Which of the following encoding methods does not provide for synchronization?
A)
NRZ-L
B)
RZ
C)
NRZ-I
D)
Manchester

1 Answer

Answer :

NRZ-L

Related questions

Description : Standard Ethernet (10-Mbps) uses_______ encoding A) NRZ B) AMI C) Manchester D) differential Manchester

Last Answer : Manchester

Description : Which encoding method uses alternating positive and negative values for1s? A) NRZ-I B) RZ C) Manchester D) AMI

Last Answer : AMI

Description : Unipolar, bipolar, and polar encoding are typesof _______ encoding. A) line B) block C) NRZ D) Manchester

Last Answer : line

Description : The transmission signal coding method of TI carrier is called a. Bipolar b. NRZ c. Manchester d. Binary

Last Answer : Bipolar

Description : 100Base-T4 uses________line coding. A) NRZ B) 8B6T C) MLT-3 D) Manchester

Last Answer : 8B6T

Description : The minimum bandwidth of Manchester and differential Manchester is ____that of NRZ. A) the sameas B) twice C) thrice D) none of the above

Last Answer : twice

Description : The idea of RZ andthe ideaof NRZ-I are combined into the ________ scheme. A) Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)

Last Answer : differential Manchester

Description : The idea of RZ andthe ideaof NRZ-L are combined into the ________ scheme. A) Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)

Last Answer : Manchester

Description : Two common scramblingtechniques are ________. A) NRZ and RZ B) AMI and NRZ C) B8ZS and HDB3 D) Manchester and differential Manchester

Last Answer : B8ZS and HDB3

Description : In Manchester anddifferential Manchester encoding, the transition at the middle of the bit is usedfor __________. A) bit transfer B) baud transfer C) synchronization D) none of the above

Last Answer : synchronization

Description : _____ encoding has a transition at the beginning of each 0 bit. A) RZ B) Manchester C) Differential Manchester D) All the above

Last Answer : Differential Manchester

Description : _____ encoding has a transition at the middle of each bit. A) RZ B) Manchester C) Differential Manchester D) All the above

Last Answer : All the above

Description : In Ethernet when Manchester encoding is used, the bit rate is: a. Half the baud rate. b. Twice the baud rate. c. Same as the baud rate. d. None of the above

Last Answer : a. Half the baud rate.

Description : In the MIME header field, ____describes how the object within the body was encoded in order that it be included in the message using a mail-safe form. a. content-type b. content-transfer-encoding c. content-description d. content-id

Last Answer : b. content-transfer-encoding

Description : In the MIME header field____describes how the object within the body is to be interpreted. a. content-type b. content-transfer-encoding c. content-description d. content-id

Last Answer : a. content-type

Description : The transformer signal coding method for T1 carrier is A. Binary B. NRZ C. Manchester D. Bipolar

Last Answer : D. Bipolar

Description : What are the four widely used variations of the NRZ encoding method?

Last Answer : a. Non-return-to-zero level (NRZ-L). b. Enhanced non-return-to-zero level (E-NRZ-L). c. Non-return-to-zero mark (NRZ-M). d. Non-return-to-zero space (NRZ-S).

Description : In Manchester encoding, does a low-to-high light level transition occurring in the middle of the bit duration represent a binary 1 or a binary 0?

Last Answer : Binary 0.

Description : 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 8B/10B; NRZ

Description : 100Base-FX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ-I B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 4B/5B; NRZ-I

Description : 100Base-TX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 4B/5B; MLT-3

Description : In______, the changeor lackof change in the level of the voltagedetermines the value of the bit. A) NRZ-I B) NRZ-L C) both (a)and (b) D) neither (a) nor (b)

Last Answer : NRZ-I

Description : In_____, the level of the voltagedetermines the valueof the bit. A) NRZ-I B) NRZ-L C) both (a) and (b) D) neither (a) nor (b)

Last Answer : NRZ-L

Description : 1000Base-T uses________line coding. A) 4D-PAM5 B) 8B6T C) MLT-3 D) Manchester

