Description : Standard Ethernet (10-Mbps) uses_______ encoding A) NRZ B) AMI C) Manchester D) differential Manchester
Last Answer : Manchester
Description : Which encoding method uses alternating positive and negative values for1s? A) NRZ-I B) RZ C) Manchester D) AMI
Last Answer : AMI
Description : Unipolar, bipolar, and polar encoding are typesof _______ encoding. A) line B) block C) NRZ D) Manchester
Last Answer : line
Description : The transmission signal coding method of TI carrier is called a. Bipolar b. NRZ c. Manchester d. Binary
Last Answer : Bipolar
Description : 100Base-T4 uses________line coding. A) NRZ B) 8B6T C) MLT-3 D) Manchester
Last Answer : 8B6T
Description : The minimum bandwidth of Manchester and differential Manchester is ____that of NRZ. A) the sameas B) twice C) thrice D) none of the above
Last Answer : twice
Description : The idea of RZ andthe ideaof NRZ-I are combined into the ________ scheme. A) Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)
Last Answer : differential Manchester
Description : The idea of RZ andthe ideaof NRZ-L are combined into the ________ scheme. A) Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)
Description : Two common scramblingtechniques are ________. A) NRZ and RZ B) AMI and NRZ C) B8ZS and HDB3 D) Manchester and differential Manchester
Last Answer : B8ZS and HDB3
Description : In Manchester anddifferential Manchester encoding, the transition at the middle of the bit is usedfor __________. A) bit transfer B) baud transfer C) synchronization D) none of the above
Last Answer : synchronization
Description : _____ encoding has a transition at the beginning of each 0 bit. A) RZ B) Manchester C) Differential Manchester D) All the above
Last Answer : Differential Manchester
Description : _____ encoding has a transition at the middle of each bit. A) RZ B) Manchester C) Differential Manchester D) All the above
Last Answer : All the above
Description : In Ethernet when Manchester encoding is used, the bit rate is: a. Half the baud rate. b. Twice the baud rate. c. Same as the baud rate. d. None of the above
Last Answer : a. Half the baud rate.
Description : In the MIME header field, ____describes how the object within the body was encoded in order that it be included in the message using a mail-safe form. a. content-type b. content-transfer-encoding c. content-description d. content-id
Last Answer : b. content-transfer-encoding
Description : In the MIME header field____describes how the object within the body is to be interpreted. a. content-type b. content-transfer-encoding c. content-description d. content-id
Last Answer : a. content-type
Description : The transformer signal coding method for T1 carrier is A. Binary B. NRZ C. Manchester D. Bipolar
Last Answer : D. Bipolar
Description : What are the four widely used variations of the NRZ encoding method?
Last Answer : a. Non-return-to-zero level (NRZ-L). b. Enhanced non-return-to-zero level (E-NRZ-L). c. Non-return-to-zero mark (NRZ-M). d. Non-return-to-zero space (NRZ-S).
Description : In Manchester encoding, does a low-to-high light level transition occurring in the middle of the bit duration represent a binary 1 or a binary 0?
Last Answer : Binary 0.
Description : 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ
Last Answer : 8B/10B; NRZ
Description : 100Base-FX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ-I B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ
Last Answer : 4B/5B; NRZ-I
Description : 100Base-TX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ
Last Answer : 4B/5B; MLT-3
Description : In______, the changeor lackof change in the level of the voltagedetermines the value of the bit. A) NRZ-I B) NRZ-L C) both (a)and (b) D) neither (a) nor (b)
Last Answer : NRZ-I
Description : In_____, the level of the voltagedetermines the valueof the bit. A) NRZ-I B) NRZ-L C) both (a) and (b) D) neither (a) nor (b)
Last Answer : NRZ-L
Description : 1000Base-T uses________line coding. A) 4D-PAM5 B) 8B6T C) MLT-3 D) Manchester
Last Answer : 4D-PAM5
Description : In___________ thereis alwaysa transition at the middle of the bit, but thebit values are determined at the beginningof the bit. If the nextbit is 0, there is a transition; if the next bit is 1, there is none. A) Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)
Description : In_______encoding, the duration of the bit is divided into twohalves. Thevoltage remains at one level during thefirst half and moves to the other level in the second half. The transition at the middle of the bit ... Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)
Last Answer : both (a) and (b)
Description : The sharing of a medium and its link by two or more devices is called _______. A) modulation B) encoding C) line discipline D) multiplexing
Last Answer : multiplexing
Description : In ATM, the _____ layer defines thetransmission medium,bit transmission,encoding, and electrical-to-optical transformation. A) physical B) ATM layer C) AAL D) none of the above
Last Answer : physical
Description : The ASCII encoding of binary data is called a. base 64 encoding b. base 32 encoding c. base 16 encoding d. base 8 encoding
Last Answer : a. base 64 encoding
Description : What are the three most popular methods for encoding digital data onto magnetic disks?
