This action might not be possible to undo. Are you sure you want to continue?
1. Data can be either a. b. c. d. Images Numbers Words All of these
2. The word ‘Data’ is derived from a. b. c. d. Latin Contextual DB None of these
3. How many types of data are a. b. c. d. 1 2 3 4
4. The types of data are a. b. c. d. Qualitative Quantitative Both a & b None of these
5. Data are taken as ________ level of abstraction a. b. c. d. Highest Middle Lowest None of these
6. Information are taken as ________ level of abstraction a. b. c. d. Highest Middle Lowest None of these
7. Knowledge are taken as ________ level of abstraction a. b. c. d. Highest Middle Lowest None of these
8. The quantitative data is expressed in a. b. c. d. Numerical form Non-numerical form Both a & b None of these
9. The qualitative data is expressed in a. b. c. d. Numerical form Non-numerical form Both a & b None of these
10. The qualitative data may be a. b. c. d. Things Words Text None of these
11. Which type of data is hard, rigorous, credible and scientific a. b. c. d. Qualitative data Quantitative data Both a & b None of these
12. Which data are rich, poor, tall, short, good, bad, better a. b. c. d. Qualitative data Quantitative data Both a & b None of these
13. Data type is thought of as a set of
a. b. c. d.
Values Operations on values Both a & b None of these
14. Data type as defined in programming language are a. b. c. d. e. byte: a. b. c. d. 4 8 16 32 Integers Floating-point numbers Characters Alphanumeric strings All of these
15. The smallest addressable unit of data is defined as a group of ___ bits is known as a
16. The unit processed by machine code instructions is called a _______ a. b. c. d. Word Number Bit Byte
17. The machine code unit may be _________ depending on the computer architecture: a. b. c. d. 8 bit or 16 bit 16 bit or 32 bit 32 bit or 64 bit 64bit or 128 bit
18. In a 32-bit word it can represent unsigned integer values ranging from
a. b. c. d.
0 to 232 -1 -231 to 231-1 0 to 264 -1 0 to 231 -1
b. c. c. Hard wired Wireless Both a & b None of these . b. A channel is defined as a path between 24. Electric current Electromagnetic field Electronic current Both a & b 21. In a 32-bit word it can represent signed integer values ranging from a. One place to another place b. d. c. d. Both a & b d. The path of channel may be a.19. A signal is an a. The path of channel may be a. A signal is used to convey data from a. None of these 22. b. A telephone user The telephone network Both a & b None of these 23. c. d. b. Physical Logical Both a & b None of these 25. One system to another system c. 0 to 232 -1 -231 to 231-1 231 to 264 -1 0 to 231 -1 20. b. d. c. d. In case of PSTN. signaling between a.
d. Electrical form Electromagnetic form Both a & b None of these 30. Images Audio Text Programs Telemetry All of these 29. b. The noise generated which is lower than the high frequency range of ____ and may have more interface with the signal of information: a. c. 300kHz 300MHz 300GHz 300Hz 32. d. In channel noise. b. d. c. In channel . data by affecting communications and files of all types including a. None of these 28. b. The noise generated because of electricity or atmospheric disturbances is of the order of a. b. Reproduced b. c. Both a & b d. Internal External Both a & b None of these 31. c. e. 300MHz . The noise may be classified as ______________ based upon the sources a. Reach the receiver at all c. d. b. Upgrades Degrades Both a & b None of these 27. the information may not be a. c.26. Information and data may be treated as a signal in either a. Noise of channel noise___________ the quality of information and data a. f. d.
b. Both a & b 39. External noise has _______ effect on higher frequencies a. d. None of these 38. Fiber optics technology c. The unit of noise is . d. b. Both a & b d. c. S/N b. b. 300kHz c. Internal noise is less dependent on frequency. External noise is generally picked ____________________ a. c. SNR c. From electrical transformers d. c. All of these 34. Higher frequency Low frequency Middle frequency No frequency 36. Digital signal processing b. Noise is measured in terms of the signal to noise ratio a. From the atmosphere c. b. d. More Less No None of these 37. S/M d. Channels Receivers Transmitter Both a & b up from electrical appliances existing 35. Internal noise is fairly low in case of a. 300GHz d. In the vicinity b. Internal noise is generated in the a. Also from outer space e. 300Hz 33. but has a significant effect at: a.
a. b. c. d.
decibels Hertz Micron bits per second
e. 40. ____________ defined as the size of the range of frequencies that can be transmitted through a channel a. Channel Bandwidth b. Channel Data Transmission Rate c. Channel noise d. Channel capacity 40. In other words channel bandwidth may be define it as the volume of information per unit time that a _____________________ a. b. c. d. Computer Person Transmission medium can handle All of these
42. Channel Bandwidth is measured in a. b. c. d. decibels Hertz Micron bits per second
43. Bandwidth is expressed as data speed in ___________ digital systems: a. b. c. d. decibels Hertz Micron bits per second
44. In analog systems, bandwidth is expressed as the difference between the a. b. c. d. Highest frequency Lowest frequency Both a & b None of these
45. __________ is determined by the maximum number of bits that can be transmitted per unit time through the physical medium: a. Channel Bandwidth b. Channel Data Transmission Rate c. Channel noise d. Channel capacity 46. Channel Data Transmission Rate is measured in a. b. c. d. decibels Hertz Micron bits per second
47. Which gave the maximum data rate of a noiseless channel a. H.Nyquist in 1924 b. H.Nyquist in 1934 c. Peter Sain in 1932 d. None of these 48. Channel latency depends on the a. b. c. d. Signal propagation speed Media characteristics Transmission distance All of these
49. _____________ is the amount of time that is needed for the information to propagate from the source to destination through the channel: a. b. c. d. e. Propagation time Channel Latency Channel Utilization Both a & b
50. Throughput may be defined as the number of _______________ through a data communication system over a period of time: a. b. c. d. bits characters blocks passing All of these
51. ___________ may be defined as range of frequencies assigned to a channel a. Bandwidth
b. Channel noise c. Bit rate d. Channel latency 52. Higher the Bandwidth,________ will be the data transmission rate or throughput a. b. c. d. More Less Medium None of these
53. In transmission of a signal, the range of carrier frequencies depends on the a. Nature of medium b. Requirement of the applications supported c. Nature of distance d. Both a & b 54. ________ may be defined as the range of frequencies being supported by a particular transmission medium a. b. c. d. Frequency Frequency spectrum Carrier frequency None of these
55. The actual range of frequencies supporting a given communication is known as a. b. c. d. Baud rate Pass band Band data Pass
56. Higher frequency signal offers _________ bandwidth a. b. c. d. Lesser Greater Medium None of these
57. ________ refers to the minimum or maximum spatial separation between devices over a link, in the context of a complete, end to end circuit a. Bandwidth b. Channel c. Distance
c. c. b. _________ is the rate over network speed which is used to detect errors while transmitting data a. Time division modem c. d. The incorrect bit rate is also known as . Formal Error Checking Forward Error Checking Forward Error Character Formal Error Character 63. Time detect modem d. c. The most popular method for detecting errors in bit rate is ________ a parity bit alongside the data bit for a character a. b. >1008GHz <1018GHz >1018GHz <1008GHz 60. None of these 58. Deleting Inserting Modifying Updating 61. d. What is the frequency range of gamma and cosmic rays a. b. b. Total division multiplex b. d. The net bit rate is also known as a. d. c. d. c. Pass bit rate Data bit rate Useful bit rate Network bit rate 64. TDM means a. Time division multiplex 62.d. FEC means a. b. Bit rate Data rate Baud rate Pass band 59.
b. d. b. TDM FEC Framing Bit All of these 66. d.a. c. d. None of these 68. d. b. c. c. Physical layer net bit rate c. b. d. 70. The sample uses different number of bits The data is encoded by different number of bits The material is sampled at different frequencies The information is digitally compressed by different algorithms All of these . The FEC is also refers to a. c. b. Data bit rate Useful bit rate Network bit rate Parity bit 65. The size of the multimedia file is the product of _______ a. TDM FEC Framing Bit All of these 67. Logical layer net bit rate b. The fundamentals of Bit rate: a. b. e. Bit rate in bytes Bit rate in kilobytes Bit rate in gigabytes None of these 69. The size of the multimedia file is the length of recording in seconds divided by: a. c. 4 8 12 16 e. The speed of connection of bit rate is determined by a. c. d. Prefix layer net bit rate d. The example of net bit rate are a.