Last Answer : 4D-PAM5

Description : In___________ thereis alwaysa transition at the middle of the bit, but thebit values are determined at the beginningof the bit. If the nextbit is 0, there is a transition; if the next bit is 1, there is none. A) Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)

Last Answer : differential Manchester

Description : In_______encoding, the duration of the bit is divided into twohalves. Thevoltage remains at one level during thefirst half and moves to the other level in the second half. The transition at the middle of the bit ... Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)

Last Answer : both (a) and (b)

Description : The sharing of a medium and its link by two or more devices is called _______. A) modulation B) encoding C) line discipline D) multiplexing

Last Answer : multiplexing

Description : In ATM, the _____ layer defines thetransmission medium,bit transmission,encoding, and electrical-to-optical transformation. A) physical B) ATM layer C) AAL D) none of the above

Last Answer : physical

Description : The ASCII encoding of binary data is called a. base 64 encoding b. base 32 encoding c. base 16 encoding d. base 8 encoding

Last Answer : a. base 64 encoding

Description : What are the three most popular methods for encoding digital data onto magnetic disks?

Last Answer : a. Frequency modulation (FM). b. Modified frequency modulation (MFM). c. Run length limited (RLL).

Description : Which of the eight methods for encoding digital data onto magnetic tape is most widely used because it’s accurate, simple, and reliable?

Last Answer : Non-return-to-zero (NRZ) encoding.

Description : _____ is an ideaor concept that isa precursor to an Internet standard. A) RCF B) RFC C) ID D) none of the above

Last Answer : RCF

Description : You are working with a network thathas the network ID 192.168.10.0. What subnet should you use that supportsup to 25 hosts and a maximum number of subnets? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248 E. 255.255.255.252

Last Answer : 255.255.255.224

Description : What partof 192.168.10.51 is the Network ID, assuming a default subnet mask? A. 192 B. 192.168.10 C. 0.0.0.5 D. 51 E. None of the above

Last Answer : 192.168.10

Description : An application process is assigned a process identifier number (process ID), which is likely to be _______ each time that process is started. A. Similar B. smaller C. different D. larger

Last Answer : C. different

Description : The IETF standards documents that describe various protocols applicable to the working of the Internet are called ________ a) RFC b) RCF c) ID d) DFC

Last Answer : a) RFC

Description : How can the loss of timing occur in NRZ line coding?

Last Answer : If long strings of 1s or 0s are present causing a lack of level transitions.

Description : In NRZ code, does the presence of a high-light level in the bit duration represent a binary 1 or a binary 0?

Last Answer : Binary 1.

Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time

Last Answer : Sequential and random

Description : We discussed ______ popular controlled-access methods. A) two B) three C) four D) none of the above

Last Answer : three

Description : In _______ methods,a stationcannot send unless it hasbeen authorized byother stations. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : In _______ methods, the stations consult one another tofind which station has the right to send. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : In ___________ methods, no station is superior to another station and none is assigned the controlover another. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : random access

Description : We have categorizedaccess methods into _______ groups. A) two B) three C) four D) five

Last Answer : three

Description : Gigabit Ethernet access methods include _______ mode. A) half-duplex B) full-duplex C) both (a) and (b) D) neither (a) nor (b)

Last Answer : both (a) and (b)

Description : Traditionally, _____ methods of switching have been important. A) four B) three C) five D) six

Last Answer : three

Description : There arethree sampling methods: __________. A) quantized, sampled, and ideal B) ideal, sampled, andflat-top C) ideal, natural, and flat-top D) none of the above

Last Answer : ideal, natural, and flat-top

Description : I'd like to provide some business ethics training for my employees, but I'm not sure where to start. Can anyone help?

Last Answer : ManagementHelp.org is a great resource for many things, including business ethics training. Check out their free guide. Robert Our company makes a series of online gaming products to teach ... ddesigned by a Professor from Regis University who is a lawyer teaching business and healthcare ethics.

Description : Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port C. Console D. LLC E. Telnet F.

Last Answer : Aux Port

Description : Before a disk drive can access any sector record, a computer program has to provide the record’s disk address. What information does this address specify? a. Track number b. Sector number c. Surface number d. All of above

Last Answer : Track number