Last Answer : a. Frequency modulation (FM). b. Modified frequency modulation (MFM). c. Run length limited (RLL).
Description : Which of the eight methods for encoding digital data onto magnetic tape is most widely used because it’s accurate, simple, and reliable?
Last Answer : Non-return-to-zero (NRZ) encoding.
Description : _____ is an ideaor concept that isa precursor to an Internet standard. A) RCF B) RFC C) ID D) none of the above
Last Answer : RCF
Description : You are working with a network thathas the network ID 192.168.10.0. What subnet should you use that supportsup to 25 hosts and a maximum number of subnets? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248 E. 255.255.255.252
Last Answer : 255.255.255.224
Description : What partof 192.168.10.51 is the Network ID, assuming a default subnet mask? A. 192 B. 192.168.10 C. 0.0.0.5 D. 51 E. None of the above
Last Answer : 192.168.10
Description : An application process is assigned a process identifier number (process ID), which is likely to be _______ each time that process is started. A. Similar B. smaller C. different D. larger
Last Answer : C. different
Description : The IETF standards documents that describe various protocols applicable to the working of the Internet are called ________ a) RFC b) RCF c) ID d) DFC
Last Answer : a) RFC
Description : How can the loss of timing occur in NRZ line coding?
Last Answer : If long strings of 1s or 0s are present causing a lack of level transitions.
Description : In NRZ code, does the presence of a high-light level in the bit duration represent a binary 1 or a binary 0?
Last Answer : Binary 1.
Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time
Last Answer : Sequential and random
Description : We discussed ______ popular controlled-access methods. A) two B) three C) four D) none of the above
Last Answer : three
Description : In _______ methods,a stationcannot send unless it hasbeen authorized byother stations. A) random access B) controlledaccess C) channelization D) none of the above
Last Answer : controlledaccess
Description : In _______ methods, the stations consult one another tofind which station has the right to send. A) random access B) controlledaccess C) channelization D) none of the above
Description : In ___________ methods, no station is superior to another station and none is assigned the controlover another. A) random access B) controlledaccess C) channelization D) none of the above
Last Answer : random access
Description : We have categorizedaccess methods into _______ groups. A) two B) three C) four D) five
Description : Gigabit Ethernet access methods include _______ mode. A) half-duplex B) full-duplex C) both (a) and (b) D) neither (a) nor (b)
Description : Traditionally, _____ methods of switching have been important. A) four B) three C) five D) six
Description : There arethree sampling methods: __________. A) quantized, sampled, and ideal B) ideal, sampled, andflat-top C) ideal, natural, and flat-top D) none of the above
Last Answer : ideal, natural, and flat-top
Description : I'd like to provide some business ethics training for my employees, but I'm not sure where to start. Can anyone help?
Last Answer : ManagementHelp.org is a great resource for many things, including business ethics training. Check out their free guide. Robert Our company makes a series of online gaming products to teach ... ddesigned by a Professor from Regis University who is a lawyer teaching business and healthcare ethics.
Description : Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port C. Console D. LLC E. Telnet F.
Last Answer : Aux Port
Description : Before a disk drive can access any sector record, a computer program has to provide the record’s disk address. What information does this address specify? a. Track number b. Sector number c. Surface number d. All of above
Last Answer : Track number