100% found this document useful (1 vote)
433 views29 pages

CS601 Solved MCQs Lectures 2345

This document contains 64 multiple choice questions about data communication protocols including HDLC, LLC, MAC protocols, Ethernet standards, and more. Some key points covered are: - HDLC defines primary, secondary, and combined station types and configurations. It supports three frame types: I, S, and U frames. - IEEE 802 defines standards for LAN protocols including Ethernet, Token Ring, and Token Bus. It separates specifications into the LLC layer and MAC sublayer. - Ethernet uses CSMA/CD access mechanism and defines physical standards such as 10Base5 thicknet and 10BaseT twisted pair.

Uploaded by

Muhammad Nouman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
433 views29 pages

CS601 Solved MCQs Lectures 2345

This document contains 64 multiple choice questions about data communication protocols including HDLC, LLC, MAC protocols, Ethernet standards, and more. Some key points covered are: - HDLC defines primary, secondary, and combined station types and configurations. It supports three frame types: I, S, and U frames. - IEEE 802 defines standards for LAN protocols including Ethernet, Token Ring, and Token Bus. It separates specifications into the LLC layer and MAC sublayer. - Ethernet uses CSMA/CD access mechanism and defines physical standards such as 10Base5 thicknet and 10BaseT twisted pair.

Uploaded by

Muhammad Nouman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 29

http://vustudents.ning.

com/

CS601-DATA COMMUNICATION
MCQs (LEC 23-45)
(1) ________ is basis for all protocols.
SDLC HDLC LAP LAN

(2) In ___________ protocols, bits are grouped into predefined patterns forming
characters.
Character-oriented Bit-oriented both a and b none of given

(3) Bit-oriented data link protocols designed for,


Full duplex and Half duplex
Point-to-point and multipoint
Both a and b
None of given

(4) HDLC can be characterized by,


Station type
Configuration
Response mode
All of above

(5) HDLC differentiate between _________ types of stations.


2 3 4 5

(6) HDLC differentiate between station(s).


Primary station
Secondary station
Combined station
All of above

(7) ___________ is a device in point-to-point or multipoint line configuration that has


complete control of the link.
Primary station
Secondary station
Combined station
None of them

(8) A ________issue commands and a ________ issue responses.


Secondary, primary
Primary, secondary
Primary, combine
None of above

(9) A _________station can both command and response.


Primary
Secondary
Combined
None of them
(10) A ___________is one of a set of connected peer devices programmed to behave either
as primary or as a secondary depending on the nature and direction of the
transmission.
Primary station
Secondary station
Combined station
None of them

(11) Primary, secondary and combined stations can be configured in _______ ways.
Two three four five

http://vustudents.ning.com/
http://vustudents.ning.com/
(12) Primary, secondary and combined stations can be configure in,
Unbalanced configuration
Symmetrical configuration
Balanced configuration
All of above

(13) Which configuration is also called Master/Slave configuration.


Unbalanced configuration
Symmetrical configuration
Balanced configuration
All of above

(14) Unbalanced configuration can be point to point if only _____device(s) is/are involved.
One Two Three Four

(15) ________can be point to point if only two devices are involved.


Unbalanced configuration
Symmetrical configuration
Balanced configuration
None of them

(16) Each _______station on a link consist of two _________ stations, one a primary and
other a secondary.
Logical, physical
Physical, logical
Combined, logical
Physical, combined

(17) HDLC does not support balanced multipoint.


True
False

(18) A mode in HDLC is the relationship between two devices involve in an exchange.
True
False

(19) HDLC supports _________modes of communication between stations.


Three Four Five Six

(20) _________device must have permission from --------------- device before transmitting.
Primary, secondary
Secondary, primary
Logical, physical
Physical, logical

(21) All information from the _________ still go to the __________ and are then relayed to
the other devices.
Primary, secondary
Secondary, primary
Logical, physical
Physical, logical

(22) All stations are equal and therefore only _____connected in point-to-point are used.
Primary
Secondary
Combined
None of them

(23) HDLC defines _______types of frames


Two three four five

http://vustudents.ning.com/
http://vustudents.ning.com/
(24) ______are used to transport user data and control information relation to user data.
I-Frames
S-Frames
U-Frames
All of above

(25) _________ are used only to transport control information.


I-Frames
S-Frames
U-Frames
All of above

(26) ________ are reserved for system management.


I-Frames
S-Frames
U-Frames
All of above

(27) If address field is only 1 byte, the last bit is always 0.


True
False

(28) The two byte case is called Extender Mode.


True
False

(29) If the control field is a 0, the frame is a/an _________


I-Frames
S-Frames
U-Frames
None of given

(30) If the first bit is 1 and the second bit is a 0, it is S-Frame.


