Description : In _______ methods, the stations consult one another tofind which station has the right to send. A) random access B) controlledaccess C) channelization D) none of the above
Last Answer : controlledaccess
Description : ________is a multiple-access method in which the available bandwidthof a link is shared in time, frequency, or through code, between different stations. A) Random access B) Controlledaccess C) Channelization D) none of the above
Last Answer : Channelization
Description : In ___________ methods, no station is superior to another station and none is assigned the controlover another. A) random access B) controlledaccess C) channelization D) none of the above
Last Answer : random access
Description : There are two cliffs. They are each attached by a suspension bridge that takes 5 minutes to walk across, and is the only way to get to the other side. No one is allowed to cross the bridge unless ... the bridge, he'll wake up exactly when you reach the other side, and send you back)? -Riddles
Last Answer : You can't go as he is awake, he'll see you, but go when he doesn't see you. Then, turn back as he is waking up, pretending to go to the side you came from. Then, he'll figure you are unauthorized to set foot on the bridge, and send you to the side you want to get to.
Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time
Last Answer : Sequential and random
Description : Gigabit Ethernet access methods include _______ mode. A) half-duplex B) full-duplex C) both (a) and (b) D) neither (a) nor (b)
Last Answer : both (a) and (b)
Description : The term 'duplex' refers to theability of the data receiving stations toecho back aconfirming messageto the sender. Infull duplex data transmission, both the sender and the receiver A. cannot talk at once B. can ... data one ata time D. can do one way data transmission only E. None of the above
Last Answer : can do one way data transmission only
Description : Mark the correct option relating to pension cases a) The continuity of an applicant's service cannot be established by the mere production of order of transfer issued at various time unless the receive the ... has to be issued by the competent authority in every case. d) All the above are correct
Last Answer : d) All the above are correct
Description : In IEEE 802.11, a___ is made of stationary or mobile wireless stations and anoptional central base station, known as the access point (AP). A) ESS B) BSS C) CSS D) none of the above
Last Answer : BSS
Description : In astar-topology Ethernet LAN, _______ is just a point where the signals coming from different stations collide; it is thecollision point. A) An activehub B) A passivehub C) either (a)or (b) D) neither (a) nor (b)
Last Answer : A passivehub
Description : _______ is designed to be usedin wirelessapplications in which stations must be ableto sharethe medium without interception by an eavesdropperand without beingsubject tojamming from a malicious intruder. A) Spread spectrum B) Multiplexing C) Modulation D) None of the above
Last Answer : Spread spectrum
Description : Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot. The probability that only one station transmits in a given slot is _______. a. nP(1 – P)n – 1 b. nP c. P(1 – P)n – 1 d. n P (1 – P)n – 1
Last Answer : a. nP(1 – P)n – 1
Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access
Last Answer : Serial access
Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method
Last Answer : Random access memory
Description : Which of the following is designated as the international distress, safety and calling frequency for radio telephony for stations of the maritime mobile service when using frequencies in the authorized bands between 156 and 174 MHz? A. 165.8 MHz B. 156.8 MHz C. 158.6 MHz D. 168.5 MHz
Last Answer : B. 156.8 MHz
Description : We discussed ______ popular controlled-access methods. A) two B) three C) four D) none of the above
Last Answer : three
Description : In Go-Back-N ARQ, if frames 4,5, and 6 are received successfully, thereceiver may send an ACK _______ to thesender. A) 5 B) 6 C) 7 D) any of theabove
Last Answer : 7
Description : _______ control refers to aset of proceduresused torestrict the amount ofdata that the sender can send before waiting foracknowledgment. A) Flow B) Error C) Transmission D) none of the above
Last Answer : Flow
Description : The two basic types of record access methods are: A) Sequential and random B) Sequential and indexed C) Direct and immediate D) Online and real time
Last Answer : Answer : A
Last Answer : a. Sequential and random
Description : We have categorizedaccess methods into _______ groups. A) two B) three C) four D) five
Description : Storage device where time to retrieve stored information is independent of address where it is stored is called _______ A. Random Access Memory B. Secondary Memory C. System D. None of the above
Last Answer : A. Random Access Memory
Description : Channelization of streams is designed to reduce flooding by ___________. a) Speeding the passage of floodwaters b) Reducing bank erosion c) Slowing down river velocity so as to reduce damage d) Increase the meandering of streams
Last Answer : a) Speeding the passage of floodwaters
Description : Internal and external factors that affect message reception by the students in the classroom are referred to as (A) feedback (B) fragmentation (C) channelization (D) noise
Last Answer : Answer: D
Description : Transforming thoughts, ideas and messages into verbal and non-verbal signs is referred to as (A) channelization (B) mediation (C) encoding (D) decoding
Last Answer : (C) encoding
Description : I am a Medicare provider authorized to send claims by mail. What is the new address for N. CA claims. Thanks?
Last Answer : It looks like the address for submitting claims is: Palmetto GBA Jurisdiction 1, AG-420 PO Box 100145 Columbia SC 29202-3145
Description : Unauthorized communication of information means and include:- a) To which he is not authorized to have access. b) Which he is not authorized to keep in his personal custody c) Both A & B d) None of these
Last Answer : c) Both A & B
Description : Which among the following is correct about goals in cryptography: a) Confidentiality - Only an authorized recipient should be able to extract the contents of the message from its encrypted form. Resulting from steps ... not be able to deny sending the message e) None of These f) All of the Above
Last Answer : f) All of the Above
Description : ______ is the art of exploiting the human elements to gain access to the authorized user. A. Social Engineering. B. IT Engineering. C. Ethical Hacking. D. None of the above.
Last Answer : A. Social Engineering.
Description : ____ is known as allowing the authorized access to information. a) Decryption b) Encryption c) Hacking d) None of the above
Last Answer : Decryption is known as allowing the authorized access to information.
Description : Which of the following statement(s) is/are FALSE in the context of Relational DBMS ? I. Views in a database system are important because they help with access control by allowing users to see only a particular subset of the data ... (B) III and IV only (C) I, II and III only (D) II, III and IV only
Last Answer : (D) II, III and IV only
Description : In communication satellite, multiple repeaters are known as a. detector b. modulator c. stations d. transponders
Last Answer : transponders
Description : . In IEEE 802.11, communication between two stations in twodifferent BSSs usually occurs viatwo ________. A) BSSs B) ESSs C) APs D) none of the above
Last Answer : APs
Description : In ______, the stations usedifferent codes toachieve multipleaccess. A) FDMA B) TDMA C) CDMA D) none of the above
Last Answer : CDMA
Description : In_______, the stations share thebandwidth of the channel in time. A) FDMA B) TDMA C) CDMA D) none of the above
Last Answer : TDMA
Description : A ________is a device in which the stations are completely unaware of its existence. A) passive hub B) repeater C) simple bridge D) transparent bridge
Last Answer : transparent bridge
Description : ________ is actually a multiport repeater. It is normally usedto createconnections between stations in a physical star topology. A) An activehub B) A passivehub C) either (a)or (b) D) neither (a) nor (b)
Last Answer : An activehub
Description : Eight stations arecompeting for the use of a sharedchannelusing the'Adaptive tree Walk Protocol'. If the stations 7 and8 are suddenly become ready at once, how many bit slots areneeded toresolve the contention? A. 7 slots B. 5 slots C. 10 slots D. 14 slots
Last Answer : 7 slots
Description : Carrier is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above
Last Answer : a continuous frequency capableof being modulated or impressed witha second signa
Description : Contention is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above
Last Answer : the condition whentwo or more stations attempt to use the same channel at the same time
Description : A pure ALOHA Network transmits 200 bit frames using a shared channel with 200 Kbps bandwidth. If the system (all stations put together) produces 500 frames per second, then the throughput of the system is ______. a. 0.384 b. 0.184 c. 0.286 d. 0.58
Last Answer : b. 0.184
Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D
Last Answer : c. C
Description : State weather the following statement is true or false for Token Bus 1).It is a linear or tree- shaped cable onto which the stations are attached. 2). the token propagates around the logical ring, with only the token holder ... 3. false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : D. 1. true, 2. true, 3. false
Description : With Slotted Aloha, a …………. sends out small clock tick packets to the outlying stations. A. distributed clock B. synchronized clock C. centralized clock D. Digital clock
Last Answer : C. centralized clock
Description : No appeal against such alternative will lie to a higher authority unless it is submitted within the usual time limit of _______ from the date of communication a) Three months b) Six month c) One year d) One month
Last Answer : b) Six month
Description : The two kinds of main memory are: a. Primary and secondary b. Random and sequential c. ROM and RAM d. All of above
Last Answer : ROM and RAM
Description : Inthe _______method, after thestation finds the line idle it sends or refrainfrom sending based on the outcome ofa random number generator. If the line is busy, it tries again A) nonpersistent B) 1-persistent C) p-persistent D) none of the above
Last Answer : p-persistent
Description : Inthe ________method, a stationthat has a frame tosend senses the line. If the line is idle, it sends immediately. If theline is not idle, it waits a random amount of time and then senses the line again. A) nonpersistent B) 1-persistent C) p-persistent D) none of the above
Last Answer : nonpersistent
Description : When 2 or more bits in a data unit has been changed during the transmission, the error is called _____ a. random error b. burst error c. inverted error d. double error
Last Answer : b. burst error
Description : When 2 or more bits in a data unit has been changed during the transmission, the error is called ____________ A. random error B. burst error C. inverted error D. double error
Last Answer : B. burst error