Transmission of computerized data from one location to another is called
A.
data transfer
B.
data flow
C.
data communication
D.
data management
E.
None of the above

1 Answer

Answer :

data communication

Related questions

Description : ………….. gives defining the flow of the data through and organization or a company or series of tasks that may or may not represent computerized processing. A) System process B) System flowchart C) System design D) Structured System

Last Answer : B) System flowchart

Description : Which of the following statement is incorrect? a. The difference between synchronous and asynchronous transmission is the clocking derived from the data in synchronous transmission. b. Half ... in online activities d. Batch processing is the prefered processing mode for telecommunication operation.

Last Answer : Batch processing is the prefered processing mode for telecommunication operation.

Description : How many 8-bit characters can be transmitted per second over a 9600 baud serial communication link using asynchronous mode of transmission with one start bit, eight data bits, two stop bits, and one parity bit ? a. 600 b. 800 c. 876 d. 1200

Last Answer : b. 800

Description : There arecertain packages that allow people to define data items, place these items in particular records, combine therecords into designated files and then manipulate and retrieve the storeddata. What arethey ... (DBMS) C. Batch processingsystem D. Data communication package E. None of the above

Last Answer : Database management system (DBMS)

Description : What is the name of the softwarepackage that allows peopleto sendelectronic mail along anetworkof computers and workstations? A. Memory residentpackage B. Project management package C. Data communication package D. Electronic mail package E. None of the above

Last Answer : Data communication package

Description : What type of communication media is the most widely usedcabling for data transfer today? A) Cat 5 B) Twisted pair C) Coaxial D) Optical fiber

Last Answer : Cat 5

Description : _________control inthe datalink layer is based on automatic repeat request, which is the retransmission of data. A) Flow B) Error C) Transmission D) none of the above

Last Answer : Transmission

Description : Which of the following is required to communicate between two computers? a. communications software b. protocol c. communication hardware d. all of above including access to transmission medium

Last Answer : all of above including access to transmission medium

Description : Communication between acomputer and a keyboardinvolves______________ transmission. A) simplex B) half-duplex C) full-duplex D) automatic

Last Answer : simplex

Description : A communication between a computer and a keyboard involves ____________ transmission. a) simplex b) half duplex c) full duplex d) semi-duplex

Last Answer : a) simplex

Description : What does PPTP stand for ? Point to Point Transmission Protocol Point to Point Transfer Protocol Point to Point Tunneling Protocol Point to Point Traffic Protoco

Last Answer : Point to Point Tunneling Protocol

Description : FTP stands for A) File transfer protocol B) File transmission protocol C) Form transfer protocol D) Form transmission protocol

Last Answer : A) File transfer protocol

Description : Silly Window Syndrome is related to a. Error during transmission b. File transfer protocol c. Degrade in TCP performance d. Interface problem

Last Answer : c. Degrade in TCP performance

Description : What does HTTPS stands for? A. Hyper Text Transmission Protocols B. Hyper Text Tile Protocols C. Hyper Text Transfer Protocol Secure D. None

Last Answer : C. Hyper Text Transfer Protocol Secure

Description : If you want to connect toyour owncomputer throughthe Internet from another location, you can use– (A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these

Last Answer : Telnet

Description : What are the datatransmission channels availablefor carrying datafrom one location to another? A. Narrowband B. Voice band C. Broadband D. All of theabove E. None of the above

Last Answer : All of theabove

Description : An endpoint of an inter-process communication flow across a computer network is called a. socket b. pipe c. port d. machine

Last Answer : a. socket

Description : An endpoint of an inter-process communication flow across a computer network is called a. socket b. pipe c. port d. machine

Last Answer : a. socket

Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above

Last Answer : Layer 7 protocols

Description : Secondary data CANNOT be obtained from : 1. trade journals 2. government reports 3. Yellow pages 4. surveys 5. computerized databases

Last Answer : surveys

Description : Primary data are BEST described as the : 1. first batch of data collected for a specific study 2. data that are observed, recorded, or collected from respondents 3. data that were compiled for ... than the current study 4. data that are collected from a computerized database 5. none of these

Last Answer : data that are observed, recorded, or collected from respondents

Description : The smallest unit of computerized data is referred as ____.  a) Bit b) Byte c) Both (a) and (b) d) None of the above

Last Answer : The smallest unit of computerized data is referred as Bit.

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : The functions of a Logical Link Layer (LLC) are a. Error control b. Flow control c. Creating and managing the communication link between two devices with the help of the Transport layer. d. All the above

Last Answer : d. All the above

Description : In asynchronous serial communication the physical layer provides ___________ a. start and stop signalling b. flow control c. both start & stop signalling and flow control d. only start signalling

Last Answer : c. both start & stop signalling and flow control

Description : The functions of a Logical Link Layer (LLC) are ___. A. Error control B. Flow control C. Creating and managing the communication link between two devices with the help of the Transport layer. D. All the above

Last Answer : D. All the above

Description : IGMP is_______protocol. A) an error reporting B) a group management C) a transmission D) noneof the above

Last Answer : a group management

Description : _______ control refers to aset of proceduresused torestrict the amount ofdata that the sender can send before waiting foracknowledgment. A) Flow B) Error C) Transmission D) none of the above

Last Answer : Flow

Description : What is the minimum number of wires needed to send data over a serial communication link layer? a. 1 b. 2 c. 4 d. 6 e. none of above

Last Answer : 2

Description : Which data communication method is used to transmit the data over a serial communication link? a. simplex b. half-duplex c. full-duplex d. b and c e. None of above

Last Answer : full-duplex

Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above

Last Answer : protecting data indata communication systems

Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above

Last Answer : C) Mail service

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : The term 'duplex' refers to theability of the data receiving stations toecho back aconfirming messageto the sender. Infull duplex data transmission, both the sender and the receiver A. cannot talk at once B. can ... data one ata time D. can do one way data transmission only E. None of the above

Last Answer : can do one way data transmission only

Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access

Last Answer : Serial access

Description : Which of the following will happen when data is entered into a memory location? a. It will add to the content of the location b. It will change the address of the memory location c. It will erase the previous content d. It will not be fruitful if there is already some data at the location

Last Answer : It will erase the previous content

Description : Which of the following registers is used to keep track of address of the memory location where the next instruction is located? a. Memory address register b. Memory data register c. Instruction register d. Program counter

Last Answer : Program counter

Description : Which of the following registers is loaded with the contents of the memory location pointed by the PC? a. Memory address registers b. Memory data registers c. Instruction register d. Program counter

Last Answer : Instruction register

Description : In_________ transmission, we send bits oneafter another without startor stop bits or gaps. It is the responsibilityof the receiver togroup the bits. A) synchronous B) asynchronous C) isochronous D) none of the abov

Last Answer : synchronous

Description : A set of rules that governs data communication is called a. Protocols b. Standards c. RFCs d. Servers

Last Answer : a. Protocols

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : When 2 or more bits in a data unit has been changed during the transmission, the error is called _____ a. random error b. burst error c. inverted error d. double error

Last Answer : b. burst error

Description : When 2 or more bits in a data unit has been changed during the transmission, the error is called ____________ A. random error B. burst error C. inverted error D. double error

Last Answer : B. burst error

Description : The channel in the data communication model can be a. postal mail services b. telephone lines c. radio lines d. any of the above

Last Answer : any of the above

Description : Which of the following statement is incorrect? a. Multiplexers are designed to accept data from several I/O devices and transmit a unified stream of data on one communication line b. HDLC is a standard ... indicates that it is ready to accept data d. RTS/CTS is the way the terminal indicates ringing

Last Answer : RTS/CTS is the way the DTE indicates that it is ready to transmit data and the way the DCW indicates that it is ready to accept data

Description : High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-pointand multipoint links. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above

Last Answer : bit-oriented

Description : The largest portionof the bandwidth for ADSLcarries_______. A) voice communication B) upstream data C) downstream data D) control data

Last Answer : downstream data

Description : A ________ is a set of rules that governs data communication. A) forum B) protocol C) standard D) none of the above

Last Answer : protocol

Description : When internet data leaves your campus, it normallygoes toa(n) ______ before moving towardits destination. A) Internet backbone B) Networkaccesspoint C) Base station D) Communication system

Last Answer : Networkaccesspoint