Multiple Choice Questions (MCQs)
Like 10 Base 5, 10 Base 2 is a ________ topology LAN.
Which of the following sublyer resolves the contention for the shared media.
YMODEM has ________ Byte of data unit.
BSC supports ___________ transmission using ___________ flow control.
If the window size is 63 in go-back N ARQ then what is the range of sequence number?
In selective-reject ARQ, only the specific damaged or lost frame is ________.
In line discipline after the data transmission, the sending system finishes with an ________ frame.
Which error detection method uses one's complement arithmetic.
In CRC there is no error if the remainder at the receiver is _______.
Which error detection method consists of a parity bit for each unit as well as an entire data unit of parity bits?
At the CRC checker, ___________ means that the data unit is damaged.
At the CRC generator, ___________ added to the data unit before the divisional process.
The term _______means that only one bit of a given data unit is changed from 1 to 0 or from 0 to 1.
Which of the following consist of just one redundant bit per data unit?
Asynchronous TDM is efficient only when the size of the time slot is kept relatively ___________.
In Synchronous TDM, Time slots are not same in number as input devices.
WDM stands for _________.
dB is negative if a signal is ___________.
A broadcast signal is received by the orbiting satellites which rebroadcasts ________.
In _________, a signal is directed straight from antenna to antenna.
Radio wave transmission utilizes ___________ different types of propagation.
TROPOSHERE is the layer of atmosphere above the troposhere but below space
STP is more expensive than UTP and is less susceptible to noise.
There are __________types of guided media.
Data is transmitted using light through a ___________ cable.
In Block coding we divide our message into blocks of k bits called as ________.
The flag in PPP is a byte that needs to be ________ whenever it appears in the data section of the frame.
________ is an Authentication Protocol, which is used by the PPP to authenticate passwords.
Congestion Control is a feature of layer(s).
Error detection and correction are the services provided by ________ layer.
No matter whether the link is dedicated or broadcast, data link control (DLC) layer provides services between ________.
The message 1110 sent by a source is received by a destination as 1011. This is ________ type of error.
In even parity check code, the value of syndrome is ________ if the number of 1s is even.
GO-BACK-N protocol is one of the ________ layer protocols, which is used to control the flow of data during the transmission.
If duration of noise is decreased during a transmission over noisy channel, fixed data rate of the channel will cause ________ number of bits being impacted by the noise.
________ is responsible for governing node to node communication.
DLC in Data Link Layer stands for ________.
Error correction is more ________ than the error detection.
If we need to correct a single error in an 8-bit data unit, we need to consider ________ possible error locations.
Data Link layer provides services to the ________ layer.
Checksum is an error-detection technique that can be applied to a message of ________ length.
________ is not a function of Data Link Control.
If the Hamming distance between sent and received code word is ________, then it shows that received data is corrupted.
The ________ protocol uses both flow and error control.
The ________ is the number of signal elements sent per unit time.
________ is used in the Stop-and-Wait protocol to overcome the issue of duplication.
S-frames in High-Level Data Link Control (HDLC) are only used to transfer ________ information.
To control and manage the transfer of data, a protocol called Point to Point Protocol (PPP) is used at the ________ layer.
________ is an Authentication Protocol, which uses two-step process to authenticate user information.
In order to find the location of two errors in an eight bit stream, we have to see ________ different combinations.
The extra bits added with the original data for error detection/correction are called ________.
CHAP is an Authentication Protocol, which uses ________ process to authenticate user information.
In Block coding scheme, number of code words is always ________ data words.
________ are used to exchange session management and control information between connected devices.
________ is the process of converting digital data to digital signals.
The original Ethernet technology with the data rate of 10 Mbps is called ________?
In Pure ALOHA, the vulnerable time is ________ the frame transmission time.
Collisions in CSMA/CA are avoided through ________.
________ works with topologies in which one drvice is designated as a primary station and the other devices are secondary stations.
Possession of TOKEN gives the station the right to ________.
________ transmission technology (based on Ethernet) provides a data rate of 1 billion bits per second.
The type of ALOHA which improves the efficiency of Pure ALOHA is ________.
CDMA stands for ________.
Which one of the following is a Random-Access protocol?
In which controlled-access method all data exchanges must be made through primary device even when the ultimate destination is a secondary device?
In CSMA/CA, ________ is the amount of time divided into slots.
What was the main draw back in ALOHA Random-Access method?
In ________, each station is allocated a time slot during which it can send data.
Which one of the following is not a Channelization Protocol?
Transmission Control Protocol is a(n) ________ layer protocol.
Which one of the following is a correct-access method?
In ________, each station sends a frame whenever it has a frame to send.
In the ________ method, the stations in a network are orgamized in a logical ring.
________ is/are un-reliable protocol(s).
In ________ each band is reserved for a specific ststion, and it belongs to the station all the time.
POST stand for ________?
Normally the value of Kmax in pure ALOHA is ________.
Terminal, microprocessor, computer, printer or any other device that generates or consumes digital data is known as ___________
The __________ generates the data and passes it along with any control information to a __________.
A ________ modem is used to connect two DTEs directly.
Asynchronous transmission is ___________.
There are _________ types of serial transmission.
AM signal requires ___________ the BW of original signal
Analog To Analog Conversion Methods include ___________.
