Multiple Choice Questions (MCQs)
In Pulse Code Modulation (PCM), the sampling is dependent on ________.
The type of ALOHA which improves the efficiency of Pure ALOHA is ________.
There are _________ types of serial transmission.
In statistical time division multiplexing, number of slots in frame are less than ________.
Congestion Control is a feature of layer(s).
Low pass channel has ________ bandwidth between two stations.
The flag in PPP is a byte that needs to be ________ whenever it appears in the data section of the frame.
In line discipline after the data transmission, the sending system finishes with an ________ frame.
What is the frequency of a sine wave if it completes one cycle in 5 seconds?
CDMA stands for ________.
In ASK, both ______ and ________ remain constant.
Traditionally MANs have been implemented using one of the 2 technologies, Circuit Switching and Packet Switching
In ________, both peak amplitude and frequency remains constant as the phase changes.
WDM stands for ________.
________ is normally used where speed is priority in data transfer.
The inversion of the level at 1 bit is called as ________.
Is there any difference between Data communication and telecommunication are network?
The logical connection between the peer layers is ________ connection.
Like 10 Base 5, 10 Base 2 is a ________ topology LAN.
Checksum is an error-detection technique that can be applied to a message of ________ length.
________ is sometimes called the bit rate.
Which of the following consist of just one redundant bit per data unit?
________ are used to exchange session management and control information between connected devices.
What is the Bandwidth of a periodic signal if it is decomposed into 4 sine waves with frequencies 200, 400, 600 and 800?
Analog To Analog Conversion Methods include ___________.
Which of the following is not a characteristic of a sine wave?
In selective-reject ARQ, only the specific damaged or lost frame is ________.
There are ________ basic categories of multiplexing.
The original Ethernet technology with the data rate of 10 Mbps is called ________?
Which of the following statement is correct?
The ________ protocol uses both flow and error control.
Like Data link layer, ___________ is also responsible for Flow control.
The message 1110 sent by a source is received by a destination as 1011. This is ________ type of error.
Time domain shows changes in ___________.
Central Hub in a Tree is an ___________.
Baud rate is greater than or equal to the bit rate.
A sine wave is defined by ___________ characteristics.
The inversion of the level represents a 1 bit in ______ encoding
In CRC there is no error if the remainder at the receiver is _______.
Error correction is more ________ than the error detection.
Following characteristics fully describe ___________, Amplitude Period/Frequency Phase
Which error detection method uses one's complement arithmetic.
________ encoding is almost obsolete today
YMODEM has ________ Byte of data unit.
In TCP/IP protocol suite, the process of adding header at each layer on sending side is known as ________.
In ASK correct formula for calculating the bandwidth ia as ________.
VCI address is ________ address in virtual circuit approach.
GO-BACK-N protocol is one of the ________ layer protocols, which is used to control the flow of data during the transmission.
Transmission Control Protocol is a(n) ________ layer protocol.
Which one of the following is not a Channelization Protocol?
To calculate the data rate for noisy channel ________ formula is used.
In analog transmission, the base signal is called the________.
The term _______means that only one bit of a given data unit is changed from 1 to 0 or from 0 to 1.
Which error detection method consists of a parity bit for each unit as well as an entire data unit of parity bits?
PSK is susceptible to the noise degradation.
In Block coding we divide our message into blocks of k bits called as ________.
Switch is a network device which operates on the ________ layer of the TCP/IP protocol suite.
Analog signals are refers to be ___________
STP is more expensive than UTP and is less susceptible to noise.
DLC in Data Link Layer stands for ________.
Which of the following sublyer resolves the contention for the shared media.
________ is the process of converting digital data to digital signals.
Encoding digital data into digital signals is called ___________.
At the CRC checker, ___________ means that the data unit is damaged.
Digital signals are refered to be ___________.
A fiber -optic cable transmit signals in the form of ________.
The Internet is ___________.
In an analog hierarchy to carry voice channels, a group can carry ________ voice channels.
Quadrature Amplitude Modulation (QAM) is the combination of ________ and ________.
Which level of the TCP/IP reference model routes data/information across a network channel?
To make sure that source does not overwhelm destination by sending data faster than it can be handled and processed is called?
In ________, each station is allocated a time slot during which it can send data.
________ contains a repeater.
In order to find the location of two errors in an eight bit stream, we have to see ________ different combinations.
Human voice is example of ___________ signal.
________ is responsible for governing node to node communication.
What is the period of a Sine wave having frequency of 10 Hz?
Possession of TOKEN gives the station the right to ________.
________ of a signal is the collection of all the component frequencies it contains.
________ is an Authentication Protocol, which uses two-step process to authenticate user information.
In ________ each band is reserved for a specific ststion, and it belongs to the station all the time.
What is the period of a Sine wave having frequency of 2 Hz?
What is the frequency of a sine wave if it completes one cycle in 2 seconds?
________ category of coaxial cable is used for thin Ethernet.
What is the Bandwidth of a periodic signal if it is decomposed into 4 sine waves with frequencies 300, 600, 900 and 1200?
If the Hamming distance between sent and received code word is ________, then it shows that received data is corrupted.
In Block coding scheme, number of code words is always ________ data words.
The level of signal is always positive in NRZ encoding.
________ is correct formula to determine the total number of ports needed for one system connected in a mesh network.
Line Configuration refers to the way two or more devices attach to a ___________.
By using ___________ system, change in the file contents during file transmission can be avoided.
In frequency shift keying, ________ remain(s) constant.
We can have ________ different groups with a 4 bit block.
CHAP is an Authentication Protocol, which uses ________ process to authenticate user information.
Data is transmitted using light through a ___________ cable.
WDM stands for _________.
________ mode of serial transmission guarantees fixed rate of data.
Which one is not the function of data link layer?
Data Link layer provides services to the ________ layer.
The most common type of connector used by coaxial cable is ________.
In _________, a signal is directed straight from antenna to antenna.
Which one of the following is a Random-Access protocol?
Which of the following is most affected by noise?
In OSI model headers are added at layer _________.
Which one of the following is a correct-access method?
BSC supports ___________ transmission using ___________ flow control.
S-frames in High-Level Data Link Control (HDLC) are only used to transfer ________ information.
In which controlled-access method all data exchanges must be made through primary device even when the ultimate destination is a secondary device?
Radio wave transmission utilizes ___________ different types of propagation.
No matter whether the link is dedicated or broadcast, data link control (DLC) layer provides services between ________.
In ___________ a dedicated communication path is established between two stations through the nodes of the network
AM signal requires ___________ the BW of original signal
Session layer is responsible for _________.
What is the period of a Sine wave having frequency of 5 Hz?
What was the main draw back in ALOHA Random-Access method?
Asynchronous TDM is efficient only when the size of the time slot is kept relatively ___________.
________ relatively measures the strength of two signals.
At the Application layer, object/information is in the form of ________.
________ is the rate of change with respect to time.
If duration of noise is decreased during a transmission over noisy channel, fixed data rate of the channel will cause ________ number of bits being impacted by the noise.
At the CRC generator, ___________ added to the data unit before the divisional process.
Radio is an example of _______ signal conversion.
The __________ generates the data and passes it along with any control information to a __________.
Which layer is concerned with the syntax and semantics of info exchange between two systems?
If the window size is 63 in go-back N ARQ then what is the range of sequence number?
The transmission medium that carries the message is referred to as the ___________.
Guard bands are used in ________ multiplexing technique, to avoid overlapping of frequency bands assigned to each user.
In circuit switched networks we have low efficiency but minimal ________.
A broadcast signal is received by the orbiting satellites which rebroadcasts ________.
The ________ is the number of signal elements sent per unit time.
There are three types of Hubs that exist. Which of the following options correctly describes these three?
TROPOSHERE is the layer of atmosphere above the troposhere but below space
There are __________types of guided media.
In ________, each station sends a frame whenever it has a frame to send.
________ works with topologies in which one drvice is designated as a primary station and the other devices are secondary stations.
Sampling means measuring ____________ of signal at equal intervals
In Pure ALOHA, the vulnerable time is ________ the frame transmission time.
A sine wave is ___________.
In ASK, Noise usually affects the ________.
Time domain plot show changes in signal phase with respect to time.
If a digital signal has "L" number of levels. ________ is the number of bits required to represent each level.
To control and manage the transfer of data, a protocol called Point to Point Protocol (PPP) is used at the ________ layer.
Time division multiplexing is used in ________ systems.
POST stand for ________?
The extra bits added with the original data for error detection/correction are called ________.
Analog refers to something that is continuous in ___________.
Digitizing an Analog Signal is called ___________.
________ transmission technology (based on Ethernet) provides a data rate of 1 billion bits per second.
________ is/are un-reliable protocol(s).
RZ stands for ___________.
Asynchronous transmission is ___________.
A portion of the path that carries TX between a given pair of devices is known as ___________.
In CSMA/CA, ________ is the amount of time divided into slots.
If we need to correct a single error in an 8-bit data unit, we need to consider ________ possible error locations.
Normally the value of Kmax in pure ALOHA is ________.
dB is negative if a signal is ___________.
In the ________ method, the stations in a network are orgamized in a logical ring.
Mr. Asif while sitting in Lahore is talking with his friend in Dubai through Skype is an example of ________.
Signals travel through fiber optic cable are in the form of ________.
Two or more computers connected so that they can communicate with each other and share information is called a ___________.
________ signal can take infinite levels of intensity over time.
In Synchronous TDM, Time slots are not same in number as input devices.
In the encoding where positive to negative transition is one and vice versa is zero.
Terminal, microprocessor, computer, printer or any other device that generates or consumes digital data is known as ___________
________ category of coaxial cable is used for Cable TV.
________ is an Authentication Protocol, which is used by the PPP to authenticate passwords.
________ is not a function of Data Link Control.
Error detection and correction are the services provided by ________ layer.
Flow control is needed to prevent ________.
________ is used in the Stop-and-Wait protocol to overcome the issue of duplication.
Each computer on the Internet has a unique numeric address called a(n) ___________.
If users must take turns using the link, then it is called Spatial Sharing.
Latency is made of ________ components.
Quantization is a method of assigning ________ values in a specific range to sampled instances.
A ________ modem is used to connect two DTEs directly.
In even parity check code, the value of syndrome is ________ if the number of 1s is even.
Collisions in CSMA/CA are avoided through ________.
Select a course code for Objective Questions:
Select a course code for Subjective Questions: