Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes
Last Answer : a. Checksum
Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes
Last Answer : A. Checksum
Description : Is the cyclic redundancy check better than hamming code?
Last Answer : It depends on what you are doing.The cyclic redundancy check will only detect an error, while thehamming code can also correct many types of errors. However toperform this correction the extra ... channels, disk sectors).Normally hamming code is done on individual bytes or words ofcomputer memory.
Description : . In cyclic redundancy checking, the divisor is _______the CRC. A) The same size as B) one bit less than C) one bit more than D) none of the above
Last Answer : one bit more than
Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check
Last Answer : a. piggybacking
Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check
Last Answer : A. piggybacking
Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum
Last Answer : Simple parity check
Description : The layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation
Last Answer : A) Physical
Description : To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block code must be _______ A. 5 B. 6 C. 11 D. none of the above
Last Answer : B. 6
Description : The divisor in a cyclic code is normally called the _________. A) degree B) generator C) redundancy D) none of the above
Last Answer : generator
Description : CRC stands for __________ a. cyclic redundancy check b. code repeat check c. code redundancy check d. cyclic repeat check
Last Answer : a. cyclic redundancy check
Description : CRC stands for __________ A. cyclic redundancy check B. code repeat check C. code redundancy check D. cyclic repeat check
Last Answer : A. cyclic redundancy check
Description : The probability thata singlebit will be inerror on a typical public telephone lineusing 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error ratefor a communicationline using 9-bit frames is ... to A. 0.003 B. 0.009 C. 0.991 D. 0.999 E. None of the above
Last Answer : 0.009
Description : Bit stuffing refers to a. inserting a 0 in user stream to differentiate it with a flag b. inserting a 0 in flag stream to avoid ambiguity c. appending a nipple to the flag sequence d. appending a nipple to the use data stream
Last Answer : a. inserting a 0 in user stream to differentiate it with a flag
Description : _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. a. Hamming Code b. CRC c. VRC d. None of the above
Last Answer : b. CRC
Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction
Last Answer : d. Error detection and correction
Description : The ________ modeprovides synchronizationfor the entire stream of bits must. In other words, it guarantees that the data arrive ata fixed rate. A) synchronous B) asynchronous C) isochronous D) none of the above
Last Answer : isochronous
Description : The term 'duplex' refers to theability of the data receiving stations toecho back aconfirming messageto the sender. Infull duplex data transmission, both the sender and the receiver A. cannot talk at once B. can ... data one ata time D. can do one way data transmission only E. None of the above
Last Answer : can do one way data transmission only
Description : A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of 01111110. If the output bit-string after stuffing is 01111100101, then the input bit-string is a. 0111110100 b. 0111110101 c. 0111111101 d. 0111111111
Last Answer : b. 0111110101
Description : High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-pointand multipoint links. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above
Last Answer : bit-oriented
Description : _____codes arespecial linear block codes with one extraproperty. If a codeword is rotated, the result is another codeword. A) Non-linear B) Convolution C) Cyclic D) none of the above
Last Answer : Cyclic
Description : The ............layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation
Description : The............ layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation
Description : In the Ethernet frame, the_______field contains error detection information. A) CRC B) preamble C) address D) none of the above
Last Answer : CRC
Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum
Last Answer : Checksum
Description : Block coding can help in _______at the receiver. A) Synchronization B) Error detection C) Attenuation D) (a) and (b)
Last Answer : (a) and (b)
Description : Which of the following refers to theterms "residual error rate"? A. the number of biterrors per twenty four hours of continuous operation onanasynchronous line B. The probability that one or moreerrors ... tonoise ratio dividedby the ratio of energy perbit to noise per hertz E. None of the above
Last Answer : The probability that one or moreerrors will be undetected whenan error detection scheme is used
Description : Which error detection method uses one's complement arithmetic? A. Simple parity check B. Two-dimensional parity check C. CRC D. Checksum
Last Answer : D. Checksum
Description : Define Error Detection and Correction. Mention the types of errors.