The bit rate could be as high as a. b. per min by an ideal transmitter d. b. per second by an ideal transistor c. Without getting error frames b. Without getting error format d. c. c. The bit rate is __________ for a specific network a. c. Baud rate determines the bandwidth required to transmit the ______ a. d. d. d. Getting error format 75. Equal More Equal or more None of these 76. Fixed Uniform Fixed and Uniform None of these 72. b.70. c. 1Gbit/s 1Mbit/s 1Mbyte/s 1Gbyte/s 74. Lesser bandwidth is required to move these signal units with _____ bits for an efficient system a. Bit rate is always ________ to the baud rate a. Signal Data Symbol None of these 77. Getting error frames c. b. c. Bit rate is used to calculate the speed of time to access the network a. d. The gross bit rate is the number of bits transmitted a. Less Large Equal None of these . per min by an ideal transistor 73. d. per second by an ideal transmitter b. b.
78. A character set was designed by a. Jean-Maurice-Emile Baudot in 1874 b. Jean-Maurice-Emile Baudot in 1885 c. John-Maurice-Emile Baudot in 1864 d. John-Merry-Emile Baudot in 1894 79. Character set system was implemented using keyboard having ____ a. b. c. d. 8-key 6-key 5-key 9-key
80. Who modified system using keyboard using 5-key a. Donald Murray in 1901 b. Donald Merry in 1902 c. Donald Duck in 1904 d. Donald Murray in 1902 81. Donald Murray modification took a shape as a. b. c. d. International Telegraph Alphabet 1 International Telephone Alphabet 1 International Television Alphabet 1 International Telegram Alphabet 1
82. International Telegraph Alphabet 1 was further developed to a. b. c. d. ITA 1 ITA 2 ITA 3 ITA 4
83. In character code system, a 5-bit code is a. b. c. d. 00011 00101 00010 10101
84. A 5-bit code is signified a a. b. c. d. Line Feed Light Feed Line Format None of these
85. The basic idea behind coding was really workable if number of characters it had to handle do not require more than a. b. c. d. 8 characters 16 characters 32 characters 64 characters
86. For covering all the characters of alphabet with special a. Characters b. Punctuation marks c. Other control characters d. Other coding technique was needed e. All of these 87. Encoding is done for data a. b. c. d. Inside computer Outside computer Both a & b None of these
88. The following data techniques are used a. Binary Coded Decimal(BCD) b. Extended Binary Coded Decimal Interchange Code(EBCDIC) c. American Standard Code for Information Interchange(ASCII) d. Unicode e. Manchester Code f. Differential Manchester Encoding(DME) g. Return to Zero(RZ) h. Non Return to Zero(NRZ) i. Non Return to Zero Invertive(NRZ-I) j. MLT-3 k. 4B/5B l. 5B/6B m. All of these 89. Unicode Examples are a. b. c. d. e. f. UTF-7 UTF-8 UTF-16 UTF-32 UTF-EBCDIC All of these
90. Binary Coded Decimal system makes use of a series of _____ to represent a decimal number
a. b. c. d.
4 8 16 32
e. 91. Nibble is known as series of ____ a. b. c. d. 8 bits 4 bits 16 bits 32 bits
92. Extended Binary Coded Decimal Interchange Code is developed by a. Parallel to ASCII, IBM in 1964 b. Parallel to ASCII, IBM in 1974 c. Parallel to ASCII, IBM in 1962 d. Parallel to ASCII, IBM in 1964 93. EBCDIC is a coding system that uses a. b. c. d. 8 bit 4 bit 16 bit 32 bit
94. A byte in EBCDIC system of coding contained ___ nibbles a. b. c. d. 3 4 2 6
95. First nibble is known as a. b. c. d. Zone Digit Byte Bit
96. Second nibble is known as a. b. c. d. Zone Digit Byte Bit
Unicode is appeared in a. 99. a. c. The first version of Unicode Unicode 1.0 Unicode 3. c. c. 103. b. b.0 appeared in a. d. 2005 . Characters belong Integers belong String belong None of these 98.0 None of these Unicode version 5. 100. ASCII is a ___ bit coding for representing characters of English alphabets a. b. d.0 Unicode 2.97. d. b. b. c. 1992 1991 1993 1994 102. a. First nibble represents category to which the __________ a. d. 1964 1965 1963 1966 Unicode was developed by Unicode Consortium Unique Consortium Unicode Constant None of these 101. b. c. ASCII was published in a. d. d. c. 64 bit 7 bit 16 bit 32 bit e.
b. d. d. d. 108. 106. a. namely are UTF(Unicode Transformation Format) UCS(Unicode Character Set) Both a & b None of these Every communication channel has a ________ which is defined as the frequency Channel Bandwidth Carrier Data rate The bandwidth is a _________ property of a transmission medium Physical Logical Both a & b None of these A telephone wire has bandwidth of ______ for short distance 1M 2M 3M 4M . d. c. c. 2004 104. c. Graphical Graphemes Graphs None of these The first 256 code points belong to __________ for conversion to Roman Text ISO 5589-1 ISO 5569-1 ISO 5579-1 ISO 5559-1 Unicode mapping methods are of two types. a. 107. b. b. d. b. c. d. 105. b. a. 109. c. range a. b. 2006 c.b. 2007 d. In Unicode there were codes for representing characters and their basic graphical representation are known as a. c. a.
c. c. 115. 116. a. c. d. b. c. d. 114. c. a. d. d. Data rate that can be achieved using a channel depends on the _____________ of a channel a. 113. b. Frequency Bandwidth Data rate Capacity The undesirable waveform is known as Anti-Aliasing Aliasing Channel Bandwidth The word PCM stands for Primary code mapping Pulse code modulation Primary channel modulation None of these How many way to communicate. d. a. b. store or manipulate information are Analog Digital Both a & b None of these The analog form of electronic communication represents the information in Continuous electromagnetic wave form Discrete form Both a & b None of these The digital form of electronic communication represents the information in Continuous electromagnetic wave form Discrete form Both a & b None of these . b.110. b. 111. 112. d. b. a. b. a. d. a. store or manipulate information 1 2 3 4 The way to communicate. c. display. display. c.
The word AM stands for a. Analog Modulation b. Analog Manipulation c. Amplitude Modulation d. Analog Modeling
118. a. b. c. d. 119. a. b. c. d. 120. a. b. c. d. 121. a. b. c. d. e. 122. a. b. c. d. 123.
The word FM stands for Frequency Modulation Fourier Manipulation Frequency Manipulation Frequency Modeling The bandwidth of voice grade channel is approximately 4000Hz 5000Hz 6000Hz 3000Hz The bandwidth of CATV video channel is approximately 2MHz 4MHz 6MHz 8MHz The advantages of FM over AM are Improved signal to noise ratio(about 25dB) Less radiated power Well defined service areas for given transmitter power Smaller geographical interference between neighboring stations All of these The disadvantages of FM are Much more bandwidth(as much as 20 times as much) More Complicated receiver More complicated transmitter All of these Computer are________ in nature a. Analog b. Digital c. Both a & b
d. None of these 124. a. b. c. d. 125. a. b. c. d. 126. a. b. c. d. 127. a. b. c. d. 128. a. b. c. d. SS7 means Signal Source7 Signaling source7 Signaling system7 Signal system7 SS7 is a System Source Protocol None of these The PSTN provides a _________ path between the destination and source Logical Physical Both a & b None of these The functions of SS7 are Controlling network Set up and tear down the call Handles the routines decision All of these SS7 uses voice switches known as SSWs(Service Switching websites) SSPs(Service Switching Points) SSNs(Service Switching Networks) SSDs(Service Switching Data)
129. SSPs uses Query Service Control Point (SCP) database using Packet switches called a. b. c. d. Signal Transfer Points(STPs) SSWs(Service Switching websites) SSPs(Service Switching Points) SSNs(Service Switching Networks)
130. _____________ refers to correct detection by receiving equipment at the beginning and end of data that was sent from sending equipment a. Asynchronous b. Synchronous
c. Synchronization d. None of these 131. Synchronous systems can be classified into three categories: Asynchronous systems Character synchronous systems Flag Synchronous systems All of these 132. Asynchronous transmission is a _________ method of transmission in which a sign bit is added to the beginning: a. b. c. d. a. b. c. d. 133. a. b. c. d. 134. a. b. c. d. Start Stop Start-stop None of these Manchester is also known as MPE(Manchester Phase Encoding) MPD(Manchester Phase Data) MPN(Manchester Phase Network) MPW(Manchester Phase Website) Manchester coding is used in telecommunication by Encoding standard 802.3 Ethernet standard 802.3 Ethernet standard 805.3 Encoding standard 805.3
135. a. b. c. d. e. 136.
For 10Mbps Ethernet carrier frequency is 20MHz 15MHz 10MHz 5MHz The another name of DME(Differential Manchester Encoding) a. CDP(Conditioned Diphase Encoding)
None of these 143. One-fourth of the baud rate b. 2 3 4 5 138. c. One-half of the baud rate d. SSPs(Service Switching Points) In DME. Due to four transitions the maximum fundamental frequency requirement is reduced to ____ a. c. less more either less or more none of these NRZ has no ___ state a. d. c. d. d. 142.136. SSWs(Service Switching websites) d. b. b. c. Rest Condition Neutral Point Both a & b None of these The NRZ-pulses contain ____ energy in comparison to that of a RZ code a. b. b. d. logical values are indicated by _______________ of transitions a. MPE(Manchester Phase Encoding) c. b. 140. b. Rest Zero Neutral None of these MLT-3 is an encoding scheme in which ____ voltage levels are used a. One-third of the baud rate c. 141. Who specified the committee scheme of coding . d. zero between each bit signifies a _____________ a. c. 139. Absence Presence Both a & b None of these In RZ.
a. c. c. we need a 125MHz clock for a signal of 1000MHz 100MHz 10MHz 99MHz 147. 145. 148.7 ANSI X5T9. a. b. c. d.25MHz 31. d. b. d. 149. d. d.5 for obtaining 100Mbps from a signal of ______ 32.25MHz 31. 144. b. d.6 ANSI X3T9. ANSI X3T9. c. e. b. d. c. The 5B/6B scheme encodes the scrambled 5-bit data pattern into predetermined _____ bit symbol a. a.a.5 ANSI X6T9.5 FDDI uses ANSI X3T9. a. c. a. b. b.24MHz 32. 146. 5 4 6 3 Modulation is the technique used to translate Information from source to destination Low frequency to higher frequency Source to higher frequency Low frequency to destination The low frequency signal are Audio Video Music Data All of these . c.26MHz 4B/5B encoding scheme is also known as Block coding Bit coding Byte coding Block character In 4B/5B scheme. b.
c. c. a. d. a. 0 . 1 b. b. a._______ are added Special character Start bit Stop bit None of these Special character are called STN SYN SBN SRN The character string of the SYN character is 01001111 10001110 00010110 00110011 The character synchronous system receives _______ as one character 2bit 4bit 8bit 16bit In the 4B/5B we need a 125MHz clock for a signal of 100MHz 10MHz 1000MHz 10000MHz 5B/6B creates a data pattern that is placed with equal numbers of a. b. c. 156. d. d. 151. c. 153. d. c. b. 152. a. d. c. a. b. 154. b.150. a. The modulation/demodulation is a Linear process Non-linear process Both a & b None of these In character synchronous system . d. 155. b.
b. c. c. Addition Subtraction Multiplied Division Angular frequency id defined as _______ the frequency of carrier signal Once Twice Thrice None of these 161. Lower . e. Modulation is the technique used to translate low-frequency(base-band) signals like __________ to a higher frequency a. c. Modulation also reduces the size of antenna for higher frequencies with ________ frequency a. c.c. Modulation/ demodulation is a non linear process where two different sinusoids are _________ a. d. Both a & b d. b. a. Lower Higher Zero None of these 162. Audio Music Video Data All of these 159. 160. a. How many encoding techniques we used today 10 100 1000 10000 158. The frequencies that comprise the message (base band) are translated into a _________ range of frequencies a. b. d. b. d. b. None of these 157. d. d. c.
a. d. For demodulation. Greater c. 164. b. c. d. None of these 163. c. d. DSB-SC DBS-CS BDS-SC BSD-CS . c. b. d. it needs the carrier frequency to be generated or derived at the receiving location known as a. 167. Middle d. d. c. 165. c. The non-linearity results in several ___________ harmonics Even Odd Both a & b None of these Harmonics are the _________ of the frequency. b. Can not change Change Either change or not None of these The frequency of the carrier ___________and we get a complex wave does not changed Change Either change or not None of these 168. that is the message frequency Addition Subtraction Multiply Division The carrier frequency may be a ___________ Radio wave Light wave Both a & b None of these 166. a. a. b.b. The amplitude of carrier frequency ________ in accordance with the modulated signal a. c. a. b. d. b.
172. The full form of DSB-SC Direct Side Band-Suppressed Carrier Direct Side Base-Suppressed Carrier Double Side Band-Suppressed Carrier Double Slide Band-Suppressed Carrier One more kind of analog modulation is called Vestigial side band modulation Vestigial side base modulation Vestigial slide band modulation Vestigial slide base modulation Pulse code modulation is a method by which an audio signals are represented as Direct data Digital data Device data None of these Pulse Code Modulation(PCM) requires bandwidth of ________ 32Kbps 64Kbps 128Kbps 256Kbps 173. b. b. None of these 175. c. d. which introduces as the finite number of quantization levels during the conversion to PCM code a. d. c. c. b. a. d. Less Middle High None of these 174. Quantization noise b. c. b. b. Equalization noise c. 171. c. In digital signal the main source of noise is ___________. a. c. Digital noise d. Dynamic range Signal-to-Noise Ratio(SNR) Both a & b None of these . The main parameters in determining the quality of a PCM system are the a. d. PCM is a coding scheme used in digital communication because of _____ sensitive to noise a. a. d.169. b. 170. a. d.
a. Telephone lines b. d. c. c. 178. Both a & b d. 181. Digital lines . 179. 2 3 4 1 The dynamic range is the ratio of the Largest possible signal magnitude Smallest possible signal magnitude Both a & b None of these For a six bits system the dynamic range will be approximately equal to ___ 34dB 36dB 40dB 38dB 180. None of these Communication channels like ____________ are usually analog media a. 32times 64times 125times 256times 182. b. Television lines c. In dynamic range. The disadvantages associated with the Delta Modulation PCM is a.176. b. Granular noise c. c. d. a. b. b. Slope overload b. d. the largest voltage amplitude is _______ the smallest voltage amplitude a. The maximum error occurs when the original level falls exactly halfway between ______ quantized levels a. b. a. c. d. c. d. The maximum error occurs between the Original level Quantized level Both a & b None of these 177.