True
False

(31) If both first and second bits are 1’s, It is U-Frame.


True
False

(32) Information field contains the user’s data in a/an ________ and network management
information in a/an _______.
I-Frame, U-Frame
U-Frame, S-Frame
S-Frame, I-Frame
None of given

(33) S-Frame has no information field.


True
False

(34) It is not possible to send control information in the information field of the I-Frame
along with the data.
True
False

(35) LAN stands for Local Area Network


True
False

(36) A ___________is a data communication system that allow a number of independent


devices to communicate directly with each other in a limited geographic area.
http://vustudents.ning.com/
http://vustudents.ning.com/
LAN
WAN
MAN
None of given

(37) FDDI stands for Fiber Distributed Data Interface.


True
False

(38) Identify the standards of IEEE.


Eithernet, Token Bus
Eithernet, Token Ring
Eithernet, Token Bus, Token Ring
None of above

(39) Fiber Distributed Data Interface (FDDI) is not an ANSI standard.


True
False

(40) In 1985, the computer society of IEEE started a project called ________ to set
standards to enable intercommunication between equipment from a variety of
manufacturers.
PROJECT 801
PROJECT 802
PROJECT 803
PROJECT 804

(41) Logical Link Control (LLC) is non-architecture specific.


True
False

(42) Strength of PROJECT 802 is not Modularity.


True
False

(43) _________ is the upper of data link layer and is common to all LAN protocols.
MAC
LLC
OSI
IEEE

(44) LLC is the upper of _________layer and is common to all LAN protocols.
Physical
Network
Data link
Session

(45) ________contains Synchronization Flag, Flow and error control specifications as well
as the physical address of next station to receive and route a packet.
MAC
LLC
OSI
IEEE

(46) MAC is containing of


Synchronization Flag
Flow and error control specifications
Physical address of next station to receive and route a packet
All of above

(47) The data unit in the LLC level is called the Protocol Data Unit (PDU).
True
http://vustudents.ning.com/
http://vustudents.ning.com/
False

(48) which field(s) is/are familiar from HDLC:


A destination service access point
A source service access point
An information field
All of above

(49) The first bit of the DSAP indicates whether the frame is intended for an individual or a
group.
True
False

(50) The PDU has no flag field, no CRC, and no station address.
True
False

(51) The word ______specifies a digital signal and word _____ specifies an analog signal.
Base, broad
Broad, base
Base, band
Band, broad

(52) IEEE divides the base band category into ________ standards.
Three Four Five Six

(53) IEEE defines only one specification for the broad band category.
10 Base 5
10 Base 2
10 Base-T
10 Base 36

(54) Such overlaps which turn signals to noise are called “COLLISION”.
True
False

(55) The access mechanism used in Ethernet is called CSMA/CD.


True
False

(56) If a system transmits after checking the line and other system transmits during this
small interval, collision can still occur.
True
False

(57) During the data transmission, the station checks for extremely _______voltages that
indicate a collision.
Low high extra high extra low

(58) The NIC (Network Interface Card) usually fits inside the station and provide the station
with a _____Physical address.
5-byte 6-byte 7-byte 8-byte

(59) Ethernet LANs can support data rate between________


1 and 100 Mbps
100 and 256 Mbps
1 and 1000 Mbps
100 and 1000 Mbps

(60) The first of physical standards defined in IEEE 802.3 model is called ______ Thick
Ethernet or Thicknet.
10 Base 2
10 Base 5
http://vustudents.ning.com/
http://vustudents.ning.com/
10 Base 4
10 Base 6

(61) 10 Base 5 is a ______Topology LAN.


Star
Ring
Bus
Tree

(62) RG-8 cable is a thick coaxial cable that provides the backbone of IEEE 802.3 standard.
True
False

(63) The spike is attached to wires outside the transceivers.


True
False

(64) The second Ethernet Implementation defined by IEEE 802 series is called ______ Thin
Ethernet or Thin net.
10 Base 2
10 Base 5
10 Base 4
10 Base 6

(65) Like 10 Base 5, 10 Base 2 is a _______Topology.


Star
Ring
Bus
Tree

(66) In 10 Base 2 no AUI cables are needed.


True
False

(67) A ______ NIC not only provides the station with an address but also checks for
voltage on the link.
10 Base 2
10 Base 5
10 Base 4
10 Base 6

(68) These cables are relatively easy to install and moves around.
AUI Cables
RG-8 Cables
RG-58 Cables
All of above

(69) _______ Ethernet is also called Twisted pair Ethernet.


10 Base 2
10 Base 5
10 Base T
None of given

(70) 10 Base T is a ________ Topology.


Star
Ring
Bus
Tree

(71) 10 Base T support a data rate of _________Mbps and has a maximum length of _____
meters.
100, 100
10, 100
http://vustudents.ning.com/
http://vustudents.ning.com/
100, 1000
10, 500

(72) A 4-pair UTP of not more than 100 meters connects the NIC to the appropriate in 10
Base T Hub.
True False

(73) The __________of a cable and the convenience of RJ-45 jack and plug makes it the
easiest to install and reinstall.
Weight
Flexibility
Weight & Flexibility
None of given

(74) 1 Base 5 is also called Star LAN.


True False

(75) Star LAN allow ________ devices to be linked with only the lead device connected to
the Hub.
10 12 15 20

(76) An attempt to improve the performance of 10 Base T is used


Switched Ethernet
Fast Ethernet
Gigabit Ethernet
None of given

(77) Data rate can be increased by decreasing the collision domain in ________
Switched Ethernet
Fast Ethernet
Gigabit Ethernet
None of given

(78) Token ring does not allow each station to send one frame per turn.
True False

(79) Token ring imposes a time limit to keep traffic move.


True False

(80) In Token ring ___________generates a new token when it is lost.


Monitor station
Primary
Secondary
Combined

(81) In a Ring Topology one disabled or disconnected node could stop the traffic flow
around the entire network.
True False

(82) One Multi Access Unit (MAU) can support up to _______ stations.
4 6 8 10

(83) ___________is the name of specific world wide net work.


Internet internet (with small i)

(84) Y-MODEM is similar to X-MODEM with only the following major difference(s).
1024-Byte data unit
Two CANs to abort transmission
ITU-T CRC-16 for error checking
All of above

(85) Z-MODEM is not a combined feature of X-MODEM and Y-MODEM.


http://vustudents.ning.com/
http://vustudents.ning.com/
True False

(86) BLAST is more powerful than X-MODEM


True False

(87) BLAST has characteristics like as,


Full Duplex
Sliding window flow control
More powerful than X-MODEM
All of given

(88) KERMIT is most widely used Asynchronous Protocol.


True False

(89) ___________of synchronous transmission makes it a better choice over


Asynchronous transmission for LAN, WAN and MAN technology.
Efficiency
Speed
Cost
Bit rate

(90) Synchronous Protocols can be divided into ________main classes.


Two Three Four Five

(91) Character-oriented Protocol is also called as Byte-oriented Protocol.


True False

(92) __________Protocols interpret a transmission frame or packet as a succession of


characters, each usually composed of one byte.
Character-oriented
Bit- oriented
Both a and b
None of given

(93) __________Protocols interpret a transmission frame or packet as a succession of


individual bits, made meaningful by there placement in the frame.
Character-oriented
Bit- oriented
Both a and b
None of given

(94) Character-oriented Protocols are as efficient as bit-oriented protocols and are seldom
use.
True False
(95) In all data link protocols, ___________is inserted in the data frame as separate control
frame.
Address
Control information
Data rate
Character

(96) Flow control is needed to prevent ____________.

Collision between sender and receiver


Overflow of the receiver buffer
Overflow of the sender buffer
Bit errors

(97) In Synchronous TDM, Time slots are not same in number as input devices.

TRUE FALSE

http://vustudents.ning.com/
http://vustudents.ning.com/
(98) If the primary wants to receive data, it asks the second-arise if they have anything to
send, this is called

POLLING
SELECTING

(99) For point-to-point configuration, addressing is needed

TRUE FALSE

(100) The Hamming code is a method of __________.

Error correction
Error detection
Error encapsulation
Error detection & error encapsulation

(101) T-Connector is used thick connector

True False

(102) _____ uses a series of filters to decompose multiplexed signal into its constituent
signals.

MUX
DEMUX
DULEX
Any of given

(102) Which error detection method involves polynomials?

Simple parity check


Two-dimensional parity check
CRC
Checksum

(104) In 56K Modems Max Uploading speed is ______ bytes and downloading speed is
______ byte.

40K, 56K
33.6K, 56K
56K, 33.6K
None of given

(105) Synchronous protocols are _____________ than Asynchronous protocols.

Low speed
Efficient
Bad
None of the above

(106) Permanent analog connection between two subscribers is called. _____________.

Switched/56 service
Analog leased service
DDS
DS

(107) Asynchronous TDM is efficient only when the size of the time slot is kept relatively
________

Large
Small
http://vustudents.ning.com/
http://vustudents.ning.com/
Medium
Zero

(108) Modem standards are _______________.

Cable Modem
Bell and ITU-U Modem
Traditional and 56K Modem
None of given

(109) A timer is set when ___________ is (are) sent out .

A data frame
An ACK
A NAK
All of given

(110) FTTC can be implemented in ______________.

Telephone system
Cable system
Telephone and cable system
None of the above

(111) Traditional Modems are limited to a data rate of ____________.

56Kbps
40Kbps
33.6Kbps
20Kbps

(112) Cable TV provides residential premises with a _________ cable.

Fiber optic
Coaxial cable
Twisted-pair cable
None of above

(113) _________ can be left aside to allow a user to download and upload the information
from the internet.

Two bands
Three bands
Four bands
Five bands

(114) Downloading required a ______ BW in the range above _______.

10MHz, 56MHz
56MHz, 16MHz
10MHz, 40MHz
6MHz, 40MHz

(115) The demodulation technique used in downloading is ___________.

56QAM
64QAM
24QAM
16QAM

(116) Currently downloading rate is between_________.

3 and 10 Mbps

http://vustudents.ning.com/
http://vustudents.ning.com/
6 and 40Mbps
12 and 56Mbps
32 and 100Mbps

(117) Uploading required a ______ BW in the range above _______.

6MHz, 40MHz
10MHz, 56MHz
56MHz, 16MHz
10MHz, 40MHz

(118) The demodulation technique used in uploading is ___________.

QAM
PCM
QPSK
PSK

(119) If a user has a BW of 10MHz he/she can download at a rate of _______.

40Mbps
50Mbps
60Mbps
70Mbps

(120) If a user has a BW of 10MHz he/she can upload at a rate of _______.

20Mbps
30Mbps
40Mbps
50Mbps

(121) Currently uploading rate is between 500Kbps and 1Mbps.

TRUE FALSE

(122) Signals are transmitted from one device to another in the form of ________

Mechanical energy
Kinetic energy
Electromagnetic energy
Potential energy

(123) Chose correct statement about radio waves

It can travel through air and space


It required specific transmitting and receiving mechanisms
Both a and b
None of given

(124) Guided media are those media that do not provide a conduit from one device to
another.

TRUE FALSE

(125) Select wrong statement for twisted pair cable.

It has two forms UTP and STP


Its frequency range is 100Hz to 5MHz
Basic twisted pair cable is used in Telephone system
None of given

(126) The plastic insulation is color banded for identification.


http://vustudents.ning.com/
http://vustudents.ning.com/
TRUE FALSE

(127) In the past, ______ flat wires were used for communication.

Two non-parallels
Two parallel
Two vertical
Two horizontal

(128) Twisting always eliminates the impact of noise but it does not significantly reduce it.

TRUE FALSE

(129) Unshielded Twisted Pair (UTP) is _________.

Cheap
Flexible
Easy to install
All of above

(130) Higher grades of UTP are used in many _________.

LAN technologies
LAN technologies and Ethernet
Ethernet and Token Ring
LAN technologies including Ethernet and Token Ring

(131) The most frequently used of plugs is a ____ connector with ___ conductor, one for
each wire of _____ twisted pairs.

RJ45, 4, 8
RJ45, 8, 4
RG8, 4, 8
RG8, 8, 4

(132) Chose the correct statement

Shielding each pair of twisted pair can not eliminate most crosstalk
STP is most expensive than UTP
STP is most susceptible to noise
Female connectors snap into male connector

(133) The frequency range of Coaxial Cable is between ________.

100 KHz to 500MHz


100MHz to 500MHz
10MHz to 100MHz
10 KHz to 100MHz

(134) Radio Government (RG) number denotes a unique set of physical specification(s),
including,

The wire gauge of inner connector


The thickness and type of inner insulator
Construction of the shield
All of above

(135) Radio Government (RG) used in Thick Ethernet is/are


RG-8 RG-9 RG-11 All of above

(136) Radio Government (RG) used in Thin Ethernet is


RG-58 RG-59 RG-28 RG-45

http://vustudents.ning.com/
http://vustudents.ning.com/
(137) Radio Government (RG) used for TV is
RG-58 RG-59 RG-28 RG-45

(138) Most common connector is called ____________ because of its shape.

Male Connector
Female Connector
Barrel Connector
None of the above
(139) BNC connector pushes on and locks into place with ______turn.
Full Half Maximum Minimum

(140) Commonly used connectors are ______________.

T-Connector and Terminator


T-Connector and U-Connector
Terminator and U-Connector
X-connector and T-connector

(141) T-connector is used in Thin Ethernet.


TRUE FALSE

(142) __________connector allows a secondary cable or cables to branch off from a main
line.

Male connector
Female connector
T-connector
U-connector

(143) __________are required for bus topologies.

Male connectors
Terminators
Female connectors
T-connectors

(144) A _________absorbs the wave at end and eliminates the echo.

Male connector
Terminator
Female connector
T-connector

(145) Identify the wrong statement

Optical Fiber is made of glass or plastic


Optical Fibers transmit signals in the form of light
The speed of light in vacuum is 300,000 Km/sec
T-connector is used in Thick Ethernet

(146) Identify the correct statement

Optical Fiber is made of glass or plastic


Optical Fibers transmit signals in the form of Electromagnetic
T-connector is used in Thick Ethernet
All of above

(147) Direction in which a light is refracted depends upon the ________ of a medium.

Height
Density
Structure
http://vustudents.ning.com/
http://vustudents.ning.com/
Quality

(148) The incident angle at which the refracted angle is _____ degree is called Critical angle.

90
60
45
30

(149) The incident angle at which the refracted angle is 90 degree is called _________.

Vertical angle
Horizontal angle
Critical angle
None of above

(150) Optical fibers are used reflection to guide light through a channel.
TRUE FALSE

(151) Fiber technology support _____ modes for the propagation of light.

Two Three Four Five

(152) Identify the wrong statement

Some beams travel straight and reach the destination without reflecting
Each beam angle is equal to its angle of reflection
The signals are introduced at the bottom of the core
A grade index fiber is the one with varying densities

(153) Single Mode Fiber is manufactured with a much ________ diameter than Multimode.

Smaller
Greater

(154) Optical Fibers are defined by the ratio of the diameter of _____ to the diameter of ____.

Cladding, Core
Core, Cladding
Source, destination
Circle, Core

(155) In the Fiber type 62.5/125 the Core is ______ and Cladding is_______.

62.5, 125
125, 62.5
0.5, 0.10
62.5, 0.5

(156) Both Core and Cladding can be made of either glass or plastic but must be same
densities.

TRUE FALSE

(157) The outer jacket of Optical Fiber can made of material(s)_____

Teflon
Fiber Plastic
Metal tubing
All of above

(158) Identify the correct statement

http://vustudents.ning.com/
http://vustudents.ning.com/
Plastic provides structural strength
Metal tubing provides strength
Teflon provide the cable strength
None of the given

(159) Photodiode converts the light into current usable by the computer.

TRUE FALSE

(160) All of the popular connector are Barrel shaped that come in male and female versions.

TRUE FALSE

(161) The major advantages of Optical Fiber over twisted-pair and coaxial cables are____.

Noise restriction, Fragility, Higher bandwidth


Less Signal Attenuation, Noise restriction, higher bandwidth
Noise restriction, Fragility, Less Signal Attenuation
None of the given

(162) The disadvantage(s) of Optical Fiber is/are____.

Noise restriction, Fragility


Less Signal Attenuation, Noise restriction
Fragility, Less Signal Attenuation
Fragility

(163) Radio wave transmission utilized ________ different type of propagation.

Two Three Four Five

(164) Radio Technology considers the earth as surrounded by ___ layers of atmosphere.

Two Three Four Five

(165) The portion of the atmosphere extended outward approx. 30 miles from the earth
surface is called___________

TROPOSHERE
IONOSPHERE
Both a and b
None of given

(166) A signal can be directed in a straight from Antenna to Antenna is called ________

Ionosphere
Broadcast
Line-of-sight
Space

(167) What propagation allows greater distance to be covered?

Ionosphere
Broadcast
Line-of-sight
Space

(168) The type of propagation used in radio transmission depends upon the ______ of the
signal.

Quality
Type
Frequency
http://vustudents.ning.com/
http://vustudents.ning.com/
Amplitude

(169) Very Low Frequency (VLF) is used for ______ radio navigation and submarine
communication.

Long-range
Short-range
Both a and b
None of given

(170) The range of Very Low Frequency (VLF) is ______________.

3 KHz to 15 KHz
3 KHz to 30 KHz
3 KHz to 12 KHz
3 KHz to 20 KHz

(171) Identify the wrong statement

VLF waves are propagated as surface waves through air


LF waves are propagated as surface waves through air
MF waves are propagated as surface waves through air
None of the given

(172) Which frequency type is used for AM radio?

Low Frequency
Middle Frequency
High Frequency
All of above

(173) Very High Frequency is used for___________.

VHF Television
FM Radio
Aircraft AM Radio
All of above

(174) Ultra High Frequency is used for________________.

UHF Television
Mobile Telephone and Microwave Link
Paging and Cellular Radio
All of above

(175) Super High Frequency is used for____________

Terrestrial
Satellite Microwave
Radar Communication
All of above

(176) Extremely High Frequency is work in range of ______________

30 MHz – 300 MHz


30 MHz – 100 MHz
100 MHz – 300MHz
100 MHz – 500 MHz

(177) How many types of antennas, are used for Microwave communication.

Two Three Four Five

http://vustudents.ning.com/
http://vustudents.ning.com/
(178) Each service area is divided into small ranges called “ CELLS”

TRUE FALSE

(179) Each cell office is controlled by a switching office is called_________.

