Binary symmetric channel uses (A) Half duplex protocol (B) Full duplex protocol (C) Bit oriented protocol (D) None of the above

1 Answer

Answer :

(A) Half duplex protocol

Related questions

Description : Which of the communication modes support two way traffic but in only once direction of a time? A) Simplex B) Half-duplex C) Three - quarter's duplex D) Full duplex

Last Answer : B) Half-duplex

Description : State whether true or false. i) A connection oriented protocol can only use unicast addresses. ii) The anycast service is included in IPV6. A) True, True B) True, False

Last Answer : i) A connection oriented protocol can only use unicast addresses.

Description : In mode, the communication channel is used in both directions at the same time? A) Full-duplex B) Simplex C) Half-duplex D) None of the above

Last Answer : Answer : A

Description : In _______ transmission, the channel capacity is shared byboth communicatingdevices at all times. A) simplex B) half-duplex C) full-duplex D) half-simplex

Last Answer : full-duplex

Description : Asynchronous protocol is A. message oriented B. clock oriented C. bit oriented D. character oriented

Last Answer : D. character oriented

Description : The most common protocol for point-to-pointaccess is the Point-to-Point Protocol (PPP), which is a _________protocol. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above

Last Answer : byte-oriented

Description : High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-pointand multipoint links. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above

Last Answer : bit-oriented

Description : Operating method in which the transmission is made alternately in each direction of a telecommunication channel A. Semi-duplex operation B. Duplex operation C. Half-duplex operation D. Simplex operation

Last Answer : C. Half-duplex operation

Description : he primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : The Excess-3 decimal code is a self-complementing code because (A) The binary sum of a code and its 9’s complement is equal to 9. (B) It is a weighted code. (C) Complement can be generated by inverting each bit pattern. (D) The binary sum of a code and its 10’s complement is equal to 9.

Last Answer : Answer: A, C

Description : A communication device that combines transmissions from several I/O devices into one line is a A) Concentrator B) Modifier C) Multiplexer D) Full duplex file

Last Answer : C) Multiplexer

Description : The relation "divides" on a set of positive integers is .................. (A) Symmetric and transitive (B) Anti symmetric and transitive (C) Symmetric only (D) Transitive only

Last Answer : (B) Anti symmetric and transitive Explanation: The ‘divide’ operation is antisymmetric because if a divides b does not necessarily implies that b divides a. If a divides b and b divides c then a divides c. So, it is transitive as well.

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : Which of the following property/ies a Group G must hold, in order to be an Abelian group? (a) The distributive property (b) The commutative property (c) The symmetric property Codes: (A) (a) and (b) (B) (b) and (c) (C) (a) only (D) (b) only

Last Answer : Answer: D

Description : Transmission control protocol ___________ a. is a connection-oriented protocol b. uses a three way handshake to establish a connection c. receives data from application as a single stream d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Transmission control protocol ___________ a. is a connection-oriented protocol b. uses a three way handshake to establish a connection c. receives data from application as a single stream d. all of the mentioned

Last Answer : d. all of the mentioned

Description : State weather the following statement is true or false for Stream Control Transmission Protocol (SCTP). 1). SCTP uses only few known ports in the TCP space. 2).SCTP is a new transport protocol at the same layer as TCP and ... , 3. false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : D. 1.false, 2. true, 3. true

Description : Transmission control protocol is a) connection oriented protocol b) uses a three way handshake to establish a connection c) recievs data from application as a single stream d) all of the mentioned

Last Answer : d) all of the mentioned

Description : Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to sample the signal at twice the highest frequency (two samples per hertz). What is the bit rate required, if it ... sample requires 8 bits? (A) 32 kbps (B) 64 kbps (C) 128 kbps (D) 256 kbps

Last Answer : (C) 128 kbps

Description : Four channels are multiplexed using TDM. If each channel sends 100 bytes/second and we multiplex 1 byte per channel, then the bit rate for the link is ............... (A) 400 bps (B) 800 bps (C) 1600 bps (D) 3200 bps

Last Answer : (D) 3200 bps Answer: D Explanation: The multiplexer is shown in the Figure. Each frame carries 1 byte from each channel; the size of each frame, therefore, is 4 bytes, or 32 bits. Because each ... channel, the frame rate must be 100 frames per second. The bit rate is 100 32 = 3200 bps. 

Description : Assume that we need to download text documents at the rate of 100 pages per minute. A page is an average of 24 lines with 80 characters in each line and each character requires 8 bits. Then the required bit rate of the channel is ... ...... (A) 1.636 Kbps (B) 1.636 Mbps (C) 2.272 Mbps (D) 3.272 Kbps

Last Answer : Answer: Marks given to all

Description : A pure ALOHA Network transmit 200 bit frames using a shared channel with 200 Kbps bandwidth. If the system (all stations put together) produces 500 frames per second, then the throughput of the system is .............. (A) 0.384 (B) 0.184 (C) 0.286 (D) 0.586

Last Answer : (B) 0.184

Description : Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is (1) 20 (2) 10 (3) 30 (4) 40

Last Answer : (2) 10

Description : Optical fiber uses reflection to guide light through a channel, in which angle of incidence is ................. the critical angle. (A) equal to (B) less than (C) greater than (D) less than or equal to

Last Answer : (C) greater than

Description : Which of the following communications lines is best suited to interactive processing applications? a. narrow band channel b. simplex lines c. full duplex lines d. mixed band channels

Last Answer : full duplex lines

Description : A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of 01111110. If the output bit-string after stuffing is 01111100101, then the input bit-string is a. 0111110100 b. 0111110101 c. 0111111101 d. 0111111111

Last Answer : b. 0111110101

Description : Public key system is useful because a. it uses two keys. b. there is no key distribution problem as public key can be kept in a commonly accessible database. c. private key can be kept secret. d. it is a symmetric key system. 

Last Answer : b. there is no key distribution problem as public key can be kept in a commonly accessible database.  

Description : Is Java an Object Oriented language?

Last Answer : A: Yes.

Description : Which one of the following is true for Java? A) Java is object oriented and interpreted B) Java is efficient and faster than C C) Java is the choice of everyone. D) Java is not robust.

Last Answer : A) Java is object oriented and interpreted

Description : A …………… is an acyclic digraph, which has only one node with indegree 0, and other nodes have indegree 1. A) Directed tree B) Undirected tree C) Dis-joint tree D) Direction oriented tree

Last Answer : A) Directed tree

Description : The pure object oriented programming language with extensive metadata available and modifiable at run time is (A) Small talk (B) C++ (C) Java (D) Eiffel

Last Answer : (A) Small talk

Description : Superficially the term object-oriented , means that, we organize software as a (A) collection of continuous objects that incorporates both data structure and behaviour. (B) collection of ... and behaviour. (D) collection of objects that incorporates both discrete data structure and behaviour.

Last Answer : (C) collection of discrete objects that incorporates both data structure and behaviour.

Description : Which one of the following statements, related to the requirements phase in Software Engineering, is incorrect ? (A) Requirement validation is one of the activities in the requirements phase. (B) ... . (D) Function points is one of the most commonly used size metric for requirements. 

Last Answer : (C) “Modelling-oriented approach” is one of the methods for specifying the functional specifications. 

Description : Language model used in LISP is ................. (A) Functional programming (B) Logic programming (C) Object oriented programming (D) All of the above

Last Answer : (A) Functional programming

Description : Which of the following is false regarding the evaluation of computer programming languages? (A) Application oriented features (B) Efficiency and Readability (C) Software development (D) Hardware maintenance cost

Last Answer : (D) Hardware maintenance cost

Description : Which of the following statements concerning Object-Oriented databases is FALSE? (A) Objects in an object-oriented database contain not only data but also methods for processing the data. (B ... Object-oriented databases store more types of data than relational databases and access that data faster.

Last Answer : (C) Object-oriented databases are more adapt at handling structures (analytical) data than relational databases.

Description : ................. is subject oriented, integrated, time variant, non-volatile collection of data in support of management decisions. (A) Data mining (B) Web mining (C) Data warehouse (D) Database Management System

Last Answer : (C) Data warehouse

Description : Abstraction and encapsulation are fundamental principles that underlie the object oriented approach to software development. What can you say about the following two statements? I. Abstraction allows us to focus on what something ... and II are correct. (3) Only II is correct. (4) Only I is correct.

Last Answer : (1) Neither I nor II is correct.

Description : If delaysare recorded as 10 bit numbers in a 50 router network, and delay vectorsare exchanged twicea second,how muchbandwidth per fill duplex line is occupied by the distributedrouting algorithm? A. 500 bps B. 1500 bps C. 5 bps D. 1000 bps

Last Answer : 1000 bps

Description : Which of the following is convenient between half-duplex and full-duplex transmission modes ?

Last Answer : Half-duplex transmission mode requires fewer devices. So half-duplex is convenient in terms of cost. Full-duplex is convenient in terms of data transmission. Because although it is possible to send data in ... receive data at the same time in half-duplex mode which is possible in full-duplex mode.

Description : Transmission sent in both directions simultaneously. A. Full duplex B. Duplex C. Half duplex D. Simplex

Last Answer : B. Duplex

Description : Transmission sent in both directions simultaneously. A. Full duplex B. Duplex C. Half duplex D. Simplex

Last Answer : B. Duplex

Description : Communiction circuits that transmit data in both directions but not at the same time are operating in a. a simplex mode b. a half duplex mode c. a full duplex mode d. an asynchronous mode

Last Answer : a half duplex mode

Description : Which data communication method is used to transmit the data over a serial communication link? a. simplex b. half-duplex c. full-duplex d. b and c e. None of above

Last Answer : full-duplex

Description : The interactive transmission of data within a time sharing system may be best suited to a. simplex lines b. half-duplex lines c. full duplex lines d. biflex-lines

Last Answer : half-duplex lines

Description : Gigabit Ethernet access methods include _______ mode. A) half-duplex B) full-duplex C) both (a) and (b) D) neither (a) nor (b)

Last Answer : both (a) and (b)

Description : Data flow between two devices canoccur in a _______ way. A) simplex B) half-duplex C) full-duplex D) all of theabove

Last Answer : all of theabove

Description : A television broadcast is anexample of_______ transmission. A) simplex B) half-duplex C) full-duplex D) automatic

Last Answer : simplex