Description : The _____schemeuses data patterns of size 2 and encodes the 2-bit patterns as one signal element belonging to a four-level signal. A) 4B5B B) 2B1Q C) MLT-3 D) none of the above
Last Answer : 2B1Q
Description : Information can betransferred betweenthe DBMS and a A. spreadsheet program B. word processor program C. graphicsprogram D. AH of the above E. None of the above
Last Answer : AH of the above
Description : HDSL encodes datausing _______. A) 4B/5B B) 2B1Q C) 1B2Q D) 6B/8T
Description : 1000Base-T uses________line coding. A) 4D-PAM5 B) 8B6T C) MLT-3 D) Manchester
Last Answer : 4D-PAM5
Description : 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ
Last Answer : 8B/10B; NRZ
Description : 100Base-T4 uses________line coding. A) NRZ B) 8B6T C) MLT-3 D) Manchester
Last Answer : 8B6T
Description : 100Base-FX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ-I B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ
Last Answer : 4B/5B; NRZ-I
Description : 100Base-TX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ
Last Answer : 4B/5B; MLT-3
Description : The Internet addresses are ______ bits in length in IPV4 addressing scheme A. 16 B. 64 C. 32 D. 48
Last Answer : C. 32
Description : In IEEE 802.11, astation with ________ mobility can move from one ESS toanother. A) no-transition B) BSS-transition C) ESS-transition D) none of the above
Last Answer : ESS-transition
Description : In IEEE 802.11, astation with ________mobility can move from one BSS toanother, but the movement is confined inside one ESS. A) no-transition B) BSS-transition C) ESS-transition D) none of the above
Last Answer : no-transition
Description : A ______ can move a part of DNA to another place on the chromosome. a. translation. b. transferon c. transposon d. transition e. transcription
Last Answer : c. transposon
Description : ______ is based oncoding theory and uses sequencesof numbers called chips. A) FDMA B) TDMA C) CDMA D) none of the above
Last Answer : CDMA
Description : ______ uses two optical fibers and a short-wave laser source, A) 1000Base-SX B) 1000Base-LX C) 1000Base-T D) none of the above
Last Answer : 1000Base-LX
Description : In___________ thereis alwaysa transition at the middle of the bit, but thebit values are determined at the beginningof the bit. If the nextbit is 0, there is a transition; if the next bit is 1, there is none. A) Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)
Last Answer : differential Manchester
Description : _____ encoding has a transition at the beginning of each 0 bit. A) RZ B) Manchester C) Differential Manchester D) All the above
Last Answer : Differential Manchester
Description : The idea of RZ andthe ideaof NRZ-I are combined into the ________ scheme. A) Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)
Description : The idea of RZ andthe ideaof NRZ-L are combined into the ________ scheme. A) Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)
Last Answer : Manchester
Description : In SQL, the CREATE TABLESPACE isused A. to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace B. to createa database trigger C. to add/rename data files, to change storage D. All of theabove E. None of the above
Last Answer : to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace
Description : Which of the following refers to theterms "residual error rate"? A. the number of biterrors per twenty four hours of continuous operation onanasynchronous line B. The probability that one or moreerrors ... tonoise ratio dividedby the ratio of energy perbit to noise per hertz E. None of the above
Last Answer : The probability that one or moreerrors will be undetected whenan error detection scheme is used
Description : The Internet addresses are ……….. bits in length in IPV4 addressing scheme a. 16 b. 64 c. 48 d. 32
Last Answer : d. 32
Description : In IEEE 802.11, astation with ________ mobility iseither stationary (not moving) or moving only insidea BSS. A) no-transition B) BSS-transition C) ESS-transition D) none of the above
Description : In Manchester anddifferential Manchester encoding, the transition at the middle of the bit is usedfor __________. A) bit transfer B) baud transfer C) synchronization D) none of the above
Last Answer : synchronization
Description : In_______encoding, the duration of the bit is divided into twohalves. Thevoltage remains at one level during thefirst half and moves to the other level in the second half. The transition at the middle of the bit ... Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)
Last Answer : both (a) and (b)
Description : _____ encoding has a transition at the middle of each bit. A) RZ B) Manchester C) Differential Manchester D) All the above
Last Answer : All the above
Description : State the two kinds of events trigger a state transition.
Last Answer : A segment arrives from the peer. ∙ The local application process invokes an operation on TCP.