Last Answer : Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. Single bit error: The only one bit of a given data unit (such as byte character/data unit or packet) is ... error: 2 or more bits in the data unit have changed from 1 to 0 from 0 to 1.
Description : Which of the following function is useful in system requiring error detection and correction codes ? (A) AND-OR (B) OR (C) AND (D) Exclusive -OR
Last Answer : Which of the following function is useful in system requiring error detection and correction codes ? (A) AND-OR (B) OR (C) AND (D) Exclusive -OR
Description : In a frame transmission, CRC stands for (A) Code Renewable Check (B) Cyclic Redundancy Check (C) Control and Refresh Code (D) Cyclic Refreshing of CPU
Last Answer : (B) Cyclic Redundancy Check
Description : In_______transmission, bits aretransmittedover asingle wire, one ata time. A) asynchronous serial B) synchronous serial C) parallel D) (a) and (b)
Description : Which of the following statements is correct for the use of packet switching? A. the subdivision of information into individuallyaddressed packets in conjunction with alternativerouting arrangementenabled the transmission path ... capacity could be achieved. D. All of theabove E. None of the above
Last Answer : All of theabove
Description : How many 8-bit characters can be transmitted per second over a 9600 baud serial communication link using asynchronous mode of transmission with one start bit, eight data bits, two stop bits, and one parity bit ? a. 600 b. 800 c. 876 d. 1200
Last Answer : b. 800
Description : The layer that transmits data in the form of bit streams using electrical and mechanicalsystems is in the OSI model. a. Physical layer b. Transport Layer c. Network Layer d. Data Link Layer
Last Answer : a. Physical layer
Description : In Bluetooth, the_____ link is used when avoiding latency (delay in data delivery) is more important than integrity (error-free delivery). A) SCO B) ACL C) ACO D) SCL
Last Answer : SCO
Description : At the data link layer, Frame Relayusesa protocol that supports _____control. A) flow B) error C) either (a) or (b D) neither (a) nor (b)
Last Answer : neither (a) nor (b)
Description : Which among the following represents the objectives/requirements of Data Link Layer? a. Frame Synchronization b. Error & Flow Control c. Both a & b d. None of the above
Last Answer : c. Both a & b
Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. error control sublayer
Last Answer : b. media access control sublayer
Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. error control sublayer
Last Answer : B. media access control sublayer
Description : Don't know what to do ??
Last Answer : Need Answer
Description : In block coding, ifn = 5, the maximum Hamming distance between two codewords is ________. A) 2 B) 3 C) 5 D) none of the above
Last Answer : 5
Description : The Hamming distance between 100 and 001 is ________. A) 2 B) 0 C) 1 D) none of the above
Last Answer : 2
Description : The Hamming distance between equal codewords is _________. A) 1 B) n C) 0 D) none of the above
Last Answer : 0
Description : To guarantee correction ofup to 5 errors in all cases, the minimum Hamming distance in a block code must be________. A) 5 B) 6 C) 11 D) none of the above
Last Answer : 11
Description : To guarantee the detectionof up to 5errors in all cases, the minimum Hamming distance in a block code mustbe _______. A) 5 B) 6 C) 11 D) none of the above
Last Answer : 6
Description : The ________ between two words is the number ofdifferences between corresponding bits. A) Hamming code B) Hamming distance C) Hamming rule D) none of the above
Last Answer : Hamming distance
Description : To guarantee correction of upto t errors, the minimum Hamming distance d min in a block code must be ________. a. t+1 b. t−2 c. 2t−1 d. 2t+1
Last Answer : d. 2t+1
Description : Coding schemes can be divided into two broad categories…………, …… A. character coding, integer coding B. hamming coding and block coding C. Hamming coding and convolution coding D. Block Coding and Convolution Coding.
Last Answer : D. Block Coding and Convolution Coding.
Description : Thus hamming code for the ASCII character “a” is given as ……………… A. 10111001111 B. 10111001000 C. 10111001001 D. 10111001
Last Answer : C. 10111001001