Description : We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called _________ A. datawords B. blockwords C. codewords D. none of the above
Last Answer : C. codewords
Description : We addr redundant bits toeach block to make thelength n = k + r. The resultingn-bit blocksare called _________. A) datawords B) blockwords C) codewords D) none of the above
Last Answer : codewords
Description : Let C be a binary linear code with minimum distance 2t + 1 then it can correct upto _____ bits of error. a. t + 1 b. t c. t - 2 d. t / 2
Last Answer : b. t
Description : . ________ is the process in which the receiver tries to guess the message by using redundant bits A. Connection-Oriented Service B. Forward error correction C. both a and b D. Confirm
Last Answer : B. Forward error correction
Description : We can divide coding schemes intotwobroad categories: ________ and______coding. A) block; linear B) linear; nonlinear C) block; convolution D) none of the above
Last Answer : block; convolution
Description : ______ provides synchronization without increasingthe number of bits. A) Scrambling B) Line coding C) Block coding D) None of the above
Last Answer : Scrambling
Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D
Last Answer : c. C
Description : Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x) to detect odd number of bits in error? a. G(x) contains more than two terms b. G(x) does ... exceeding the frame length c. 1+x is a factor of G(x) d. G(x) has an odd number of terms
Last Answer : c. 1+x is a factor of G(x)
Description : _____codes arespecial linear block codes with one extraproperty. If a codeword is rotated, the result is another codeword. A) Non-linear B) Convolution C) Cyclic D) none of the above
Last Answer : Cyclic
Description : In a linear block code, the_______ ofany two valid codewords creates another valid codeword. A) XORing B) ORing C) ANDing D) none of the above
Last Answer : XORing
Description : In block coding, if k =2 and n =3, we have _______ invalid codewords. A) 8 B) 4 C) 2 D) none of the above
Last Answer : 2
Description : Consider a source computer(S) transmitting a file of size 106 bits to a destination computer (D)over a network of two routers (R1 and R2) and three links(L1, L2, and L3). L1connects S to R1; L2 connects R1 to ... file from S to D? a. 1005 ms b. 1010 ms c. 3000 ms d. 3003 ms Answer: Option(a)
Last Answer : a. 1005 ms
Description : Which of the following is a characteristic of a firewall? a. Examines each message as it seeks entrance to the network b. Blocks messages without the correct markings from entering the network c. Detects computers communicating with the Internet without approval d. All of the above
Last Answer : d. All of the above
Description : The ______ technique expands the bandwidthof a signal by replacing each data bit with n bits. A) FDM B) DSSS C) FHSS D) TDM
Last Answer : DSSS
Description : In______ transmission, wesend1 start bit (0) at thebeginningand 1 or more stop bits (1s) at the end of each byte. A) synchronous B) asynchronous C) isochronous D) none of the above
Last Answer : asynchronous
Description : In_______transmission, bits aretransmittedsimultaneously,each across its own wire. A) Asynchronous serial B) Synchronous serial C) Parallel D) (a) and (b)
Last Answer : Parallel
Description : If link transmits 4000 frames per second and each slot has 8 bits, the transmission rate of circuit of this TDM is ______. a. 64 Kbps b. 32 Mbps c. 32 Kbps d. 64 MbpS
Last Answer : c. 32 Kbps
Description : Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is _____. a. 2 sec b. 3 sec c. 4 sec d. 1 sec
Last Answer : a. 2 sec
Description : A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute with each frame carrying an average of 10,000 bits. What is the throughput of this network ? a. 1 Mbps b. 2 Mbps c. 10 Mbps d. 12 Mbps
Last Answer : b. 2 Mbps
Description : A network with bandwidth of 10 Mbps can pass only an average of 15,000 frames per minute with each frame carrying an average of 8,000 bits. What is the throughput of this network? a. 2 Mbps b. 60 Mbps c. 120 Mbps
Last Answer : a. 2 Mbps
Description : Which of the following information about the UNIX file system is not correct? (A) Super block contains the number of i-nodes, the number of disk blocks, and the start of the list of free disk blocks. (B ... Each i-node is 256-bytes long. (D) All the files and directories are stored in data blocks.
Last Answer : (C) Each i-node is 256-bytes long.
