Description : The divisor in a cyclic code is normally called the _________. A) degree B) generator C) redundancy D) none of the above
Last Answer : generator
Description : CRC stands for __________ a. cyclic redundancy check b. code repeat check c. code redundancy check d. cyclic repeat check
Last Answer : a. cyclic redundancy check
Description : CRC stands for __________ A. cyclic redundancy check B. code repeat check C. code redundancy check D. cyclic repeat check
Last Answer : A. cyclic redundancy check
Description : In a frame transmission, CRC stands for (A) Code Renewable Check (B) Cyclic Redundancy Check (C) Control and Refresh Code (D) Cyclic Refreshing of CPU
Last Answer : (B) Cyclic Redundancy Check
Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization
Last Answer : cyclic redundancy codes
Description : In CRC if the data unit is 100111001 and the divisor is 1011 then what is dividend at the receiver? a. 100111001101 b. 100111001011 c. 100111001 d. 100111001110
Last Answer : b. 100111001011
Description : Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x) to detect odd number of bits in error? a. G(x) contains more than two terms b. G(x) does ... exceeding the frame length c. 1+x is a factor of G(x) d. G(x) has an odd number of terms
Last Answer : c. 1+x is a factor of G(x)
Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes
Last Answer : a. Checksum
Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check
Last Answer : a. piggybacking
Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check
Last Answer : A. piggybacking
Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum
Last Answer : Simple parity check
Description : _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. a. Hamming Code b. CRC c. VRC d. None of the above
Last Answer : b. CRC
Description : Is the cyclic redundancy check better than hamming code?
Last Answer : It depends on what you are doing.The cyclic redundancy check will only detect an error, while thehamming code can also correct many types of errors. However toperform this correction the extra ... channels, disk sectors).Normally hamming code is done on individual bytes or words ofcomputer memory.
Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes
Last Answer : A. Checksum
Description : Let G(x) be generator polynomial used for CRC checking. The condition that should be satisfied by G(x) to correct odd numbered error bits, will be: (1) (1+x) is factor of G(x) (2) (1-x) is factor of G(x) (3) (1+x2) is factor of G(x) (4) x is factor of G(x)
Last Answer : (1+x) is factor of G(x)
Description : What is the main difference between DDCMP and SDLC? a. DDCMP does not need special hardware to final the beginning of a message b. DDCMP has a message header c. SDLC has a IP address d. SDLC does not use CRC
Last Answer : DDCMP does not need special hardware to final the beginning of a message
Description : In the Ethernet frame, the_______field contains error detection information. A) CRC B) preamble C) address D) none of the above
Last Answer : CRC
Description : In the Ethernet, the _______field is actually added at the physical layer and isnot (formally)part of the frame. A) CRC B) preamble C) address D) none of the above
Last Answer : preamble
Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum
Last Answer : Checksum
Description : Which of the following statements is TRUE? a. Both Ethernet frame and IP packet include checksum fields b. Ethernet frame includes a checksum field and IP packet includes a CRC field c. Ethernet ... and IP packet includes a checksum field d. Both Ethernet frame and IP packet include CRC fields
Last Answer : Ethernet frame includes a CRC field and IP packet includes a checksum field
Description : If the frame to be transmitted is 1101011011 and the CRC polynomial to be used for generating checksum is x 4+ x + 1, then what is the transmitted frame? a. 11010110111011 b. 11010110111101 c. 11010110111110 d. 11010110111001
Last Answer : c. 11010110111110
Description : The message 11001001 is to be transmitted using the CRC polynomial x^3 + 1 to protect it from errors. The message that should be transmitted is: a. 11001001000 b. 11001001011 c. 11001010 d. 110010010011
Last Answer : b. 11001001011
Description : Which error detection method uses one's complement arithmetic? A. Simple parity check B. Two-dimensional parity check C. CRC D. Checksum
Last Answer : D. Checksum
Description : Write short notes on CRC checker.
Last Answer : After receiving the data appended with the CRC it does the same modulo-2 division. If the remainder is all 0’s the CRC is dropped and the data accepted. Otherwise, the received stream of bits is discarded and the data are resent.
