Description : Which of the communication modes support two way traffic but in only once direction of a time? A) Simplex B) Half-duplex C) Three - quarter's duplex D) Full duplex
Last Answer : B) Half-duplex
Description : State whether true or false. i) A connection oriented protocol can only use unicast addresses. ii) The anycast service is included in IPV6. A) True, True B) True, False
Last Answer : i) A connection oriented protocol can only use unicast addresses.
Description : In mode, the communication channel is used in both directions at the same time? A) Full-duplex B) Simplex C) Half-duplex D) None of the above
Last Answer : Answer : A
Description : In _______ transmission, the channel capacity is shared byboth communicatingdevices at all times. A) simplex B) half-duplex C) full-duplex D) half-simplex
Last Answer : full-duplex
Description : Asynchronous protocol is A. message oriented B. clock oriented C. bit oriented D. character oriented
Last Answer : D. character oriented
Description : The most common protocol for point-to-pointaccess is the Point-to-Point Protocol (PPP), which is a _________protocol. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above
Last Answer : byte-oriented
Description : High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-pointand multipoint links. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above
Last Answer : bit-oriented
Description : Operating method in which the transmission is made alternately in each direction of a telecommunication channel A. Semi-duplex operation B. Duplex operation C. Half-duplex operation D. Simplex operation
Last Answer : C. Half-duplex operation
Description : he primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL
Last Answer : A) SSL
Description : The Excess-3 decimal code is a self-complementing code because (A) The binary sum of a code and its 9’s complement is equal to 9. (B) It is a weighted code. (C) Complement can be generated by inverting each bit pattern. (D) The binary sum of a code and its 10’s complement is equal to 9.
Last Answer : Answer: A, C
Description : A communication device that combines transmissions from several I/O devices into one line is a A) Concentrator B) Modifier C) Multiplexer D) Full duplex file
Last Answer : C) Multiplexer
Description : The relation "divides" on a set of positive integers is .................. (A) Symmetric and transitive (B) Anti symmetric and transitive (C) Symmetric only (D) Transitive only
Last Answer : (B) Anti symmetric and transitive Explanation: The ‘divide’ operation is antisymmetric because if a divides b does not necessarily implies that b divides a. If a divides b and b divides c then a divides c. So, it is transitive as well.
Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.
Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
Description : Which of the following property/ies a Group G must hold, in order to be an Abelian group? (a) The distributive property (b) The commutative property (c) The symmetric property Codes: (A) (a) and (b) (B) (b) and (c) (C) (a) only (D) (b) only
Last Answer : Answer: D
Description : The symmetric difference of two sets S1 and S2 is defined as S1ΘS2 = {x|xϵS1 or xϵS2, but x is not in both S1 and S2} The nor of two languages is defined as nor (L1,L2) = ... symmetric difference and nor. (D) The family of regular languages are not closed under both symmetric difference and nor.
Last Answer : (C) The family of regular languages are closed under both symmetric difference and nor.
Description : Transmission control protocol ___________ a. is a connection-oriented protocol b. uses a three way handshake to establish a connection c. receives data from application as a single stream d. all of the mentioned
Last Answer : d. all of the mentioned
Description : State weather the following statement is true or false for Stream Control Transmission Protocol (SCTP). 1). SCTP uses only few known ports in the TCP space. 2).SCTP is a new transport protocol at the same layer as TCP and ... , 3. false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true
Last Answer : D. 1.false, 2. true, 3. true
Description : Transmission control protocol is a) connection oriented protocol b) uses a three way handshake to establish a connection c) recievs data from application as a single stream d) all of the mentioned
Last Answer : d) all of the mentioned
Description : Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to sample the signal at twice the highest frequency (two samples per hertz). What is the bit rate required, if it ... sample requires 8 bits? (A) 32 kbps (B) 64 kbps (C) 128 kbps (D) 256 kbps
Last Answer : (C) 128 kbps
Description : Four channels are multiplexed using TDM. If each channel sends 100 bytes/second and we multiplex 1 byte per channel, then the bit rate for the link is ............... (A) 400 bps (B) 800 bps (C) 1600 bps (D) 3200 bps
Last Answer : (D) 3200 bps Answer: D Explanation: The multiplexer is shown in the Figure. Each frame carries 1 byte from each channel; the size of each frame, therefore, is 4 bytes, or 32 bits. Because each ... channel, the frame rate must be 100 frames per second. The bit rate is 100 32 = 3200 bps.
Description : Assume that we need to download text documents at the rate of 100 pages per minute. A page is an average of 24 lines with 80 characters in each line and each character requires 8 bits. Then the required bit rate of the channel is ... ...... (A) 1.636 Kbps (B) 1.636 Mbps (C) 2.272 Mbps (D) 3.272 Kbps
Last Answer : Answer: Marks given to all
Description : A pure ALOHA Network transmit 200 bit frames using a shared channel with 200 Kbps bandwidth. If the system (all stations put together) produces 500 frames per second, then the throughput of the system is .............. (A) 0.384 (B) 0.184 (C) 0.286 (D) 0.586
Last Answer : (B) 0.184
Description : Which of the following statements are true ? I. A circuit that adds two bits, producing a sum bit and a carry bit is called half adder. II. A circuit that adds two bits, producing a sum bit and a carry bit is called full adder. ... an inverter. (A) I & II (B) II & III (C) I, II, III (D) I, III & IV
Last Answer : (D) I, III & IV
Description : Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is (1) 20 (2) 10 (3) 30 (4) 40
Last Answer : (2) 10
Description : Optical fiber uses reflection to guide light through a channel, in which angle of incidence is ................. the critical angle. (A) equal to (B) less than (C) greater than (D) less than or equal to
Last Answer : (C) greater than
Description : Which of the following communications lines is best suited to interactive processing applications? a. narrow band channel b. simplex lines c. full duplex lines d. mixed band channels
Last Answer : full duplex lines
Description : A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of 01111110. If the output bit-string after stuffing is 01111100101, then the input bit-string is a. 0111110100 b. 0111110101 c. 0111111101 d. 0111111111
Last Answer : b. 0111110101
Description : Public key system is useful because a. it uses two keys. b. there is no key distribution problem as public key can be kept in a commonly accessible database. c. private key can be kept secret. d. it is a symmetric key system.
Last Answer : b. there is no key distribution problem as public key can be kept in a commonly accessible database.
Description : Is Java an Object Oriented language?
Last Answer : A: Yes.
Description : Which one of the following is true for Java? A) Java is object oriented and interpreted B) Java is efficient and faster than C C) Java is the choice of everyone. D) Java is not robust.
Last Answer : A) Java is object oriented and interpreted
Description : A …………… is an acyclic digraph, which has only one node with indegree 0, and other nodes have indegree 1. A) Directed tree B) Undirected tree C) Dis-joint tree D) Direction oriented tree
Last Answer : A) Directed tree
Description : The pure object oriented programming language with extensive metadata available and modifiable at run time is (A) Small talk (B) C++ (C) Java (D) Eiffel
Last Answer : (A) Small talk
Description : Superficially the term object-oriented , means that, we organize software as a (A) collection of continuous objects that incorporates both data structure and behaviour. (B) collection of ... and behaviour. (D) collection of objects that incorporates both discrete data structure and behaviour.
Last Answer : (C) collection of discrete objects that incorporates both data structure and behaviour.
Description : Which one of the following statements, related to the requirements phase in Software Engineering, is incorrect ? (A) Requirement validation is one of the activities in the requirements phase. (B) ... . (D) Function points is one of the most commonly used size metric for requirements.
Last Answer : (C) “Modelling-oriented approach” is one of the methods for specifying the functional specifications.
Description : Language model used in LISP is ................. (A) Functional programming (B) Logic programming (C) Object oriented programming (D) All of the above
Last Answer : (A) Functional programming
Description : Which of the following is false regarding the evaluation of computer programming languages? (A) Application oriented features (B) Efficiency and Readability (C) Software development (D) Hardware maintenance cost
Last Answer : (D) Hardware maintenance cost
Description : Which of the following statements concerning Object-Oriented databases is FALSE? (A) Objects in an object-oriented database contain not only data but also methods for processing the data. (B ... Object-oriented databases store more types of data than relational databases and access that data faster.
Last Answer : (C) Object-oriented databases are more adapt at handling structures (analytical) data than relational databases.
Description : ................. is subject oriented, integrated, time variant, non-volatile collection of data in support of management decisions. (A) Data mining (B) Web mining (C) Data warehouse (D) Database Management System
Last Answer : (C) Data warehouse
Description : Abstraction and encapsulation are fundamental principles that underlie the object oriented approach to software development. What can you say about the following two statements? I. Abstraction allows us to focus on what something ... and II are correct. (3) Only II is correct. (4) Only I is correct.
Last Answer : (1) Neither I nor II is correct.
Description : If delaysare recorded as 10 bit numbers in a 50 router network, and delay vectorsare exchanged twicea second,how muchbandwidth per fill duplex line is occupied by the distributedrouting algorithm? A. 500 bps B. 1500 bps C. 5 bps D. 1000 bps
Last Answer : 1000 bps
Description : Which of the following is convenient between half-duplex and full-duplex transmission modes ?
Last Answer : Half-duplex transmission mode requires fewer devices. So half-duplex is convenient in terms of cost. Full-duplex is convenient in terms of data transmission. Because although it is possible to send data in ... receive data at the same time in half-duplex mode which is possible in full-duplex mode.
Description : Transmission sent in both directions simultaneously. A. Full duplex B. Duplex C. Half duplex D. Simplex
Last Answer : B. Duplex
Description : Communiction circuits that transmit data in both directions but not at the same time are operating in a. a simplex mode b. a half duplex mode c. a full duplex mode d. an asynchronous mode
Last Answer : a half duplex mode
Description : Which data communication method is used to transmit the data over a serial communication link? a. simplex b. half-duplex c. full-duplex d. b and c e. None of above
Description : The interactive transmission of data within a time sharing system may be best suited to a. simplex lines b. half-duplex lines c. full duplex lines d. biflex-lines
Last Answer : half-duplex lines
Description : Gigabit Ethernet access methods include _______ mode. A) half-duplex B) full-duplex C) both (a) and (b) D) neither (a) nor (b)
Last Answer : both (a) and (b)
Description : Data flow between two devices canoccur in a _______ way. A) simplex B) half-duplex C) full-duplex D) all of theabove
Last Answer : all of theabove
Description : A television broadcast is anexample of_______ transmission. A) simplex B) half-duplex C) full-duplex D) automatic
Last Answer : simplex