In ________, both peak amplitude and frequency remains constant as the phase changes.
PSK is susceptible to the noise degradation.
Which of the following is most affected by noise?
Baud rate is greater than or equal to the bit rate.
In analog transmission, the base signal is called the________.
In ASK, Noise usually affects the ________.
In ASK, both ______ and ________ remain constant.
Following characteristics fully describe ___________, Amplitude Period/Frequency Phase
Which of the following statement is correct?
Quantization is a method of assigning ________ values in a specific range to sampled instances.
Sampling means measuring ____________ of signal at equal intervals
In the encoding where positive to negative transition is one and vice versa is zero.
Encoding digital data into digital signals is called ___________.
RZ stands for ___________.
Digitizing an Analog Signal is called ___________.
The level of signal is always positive in NRZ encoding.
The inversion of the level represents a 1 bit in ______ encoding
________ encoding is almost obsolete today
Radio is an example of _______ signal conversion.
The inversion of the level at 1 bit is called as ________.
What is the Bandwidth of a periodic signal if it is decomposed into 4 sine waves with frequencies 300, 600, 900 and 1200?
________ of a signal is the collection of all the component frequencies it contains.
What is the Bandwidth of a periodic signal if it is decomposed into 4 sine waves with frequencies 200, 400, 600 and 800?
What is the period of a Sine wave having frequency of 10 Hz?
What is the period of a Sine wave having frequency of 5 Hz?
What is the frequency of a sine wave if it completes one cycle in 2 seconds?
What is the period of a Sine wave having frequency of 2 Hz?
Time domain shows changes in ___________.
Time domain plot show changes in signal phase with respect to time.
What is the frequency of a sine wave if it completes one cycle in 5 seconds?
Digital signals are refered to be ___________.
Human voice is example of ___________ signal.
Analog refers to something that is continuous in ___________.
A sine wave is ___________.
________ is the rate of change with respect to time.
Analog signals are refers to be ___________
A sine wave is defined by ___________ characteristics.
Each computer on the Internet has a unique numeric address called a(n) ___________.
Like Data link layer, ___________ is also responsible for Flow control.
Which layer is concerned with the syntax and semantics of info exchange between two systems?
Session layer is responsible for _________.
Which level of the TCP/IP reference model routes data/information across a network channel?
Flow control is needed to prevent ________.
Which one is not the function of data link layer?
In OSI model headers are added at layer _________.
The Internet is ___________.
In ___________ a dedicated communication path is established between two stations through the nodes of the network
Traditionally MANs have been implemented using one of the 2 technologies, Circuit Switching and Packet Switching
Central Hub in a Tree is an ___________.
________ contains a repeater.
There are three types of Hubs that exist. Which of the following options correctly describes these three?
A portion of the path that carries TX between a given pair of devices is known as ___________.
Line Configuration refers to the way two or more devices attach to a ___________.
If users must take turns using the link, then it is called Spatial Sharing.
By using ___________ system, change in the file contents during file transmission can be avoided.
To make sure that source does not overwhelm destination by sending data faster than it can be handled and processed is called?
The transmission medium that carries the message is referred to as the ___________.
Two or more computers connected so that they can communicate with each other and share information is called a ___________.
Is there any difference between Data communication and telecommunication are network?
________ category of coaxial cable is used for Cable TV.
The logical connection between the peer layers is ________ connection.
________ is normally used where speed is priority in data transfer.
In Pulse Code Modulation (PCM), the sampling is dependent on ________.
A fiber -optic cable transmit signals in the form of ________.
There are ________ basic categories of multiplexing.
________ signal can take infinite levels of intensity over time.
________ relatively measures the strength of two signals.
________ is correct formula to determine the total number of ports needed for one system connected in a mesh network.
To calculate the data rate for noisy channel ________ formula is used.
In circuit switched networks we have low efficiency but minimal ________.
We can have ________ different groups with a 4 bit block.
VCI address is ________ address in virtual circuit approach.
In ASK correct formula for calculating the bandwidth ia as ________.
Guard bands are used in ________ multiplexing technique, to avoid overlapping of frequency bands assigned to each user.
Mr. Asif while sitting in Lahore is talking with his friend in Dubai through Skype is an example of ________.
WDM stands for ________.
Switch is a network device which operates on the ________ layer of the TCP/IP protocol suite.
Signals travel through fiber optic cable are in the form of ________.
________ category of coaxial cable is used for thin Ethernet.
In statistical time division multiplexing, number of slots in frame are less than ________.
Latency is made of ________ components.
In TCP/IP protocol suite, the process of adding header at each layer on sending side is known as ________.
The most common type of connector used by coaxial cable is ________.
Low pass channel has ________ bandwidth between two stations.
________ mode of serial transmission guarantees fixed rate of data.
At the Application layer, object/information is in the form of ________.
Which of the following is not a characteristic of a sine wave?
Quadrature Amplitude Modulation (QAM) is the combination of ________ and ________.
________ is sometimes called the bit rate.
Time division multiplexing is used in ________ systems.
If a digital signal has "L" number of levels. ________ is the number of bits required to represent each level.
In frequency shift keying, ________ remain(s) constant.
In an analog hierarchy to carry voice channels, a group can carry ________ voice channels.
Select a course code for Objective Questions:
Select a course code for Subjective Questions: