CS601Quiz-2 Solution Fall 2022 (Lectures to )

4

  Vu All Subjects Assignment Quiz GDB Handouts Available here


 Aslam U Alaikum!

Dear Students,

In this post we are providing you CS601 Quiz-2 Solution Fall 2022 ( to ) 100% correct or right solution.

 In order to resolve link layer address of the next node, the first generated ARP request is always in _________ mode.

Broadcast         

A3:34:45:11:92:F1 is a ____________________ link layer address..

Multicast Address

In _________ type of error, two or more bits in the data unit will be changed.

Burst                                                                                  

1.      In _____ each station is allocated a time slot during which it can send data

                                         TDMA…….confirm

2.      PAP and CHAP are used by __ as Authentication Protocols.

                                       PPP……confirm

3.      In each character protocol each character of frame is encoded using ____ coding system .

                                                          Bit-oreinted

 

4.      IN MAC, when nodes use a multi-point or broadcast link, we need a _________ to coordinate access to the link.

                                        Multiple-access protocol/……confirm

5.      The orginal Etherrnet technology with the data rate of 10 MBps is called______?

                                            Standard Ethernet….confirm

 

6.      ________ uses fiber-optic cable

                                            10base-F….confirm

7.      One of the most common protocols for point-to-point access is _______.

                                                   PPP……confirm

8.      __________ is an Authentication Protocol, which uses two-step process to authenticate user information.

                                                        PAP……confirm

9.      If duration of noise is decreased during a transmission over noisy channel, fixed data rate of the channel will cause _______ number of bits being impacted by the noise

                                                         More…..confirm

10.  For carrier sense Multiple Access/Collision Detection (CSMA/CD), we need a restriction on the

                                                                             Collision size….confirm

 

11.  Stop-and-Wait protocol is used for _________.

                                      Both flow and error control……confirm

 

12.  In hexadecimal notation of Ethernet address, each byte is separated by _______ symbol.

                                           Colon….confirm

13.  In a linear block code, the _______ of any two valid codewords creates another valid codeword.

14.   

                                                      XOR…..confirm

15.  In the ______ method, the stations in a network are organized in a logical ring.

                                                 Token-passing….confirm

16.  Which one of the following is not a Channelization Protocol?

                                            CSMA……confirm

17.  In order to find the location of two errors in an eight bit stream, we have to see ________ different combinations.

                                                           28….confirm

18.  If we need to correct a single error in an 8-bit data unit, we need to consider _____ possible error locations

                                              16…..confirm

19.  In _______ each station sends a frame whenever it has a frame to send.

                                          Slotted ALoHA…..confirm

20.  ________ is the process of converting digital data to digital signals.

                                  Line coding…..confirm

21.  In case of higher data rate, the number of impacted bits will be ________.

                                    Higher

22.  In _ protocol, the sender sends one frame at a time and wants for an acknowledgment before sending the next one.

                                                        Stop-and-wait

23.  In block coding we divide our message into blocks of K bits called as _____.

                                      Data words….confirm

24.  CDMA stands for ________.

                                            Code division Multiple Access…..confirm

25.  ____ is not a function of data link control.

                                               Modulation…..confirm

26.  CHAP is an Authentication Protocol, which uses ______ process to authenticate user information.

                                                    Three-way……confirm from net

27.  In the context of Ethernet address, the source address is always a ______ address.

                                                 Unicast…confirm

28.  In the context of Ethernet address, the destination address is always a ______ address.

                                   Unicast, multicast, broadcast….confirm

29.  __________ transmission technology (based on Ethernet) provides a data rate of 1 billion bits per second.

                                                       Gigabit Ethernet….confirm

30.  Fast Ethernet has a data rate of ____ Mbps.

                              100…..confirm

31.  In random access method, when two or more than two nodes transmit at the same time when

                                                  All the nodes in collision survives

32.  Data link layer is divided into ______ sub layers

                                    Two…..confirm

33.  If the harming distance between sent and received code word is ______ then it shows that received data is corrupted.

                                      (Is not equal to)0….confirm

34.  In order to find hamming distance between two pair of words, _____ logical operation is used.

                                                    XOR….confirm

35.  Ethernet address is of ___ bytes

                              6….confirm

 

36.  In ________ a station monitors the medium after it sends a frame to see if the transmission was successful.

                                 CSMA/CD……confirm

37.  For carrier sense Multiple Access/Collision Detection (CSMA/CD), we need a restriction on the _______.

                                         Frame size…confirm

 

38.  Ethernet address is of _______ bytes

                                                  6

39.  What was the main drawback in the aloha random access method

                                             Redundancy in data

40.  In telephone, network POP stands for

                                    Point-of presence

41.  Possession of token gives the station the right to _______.

                                   Send the data

42.  In Ethernet, the source address field in the MAC frame is the _ address

                                  Previous station physical

43.  Normally the value of Kmax in pure aloha is

                             15

44.  ______ uses thin coaxial cable.

                                       10 base 5

45.  MAC stands for ____

                            Media access control

46.  In the context of Ethernet implementations maximum medium length of 10 base-F

                          2000

47.  Transmission technology based on Ethernet provides a data rate of 1 billion bits per second.

                                                 Standard Ethernet

48.  Works with topologies in which one device is designated as a primary station  and the other devices are secondary stations

                                                        None of the given

49.  MAC address is of ________.

                                                 48 bits

50.  The type of aloha which improves the efficiency of pure aloha is.

                                  Slotted aloha

51.  A personal computer or workstation on an Ethernet network must have _____ card

                                    NIC

52.  In which controlled access method all data exchange must be made through primary device even when the ultimate destination is a secondary device

                               Polling

53.  In _ each band is reserved for a specific station and it belongs to the station all the time

                                          FDMA

54.  In pure aloha the vulnerable time is ___ the frame transmission time

                                      Two times

55.  DSl stands for _______.

                           Digital subscriber line

56.  In the context of Ethernet address, the source address is always a __________ address

                        Multicast

57.  The original Ethernet technology with the data rate of 10 Mbps is called

                              Standard ethernet

58.  Which of the following is a correct controlled access method

                            All options

59.  When we represent the data in CDMA if a station Is idle then it sends

                             0

60.  In telephone, network POP stands for _________.

                      Point of presence

 

61.  What was the main drawback in the aloha random access method

                        Redundancy data rate

62.  _transmission technology based on Ethernet provide a data rrate of 1 billion bits per second

                                   Gigabit Ethernet

63.  In which controlled access method all data exchanges must be made through a primary device even when the ultimate destination is a secondary device.

                                                   Polling

64.  In telephone, network POP stands for

                     Point of presence

65.  Mac address is of _____

                48 bits

66.  In _____ collision are avoided by deferring transmission even if the channel is idle

                        The interframe space

67.  POTS stand for _?

                 Plain old telephone system……confirm

68.  Normally the value of Kmax in pure aloha is

                15

69.  In Ethernet frame both  destination and sender addresses are of length

                                  6 byte

70.  In _____ each band is reserved for a specific station and it belongs to the station all the time

                                   FDMA

71.  The original Ethernet technology with a data rate of 10MBps is called

                      Standard Ethernet

 

72.  The _ method has the highest chance of collision because two or more stations may find the line idle and send their frames immediately

                                    1 persistent method

73.  IN allocated a time slot during which it can send data each station is

                                          TDMA

74.  In which controlled access method al data exchanges must be made through primary device even when the ultimate destination is a secondary device

                                    Polling

75.  CDMA stands for

                                 Code data multiply access

76.  Works with topologies in which one device is designated as a primary station and the other device are secondary stations

                                         Polling

77.  In Ethernet, the source address field in the MAC frame is the address

                                   Next destination physical

1.  VCI address is ________ address in virtual circuit approach.

1.  Private

2.  Variable

3.  Local

4.  Global

2.  Traditionally MANs have been implemented using one of the 2 technologies, Circuit Switching and Packet Switching

1.  true

2.  false

 

3.  In the ________ method, the stations in a network are orgamized in a logical ring.

1.  Token-passing

2.  Polling

3.  Reservation

4.  None of the given

4.  Like 10 Base 5, 10 Base 2 is a ________ topology LAN.

1.  Ring

2.  Mesh

3.  Star

4.  Bus

5.  In Pure ALOHA, the vulnerable time is ________ the frame transmission time.

1.  Same as

2.  Three times

3.  Two times

4.  Four times

6.  The transmission medium that carries the message is referred to as the ___________.

1.  send and receive device

2.  communication channel

3.  protocol

4.  gateways

7.  Analog signals are refers to be ___________

1.  Continuous

2.  Discrete

3.  Periodic

4.  Aperiodic

 

 

8.  There are _________ types of serial transmission.

1.  3

2.  4

3.  2

4.  None of the given

9.  To calculate the data rate for noisy channel ________ formula is used.

1.  Shannon

2.  Nyquist

3.  Propagation

4.  Greedy

10.             There are three types of Hubs that exist. Which of the following options correctly describes these three?

1.  Passive, dormant, special

2.  Active , dormant , passive

3.  Passive, Active, Turbo

4.  Passive, Active, Intelligent

11.             ________ is the rate of change with respect to time.

1.  Voltage

2.  Time

3.  Frequency

4.  Amplitude

12.             To control and manage the transfer of data, a protocol called Point to Point Protocol (PPP) is used at the ________ layer.

1.  Physical

2.  Network

3.  Presentation

4.  Data link

13.             What is the frequency of a sine wave if it completes one cycle in 2 seconds?

1.  0.5

2.  0.6

3.  0.3

4.  0.2

14.             ________ relatively measures the strength of two signals.

1.  Signal rate

2.  Bit rate

3.  Decibel

4.  Pulse Rate

15.             Central Hub in a Tree is an ___________.

1.  Active hub

2.  passive hub

16.             At the CRC generator, ___________ added to the data unit before the divisional process.

1.  0s are

2.  1s are

3.  a polynomial is

4.  a CRC remainder is

17.             A broadcast signal is received by the orbiting satellites which rebroadcasts ________.

1.  to the resender

2.  to the sender

3.  to the atmosphere

4.  none of the given

 

 

18.             The flag in PPP is a byte that needs to be ________ whenever it appears in the data section of the frame.

1.  Duplicated

2.  Blocked

3.  Cleaned

4.  Escaped

19.             In _________, a signal is directed straight from antenna to antenna.

1.  Line of sight propagation

2.  Ground propagation

3.  Space propagation

4.  Tropospheric propagation

20.             Which of the following consist of just one redundant bit per data unit?

1.  Two dimentional Parity check.

2.  CRC

3.  Simple Parity Check

4.  Checksum

21.             The term _______means that only one bit of a given data unit is changed from 1 to 0 or from 0 to 1.

1.  Packet Error

2.  Burst Error

3.  Single Bit Error

4.  Character Error

22.             Flow control is needed to prevent ________.

1.  Bit errors

2.  Overflow of the sender buffer

3.  Overflow of the receiver buffer

4.  Collision between sender and receiver

 

23.             Transmission Control Protocol is a(n) ________ layer protocol.

1.  Transport

2.  Application

3.  Session

4.  Network

24.             A fiber -optic cable transmit signals in the form of ________.

1.  Light

2.  Sound

3.  Wave

4.  None of the given

25.             Possession of TOKEN gives the station the right to ________.

1.  Modify the data

2.  Send the data

3.  Delete the data

4.  Receive the data

26.             The inversion of the level at 1 bit is called as ________.

1.  NRZ-L

2.  NRZ-I

3.  RZ

4.  None of the given.

27.             What was the main draw back in ALOHA Random-Access method?

1.  Redundancy in Data

2.  Potential Collision

3.  Inconsistent Data rate

4.  All of the given

28.             Data is transmitted using light through a ___________ cable.

1.  twisted pair

2.  fiber-optic

3.  coaxial

4.  microwave

29.             In ________, each station sends a frame whenever it has a frame to send.

1.  Slotted ALOHA

2.  Fragmented ALOHA

3.  Pure ALOHA

4.  None of the given

30.             In OSI model headers are added at layer _________.

1.  1,2,3 only

2.  6,5,7 only

3.  5,4,3 only

4.  6,5,4,3,2 only

31.             Is there any difference between Data communication and telecommunication are network?

1.  Yes

2.  No

32.             ________ is an Authentication Protocol, which is used by the PPP to authenticate passwords.

1.  CHAP

2.  PAP

3.  LCP

4.  ICMP

33.             Which level of the TCP/IP reference model routes data/information across a network channel?

1.  Application Layer

2.  Data Link Layer

3.  Transport Layer

4.  Network Layer

34.             In ASK, both ______ and ________ remain constant.

1.  Amplitude, Frequency

2.  Amplitude, phase

3.  Frequency, Phase

4.  Amplitude, Samples

35.             Which error detection method consists of a parity bit for each unit as well as an entire data unit of parity bits?

1.  Checksum

2.  Cyclic Redundancy Check (CRC)

3.  Longitudinal Red Check (LRC)

4.  Vertical Redundancy Check (VRC)

36.             Baud rate is greater than or equal to the bit rate.

1.  True

2.  False

37.             The most common type of connector used by coaxial cable is ________.

1.  BNC

2.  RJ-45

3.  RJ-11

4.  RJ-57

38.             In even parity check code, the value of syndrome is ________ if the number of 1s is even.

1.  1

2.  2

3.  0

4.  4

39.             What is the period of a Sine wave having frequency of 10 Hz?

1.  0.2

2.  0.1

3.  0.5

4.  0.3

40.             In ________, both peak amplitude and frequency remains constant as the phase changes.

1.  PSK

2.  QAM

3.  Both PSK & QAM

4.  None of the given

41.             There are __________types of guided media.

1.  2

2.  3

3.  4

4.  5

42.             ________ is responsible for governing node to node communication.

1.  Application Layer

2.  Session Layer

3.  Data Link layer

4.  Presentation Layer

43.             TROPOSHERE is the layer of atmosphere above the troposhere but below space

1.  True

2.  False

44.             Terminal, microprocessor, computer, printer or any other device that generates or consumes digital data is known as ___________

1.  DCE

2.  DTE

3.  DCE & DTE

4.  None of the given

45.             Normally the value of Kmax in pure ALOHA is ________.

1.  25

2.  10

3.  15

4.  30

46.             Sampling means measuring ____________ of signal at equal intervals

1.  Amplitudes

2.  Frequencies

3.  Phases

4.  None of the given

47.             A sine wave is ___________.

1.  periodic and discrete

2.  aperiodic and discrete

3.  periodic and continuous

4.  aperiodic and continuous

48.             The inversion of the level represents a 1 bit in ______ encoding

1.  NRZ-I

2.  NRZ-L

3.  RZ

4.  Manchester

49.             To make sure that source does not overwhelm destination by sending data faster than it can be handled and processed is called?

1.  Addressing & Routing

2.  Exchange Management

3.  Flow Control

4.  Recovery

50.             Time domain plot show changes in signal phase with respect to time.

1.  true

2.  false

51.             In which controlled-access method all data exchanges must be made through primary device even when the ultimate destination is a secondary device?

1.  Polling

2.  Reservation

3.  Token Passing

4.  Port Forwarding

52.             If a digital signal has "L" number of levels. ________ is the number of bits required to represent each level.

1.  Log L

2.  Log Base 2 L

3.  L Square

4.  Log(2*L)

53.             ________ category of coaxial cable is used for Cable TV.

1.  RG-58

2.  RG-59

3.  RG-11

4.  RG-47

54.             The level of signal is always positive in NRZ encoding.

1.  true

2.  false

55.             Radio is an example of _______ signal conversion.

1.  Analog to analog

2.  Analog to digital

3.  Digital to Digital

4.  Digital to analog

56.             Analog To Analog Conversion Methods include ___________.

1.  AM, PM and FM

2.  AM, FSK and PM

3.  AM, PM and QAM

4.  None of the given

57.             The original Ethernet technology with the data rate of 10 Mbps is called ________?

1.  Standard Ethernet

2.  Fast Ethernet

3.  Gigabit Ethernet

4.  10 Gigabit Ethernet

58.             Which of the following is not a characteristic of a sine wave?

1.  Amplitude

2.  Segmentation

3.  Phase

4.  Frequency

59.             By using ___________ system, change in the file contents during file transmission can be avoided.

1.  Routing

2.  Flow Control

3.  Error Detection and Correction

4.  Congestion Control

60.             In order to find the location of two errors in an eight bit stream, we have to see ________ different combinations.

1.  28

2.  16

3.  8

4.  4

61.             In CSMA/CA, ________ is the amount of time divided into slots.

1.  Interframe Window

2.  Contention Window

3.  Fragmented Window

4.  Collided Window

62.             ________ is used in the Stop-and-Wait protocol to overcome the issue of duplication.

1.  Frame sequencing

2.  Acknowledgement numbering

3.  Counter and Timer reset

4.  Frame sequencing and Acknowledgement numbering

63.             Which one of the following is a correct-access method?

1.  Polling

2.  Token Passing

3.  Reservation

4.  All of the given

64.             In the encoding where positive to negative transition is one and vice versa is zero.

1.  Manchester

2.  Differential Manchester

3.  All of the given

4.  None of given

65.             If the window size is 63 in go-back N ARQ then what is the range of sequence number?

1.  0 to 63

2.  0 to 64

3.  1 to 63

4.  1 to 64

66.             Following characteristics fully describe ___________,
Amplitude
Period/Frequency
Phase

1.  Sine Waves

2.  Digital Signals

3.  Aperiodic Signals

4.  None of the given

67.             Digitizing an Analog Signal is called ___________.

1.  Analog-to-Digital Conversion

2.  Digital-to-Digital Conversion

3.  Digital-to-Analog Conversion

4.  None of the given

68.             At the CRC checker, ___________ means that the data unit is damaged.

1.  A string of 0s

2.  A string of 1s

3.  A string of alternating 1s and 0s

4.  A nonzero remainder

69.             Which one of the following is a Random-Access protocol?

1.  TDMA

2.  CDMA/CD

3.  ALOHA

4.  CDMA/CA

70.             Human voice is example of ___________ signal.

1.  Digital

2.  Analog

3.  Discrete

4.  None of the given

71.             In statistical time division multiplexing, number of slots in frame are less than ________.

1.  Output data rate

2.  Input lines

3.  Input frequency

4.  Multiplexed T lines

72.             A ________ modem is used to connect two DTEs directly.

1.  'NULL

2.  Cable

3.  DSL

4.  None of the given

73.             If we need to correct a single error in an 8-bit data unit, we need to consider ________ possible error locations.

1.  16

2.  2

3.  4

4.  8

74.             Asynchronous TDM is efficient only when the size of the time slot is kept relatively ___________.

1.  Large

2.  Small

3.  Medium

4.  Zero

75.             The ________ protocol uses both flow and error control.

1.  TCP/IP

2.  HDLC

3.  ICMP

4.  Stop-and-Wait

76.             In ________, each station is allocated a time slot during which it can send data.

1.  CDMA

2.  NDMA

3.  TDMA

4.  FDMA

77.             The extra bits added with the original data for error detection/correction are called ________.

1.  Fault bits

2.  Port numbers

3.  Redundant bits

4.  Process IDs

78.             ________ is correct formula to determine the total number of ports needed for one system connected in a mesh network.

1.  N+1

2.  N-1

3.  N(N+1)

4.  NxN

79.             ________ is sometimes called the bit rate.

1.  signal rate

2.  modulation rate

3.  Data rate

4.  pulse rate

80.             Collisions in CSMA/CA are avoided through ________.

1.  The Interframe Space

2.  The Contention Window

3.  Acknowledgements

4.  All of the given

81.             ________ category of coaxial cable is used for thin Ethernet.

1.  RG-58

2.  RG-59

3.  RG-1

4.  RG-47

82.             Which one is not the function of data link layer?

1.  Line discipline

2.  Flow control

3.  Error control

4.  Network control

83.             Session layer is responsible for _________.

1.  Reassembly of data

2.  Maintaining the connection

84.             ________ mode of serial transmission guarantees fixed rate of data.

1.  Synchronous

2.  Asynchronous

3.  Isochronous

4.  Metasochronous

85.             Data Link layer provides services to the ________ layer.

1.  Application

2.  Transport

3.  Network

4.  Session

86.             The ________ is the number of signal elements sent per unit time.

1.  Data rate

2.  Signal rate

3.  Bit rate

4.  Period

87.             The logical connection between the peer layers is ________ connection.

1.  Physical

2.  Direct

3.  Indirect

4.  Tangible

88.             What is the period of a Sine wave having frequency of 5 Hz?

1.  0.2

2.  0.1

3.  0.5

4.  0.3

89.             A sine wave is defined by ___________ characteristics.

1.  2

2.  3

3.  4

4.  5

90.             If duration of noise is decreased during a transmission over noisy channel, fixed data rate of the channel will cause ________ number of bits being impacted by the noise.

1.  Constant

2.  More

3.  Less

4.  Zero

91.             S-frames in High-Level Data Link Control (HDLC) are only used to transfer ________ information.

1.  User data

2.  Control

3.  Redundant

4.  Original

92.             The __________ generates the data and passes it along with any control information to a __________.

1.  DTE, DCE

2.  DCE, DTE

3.  DTE, DTE

4.  DCE, DCE

93.             The type of ALOHA which improves the efficiency of Pure ALOHA is ________.

1.  Slotted ALOHA

2.  Upper ALOHA

3.  Integrated ALOHA

4.  Lower ALOHA

94.             What is the period of a Sine wave having frequency of 2 Hz?

1.  0.2

2.  0.1

3.  0.5

4.  0.3

95.             WDM stands for ________.

1.  Wideband De-Modulation

2.  Worst Data Manipulation

3.  Wavelength Division Multiplexing

4.  None of the given

96.             Latency is made of ________ components.

1.  Two

2.  Three

3.  Four

4.  Five

97.             The logical connection between the peer layers is ________ connection.

1.  Physical

2.  Direct

3.  Indirect

4.  Tengible

98.             In line discipline after the data transmission, the sending system finishes with an ________ frame.

1.  EOT

2.  EKT

3.  ENT

4.  ESP

99.             ________ of a signal is the collection of all the component frequencies it contains.

1.  Time domain

2.  Frequency domain

3.  Frequency spectrum

4.  None of the given

100.         CHAP is an Authentication Protocol, which uses ________ process to authenticate user information.

1.  Two-way

2.  Three-way

3.  Four-way

4.  Five-way

101.         RZ stands for ___________.

1.  Return to Z

2.  Retire a Zero

3.  Return ot Zero

4.  None of the given

1.  In ________ each band is reserved for a specific ststion, and it belongs to the station all the time.

1.  FDMA

2.  CDMA

3.  TDMA

4.  CSMA

2.  In TCP/IP protocol suite, the process of adding header at each layer on sending side is known as ________.

1.  Encapulation

2.  De-encapulation

3.  Packetizing

4.  Framing

3.  In Block coding we divide our message into blocks of k bits called as ________.

1.  Code words

2.  Data words

3.  Passwords

4.  Cross words

4.  In circuit switched networks we have low efficiency but minimal ________.

1.  Delay

2.  Speed

3.  Throughput

4.  Errors

5.  Error correction is more ________ than the error detection.

1.  Easy

2.  Useless

3.  Informal

4.  Difficult

6.  AM signal requires ___________ the BW of original signal

1.  Twice

2.  Half

3.  Same

4.  Three Times

7.  Asynchronous transmission is ___________.

1.  Slow

2.  Fast

3.  Costly

4.  None effective

8.  The Internet is ___________.

1.  software for sending e-mail around the world

2.  a government-owned agency that links computers

3.  a global network of computers networks

4.  a specialised form of local area network

9.  Time division multiplexing is used in ________ systems.

1.  Analog

2.  Hybrid

3.  Digital

4.  Automated

10.             Radio wave transmission utilizes ___________ different types of propagation.

1.  Two

2.  Three

3.  Four

4.  Five

11.             Checksum is an error-detection technique that can be applied to a message of ________ length.

1.  Exactly 4

2.  Exactly 8

3.  Exactly 32

4.  Any

12.             At the Application layer, object/information is in the form of ________.

1.  Message

2.  Packet

3.  Segment

4.  Frame

13.             POST stand for ________?

1.  Plain Old Telephone Set

2.  Plain Old Time Sharing

3.  Plain Old Telephone System

4.  Plain Old Telephone Service

14.             Which of the following statement is correct?

1.  Digital signals are less prone to Noise

2.  Digital signals are highly prone to Noise

3.  Analog Signals are less prone to Noise

4.  Digital signals are not affected by Noise

15.             In selective-reject ARQ, only the specific damaged or lost frame is ________.

1.  Retransmitted

2.  Forwarded

3.  Selected

4.  Rejected

16.             In ASK correct formula for calculating the bandwidth ia as ________.

1.  B=(1+d)S

2.  B=(1*d)S

3.  B=(d-1)S

4.  B=(d-5)S

17.             Encoding digital data into digital signals is called ___________.

1.  Analog-to-Digital Conversion

2.  Digital-to-Digital Conversion

3.  Digital-to-Analog Conversion

4.  None of the given

18.             If the Hamming distance between sent and received code word is ________, then it shows that received data is corrupted.

1.  ≠ 0

2.  = 0

3.  ≠ 1

4.  = 1

19.             Quadrature Amplitude Modulation (QAM) is the combination of ________ and ________.

1.  FSK, PSK

2.  PSK, FSK

3.  ASK, PSK

4.  ASK, FSK

20.             PSK is susceptible to the noise degradation.

1.  True

2.  False

21.             ________ works with topologies in which one drvice is designated as a primary station and the other devices are secondary stations.

1.  Reservation

2.  Polling

3.  Token

4.  None of the given

22.             No matter whether the link is dedicated or broadcast, data link control (DLC) layer provides services between ________.

1.  Virtual LANs

2.  Two adjacent nodes

3.  Ethernet links

4.  Source and destination PCs

23.             CDMA stands for ________.

1.  Carrier Division Multiple Access

2.  Carrier Data Multiple Access

3.  Code Data Multiple Access

4.  Code Division Multiple Access

24.             If users must take turns using the link, then it is called Spatial Sharing.

1.  true

2.  false

25.             GO-BACK-N protocol is one of the ________ layer protocols, which is used to control the flow of data during the transmission.

1.  Physical

2.  Network

3.  Presentation

4.  Data link

26.             In ___________ a dedicated communication path is established between two stations through the nodes of the network

1.  Circuit switching

2.  Packet switching

27.             Signals travel through fiber optic cable are in the form of ________.

1.  Light

2.  Bits

3.  Electromagnetic

4.  Bytes

28.             ________ contains a repeater.

1.  Active hub

2.  Passive hub

29.             In frequency shift keying, ________ remain(s) constant.

1.  Frequency

2.  Amplitude

3.  Both Amplitude and Phase

4.  Both Phase and Frequency

30.             ________ is/are un-reliable protocol(s).

1.  IP and TCP

2.  UDP

3.  IP and UDP

4.  TCP

31.             ________ is not a function of Data Link Control.

1.  Framing

2.  Modulation

3.  Error Control

4.  Flow Control

32.             Each computer on the Internet has a unique numeric address called a(n) ___________.

1.  domain address

2.  protocol address

3.  IP address

4.  Web address

33.             dB is negative if a signal is ___________.

1.  Attenuated

2.  Distorted

3.  Amplified

4.  Noisy

34.             We can have ________ different groups with a 4 bit block.

1.  4

2.  8

3.  16

4.  32

35.             Line Configuration refers to the way two or more devices attach to a ___________.

1.  Path

2.  Circuit

3.  Link

4.  Router

36.             Error detection and correction are the services provided by ________ layer.

1.  Data link layer

2.  Application layer

3.  Physical layer

4.  Session layer

37.             Which of the following sublyer resolves the contention for the shared media.

1.  MAC

2.  LLC

3.  Physical

4.  None of the given.

38.             There are ________ basic categories of multiplexing.

1.  2

2.  3

3.  7

4.  5

39.             Low pass channel has ________ bandwidth between two stations.

1.  Dedicated

2.  Shared

3.  Multiplexed

4.  Infinite

40.             BSC supports ___________ transmission using ___________ flow control.

1.  Full-duplex, Stop and wait ARQ

2.  Half-duplex, Selective reject ARQ

3.  Full-duplex, Selective reject ARQ

4.  Half-duplex, Stop and wait ARQ

41.             Quantization is a method of assigning ________ values in a specific range to sampled instances.

1.  Negative

2.  Positive

3.  Binary

4.  Integral

42.             ________ encoding is almost obsolete today

1.  Bipolar

2.  Unipolar

3.  Polar

4.  None of the given

43.             YMODEM has ________ Byte of data unit.

1.  1024

2.  256

3.  128

4.  512

44.             Like Data link layer, ___________ is also responsible for Flow control.

1.  Transport Layer

2.  Session Layer

45.             In CRC there is no error if the remainder at the receiver is _______.

1.  Equal to the remainder at the sender

2.  Zero

3.  Nonzero

4.  The quotient at the sender

46.             ________ is normally used where speed is priority in data transfer.

1.  Serial data transmission

2.  Hybrid data transmission

3.  Parallel data transmission

4.  Both parallel and serial data transmission

47.             In Block coding scheme, number of code words is always ________ data words.

1.  Less than

2.  Equal to

3.  Greater than

4.  Same as

48.             A portion of the path that carries TX between a given pair of devices is known as ___________.

1.  Direct Point

2.  Bridge

3.  Channel

4.  Access Point

49.             What is the Bandwidth of a periodic signal if it is decomposed into 4 sine waves with frequencies 200, 400, 600 and 800?

1.  100

2.  500

3.  300

4.  600

50.             ________ is the process of converting digital data to digital signals.

1.  CSMA/CD

2.  CSMA/CA

3.  Line coding

4.  Segmentation

51.             ________ transmission technology (based on Ethernet) provides a data rate of 1 billion bits per second.

1.  Fast Ethernet

2.  Standard Ethernet

3.  Gigabit Ethernet

4.  10BASE-T Ethernet

52.             Congestion Control is a feature of layer(s).

1.  Data Link

2.  Network

3.  Transport

4.  All mentioned

53.             In Pure ALOHA, the vulnerable time is ________ the frame transmission time.

1.  Same as

2.  Two times

3.  Three times

4.  Four times

54.             What is the Bandwidth of a periodic signal if it is decomposed into 4 sine waves with frequencies 300, 600, 900 and 1200?

1.  100

2.  900

3.  300

4.  600

55.             ________ signal can take infinite levels of intensity over time.

1.  Digital

2.  Discrete

3.  Analog

4.  Logical

56.             Mr. Asif while sitting in Lahore is talking with his friend in Dubai through Skype is an example of ________.

1.  Local Area Network

2.  Metropolitan Area Network

3.  Wide Area Network

4.  Home Based Network

57.             Which layer is concerned with the syntax and semantics of info exchange between two systems?

1.  Physical

2.  Application

3.  Session

4.  Presentation

58.             Time domain shows changes in ___________.

1.  time w.r.t signal amplitude

2.  signal amplitude w.r.t time

3.  time

4.  All of the given

59.             In ASK, Noise usually affects the ________.

1.  Amplitude

2.  Phase

3.  Sample

4.  Frequency

60.             In analog transmission, the base signal is called the________.

1.  Carrier Signal

2.  Analog signal

3.  Digital signal

4.  Modulated signal

61.             Which of the following is most affected by noise?

1.  PSK

2.  ASK

3.  FSK

4.  QAM

62.             In Synchronous TDM, Time slots are not same in number as input devices.

1.  True

2.  False

63.             The flag in PPP is a byte that needs to be ________ whenever it appears in the data section of the frame.

1.  Duplicated

2.  Blocked

3.  Cleaned

4.  Escaped

64.             Guard bands are used in ________ multiplexing technique, to avoid overlapping of frequency bands assigned to each user.

1.  PDM

2.  CSMA

3.  TDM

4.  FDM

65.             DLC in Data Link Layer stands for ________.

1.  Divide Line Communication

2.  Data Line Code

3.  Data Link Control

4.  Demand Link Coordination

66.             In Pulse Code Modulation (PCM), the sampling is dependent on ________.

1.  Time

2.  Amplitude

3.  Frequency

4.  Signal Rate

67.             Digital signals are refered to be ___________.

1.  Continuous

2.  Discrete

3.  All of the given

4.  None of the given

68.             Two or more computers connected so that they can communicate with each other and share information is called a ___________.

1.  satellite

2.  protocol

3.  broadcast

4.  network

69.             Which error detection method uses one's complement arithmetic.

1.  Cyclic Redundancy Check (CRC)

2.  Longitudinal Red Check (LRC)

3.  Checksum

4.  Simple Parity Check

70.             WDM stands for _________.

1.  Wave Division Multiplexing

2.  Wrong Division Multiplexing

3.  Well Division Multiplexing

4.  West Division Multiplexing

71.             Analog refers to something that is continuous in ___________.

1.  Time

2.  Space

3.  Frequency

4.  None of the given

72.             What is the frequency of a sine wave if it completes one cycle in 5 seconds?

1.  0.5

2.  0.6

3.  0.3

4.  0.2

73.             In an analog hierarchy to carry voice channels, a group can carry ________ voice channels.

1.  60

2.  12

3.  20

4.  10

74.             STP is more expensive than UTP and is less susceptible to noise.

1.  True

2.  False

75.             Switch is a network device which operates on the ________ layer of the TCP/IP protocol suite.

1.  Application

2.  Transport

3.  Presentation

4.  Data link

76.             ________ are used to exchange session management and control information between connected devices.

1.  I-frames

2.  U-frames

3.  S-frames

4.  N-frames

77.             The message 1110 sent by a source is received by a destination as 1011. This is ________ type of error.

1.  Burst

2.  Single-Bit

3.  Uni-Bit

4.  Hamming


If you appreciate our work, please share our website vuonlinehelp.blogspot.com with your friends.

We are here to provide Latest Virtual University Assignment Solutions, GDB Solutions, Quiz  Solution, Midterm Past Papers, and Final term Past Papers in this website.

Post a Comment

4Comments

Thanks everone

Post a Comment