Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum
Last Answer : Checksum
Description : Which error detection method uses one's complement arithmetic? A. Simple parity check B. Two-dimensional parity check C. CRC D. Checksum
Last Answer : D. Checksum
Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check
Last Answer : a. piggybacking
Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check
Last Answer : A. piggybacking
Description : In the Ethernet frame, the_______field contains error detection information. A) CRC B) preamble C) address D) none of the above
Last Answer : CRC
Description : An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above
Last Answer : Frame check sequence
Description : Which of the following statements is TRUE? a. Both Ethernet frame and IP packet include checksum fields b. Ethernet frame includes a checksum field and IP packet includes a CRC field c. Ethernet ... and IP packet includes a checksum field d. Both Ethernet frame and IP packet include CRC fields
Last Answer : Ethernet frame includes a CRC field and IP packet includes a checksum field
Description : If the frame to be transmitted is 1101011011 and the CRC polynomial to be used for generating checksum is x 4+ x + 1, then what is the transmitted frame? a. 11010110111011 b. 11010110111101 c. 11010110111110 d. 11010110111001
Last Answer : c. 11010110111110
Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes
Last Answer : a. Checksum
Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization
Last Answer : cyclic redundancy codes
Description : Which of the following is associated with error detector? a. Odd parity bit b. Even parity bit c. Both of the above d. None of above
Last Answer : Both of the above
Description : How many 8-bit characters can be transmitted per second over a 9600 baud serial communication link using asynchronous mode of transmission with one start bit, eight data bits, two stop bits, and one parity bit ? a. 600 b. 800 c. 876 d. 1200
Last Answer : b. 800
Description : A simple parity-check code can detect __________ errors A. an even-number of B. two C. no errors D. an odd-number of
Last Answer : D. an odd-number of
Description : The probability thata singlebit will be inerror on a typical public telephone lineusing 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error ratefor a communicationline using 9-bit frames is ... to A. 0.003 B. 0.009 C. 0.991 D. 0.999 E. None of the above
Last Answer : 0.009
Description : In CRC if the data unit is 100111001 and the divisor is 1011 then what is dividend at the receiver? a. 100111001101 b. 100111001011 c. 100111001 d. 100111001110
Last Answer : b. 100111001011
Description : . In cyclic redundancy checking, the divisor is _______the CRC. A) The same size as B) one bit less than C) one bit more than D) none of the above
Last Answer : one bit more than
Description : Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x) to detect odd number of bits in error? a. G(x) contains more than two terms b. G(x) does ... exceeding the frame length c. 1+x is a factor of G(x) d. G(x) has an odd number of terms
Last Answer : c. 1+x is a factor of G(x)
Description : _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. a. Hamming Code b. CRC c. VRC d. None of the above
Last Answer : b. CRC
Description : We addr redundant bits toeach block to make thelength n = k + r. The resultingn-bit blocksare called _________. A) datawords B) blockwords C) codewords D) none of the above
Last Answer : codewords
Description : We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called _________ A. datawords B. blockwords C. codewords D. none of the above
Last Answer : C. codewords
Description : . ________ is the process in which the receiver tries to guess the message by using redundant bits A. Connection-Oriented Service B. Forward error correction C. both a and b D. Confirm
Last Answer : B. Forward error correction
Description : Which of the following refers to theterms "residual error rate"? A. the number of biterrors per twenty four hours of continuous operation onanasynchronous line B. The probability that one or moreerrors ... tonoise ratio dividedby the ratio of energy perbit to noise per hertz E. None of the above
Last Answer : The probability that one or moreerrors will be undetected whenan error detection scheme is used
Description : CRC stands for __________ a. cyclic redundancy check b. code repeat check c. code redundancy check d. cyclic repeat check
Last Answer : a. cyclic redundancy check
Description : CRC stands for __________ A. cyclic redundancy check B. code repeat check C. code redundancy check D. cyclic repeat check
Last Answer : A. cyclic redundancy check
Description : The layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation
Last Answer : A) Physical
Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction
Last Answer : d. Error detection and correction
Description : Instructions and memory address are represented by a. Character code b. Binary codes c. Binary word d. Parity bit
Last Answer : Binary codes
Description : Characteristic of a good test A. Reasonable probability of catching an error and can be redundant B. It is not simple or too complex C. Reasonable probability of catching an error and cannot be redundant D. It is either simple or too complex
Last Answer : C. Reasonable probability of catching an error and cannot be redundant
Description : Which of the following is associated with error detector? A) Odd parity bit B) Even parity bit C) Both of the above D) None of above
Last Answer : Answer : C
Last Answer : c. Both of the above
Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above
Last Answer : Provision of sequence number in the header of message
Description : Each check bit is grouped with the information bits as specified by a__ a. Parity check code b. Parity check matrix c. Parity check bit d. All of these
Last Answer : b. Parity check matrix
Description : Given code word 1110001010 is to be transmitted with even parity check bit. The encoded word to be transmitted for this code is (A) 11100010101 (B) 11100010100 (C) 1110001010 (D) 111000101
Last Answer : (A) 11100010101
Description : Parity bit check is used to
Last Answer : Parity bit check is used to Detect 1 bit error
Description : Block coding can help in _______at the receiver. A) Synchronization B) Error detection C) Attenuation D) (a) and (b)
Last Answer : (a) and (b)
Description : Define Error Detection and Correction. Mention the types of errors.
Last Answer : Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. Single bit error: The only one bit of a given data unit (such as byte character/data unit or packet) is ... error: 2 or more bits in the data unit have changed from 1 to 0 from 0 to 1.
Description : Method of managing advertising budget at a certain percentage of sales price per unit or forecasted sales of products is classified as A. percentage of sales method B. affordable method C. competitive parity method D. objective and task method
Last Answer : A. percentage of sales method
Description : How many bytes of data can be sent in 15 seconds over a serial link with baud rate of 9600 in asynchronous mode with odd parity and two stop bits in the frame? a. 10,000 bytes b. 12,000 bytes c. 15,000 bytes d. 27,000 bytes
Last Answer : b. 12,000 bytes
Description : ____ is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer.
Last Answer : UDP
Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes
Last Answer : A. Checksum
Description : How many characters per sec (7 bits + 1 parity ) can be transmitted over a 2400 bps line if the transfer is synchronous (1 start and 1 stop bit)?
Last Answer : 1. 300 2. 240 3. 250 4. 275 Ans- 2400/(7+1+2) 240
Description : What is the main difference between DDCMP and SDLC? a. DDCMP does not need special hardware to final the beginning of a message b. DDCMP has a message header c. SDLC has a IP address d. SDLC does not use CRC
Last Answer : DDCMP does not need special hardware to final the beginning of a message
Description : In the Ethernet, the _______field is actually added at the physical layer and isnot (formally)part of the frame. A) CRC B) preamble C) address D) none of the above
Last Answer : preamble
Description : The message 11001001 is to be transmitted using the CRC polynomial x^3 + 1 to protect it from errors. The message that should be transmitted is: a. 11001001000 b. 11001001011 c. 11001010 d. 110010010011
Last Answer : b. 11001001011
Description : Write short notes on CRC checker.
Last Answer : After receiving the data appended with the CRC it does the same modulo-2 division. If the remainder is all 0’s the CRC is dropped and the data accepted. Otherwise, the received stream of bits is discarded and the data are resent.
Description : What is used to identify whether a data word has an odd or even number of 1’s ? (1) Carry bit (2) Sign bit (3) Zero bit (4) Parity bit
Last Answer : Parity bit
Description : Assuming 8 bits for data, 1 bit for parity, I start bit and 2 stop bits, the number of characters that 1200 BPS communication line can transmit is
Last Answer : Assuming 8 bits for data, 1 bit for parity, I start bit and 2 stop bits, the number of characters that 1200 BPS communication line can transmit is 12CPS.
Description : The checksum of0000 and0000 is__________. A) 1111 B) 0000 C) 1110 D) 0111
Last Answer : 0111
Description : The checksum of1111 and1111 is_________. A) 1111 B) 0000 C) 1110 D) 0111
Last Answer : 1110
Description : The IPv4header field formerly knownas the service type field is now calledthe _______ field. A) IETF B) checksum C) differentiatedservices D) noneof the above
Last Answer : differentiatedservices