Description : DES works by using a. permutation and substitution on 64 bit blocks of plain text b. only permutations on blocks of 128 bits c. exclusive ORing key bits with 64 bit blocks d. 4 rounds of substitution on 64 bit blocks with 56 bit keys
Last Answer : a. permutation and substitution on 64 bit blocks of plain text
Description : In_________ transmission, we send bits oneafter another without startor stop bits or gaps. It is the responsibilityof the receiver togroup the bits. A) synchronous B) asynchronous C) isochronous D) none of the abov
Last Answer : synchronous
Description : The _______ layer provides a well defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames A. Data Link B. Physical C. Network D. Session
Last Answer : A. Data Link
Description : The network layer encapsulates the data into _______of data. A. bits B. frames C. packets D. bytes
Last Answer : C. packets
Description : When we move from the outermost track to the innermost track in a magnetic disk, then density (bits per linear inch) (1) decreases (2) increases (3) remains the same (4) either remains constant or decreases
Last Answer : increases
Description : ___ cable can carry signals ofhigher frequency ranges than_____ cable. A) Twisted-pair; fiber-optic B) Coaxial; fiber-optic C) Coaxial; twisted-pair D) none of the abov
Last Answer : Coaxial; twisted-pair
Description : The data rate is sometimes calledthe ___ rate. A) baud B) bit C) signal D) none of the above
Last Answer : bit
Description : MSOffice2000 included a full-fledged Web designingsoftwarecalled ___ A. MS Word B. Front Page Express C. FrontPage 2000 D. None of these
Last Answer : FrontPage 2000
Description : The Dialup connections to access the internet uses ___ protocol. a. PPP (Point to Point protocol) b. X.25 protocol c. PLIP protocol d. None
Last Answer : a. PPP (Point to Point protocol)
Description : The modes of a MAC to share a transmission medium are ___. A. Round Robin B. Reservation C. Contention D. All the above
Last Answer : A. Round Robin
Description : The functions of a Logical Link Layer (LLC) are ___. A. Error control B. Flow control C. Creating and managing the communication link between two devices with the help of the Transport layer. D. All the above
Last Answer : D. All the above
Description : Which of the following is true about ICMP messages? A) An ICMP error message may be generated for an ICMP error message. B) An ICMP error message may be generated for each fragment. C) An ICMP error message may be generated for a multicast datagram. D) noneis true
Last Answer : noneis true
Description : When 2 or more bits in a data unit has been changed during the transmission, the error is called _____ a. random error b. burst error c. inverted error d. double error
Last Answer : b. burst error
Description : When 2 or more bits in a data unit has been changed during the transmission, the error is called ____________ A. random error B. burst error C. inverted error D. double error
Last Answer : B. burst error
Description : In ________, we combine signals from different sources to fit into a larger bandwidth. A) spread spectrum B) line coding C) block coding D) none of the above
Last Answer : spread spectrum
Description : the storage capacity of a disk system depends on the bits per inch of track and the tracks per inch of a. Cylinder b. Hum c. Cluster d. Surface
Last Answer : Surface
Description : If in a computer, 16 bits are used to specify address in a RAM, the number of addresses will be a. 216 b. 65,536 c. 64K d. Any of the above
Last Answer : 65,536
Description : A byte consists of a. One bit b. Four bits c. Eight bits d. Sixteen bits
Last Answer : Eight bits
Description : a computer which CPU speed around 100 million instruction per second and with the word length of around 64 bits is known as a. Super computer b. Mini computer c. Micro computer d. Macro computer
Last Answer : Super computer
Description : Storage capacity of magnetic disk depends on a. tracks per inch of surface b. bits per inch of tracks c. disk pack in disk surface d. All of above
Last Answer : All of above
Description : Number of bits per symbol used in Baudot code is a. 7 b. 5 c. 8 d. 9
Last Answer : 5
Description : Avalanche photodiode receivers can detect bits of transmitted data by receiving a. 100 photons b. 200 photons c. 2000 photons d. 300 photons
Last Answer : 200 photons
Description : A band is always equivalent to a. a byte b. a bit c. 100 bits d. none of above
Last Answer : none of above
Description : The synchronous modems are more costly than the asynchronous modems because a. they produce large volume of data b. they contain clock recovery circuits c. they transmit the data with stop and start bits d. they operate with a larger bandwidth e. none of above
Last Answer : they contain clock recovery circuits
Description : In Ethernet addressing, ifall the bits are 1s, the address is _________. A) unicast B) multicast C) broadcast D) none of the above
Last Answer : broadcast
Description : In Go-Back-N ARQ, if 5 is the number of bits for thesequencenumber, then the maximum size of the receive window mustbe _____ A) 15 B) 16 C) 31 D) 1
Last Answer : 1
Description : In Go-Back-N ARQ, if 5 is the number of bits for thesequencenumber, then the maximum size of the send window must be _____ A) 15 B) 16 C) 31 D) 1
Last Answer : 31