Cs - 601 F-T Mcqs by Vu - Toper
Cs - 601 F-T Mcqs by Vu - Toper
Solve By Vu_Toper-RM
1. Amplitude, Frequency
2. Amplitude, phase
3. Frequency, Phase
4. Amplitude, Samples
2. In an analog hierarchy to carry voice channels, a group
can carry ________ voice channels.
1. 60
2. 12
3. 20
4. 10
3. Which of the following sublayer resolves the contention
for the shared media?
1. MAC
2. LLC
3. Physical
4. None of the given.
4. What is the period of a Sine wave having frequency of 5
Hz?
1. 0.2
2. 0.1 3. 0.5
4. 0.3
5. In CRC there is no error if the remainder at the receiver
is _______.
1. Equal to the remainder at the sender
2. Zero
3. Nonzero
4. The quotient at the sender
6. Analog To Analog Conversion Methods include
___________.
1. AM, PM and FM
2. AM, FSK and PM
3. AM, PM and QAM
4. None of the given
7. Signals travel through fiber optic cable are in the form of
________.
1. Light
2. Bits
3. Electromagnetic
4. Bytes
8. If the Hamming distance between sent and received
code word is ________, then it shows that received data
is corrupted.
1. ≠ 0
2. = 0 3. ≠ 1
4. = 1
9. The flag in PPP is a byte that needs to be ________
whenever it appears in the data section of the frame.
1. Duplicated
2. Blocked
3. Cleaned
4. Escaped
10. ________ is normally used where speed is priority in
data transfer.
1. Serial data transmission
2. Hybrid data transmission
3. Parallel data transmission
4. Both parallel and serial data transmission
11. Baud rate is greater than or equal to the bit rate.
1. True
2. False
12. ________ is an Authentication Protocol, which is used by
the PPP to authenticate passwords.
1. CHAP
2. PAP
3. LCP
4. ICMP
13. In Pure ALOHA, the vulnerable time is ________ the
frame transmission time.
1. Same as
2. Two times
3. Three times
4. Four times
14. A broadcast signal is received by the orbiting satellites
which rebroadcasts ________.
1. to the resender
2. to the sender
3. to the atmosphere
4. none of the given
15. In TCP/IP protocol suite, the process of adding header at
each layer on sending side is known as ________.
1. Encapsulation
2. De-encapsulation
3. Packetizing
4. Framing
16. By using ___________ system, change in the file
contents during file transmission can be avoided.
1. Routing
2. Flow Control
3. Error Detection and Correction
4. Congestion Control
17. Which of the following consist of just one redundant bit
per data unit?
1. Two-dimensional Parity check.
2. CRC
3. Simple Parity Check
4. Checksum
18. If duration of noise is decreased during a transmission
over noisy channel, fixed data rate of the channel will
cause ________ number of bits being impacted by the
noise.
1. Constant
2. More
3. Less
4. Zero
19. The extra bits added with the original data for error
detection/correction are called ________.
1. Fault bits
2. Port numbers
3. Redundant bits
4. Process IDs
20. Flow control is needed to prevent ________.
1. Bit errors
2. Overflow of the sender buffer
3. Overflow of the receiver buffer
4. Collision between sender and receiver
21. The inversion of the level represents a 1 bit in ______
encoding
1. NRZ-I
2. NRZ-L
3. RZ
4. Manchester
22. The term _______means that only one bit of a given
data unit is changed from 1 to 0 or from 0 to 1.
1. Packet Error
2. Burst Error
3. Single Bit Error
4. Character Error
23. A sine wave is defined by ___________ characteristics.
1. 2
2. 3
3. 4
4. 5
24. Quadrature Amplitude Modulation (QAM) is the
combination of ________ and ________.
1. FSK, PSK
2. PSK, FSK
3. ASK, PSK
4. ASK, FSK
25. If we need to correct a single error in an 8-bit data unit,
we need to consider ________ possible error locations.
1. 16
2. 2 3. 4
4. 8
26. To calculate the data rate for noisy channel ________
formula is used.
1. Shannon
2. Nyquist
3. Propagation
4. Greedy
27. GO-BACK-N protocol is one of the ________ layer
protocols, which is used to control the flow of data during
the transmission.
1. Physical
2. Network
3. Presentation
4. Data link
28. A ________ modem is used to connect two DTEs
directly.
1. 'NULL
2. Cable
3. DSL
4. None of the given
29. Time division multiplexing is used in ________ systems.
1. Analog
2. Hybrid
3. Digital
4. Automated
30. In OSI model headers are added at layer _________.
1. 1,2,3 only
2. 6,5,7 only
3. 5,4,3 only
4. 6,5,4,3,2 only
31. Line Configuration refers to the way two or more devices
attach to a ___________.
1. Path
2. Circuit
3. Link
4. Router
32. A sine wave is ___________.
1. periodic and discrete
2. aperiodic and discrete
3. periodic and continuous
4. aperiodic and continuous
33. The logical connection between the peer layers is
________ connection.
1. Physical
2. Direct
3. Indirect
4. Tangible
34. What is the frequency of a sine wave if it completes one
cycle in 2 seconds? 1. 0.5
2. 0.6
3. 0.3
4. 0.2
35. In Synchronous TDM, Time slots are not same in number
as input devices. 1. True
2. False
36. ________ category of coaxial cable is used for thin
Ethernet.
1. RG-58
2. RG-59
3. RG-1
4. RG-47
37. Radio wave transmission utilizes ___________ different
types of propagation. 1. Two
2. Three
3. Four
4. Five
38. BSC supports ___________ transmission using
___________ flow control.
1. Full-duplex, Stop and wait ARQ
2. Half-duplex, Selective reject ARQ
3. Full-duplex, Selective reject ARQ
4. Half-duplex, Stop and wait ARQ
39. In selective-reject ARQ, only the specific damaged or lost
frame is ________.
1. Retransmitted
2. Forwarded
3. Selected
4. Rejected
40. Error detection and correction are the services provided
by ________ layer.
1. Data link layer
2. Application layer
3. Physical layer
4. Session layer
41. The __________ generates the data and passes it along
with any control information to a __________.
1. DTE, DCE
2. DCE, DTE
3. DTE, DTE
4. DCE, DCE
42. Analog refers to something that is continuous in
___________.
1. Time
2. Space
3. Frequency
4. None of the given
43. Time domain shows changes in ___________.
1. time w.r.t signal amplitude
2. signal amplitude w.r.t time
3. time
4. All of the given
44. Mr. Asif while sitting in Lahore is talking with his friend
in Dubai through Skype is an example of ________.
1. Local Area Network
2. Metropolitan Area Network
3. Wide Area Network
4. Home Based Network
45. Which level of the TCP/IP reference model routes
data/information across a network channel?
1. Application Layer
2. Data Link Layer
3. Transport Layer
4. Network Layer
46. There are _________ types of serial transmission.
1. 3
2. 4
3. 2
4. None of the given
47. Latency is made of ________ components.
1. Two
2. Three
3. Four
4. Five
48. Like 10 Base 5, 10 Base 2 is a ________ topology LAN.
1. Ring
2. Mesh
3. Star
4. Bus
49. ________ is the rate of change with respect to time.
1. Voltage
2. Time
3. Frequency
4. Amplitude
50. Two or more computers connected so that they can
communicate with each other and share information is
called a ___________.
1. satellite
2. protocol
3. broadcast
4. network
51. Which error detection method consists of a parity bit for
each unit as well as an entire data unit of parity bits?
1. Checksum
2. Cyclic Redundancy Check (CRC)
3. Longitudinal Red Check (LRC)
4. Vertical Redundancy Check (VRC) 52. Central Hub
in a Tree is an ___________.
1. Active hub
2. passive hub
53. Time domain plot show changes in signal phase with respect
to time.
1. true
2. false
54. ________ is an Authentication Protocol, which uses two-step
process to authenticate user information.
1. CHAP
2. LCP
3. PAP
4. ICMP
55. CHAP is an Authentication Protocol, which uses ________
process to authenticate user information.
1. Two-way
2. Three-way
3. Four-way
4. Five-way
56. No matter whether the link is dedicated or broadcast, data
link control (DLC) layer provides services between
________.
1. Virtual LANs
2. Two adjacent nodes
3. Ethernet links
4. Source and destination PCs
57. Encoding digital data into digital signals is called
___________.
1. Analog-to-Digital Conversion
2. Digital-to-Digital Conversion
3. Digital-to-Analog Conversion
4. None of the given
58. ________ encoding is almost obsolete today
1. Bipolar
2. Unipolar
3. Polar
4. None of the given 59. The Internet is
___________.
1. software for sending e-mail around the world
2. a government-owned agency that links computers
3. a global network of computers networks
4. a specialized form of local area network
60. PSK is susceptible to the noise degradation.
1. True
2. False
61. Low pass channel has ________ bandwidth between
two stations.
1. Dedicated
2. Shared
3. Multiplexed
4. Infinite
62. In ASK, Noise usually affects the ________.
1. Amplitude
2. Phase
3. Sample
4. Frequency
63. The flag in PPP is a byte that needs to be ________
whenever it appears in the data section of the frame.
1. Duplicated
2. Blocked
3. Cleaned
4. Escaped
64. Which of the following is not a characteristic of a sine
wave? 1. Amplitude
2. Segmentation
3. Phase
4. Frequency
65. In statistical time division multiplexing, number of slots
in frame are less than ________.
1. Output data rate
2. Input lines
3. Input frequency
4. Multiplexed T lines
66. If a digital signal has "L" number of levels. ________ is
the number of bits required to represent each level.
1. Log L
2. Log Base 2 L
3. L Square
4. Log(2*L)
67. ________ is responsible for governing node to node
communication.
1. Application Layer
2. Session Layer
3. Data Link layer
4. Presentation Layer
68. The original Ethernet technology with the data rate of
10 Mbps is called ________?
1. Standard Ethernet
2. Fast Ethernet
3. Gigabit Ethernet
4. 10 Gigabit Ethernet
69. What is the period of a Sine wave having frequency of
2 Hz?
1. 0.2
2. 0.1
3. 0.5
4. 0.3
70. In line discipline after the data transmission, the
sending system finishes with an ________ frame.
1. EOT
2. EKT
3. ENT
4. ESP
71. Each computer on the Internet has a unique numeric
address called a(n) ___________.
1. domain address
2. protocol address
3. IP address
4. Web address
72. In even parity check code, the value of syndrome is
________ if the number of 1s is even.
1. 1
2. 2
3. 0
4. 4
73. TROPOSHERE is the layer of atmosphere above the
troposphere but below space
1. True
2. False
74. The logical connection between the peer layers is
________ connection.
1. Physical
2. Direct
3. Indirect
4. Tangible
75. We can have ________ different groups with a 4 bit
block.
1. 4
2. 8
3. 16
4. 32
76. In analog transmission, the base signal is called
the________.
1. Carrier Signal
2. Analog signal
3. Digital signal
4. Modulated signal
77. Traditionally MANs have been implemented using one of
the 2 technologies, Circuit Switching and Packet
Switching
1. true
2. false
78. In ___________ a dedicated communication path is
established between two stations through the nodes of
the network
1. Circuit switching
2. Packet switching
79. If the window size is 63 in go-back N ARQ then what is
the range of sequence number?
1. 0 to 63
2. 0 to 64 3. 1 to 63
4. 1 to 64
80. WDM stands for ________.
1. Wideband De-Modulation
2. Worst Data Manipulation
3. Wavelength Division Multiplexing
4. None of the given
81. At the CRC checker, ___________ means that the data
unit is damaged.
1. A string of 0s
2. A string of 1s
3. A string of alternating 1s and 0s
4. A nonzero remainder
82. The level of signal is always positive in NRZ encoding.
1. true
2. false
83. There are ________ basic categories of multiplexing.
1. 2
2. 3
3. 7
4. 5
84. ________ are used to exchange session management
and control information between connected devices.
1. I-frames
2. U-frames
3. S-frames
4. N-frames
85. At the CRC generator, ___________ added to the data
unit before the divisional process.
1. 0s are
2. 1s are
3. a polynomial is
4. a CRC remainder is
86. Checksum is an error-detection technique that can be
applied to a message of ________ length.
1. Exactly 4
2. Exactly 8
3. Exactly 32
4. Any
87. The ________ protocol uses both flow and error control.
1. TCP/IP
2. HDLC
3. ICMP
4. Stop-and-Wait
88. S-frames in High-Level Data Link Control (HDLC) are
only used to transfer ________ information.
1. User data
2. Control
3. Redundant
4. Original
89. Which of the following statement is correct?
1. Digital signals are less prone to Noise
2. Digital signals are highly prone to Noise 3. Analog
Signals are less prone to Noise
4. Digital signals are not affected by Noise
90. Quantization is a method of assigning ________ values
in a specific range to sampled instances.
1. Negative
2. Positive
3. Binary
4. Integral
91. To control and manage the transfer of data, a protocol
called Point to Point Protocol (PPP) is used at the
________ layer.
1. Physical
2. Network
3. Presentation
4. Data link
92. ________ is sometimes called the bit rate.
1. signal rate
2. modulation rate
3. Data rate
4. pulse rate
93. In circuit switched networks we have low efficiency but
minimal ________. 1. Delay
2. Speed
3. Throughput
4. Errors
94. In ________, both peak amplitude and frequency
remains constant as the phase changes.
1. PSK
2. QAM
3. Both PSK & QAM
4. None of the given
95. The inversion of the level at 1 bit is called as ________.
1. NRZ-L
2. NRZ-I
3. RZ
4. None of the given.
96. Which error detection method uses one's complement
arithmetic.
1. Cyclic Redundancy Check (CRC)
2. Longitudinal Red Check (LRC)
3. Checksum
4. Simple Parity Check
97. The transmission medium that carries the message is
referred to as the ___________.
1. send and receive device
2. communication channel
3. protocol
4. gateways
98. What is the Bandwidth of a periodic signal if it is
decomposed into 4 sine waves with frequencies 200,
400, 600 and 800?
1. 100
2. 500
3. 300
4. 600
99. ________ is the process of converting digital data to
digital signals.
1. CSMA/CD
2. CSMA/CA
3. Line coding
4. Segmentation
100. Session layer is responsible for _________.
1. Reassembly of data
2. Maintaining the connection
https://examradar.com/multiple-access-mcq-data-communication-networking/
Check This link Important Mcqs for Final Term Exams.