Multiple Choice Questions (MCQs)
What is the frequency of a sine wave if it completes one cycle in 5 seconds?
At the Application layer, object/information is in the form of ________.
Possession of TOKEN gives the station the right to ________.
What is the frequency of a sine wave if it completes one cycle in 2 seconds?
Terminal, microprocessor, computer, printer or any other device that generates or consumes digital data is known as ___________
VCI address is ________ address in virtual circuit approach.
In ASK correct formula for calculating the bandwidth ia as ________.
RZ stands for ___________.
WDM stands for _________.
Asynchronous TDM is efficient only when the size of the time slot is kept relatively ___________.
There are ________ basic categories of multiplexing.
The __________ generates the data and passes it along with any control information to a __________.
In Block coding scheme, number of code words is always ________ data words.
In ________, each station is allocated a time slot during which it can send data.
Two or more computers connected so that they can communicate with each other and share information is called a ___________.
Checksum is an error-detection technique that can be applied to a message of ________ length.
If a digital signal has "L" number of levels. ________ is the number of bits required to represent each level.
In CSMA/CA, ________ is the amount of time divided into slots.
Latency is made of ________ components.
Low pass channel has ________ bandwidth between two stations.
In Block coding we divide our message into blocks of k bits called as ________.
Time domain shows changes in ___________.
Session layer is responsible for _________.
Which of the following is not a characteristic of a sine wave?
Central Hub in a Tree is an ___________.
Data Link layer provides services to the ________ layer.
Each computer on the Internet has a unique numeric address called a(n) ___________.
S-frames in High-Level Data Link Control (HDLC) are only used to transfer ________ information.
A sine wave is ___________.
Which of the following sublyer resolves the contention for the shared media.
Normally the value of Kmax in pure ALOHA is ________.
TROPOSHERE is the layer of atmosphere above the troposhere but below space
Traditionally MANs have been implemented using one of the 2 technologies, Circuit Switching and Packet Switching
A sine wave is defined by ___________ characteristics.
A fiber -optic cable transmit signals in the form of ________.
________ are used to exchange session management and control information between connected devices.
Like Data link layer, ___________ is also responsible for Flow control.
A ________ modem is used to connect two DTEs directly.
Digital signals are refered to be ___________.
The message 1110 sent by a source is received by a destination as 1011. This is ________ type of error.
To make sure that source does not overwhelm destination by sending data faster than it can be handled and processed is called?
Like 10 Base 5, 10 Base 2 is a ________ topology LAN.
No matter whether the link is dedicated or broadcast, data link control (DLC) layer provides services between ________.
CDMA stands for ________.
________ is sometimes called the bit rate.
There are three types of Hubs that exist. Which of the following options correctly describes these three?
Asynchronous transmission is ___________.
________ contains a repeater.
The extra bits added with the original data for error detection/correction are called ________.
The original Ethernet technology with the data rate of 10 Mbps is called ________?
________ is responsible for governing node to node communication.
________ is not a function of Data Link Control.
PSK is susceptible to the noise degradation.
To calculate the data rate for noisy channel ________ formula is used.
Is there any difference between Data communication and telecommunication are network?
What is the period of a Sine wave having frequency of 5 Hz?
________ signal can take infinite levels of intensity over time.
If duration of noise is decreased during a transmission over noisy channel, fixed data rate of the channel will cause ________ number of bits being impacted by the noise.
Guard bands are used in ________ multiplexing technique, to avoid overlapping of frequency bands assigned to each user.
A portion of the path that carries TX between a given pair of devices is known as ___________.
dB is negative if a signal is ___________.
Mr. Asif while sitting in Lahore is talking with his friend in Dubai through Skype is an example of ________.
In circuit switched networks we have low efficiency but minimal ________.
________ of a signal is the collection of all the component frequencies it contains.
The inversion of the level represents a 1 bit in ______ encoding
In Pulse Code Modulation (PCM), the sampling is dependent on ________.
Which error detection method uses one's complement arithmetic.
BSC supports ___________ transmission using ___________ flow control.
To control and manage the transfer of data, a protocol called Point to Point Protocol (PPP) is used at the ________ layer.
At the CRC generator, ___________ added to the data unit before the divisional process.
What was the main draw back in ALOHA Random-Access method?
The type of ALOHA which improves the efficiency of Pure ALOHA is ________.
In OSI model headers are added at layer _________.
Flow control is needed to prevent ________.
What is the Bandwidth of a periodic signal if it is decomposed into 4 sine waves with frequencies 200, 400, 600 and 800?
________ is the rate of change with respect to time.
AM signal requires ___________ the BW of original signal
In an analog hierarchy to carry voice channels, a group can carry ________ voice channels.
Encoding digital data into digital signals is called ___________.
In line discipline after the data transmission, the sending system finishes with an ________ frame.
CHAP is an Authentication Protocol, which uses ________ process to authenticate user information.
There are __________types of guided media.
________ category of coaxial cable is used for Cable TV.
A broadcast signal is received by the orbiting satellites which rebroadcasts ________.
Quantization is a method of assigning ________ values in a specific range to sampled instances.
In ________, both peak amplitude and frequency remains constant as the phase changes.
The logical connection between the peer layers is ________ connection.
If the window size is 63 in go-back N ARQ then what is the range of sequence number?
Signals travel through fiber optic cable are in the form of ________.
The most common type of connector used by coaxial cable is ________.
The inversion of the level at 1 bit is called as ________.
Line Configuration refers to the way two or more devices attach to a ___________.
STP is more expensive than UTP and is less susceptible to noise.
________ is used in the Stop-and-Wait protocol to overcome the issue of duplication.
If we need to correct a single error in an 8-bit data unit, we need to consider ________ possible error locations.
Digitizing an Analog Signal is called ___________.
Which of the following is most affected by noise?
In Pure ALOHA, the vulnerable time is ________ the frame transmission time.
The flag in PPP is a byte that needs to be ________ whenever it appears in the data section of the frame.
Which error detection method consists of a parity bit for each unit as well as an entire data unit of parity bits?
Error correction is more ________ than the error detection.
Switch is a network device which operates on the ________ layer of the TCP/IP protocol suite.
In _________, a signal is directed straight from antenna to antenna.
GO-BACK-N protocol is one of the ________ layer protocols, which is used to control the flow of data during the transmission.
In ________ each band is reserved for a specific ststion, and it belongs to the station all the time.
What is the period of a Sine wave having frequency of 10 Hz?
Which one of the following is not a Channelization Protocol?
________ is correct formula to determine the total number of ports needed for one system connected in a mesh network.
Which one of the following is a correct-access method?
In the ________ method, the stations in a network are orgamized in a logical ring.
At the CRC checker, ___________ means that the data unit is damaged.
Which level of the TCP/IP reference model routes data/information across a network channel?
Sampling means measuring ____________ of signal at equal intervals
Time domain plot show changes in signal phase with respect to time.
In ___________ a dedicated communication path is established between two stations through the nodes of the network
Which of the following consist of just one redundant bit per data unit?
In even parity check code, the value of syndrome is ________ if the number of 1s is even.
Which one of the following is a Random-Access protocol?
Transmission Control Protocol is a(n) ________ layer protocol.
________ mode of serial transmission guarantees fixed rate of data.
Error detection and correction are the services provided by ________ layer.
In Synchronous TDM, Time slots are not same in number as input devices.
________ is an Authentication Protocol, which is used by the PPP to authenticate passwords.
We can have ________ different groups with a 4 bit block.
DLC in Data Link Layer stands for ________.
What is the period of a Sine wave having frequency of 2 Hz?
In TCP/IP protocol suite, the process of adding header at each layer on sending side is known as ________.
Quadrature Amplitude Modulation (QAM) is the combination of ________ and ________.
Which of the following statement is correct?
Human voice is example of ___________ signal.
In statistical time division multiplexing, number of slots in frame are less than ________.
Data is transmitted using light through a ___________ cable.
In frequency shift keying, ________ remain(s) constant.
The level of signal is always positive in NRZ encoding.
Analog To Analog Conversion Methods include ___________.
________ is normally used where speed is priority in data transfer.
There are _________ types of serial transmission.
If the Hamming distance between sent and received code word is ________, then it shows that received data is corrupted.
Radio is an example of _______ signal conversion.
The ________ is the number of signal elements sent per unit time.
________ works with topologies in which one drvice is designated as a primary station and the other devices are secondary stations.
The transmission medium that carries the message is referred to as the ___________.
The term _______means that only one bit of a given data unit is changed from 1 to 0 or from 0 to 1.
In which controlled-access method all data exchanges must be made through primary device even when the ultimate destination is a secondary device?
Analog refers to something that is continuous in ___________.
________ is the process of converting digital data to digital signals.
In the encoding where positive to negative transition is one and vice versa is zero.
In ASK, both ______ and ________ remain constant.
Collisions in CSMA/CA are avoided through ________.
In selective-reject ARQ, only the specific damaged or lost frame is ________.
________ category of coaxial cable is used for thin Ethernet.
In CRC there is no error if the remainder at the receiver is _______.
In ________, each station sends a frame whenever it has a frame to send.
________ relatively measures the strength of two signals.
________ is/are un-reliable protocol(s).
WDM stands for ________.
If users must take turns using the link, then it is called Spatial Sharing.
In analog transmission, the base signal is called the________.
Congestion Control is a feature of layer(s).
Radio wave transmission utilizes ___________ different types of propagation.
Which layer is concerned with the syntax and semantics of info exchange between two systems?
The Internet is ___________.
What is the Bandwidth of a periodic signal if it is decomposed into 4 sine waves with frequencies 300, 600, 900 and 1200?
YMODEM has ________ Byte of data unit.
________ encoding is almost obsolete today
POST stand for ________?
Time division multiplexing is used in ________ systems.
Baud rate is greater than or equal to the bit rate.
Following characteristics fully describe ___________, Amplitude Period/Frequency Phase
The ________ protocol uses both flow and error control.
________ transmission technology (based on Ethernet) provides a data rate of 1 billion bits per second.
________ is an Authentication Protocol, which uses two-step process to authenticate user information.
In order to find the location of two errors in an eight bit stream, we have to see ________ different combinations.
Analog signals are refers to be ___________
Which one is not the function of data link layer?
In ASK, Noise usually affects the ________.
By using ___________ system, change in the file contents during file transmission can be avoided.
Select a course code for Objective Questions:
Select a course code for Subjective Questions: