The message 11001001 is to be transmitted using the CRC polynomial x3+1 to protect it from errors. The message that should be transmitted is (A) 110010011001 (B) 11001001 (C) 110010011001001 (D) 11001001011

1 Answer

Answer :

(D) 11001001011

Related questions

Description : The message 11001001 is to be transmitted using the CRC polynomial x^3 + 1 to protect it from errors. The message that should be transmitted is: a. 11001001000 b. 11001001011 c. 11001010 d. 110010010011

Last Answer : b. 11001001011

Description : Let G(x) be generator polynomial used for CRC checking. The condition that should be satisfied by G(x) to correct odd numbered error bits, will be: (1) (1+x) is factor of G(x) (2) (1-x) is factor of G(x) (3) (1+x2) is factor of G(x) (4) x is factor of G(x)

Last Answer : (1+x) is factor of G(x)

Description : _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. a. Hamming Code b. CRC c. VRC d. None of the above

Last Answer : b. CRC

Description : If the frame to be transmitted is 1101011011 and the CRC polynomial to be used for generating checksum is x 4+ x + 1, then what is the transmitted frame? a. 11010110111011 b. 11010110111101 c. 11010110111110 d. 11010110111001

Last Answer : c. 11010110111110

Description : Using factor theorem, factorise the polynomial x3 + x2 - 4x - 4. -Maths 9th

Last Answer : Solution :-

Description : Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x) to detect odd number of bits in error? a. G(x) contains more than two terms b. G(x) does ... exceeding the frame length c. 1+x is a factor of G(x) d. G(x) has an odd number of terms

Last Answer : c. 1+x is a factor of G(x)

Description : In CRC based design, a CRC Team consists of : (a) one or two users representatives (b) several programmers (c) project co-ordinators (d) one or two system analysts Codes : (A) (a) and (c) (B) (a), (b), (c) and (d) (C) (a), (c) and (d) (D) (a), (b) and (d)

Last Answer : Answer: C

Description : The travelling salesman problem can be solved in: (A) Polynomial time using dynamic programming algorithm (B) Polynomial time using branch-and-bound algorithm (C) Exponential time using dynamic programming algorithm or branch-andbound algorithm. (D) Polynomial time using backtracking algorithm.

Last Answer : (C) Exponential time using dynamic programming algorithm or branch-andbound algorithm.

Description : Big - O estimate for f(x) = (x + 1) log(x2 + 1) + 3x2 is given as (A) O(xlogx) (B) O(x2) (C) O(x3) (D) O(x2logx)

Last Answer : (B) O(x2)

Description : Consider the following LPP: Min. Z = x1+x2+x3 Subject to 3x1 + 4x3 ≤ 5 5x1 + x2 + 6x3 =7 8x1 + 9x3 ≥ 2 x1, x2, x3 ≥ 0 The standard form of this LPP shall be: (1) Min. Z = x1 + x2 + x3 + 0x4 + 0x5 Subject ... + 4x3 + x4 = 5; 5x1 + x2 + 6x3 + x6 = 7; 8x1 + 9x3 - x5 + x7 = 2; x1 to x7 ≥ 0

Last Answer : Answer: 1

Description : What is the main difference between DDCMP and SDLC? a. DDCMP does not need special hardware to final the beginning of a message b. DDCMP has a message header c. SDLC has a IP address d. SDLC does not use CRC

Last Answer : DDCMP does not need special hardware to final the beginning of a message

Description : Find the transmitted code if the frame is (MSB) 1101011011 (LSB) and generator polynomial is x4 + x + 1. A. 1101011011 1110 B. 1101011111 1110 C. 1101011011 1111 D. 1101011011

Last Answer : A. 1101011011 1110

Description : A message “COMPUTERNETWORK” encrypted(ignore quotes)using columnar transposition cipher with a key “LAYER”. The encrypted message is: (A) CTTOEWMROPNRUEK (B) MROUEKCTTPNROEW (C) OEWPNRCTTUEKMRO (D) UEKPNRMROOEWCTT

Last Answer : (C) OEWPNRCTTUEKMRO

Description : Encrypt the plain text Message “EXTRANET” using Transposition cipher technique with the following key: Using ‘Z’ as bogus character. (A) TAXERTZENZ (B) EXTRANETZZ (C) EZXZTRZANZET (D) EXTZRANZETZ

Last Answer : (A) TAXERTZENZ 

Description : Which of the following are the functions of operating system? i) recovering from errors ii) facilitating input/output iii) facilitating parallel operation iv) sharing hardware among users v) implementing user interface A) i, ii, ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : Which of the following is/are the functions of operating system? i) Sharing hardware among users. ii) Allowing users to share data among themselves. iii) Recovering from errors. iv) Preventing users from interfering with one another. ... only C) i, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : Process of removing errors called a) Error Free b) Debug c) Syntax Error d) Exception

Last Answer : b) Debug

Description : Software testing is (A) the process of establishing that errors are not present. (B) the process of establishing confidence that a program does what it is supposed to do. (C) the process of ... as per specifications. (D) the process of executing a program with the intent of finding errors. 

Last Answer : (D) the process of executing a program with the intent of finding errors.

Description : Adaptive maintenance is a maintenance which ............. (A) Correct errors that were not discovered till testing phase. (B) is carried out to port the existing software to a new environment. (C) improves the system performance. (D) both (B) and (C)

Last Answer : (B) is carried out to port the existing software to a new environment.

Description : What is the function of following UNIX command? WC - lb& (A) It runs the word count program to count the number of lines in its input, a, writing the result to b, as a foreground process. (B) It runs ... (D) It copies the l ' numbers of lines of program from file, a, and stores in file b.

Last Answer : (B) It runs the word count program to count the number of lines in its input, a, writing the result to b, but does it in the background.

Description : Software safety is quality assurance activity that focuses on hazards that (A) affect the reliability of a software component (B) may cause an entire system to fail. (C) may result from user input errors. (D) prevent profitable marketing of the final product

Last Answer : (B) may cause an entire system to fail.

Description : Given code word 1110001010 is to be transmitted with even parity check bit. The encoded word to be transmitted for this code is (A) 11100010101 (B) 11100010100 (C) 1110001010 (D) 111000101

Last Answer : (A) 11100010101 

Description : Which of the following is not associated with the session layer? (A) Dialog control (B) Token management (C) Semantics of the information transmitted (D) Synchronization

Last Answer : (C) Semantics of the information transmitted 

Description : ………… is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : ………………….. is responsible for converting the higher level protocol addresses (IP addresses) to physical network addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet protocol(IP) ii) Internet control Message Protocol(ICMP) iii) Bootstrap Protocol (BooTP) iv) Dynamic Host Configuration Protocol (DHCP) v) ... C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : ........ is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : D) Internet Control Message Protocol (ICMP)

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only

Last Answer : D) All i, ii, iii, iv and v only

Description : The data unit in the TCP/IP layer called a ..... A) Message B) Segment C) Datagram D) Frame

Last Answer : D) Frame

Description : In RSA algorithm,if p=5,q=7,e=7and message=3. What will be the value of ciphertext ?

Last Answer : 17

Description : Which of the following addresses is used to deliver a message to the correct application program running on a host? (A) Port (B) IP (C) Logical (D) Physical

Last Answer : (A) Port 

Description : In a binary Hamming code the number of check digits is r then number of message digits is equal to: (A) 2r-1 (B) 2r-r-1 (C) 2r-r+1 (D) 2r+r-1

Last Answer : (B) 2r-r-1

Description : Which of the following is not valid with reference to Message Passing Interface (MPI)? (A) MPI can run on any hardware platform (B) The programming model is a distributed memory model. (C) All ... implicit. (D) MPI - Comm - Size returns the total number of MPI processes in specified communication.

Last Answer : (C) All parallelism is implicit.

Description : Which of the following statements is incorrect for Parallel Virtual Machine (PVM)? (A) The PVM Communication model provides asynchronous blocking send, asynchronous blocking receive and non-blocking receive function. ... of such messages. (D) In PVM Model, the message order is not preserved. 

Last Answer : (D) In PVM Model, the message order is not preserved.

Description : The distributed system is a collection of (P) and communication is achieved in distributed system by (Q) , where (P) and (Q) are : (A) Loosely coupled hardware on tightly ... message passing ,respectively. (D) Loosely coupled software on tightly coupled hardware and file sharing, respectively.

Last Answer : (C) Tightly coupled software on loosely coupled hardware and message passing ,respectively. 

Description : A Multicomputer with 256 CPUs is organized as 16x16 grid. What is the worst case delay (in hops) that a message might have to take? (A) 16 (B) 15 (C) 32 (D) 30

Last Answer : (D) 30

Description : In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................ (1) 2 bytes (2) 1 byte (3) 4 bytes (4) 5 bytes

Last Answer : (4) 5 bytes 

Description : Encryption is required to (i) protect business information from eavesdropping when it is transmitted on internet (ii)efficiently use the bandwidth available in PSTN (iii) to protect information stored in companies' databases from ... a. i and ii b. ii and iii c. iii and iv d. i and iv

Last Answer : d. i and iv 

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : The ________is a network layer Internet protocol that provides message packets to report errors and other information regarding IP packet processing back to the source: a) Internet Control Message ... Standard Flexible Message Protocol c) Internet Dynamic Chartered Message Protocol d) None of These

Last Answer : a) Internet Control Message Protocol

Description : Can computer viruses be transmitted over a silent voice mail message on Skype?

Last Answer : There’s a first time for everything. Leaving you a “silent” voice mail is one computer sending a digital file to yours, which is how a virus spreads. I’d run a scan to hunt for a possible virus, and not open any vmails from people you don’t know.

Description : How is a message transmitted?

Last Answer : Short Message Service message are transmitted through a message center a message store that holds a text message from the sending phone until the receiving phone is available to except the message.

Description : The correctness and accuracy of the transmitted message content is A. verified by the modem B. communications system C. determined by the sender and receiver D. ensured by use of digital technique

Last Answer : C. determined by the sender and receiver

Description : In __________ transmission, a unique SYNC character is transmitted at the beginning of each message. A. asynchronous B. synchronous C. digital D. analogue

Last Answer : B. synchronous

Description : The vehicle through which the coded message is transmitted from the source to the receiver is called a(n) A)coder. B)decoder. C)encoder. D)relay channel. E)medium of transmission.

Last Answer : E)medium of transmission.

Description : WinRAR corrupt MP3 file -CRC failed?

Last Answer : I can’t answer this question, but I have already sent it to some tech-sawy people on ask-public. Hang on!

Description : Beat Master related to CRC means a) The postman of beat of delivery office b) It contains details of beats covered by each delivery office c) All the above d) None of these

Last Answer : b) It contains details of beats covered by each delivery office

Description : Mail agency master related to CRC means a) The mail agent of the mail office b) The mail guard of the agency branch c) It contains agencies detail of MMS & Sections for carrying bags closed in the CRC to other offices d) None of these

Last Answer : c) It contains agencies detail of MMS & Sections for carrying bags closed in the CRC to other offices