Description : A _________ interconnects LAN having identical protocols at the physical and data link layers. A. All of these B. bridge C. router D. Gateway
Last Answer : B. bridge
Description : Explain the terms topology and access methods used in LANs. Discuss the CSMA/CD and CSMA/CA protocols.
Last Answer : (i) LAN topologies: Network topology is a physical schematic which shows interconnection of the many users. There are four basic topologies as under: (a) Direct Connection or one to all ... it is free, the station transmits, and waits for an acknowledgment signal that the packet was received
Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame
Description : What device separates asingle network into two segmentsbut lets the twosegments appear as one tohigher protocols? A. Switch B. Bridge C. Gateway D. Router
Last Answer : Bridge
Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size
Description : The examples of Interior Gateway Protocols (IGP) are. i) Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii
Last Answer : B) i, and ii only
Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv
Last Answer : b. i, ii, iii
Description : Main basic components of a data communication are composed of the following. A. Computer, modern and router B. Computer, bridge and gateway C. Transmitter, channel and receiver D. Transmitter, computer and modem
Last Answer : C. Transmitter, channel and receiver
Description : A device that connects two dissimilar networks and performs the protocol conversion. A. Gateway B. Coupler C. Transformer D. Converter
Last Answer : A. Gateway
Description : Which of the following structures or regions is incorrectly paired with its functions? (a) Medulla : Controls respiration oblongata and cardiovascular reflexes (b) Limbic : Consists of fibre tracts ... thirst (d) Corpus callosum : Band of fibers connecting left and right cerebral hemispheres
Last Answer : (b) Limbic : Consists of fibre tracts system that interconnect different regions of brain controls movement
Description : Which of the following structures or regions is incorrectly paired with its function ? (1) Medulla oblongata : controls respiration and cardiovascular reflexes. (2) Limbic system : consists of fibre ... and thirst. (4) Corpus callosum : band of fibers connecting left and right cerebral hemispheres.
Last Answer : (2) Limbic system : consists of fibre tracts that interconnect different regions of brain; controls movement.
Description : Network Architecture refers to the layout of the network consisting of the hardware, software, connectivity, communication protocols and mode of transmission, such as ____: a) Wired b) Wireless c) Wired or Wireless d) None of These
Last Answer : c) Wired or Wireless
Description : If a mirror is used to reflect light, the reflected light angle is ____ as the incident angle a. Smaller b. Larger c. The same d. Independent
Last Answer : c. The same
Description : PCI stands for _________ a) Peripheral Component Interconnect b) Partial Component Interconnect c) Peripheral Component Interaction d) Partial Component Interaction
Last Answer : Answer: a Explanation: PCI is a high-bandwidth bus that can function as a peripheral bus. Compared with others, it delivers better system performance
Description : What type of circuit is used by control memory to interconnect registers. a. Data routing circuit b. Address routing circuit c. Control routing circuit d. None of the these
Last Answer : a. Data routing circuit
Description : Interface electronic circuit is used to interconnect I/O devices to a computer’s CPU or a. ALU b. Memory c. Buffer d. Register
Last Answer : Memory
Description : Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit foranswer: A. Bandwidth alternatives B. Switching alternating C. Inter organizational networks D. Extranets
Last Answer : Inter organizational networks
Description : ICMP stands for __________ a. Internet Coordinate Message Protocol b. Internet Control Message Protocol c. Interconnect Control Message Protocol d. Interconnect Coordinate Message Protocol
Last Answer : b. Internet Control Message Protocol
Description : PCI stands for: a) Peripheral Component Interconnect b) Personal Computer Interface c) Programming In Computer Interchange d) None of These
Last Answer : a) Peripheral Component Interconnect
Last Answer : b. Memory
Description : What allows digital devices to interconnect and transmit data? a. a sensor b.a global positioning sensor c.a smart phone d.a network
Last Answer : d.a network
Description : The real image formed by a spherical mirror is ____ relative to its object a. Erect b. Inverted c. Smaller d. Larger
Last Answer : d. Larger
Description : The speech coding rate in D-AMPS is ____. A. 8 kbps B. 13 kbps C. 15 kbps D. 20 kbps
Last Answer : A. 8 kbps
Description : Encryption of data is important to ensure its privacy. It is most commonly achieved by using a ____. A. public-key encryption B. private-key encryption C. password-key encryption D. character set encryption
Last Answer : A. public-key encryption
Description : In GSM cellular system, the speech coding rate is ____. A. 13 kbps B. 8 kbps C. 15 kbps D. 20 kbps
Last Answer : A. 13 kbps
Description : An area on earth covered by a satellite radio beam is called ____. A. SSP B. Region C. footprint D. primary area
Last Answer : C. footprint
Description : Satellite orbits around the earth are ____ orbits. A. circular B. either elliptical or circular C. elliptical D. circular only
Last Answer : B. either elliptical or circular
Description : ____ is a term given to the region where superrefraction occurs. A. Strata B. Duct C. Isothermal region D. Tropospheric region
Last Answer : B. Duct
Description : ____ system transmits frequency-division-multiplexed voice band signals over a coaxial cable for distances up to 4000 miles. A. T carrier B. X carrier C. L carrier D. F carrier
Last Answer : C. L carrier
Description : For a loudness level between 110 and 120 dB, the maximum daily exposure limit is ____ minute (s). A. 1 B. 60 C. 20 D. 45
Last Answer : A. 1
Description : ____ is defined as any radiation of energy by means of electromagnetic wave. A. Emission B. Radiation C. Radio D. Broadcasting
Last Answer : A. Emission
Description : The product of the radiated RF power of a transmitter and the gain of the antenna system in a given direction relative to an isotropic radiator is called ____. A. Effective Radiated Power (ERP) B. Effective Isotropic Radiated Power (EIRP) C. Radiated Power D. Transmit Power
Last Answer : B. Effective Isotropic Radiated Power (EIRP)
Description : The typical length of the rhombic antenna is ____. A. 2λ to 8λ B. 10λ to 20λ C. 1λ to 3λ D. 5λ to 10λ
Last Answer : A. 2λ to 8λ
Description : In cellular system, the average lead time to install a new base station is approximately ____ months to a year. A. 4 B. 5 C. 6 D. 10
Last Answer : C. 6
Description : The approximate single-hop nighttime range of F2 layer is ____. A. 3000 km B. 3840 km C. 4130 km D. 2350km
Last Answer : C. 4130 km
Description : Flicker noise is a poorly understood form of noise which may be completely ignored about above ____. A.100 Hz B. 200 Hz C. 400 Hz D. 500 Hz
Last Answer : D. 500 Hz
Description : The antenna effective height is ____ to ____ of the actual height. A. ½ to 2/3 B. ½ to ¾ C. ¼ to 2/3 D. ¼ to ¾
Last Answer : A. ½ to 2/3
Description : To obtain the most reliable sky wave propagation the ____ should be used. A. Lowest useable frequency (LUF). B. Maximum useable frequency (MUF). C. Optimum useable frequency (OUF). D. Critical frequency
Last Answer : C. Optimum useable frequency (OUF).
Description : Skip distance can be maximized by using the ____ radiation angle possible and the ____ frequency that will be refracted at that angle. A. lowest, lowest B. lowest, highest C. highest, lowest D. highest, highest
Last Answer : B. lowest, highest
Description : The range of speech power is ____. A. 1 – 10 watts B. 100 – 1000 milliwatts C. 10 – 100 milliwatts D. 10 – 1000 microwatts
Last Answer : 10 – 1000 microwatts
Description : A radio signal travels ____ yards per microseconds. A. 273 B. 328 C. 618 D. 123.6
Last Answer : C. 618
Description : Iridium satellites can provide data communications of up ____ bps data rate. A. 1200 B. 4800 C. 2400 D. 3840
Last Answer : C. 2400
Description : For navigation as well as marine and aeronautical communications and radar, ____ band is used. A. L B. K C. S D. J
Last Answer : A. L
Description : How to resize different movie formats in Adobe Premiere CS3?
Last Answer : I’m not an Adobe user, but if your movie is distorted when you enlarge it that probably means the quality/size is bad? You can’t enlarge shitty video without it looking shitty…
Description : Explain the different instruction formats with examples
Last Answer : The instruction set is grouped into the following formats • One byte instruction MOV C,A • Two byte instruction MVI A,39H • Three byte instruction JMP 2345H
Description : Subschema can be used to A. create very different, personalized views of the samedata B. present information in different formats C. hide sensitive informationby omitting fields from thesub¬schema's description D. All of theabove E. None of the above
Last Answer : All of theabove
Description : What consists of 2 or more lans that span a wide geographic area?
Last Answer : They're called a Wide-Area Network - or WAN.
Description : Office LANs that are spread geographically apart on a large scale can be connected using a corporate _____ 1) CAN 2) LAN 3) DAN 4) WAN 5) TAN
Last Answer : Answer :4
Description : In Bluetooth, the_____layer is roughlyequivalent tothe MAC sublayer in LANs. A) radio B) baseband C) L2CAP D) none of the above
Last Answer : baseband