Description : The dimensions of modulus of elasticity are a.MLT-2 b.107 dynes c.MLT-1 d.ML-2T-1 e.ML-1T-2
Last Answer : e. ML-1T-2
Description : The dimensions of gravitational constant G a.MLT-2 b.M-1L3T-2 c.Ellipsc d.ML2T-1 e.MLT-1
Last Answer : b. M-1L3T-2
Description : Te dimensions of frequency are a.107 dynes b.MLT c.L-1 d.T-1 e.L-1T-1
Last Answer : d. T-1
Description : The dimension MLT–2 corresponds to (1) force (2) work done (3) acceleration (4) velocity
Last Answer : force
Description : In_______encoding, we use three levels: positive, zero, and negative. A) unipolar B) bipolar C) polar D) none of the above
Last Answer : bipolar
Description : Inslotted ALOHA, the vulnerable time is ______ the frame transmissiontime. A) the sameas B) two times C) three times D) none of the above
Last Answer : the sameas
Description : In a three-stage space division switch, if N = 200, the number of crosspoints is ______. A) 40,000 B) greater than 40,000 C) less than40,000 D) greater than 100,000
Last Answer : ess than40,00
Description : An STS multiplexer is a ______ device. A) one-layer B) two-layer C) three-layer D) four-layer
Last Answer : two-layer
Description : A pure ALOHA Network transmits 200 bit frames using a shared channel with 200 Kbps bandwidth. If the system (all stations put together) produces 500 frames per second, then the throughput of the system is ______. a. 0.384 b. 0.184 c. 0.286 d. 0.58
Last Answer : b. 0.184
Description : Transmission control protocol ___________ a. is a connection-oriented protocol b. uses a three way handshake to establish a connection c. receives data from application as a single stream d. all of the mentioned
Last Answer : d. all of the mentioned
Description : Transmission control protocol is a) connection oriented protocol b) uses a three way handshake to establish a connection c) recievs data from application as a single stream d) all of the mentioned
Last Answer : d) all of the mentioned
Description : Ina _____scheme,all the signal levels are onone sideof the time axis,either above or below. A) polar B) bipolar C) unipolar D) all of theabove
Last Answer : unipolar
Description : The signal which has infinitely many levels of intensity over a period of time is called ……… A. digital signal B. analog signal C. both a and b D. sound signal
Last Answer : A. digital signal
Description : A protocol is a set of rules governing a time sequence of events that must take place a. between peers b. between an interface c. between modems d. across an interface
Last Answer : between peers
Description : A ________ is a set of rules that governs data communication. A) forum B) protocol C) standard D) none of the above
Last Answer : protocol
Description : Error rate is A. an error-detectingcode based ona summation operation performed onthebits to be checked. B. a checkbit appended to anarrayof binary digits to make thesum of all thebinary digits. C. a ... ratioof the number ofdata units in error to the total number of dataunits E. None of the above
Last Answer : the ratioof the number ofdata units in error to the total number of dataunits
Description : Application layer protocol defines ____ a.types of messages exchanged b.message format, syntax and semantics c.rules for when and how processes send and respond to messages d.all of the mentioned
Last Answer : d.all of the mentioned
Description : A set of rules that governs data communication is called a. Protocols b. Standards c. RFCs d. Servers
Last Answer : a. Protocols
Description : ------------------- is a set of rules governing the format and meaning of the packets, or messages that are exchanged by the peer entities within a layer. a. Interface b. Reference model c. Protocol d. None of these
Last Answer : c. Protocol
Description : What refers generally to any type of fraud or scheme that uses one or more components of the Internet?
Last Answer : The generic term is 'cybercrime'.
Description : What are the uses of EMTR scheme?
Last Answer : 1. To restore class III when class IV supply fails. 2. To extend supply to class II when UPS fails. 3. In one DG condition to load restoration. 4. Sub sequent restoration of large motor loads.
Description : In what state of matter transition do water molecules move the least?
Last Answer : In what state of matter transition do water molecules move theleast?
Description : Which committee recommended the establishment of the scheme of ‘democratic decentralization’, which finally came to be known as Panchayati Raj? a. Balwant Rai Mehta Committee b. Ajay Chitnis Committee c. L M Sanghvi Committee d. G V K Rao Committee
Last Answer : a. Balwant Rai Mehta Committee