Description : _____ provides redundancy toensure synchronization and inherent errordetection. A) Block coding B) Line coding C) Scrambling D) None of the above
Last Answer : Block coding
Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove
Last Answer : All of theabove
Description : _____codes arespecial linear block codes with one extraproperty. If a codeword is rotated, the result is another codeword. A) Non-linear B) Convolution C) Cyclic D) none of the above
Last Answer : Cyclic
Description : The _____schemeuses data patterns of size 2 and encodes the 2-bit patterns as one signal element belonging to a four-level signal. A) 4B5B B) 2B1Q C) MLT-3 D) none of the above
Last Answer : 2B1Q
Description : What is the size of the ‘total length’ field in IPv4 datagram? a. 4 bit b. 8 bit c. 16 bit d. 32 bit
Last Answer : c. 16 bit
Description : the maximum window size for data transmission using the selective reject protocol with n-bit frame sequence numbers is: a. 2^n b. 2^(n-1) c. 2^n – 1 d. 2^(n-2)
Last Answer : b. 2^(n-1)
Description : Suppose that the one-way propagation delay for a 100 Mbps Ethernet having 48-bit jamming signal is 1.04 micro-seconds. The minimum frame size in bits is: a. 112 b. 160 c. 208 d. 256
Last Answer : d. 256
Description : Suppose the round trip propagation delay for a 10 Mbps Ethernet having 48-bit jamming signal is 46.4 ms. The minimum frame size is a. 94 b. 416 c. 464
Last Answer : c. 464
Description : What is the size of an IP address? A. 64 bit B. 128 bit C. 16 bit D. 32 bit
Last Answer : D. 32 bit
Description : The redundancy in images stems from: (A) pixel decorrelation (B) pixel correlation (C) pixel quantization (D) image size
Last Answer : (B) pixel correlation
Description : The term ________ means that IP provides no error checking or tracking. IP assumes the unreliabilityof the underlying layers and does its best to get a transmission throughto its destination,but with ... ) reliable delivery B) connection-oriented delivery C) best-effort delivery D) noneof the above
Last Answer : best-effort delivery
Description : A best-effort delivery service suchas IPv4 includes _______. A) error checking B) error correction C) datagram acknowledgment D) noneof the above
Last Answer : noneof the above
Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP
Last Answer : c. m1: SMTP m2: POP m3: HTTP
Description : An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true? A) Thedo not fragment bit is set to 1 for all three datagrams. B) The more fragment bit ... Theidentification fieldis the same for all three datagrams. D) Theoffset field is thesame for all three datagrams
Last Answer : Theidentification fieldis the same for all three datagrams.
Description : An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true? A. The do not fragment bit is set to 1 for all three datagrams. B. The more fragment bit is set to 0 ... field is the same for all three datagrams. D. The offset field is the same for all three datagrams
Last Answer : C. The identification field is the same for all three datagrams.
Description : In Ethernet when Manchester encoding is used, the bit rate is: a. Half the baud rate. b. Twice the baud rate. c. Same as the baud rate. d. None of the above
Last Answer : a. Half the baud rate.
Description : The one guideline to be followed while designing the database is A) A database design may be ambiguous. B) Unrelated data should be in the same table so that updating the data will be easy. C) It should avoid/reduce the redundancy. D) An entity should not have attributes.
Last Answer : C) It should avoid/reduce the redundancy.
Description : Consider the formula in image processing RD = 1 - (1/CR) Where CR = n1/n2 CR is called as compression ratio n1 and n2 denotes the number of information carrying units in two datasets that represent ... . (A) Data Compression (B) Data Redundancy (C) Data Relation (D) Data Representation
Last Answer : (B) Data Redundancy
Description : Hi, new in the mac world, i'm looking for good mac (10.5.6) applications, if anybody has any tips..?? I know this a bit of a vague question but any programme topic is good checking out..!! thanks!
Last Answer : Any mac application that works for 10.x will work for 10.5.6. One thing you should get used to is that Apple updates their OS every month or more frequently, and the updates are ... you can visit software repositories. www.apple.com/downloads/macosx/ www.softpedia.com/mac www.versiontracker.com/
Description : The original ASCII code used__bits of each byte, reserving that last bit for error checking A) 5 B) 6 C) 7 D) 8
Last Answer : Answer : C
Description : The original ASCII code used…bits of each byte, reserving that last bit for error checking a. 5 b. 6 c. 7 d. 8
Last Answer : c. 7
Description : A burst error means that two or more bits in the dataunit havechanged. A) double-bit B) burst C) single-bit D) none of the above
Last Answer : burst
Description : In______ transmission, wesend1 start bit (0) at thebeginningand 1 or more stop bits (1s) at the end of each byte. A) synchronous B) asynchronous C) isochronous D) none of the above
Last Answer : asynchronous
Description : In IPv4, which field or bit value unambiguously identifies thedatagram as a fragment? A) Donot fragment bit ?0 B) More Fragment bit ?0 C) Fragment offset = 1000 D) noneof the above
Last Answer : Fragment offset = 1000
Description : Is 3 ever a divisor or 2^n?
Last Answer : answer:Think of the basic rules of automata. Prove the starting point., n=1 -> ⅔, Nope. Now prove the next step n=n+1 2×⅔ Nope. Now increment by proving all successive steps are a multiple of one of the above steps. (Unless I misunderstood the question.)