TMSO
MSTO
MTSO
STMO

(180) Identify the correct option given bellow

Cell office � MTSO � Telephone Office


MTSO � Cell office � Telephone Office
Telephone Office � Cell Office � MTSO
None of the given

(181) Identify the wrong statement given bellow

MTSO monitor the signal level every few seconds


MTSO assigns an unused voice channel
MTSO sends queries to only one cell (paging)
Telephone Office sends the signals to MTSO

(182) What do you mean by Attenuation?

Loss of energy
Loss of signals
Loss of link
Loss of money

(183) Negative dB mean_________ and positive dB mean_________

Attenuation, Amplification
Amplification, Attenuation
Attenuation, Noise
Noise, Amplification

(184) Identify the correct statement given bellow

Distortion means that the signals change its form and shape
Distortion occur in a composite signals
Both a and b
None of above

(185) It comes from sources like Motors and Appliances,

Induced Noise
Crosstalk
Impulse Noise
All of above

(186) Effect of one wire on other is what type of Noise?

Induced Noise
Crosstalk
Impulse Noise
All of above

(187) Spike comes from power lines; lightening etc is what type of NOISE?

Induced Noise
http://vustudents.ning.com/
http://vustudents.ning.com/
Crosstalk
Impulse Noise
All of above

(188) Which concept(s) is/are used to measure the performance of the TX Media?

Throughput
Propagation Speed
Propagation Time
All of above

(189) The propagation speed of EM signals depends on the _______ of the signals

Medium
Frequency
Medium and frequency
Medium and quality

(190) If TX capacity of a link is ______ than the TX needs of a device attached to it, the
excess capacity is wasted.

Smaller
Greater

(191) WDM stands for

Wave Division Multiplexing Wrong Division Multiplexing


Well Division Multiplexing West Division Multiplexing

(192) Multiplexing has long been used as an essential tool in ______.

Electronic industry
Telephone industry
Space science
VLAN

(193) A portion of the path that carries TX b/w a given pair of devices is known as
__________.

Node Bridge Channel Access Point

(194) Multiplexing is the set of techniques that allows simultaneous TX of multiple signals
across a ___________ data link

Single Double Multi None of the given

(195) There are ________ basic categories of multiplexing.

3 4 5 6
(196) Amplifiers are used to __________the signal to heat.

Amplify
Rectify
Testify
Nullify

(196) Optical signals are multiplexed using _________ at switching office to create wider
BW optical signals

WDM FDM TDM MUX

(197) HDLC is an acronym for ______________.

http://vustudents.ning.com/
http://vustudents.ning.com/
High-duplex line communication
High-level data link control
Half-duplex digital link combination
Host double-level circuit

(197) An analog technique that can be applied when BW of a link is greater than the
combined BW of the signals to be TX.

WDM FDM TDM MUX

(198) ______ uses a series of filters to decompose multiplexed signal into its constituent
signals.

FDM TDM DEMUX MUX

(199) The order of receipt tells the _________ where to direct each time slot so no
addressing is necessary

FDM TDM DEMUX MUX

(200) Waste of empty slots is a weakness of synchronous TDM.

TRUE False

KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK
KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK

There are how many factors on which the performance of a network depends?
► Three
► Five
► Four
► Two

_________requires the maximum number of I/O ports.

► Bus
► Star
► Mesh
► Ring

Headers are added at layers 1 and 7 of OSI model.


► True
► False

Trailer is only added at ________layer of OSI model.


► Data link
► Physical
► Network
► Application

A sine wave must be an analog signal.


► True
► False

If there is __________in voltage then the frequency is infinite.


► Instantaneous change
http://vustudents.ning.com/
http://vustudents.ning.com/
► Continuous change
► No change

The inversion of the level at 1 bit is called as __________


► NRZ-L
► NRZ-I
► RZ

The last process in PCM is _________ digital data into digital signal.
► encoding
► decoding
► modulating

Amplitude in ASK is more resistive to EMI and Noise.


► True
► False

If FCC regulations are followed, the carrier frequencies of adjacent AM radio stations are
____________ apart.
► 5 KHz
► 10 KHz
► 200 KHz
► 530 KHz

In _____________ transmission, a start bit and a stop bit frame a character byte.
► Asynchronous serial
► Synchronous serial
► Parallel
► Asynchronous & Synchronous serial

Synchronous transmission has _____________.

► a start bit
► a stop bit
► gaps between bytes
► none of the given

Transmission media are usually categorized as _____________


► Fixed or Unfixed
► Guided or Unguided
► Determinate or Indeterminate
► Metallic or Nonmetallic

The RG number gives us information about ________.


► Twisted pairs
► Coaxial cables
► Optical fibers
► all of the given

Microwave frequencies range from _________.


► 30 to 300 KHz
► 300 KHz to300 KHz to 3 GHz
► 3 KHz to 300 GHz
► 3 KHz to 3000 GHz
http://vustudents.ning.com/
http://vustudents.ning.com/
All of popular Fiber optic connectors are ___________ shaped.
► Conical
► Barrel
► Circular
► Rectangular

In ______________ method a signal can be directed in a straight from Antenna to antenna.


► Line of sight
► Ground propagation
► Sky propagation
► Microwaves

Amplifiers are used to __________the signal to heat.


► Amplify
► Rectify
► Testify
► NUllify

There are ________ basic categories of multiplexing.


►3
►4
►2
►5

If a T-1 carries 8000 frames, the data rate is ___________


► 2.544 Mbps
► 1.544 Mbps
► 1.544 Kbps
► 1.544 Gbps

FTTC stands for _____________


► Flexible to the curb
► Fiber to the curb
► Fiber to the cable
► Fiber to the center

Optical signals are multiplexed using _________ at switching office to create wider BW optical
signals
► WDM
► FDM
► TDM
► MUX

Which error detection method consists of a parity bit for each unit as well as an entire data unit of
parity bits?
► Simple parity check
► Two-dimensional parity check
► CRC
► Checksum

If the ASCII character G is sent and the character D is received, what type of error is this?
► Single-bit
► Multiple-bit
http://vustudents.ning.com/
http://vustudents.ning.com/
► Burst
► Recoverable

Flow control is needed to prevent ____________


► Bit errors
► Overflow of the sender buffer
► Overflow of the receiver buffer
► Collision between sender and receiver

In data link layer, communication requires at least ___________ devices working together
►3
►2
►4
►5

Data link control is composed of ____________ important functions.


►2
►3
►4
►5

Error control is both error _________ and error ___________


► Detection; correction
► Detection; deletion
► Detection; avoidance
► Detection; forwarding

ENQ/ACK stands for______________


► Enquiry/ Acknowledgment
► Enque/ Acknowledgment
► Enquist/ Acknowledgment
► none of the given

In __________ ARQ, if a NAK is received, only the specific damaged or lost frame is
retransmitted.
► Stop-and-wait
► Go-Back-N
► Selective repeat
► Stop-and-wait & Go-back-N

Sliding window requires that data frames be transmitted _______________


► Sequentially
► Frequently
► Synchronously
► Asynchronously

Which of the following combines features of the other two?


► ZMODEM
► YMODEM
► XMODEM
► None of given

BLAST stands for :


► Blocked asynchronous transmission
http://vustudents.ning.com/
http://vustudents.ning.com/
► Blocked synchronous transmission
► Barrel asynchronous transmission
► Below asynchronous transmission

HDLC is an acronym for ______________.

► High-duplex line communication


► High-level data link control
► Half-duplex digital link combination
► Host double-level circuit

The HDLC ___________ field defines the beginning and end of a frame.
► Flag
► Address
► Control
► FCS

The shortest frame in HDLC protocol is usually the _________ frame.


► Information
► Supervisory
► Management
► None of the given

The PDU has no flag fields, no CRC, and no station address


► TRUE
► FALSE

_________ is the access protocol used by traditional Ethernet.


► CSMA/CD
► CSMA/CA
► Token Ring
► CSMA

Repeater is an amplifier, not a regenerator.


► True
► False

Bridges can divide a large ________ into smaller segments


► Network
► Packet
► Frame
► Address

The information to be communicated in a data communications system is the


► Medium
► Protocol
► Message
► Transmission

A set of devices connected by communication links is called networking


► True
► False

http://vustudents.ning.com/
http://vustudents.ning.com/
Internet with small “i” specifies the world wide Network the actual internet.
► True
► False

Data chunk at data link layer is called________


► Frame
► Packet
► Datagram

Data synchronization is a function related with ___________


► Session layer
► Presentation layer
► Transport

When data are transmitted from device A to device B, the header from A’s layer 4 is read by B’s
__________
► Physical
► Transport
► Application
► None of the given

Data must be converted into__________ before transmission.


► Signal
► Wave
► Electric pulse

PCM is the first process of PAM.


► True
► False

In _____________ transmission, bits are transmitted over a single wire, one at a time.
► Asynchronous serial
► Synchronous serial
► Parallel
► Asynchronous & Synchronous serial

EIA 232 allows for a maximum bit rate of __________Kbps.


► 40
► 30
► 20
► 10

When a beam of light travels through media of two different densities, if the angle of incidence is
greater than the critical angle, ____________occurs.
► Reflection
► Refraction
► Incidence
► Criticism

A parabolic dish antenna is a(n) ______________ antenna.


► Omni directional
► Bidirectional
► Unidirectional
► Horn
http://vustudents.ning.com/
http://vustudents.ning.com/
Ultra high-frequency waves always use __________ propagation.
► Ground
► Sky
► Line of Sight
► Space

Middle frequency waves having range 300 KHz-3 MHz always use __________ propagation.
► Ground
► Sky
► Line of Sight
► Space

dB is ____________ if a signal is attenuated.


► Negative
► Positive
► Null
► Zero

Which multiplexing technique involves signals composed of light beams?


► FDM
► TDM
► WDM
► none of the given

Multiplexing has long been used as an essential tool in the ____________.


► Electronic industry
► Telephone industry
► Space science
► VLAN

A telephone network is an example of a __________ network.


► Packet-switched
► Circuit-switched
► Message-switched
► None of the given

The local loop has ___________ cable that connects the subscriber telephone to the nearest end
office.
► Twisted-pair
► Coaxial
► Fiber-optic
► None of the given

Which error detection method involves polynomials?


► Checksum
► Two-dimensional parity check
► CRC
► Simple parity check

In CRC there is no error if the remainder at the receiver is ____________


► Equal to the remainder at the sender
► Zero
► Nonzero
http://vustudents.ning.com/
http://vustudents.ning.com/
► The quotient at the sender

In CRC the quotient at the sender _____________


► Becomes the dividend at the receiver
► Becomes the divisor at the receiver
► is discarded
► is the remainder

Which error detection method can detect a bust error?


► The parity check
► Two-dimensional parity check
► CRC
► Two-dimensional parity check and CRC

At the CRC checker, ________ means that the data unit is damaged
► A string of 0s
► A string of 1s
► A string of alternating 1s and 0s
► A nonzero remainder

Error control is both error _________ and error ___________


► Detection; correction
► Detection; deletion
► Detection; avoidance
► Detection; forwarding

In line discipline the initiator first transmits a frame called an ________


► Enquiry
► Acknowledgment
► NAK
► Request

In line discipline after the data transmission, the sending system finishes with an _____________
frame
► EOT
► EKT
► ENT
► ESP

In primary-secondary communication ______________ is always the initiator of a session


► Primary
► Secondary
► Sender
► Receiver

Primary device uses ____________ to receive transmission from the secondary devices.
► ACK
► ENQ
► POLL

In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence number?
► 0 to 63
► 0 to 64
► 1 to 63
http://vustudents.ning.com/
http://vustudents.ning.com/
► 1 to 64

Sliding window requires that data frames be transmitted _______________

► Sequentially
► Frequently
► Synchronously
► Asynchronously

Data link protocols can be divided into ______________ sub-groups.


► Two
► Three
► Four
► Five

XMODEM is a ______________ protocol designed for telephone-line communication b/w PCs.


► File transfer
► Hardware
► Software
► Application exchange

In Y-MODEM Multiple files can be sent simultaneously


► True
► False

Which of the following combines features of the other two?


► ZMODEM
► YMODEM
► XMODEM
► None of given

BLAST stands for:


► Blocked asynchronous transmission
► Blocked synchronous transmission
► Barrel asynchronous transmission
► Below asynchronous transmission

Which one of the following uses full duplex operation with sliding window flow control.
► BLAST
► XMODEM
► YMODEM
► ZMODEM

HDLC is an acronym for ______________.


► High-duplex line communication
► High-level data link control
► Half-duplex digital link combination
► Host double-level circuit

The DSAP and SSAP are addresses used by _________ to identify the protocol stacks.
► LLC
► MAC
► Network

http://vustudents.ning.com/
http://vustudents.ning.com/
The PDU has no flag fields, no CRC, and no station address
► TRUE
► FALSE

Which of the following is a bus topology LAN that uses base band signaling and has a max?
Segment length of 500 meters
► 10 Base5
► 10 Base2
► 100 Base2
► 100 Base5

Token Bus has no commercial application in data communications


► True
► False

The BNC-T connector is a T-shaped device with _______ ports


► Three
► Two
► Four
► Five

_________ is the access protocol used by traditional Ethernet.


► CSMA/CD
► CSMA/CA
► Token Ring
► CSMA

When a collision is detected in a network using CSMA/CD _________


► The frame is immediately resent
► A jam signal is sent by the station
► The back off value is set to 0
► The back off value is decremented by 1

Like VRC, LRC and CRC, Checksum is also based on _______________.


► Redundancy
► Decimal Division
► Encryption
► Encoding

Check sum method is used for _______________ layers.


► Physical
► Application
► Transport
► Data link

Repeater works on __________ layer.


► Data Link
► Physical
► Network
► Application

When systems share a point to point link, then protocols used are called ___________ protocols.
► Direct
► Indirect
http://vustudents.ning.com/
http://vustudents.ning.com/
► Monolithic
► structured

_________ requires more bandwidth.


► FSK
► ASK
► PSK
► QAM

http://vustudents.ning.com/

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy