard wayof organizing information into accessible parts C. describes how data is actually stored on disk D. All of theabove E. None of the above
Last Answer : is a standard wayof organizing information into accessible parts
Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove
Description : Subschema can be used to A. create very different, personalized views of the samedata B. present information in different formats C. hide sensitive informationby omitting fields from thesub¬schema's description D. All of theabove E. None of the above
Description : In SQL, which command(s) is(are) used to change atable's storage characteristics? A. ALTER TABLE B. MODIFY TABLE C. CHANGE TABLE D. All of theabove E. None of the abov
Last Answer : ALTER TABLE
Description : Goals for the design of thelogical schema include A. avoiding data inconsistency B. being ableto construct queries easily C. being ableto access data efficiently D. All of theabove E. None of the above
Description : . In SQL, which command(s) is(are) usedto recompilea storedfunction? A. SET FUNCTION B. SET STORED FUNCTION C. ALTER FUNCTION D. All of theabove E. None of the above
Last Answer : ALTER FUNCTION
Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above
Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files
Description : In SQL, the command(s) is (are)used tocreate an index for atable or cluster A. CREATE INDEX B. MODIFY INDEX C. SET INDEX TO FILE D. All of theabove E. None of the above
Last Answer : CREATE INDEX
Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame
Description : Devices interconnected by the LAN should include A. Computers and terminals B. mass storage device, printers and plotters C. bridges and gateways D. All of theabove E. None of the above
Description : Which of the following statement is incorrect? A. The Addresses Resolution Protocol, ARP, allows a host to find the physicaladdress ofa target host on the samephysical network, given only the target IP address. ... -addresses of our choice to every machine. D. All of theabove E. None of the above
Description : A central computer surrounded by one or more satellite computers is called a A. bus network B. ring network C. star network D. All of theabove E. None of the above
Last Answer : star network
Description : An anticipated result from multiprogramming operations is: A. reducedcomputer idle time B. the handling of more jobs C. better schedulingof work D. All of theabove E. None of the above
Description : Compared to analog signals, digital signals A. allow faster transmission B. are moreaccurate C. both (a)and (b) D. All of theabove E. None of the above
Last Answer : both (a)and (b)
Description : Which of the following statements is correct for the use of packet switching? A. the subdivision of information into individuallyaddressed packets in conjunction with alternativerouting arrangementenabled the transmission path ... capacity could be achieved. D. All of theabove E. None of the above
Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size
Description : The largest portionof the bandwidth for ADSLcarries_______. A) voice communication B) upstream data C) downstream data D) control data
Last Answer : downstream data
Description : If an Ethernet destination address is08:07:06:05:44:33, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove
Last Answer : unicast
Description : f an Ethernet destination address is07:01:02:03:04:05, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove
Last Answer : multicast
Description : Membership in a VLAN can be based on _________. A) port numbers B) MAC addresses C) IP addresses D) all of theabove
Last Answer : all of theabove
Description : A repeater is a connecting devicethat operates in the _______ layer of theInternet model. A) physical B) data link C) network D) all of theabove
Last Answer : physical
Description : In Go-Back-N ARQ, if frames 4,5, and 6 are received successfully, thereceiver may send an ACK _______ to thesender. A) 5 B) 6 C) 7 D) any of theabove
Last Answer : 7
Description : In______ schemes, the voltagesare on the both sidesof the time axis. Forexample, thevoltage level for 0 can bepositive and thevoltage level for 1 can be negative. A) polar B) bipolar C) unipolar D) all of theabove
Last Answer : polar
Description : Ina _____scheme,all the signal levels are onone sideof the time axis,either above or below. A) polar B) bipolar C) unipolar D) all of theabove
Last Answer : unipolar
Description : _________can impair a signal. A) Attenuation B) Distortion C) Noise D) All of theabove