ASK-Amplitude Shift Keying b. DPSK-Differential Phase Shift Keying e.Quadrature Amplitude Modulation h. b. d. the frequency of the carrier signal is changed according to the data . In the Frequency Shift keying. c.d. a. b. 185. b. All of these The main advantage of this technique. c. QPSK-Quadrature Phase Shifted Keying g. 3000 3300 3100 3330 188. Which is a bandwidth-limited channel Digital media Analog media Both a & b None of these In the case of telephone lines. d. it is easy to such a. c. b. 189. the usable bandwidth falls in the range of _______ 300Hz to 3000Hz 300Hz to 3300Hz 30Hz to 3300Hz 33Hz to 3300Hz Digital information signals have the shape of pulse and represented by 0 1 both a & b none of these 187. b. d. a. QAM. d. d. None of these 183. The following types of modulation are used in modems a. 184. 186. Signals Also to detect them Both a & b None of these Telephone lines limit amplitude changes to some _________ changes per second a. a. c. PSK-Phase Shift Keying d. FSK-Frequency Shifted Keying c. c. BPSK-Binary Phase Shift Keying f.
c. d. For a 0 the modem shifts the phase of each succeeding signal in a certain number of degrees a. 192. c. c. d. b. c.a. In the differential phase shift keying. c. 191. d. a __ degrees phase sine wave is transmitted 0 45 90 180 A sub method of the phase modulation is Differential phase modulation Direct phase modulation Double phase modulation None of these Differential phase modulation technique is also called Amplitude Shift Keying Phase Shift Keying Frequency Shift Keying None of these 195. Modulation Data Signals None of these 190. c. b. d. d. a. a. d. 194. b. b. a. c. Analog data Digital data Signal data None of these For a 0. d. 0 45 90 180 . b. a. b. 193. a __ degrees phase sine wave is transmitted 0 45 90 180 For a 1. b. In the Phase Shift Keying method a sine wave is transmitted and the phase of the sine wave carries the ______ a.
c. 200. c. d. QPSK 8PSK 8QAM 8FSK Binary Phase Shift Keying is measured in Decibel Baud Hertz bits per second In QPSK. b. d. where each symbol represents ____. a. the modulation technique is called a. In the differential phase shift keying. In binary phase shift keying. c. b. b. c. 202. where each symbol represents ____. b. 0 90 180 270 197. d. In binary phase shift keying. the case of 8 different phase shifts. d.196. For a 1 the modem shifts the phase of each succeeding signal and a different certain number of degrees a. 199. 2 bits 4 bits 8 bits 16 bits 198. 201. d. a. the modulation technique is called quadrature PSK(QPSK) a. d. a. b. b. the case of 4 different phase shifts. c. c. the four angle are usually out of phase by 0 45 90 180 The AM is considered as a Linear process Non-linear process Both a & b None of these The FM is considered as a .
d. d. b. ________ is a process where multiple analog message signals or digital data streams are combined into one medium over a shared medium . b. d. ________ of the carrier wave changes Frequency Phase Both a & b None of these PCM requires bandwidth of 21Kbps 24Kbps 64Kbps 65Kbps 206. d. c. b. a. c. b. a. In data communication using computers . d. a. c. Analog Digital Both a &b None of these 208. 205. Linear process Non-linear process Both a & b None of these The phase modulation is similar to the Amplitude Modulation Frequency Modulation Angle Modulation Pulse Code Modulation In PM. c. Analog Digital Both a & b None of these 207.________ signal are normally converted into PCM a.a. d. c. e. 203. c. 204. b. The PCM is a coding scheme used in __________ communication because of less sensitive to noise a. b.
b. Code Division Multiplexing(CDM) d. Wavelength Division Multiplexing(WDM) 213. d. c. Multiple channels are combined onto a single aggregate signal for transmission a. d. g. c. In which . f. d. Frequency Division Multiplexing(FDM) b. d. b. c. c. such systems are still in use and are used with analog transmission a.a. c. e. 209. Time Division Multiplexing(TDM) c. b. 211. d. a. b. a. Frequency Division Multiplexing(FDM) Time Division Multiplexing(TDM) Code Division Multiplexing(CDM) Wavelength Division Multiplexing(WDM) In FDM . channels are separated in the aggregate by their Bandwidth Signal Frequency None of these 212. _______ provides a means for merging data from the varied sources into a single channel to support communication over a microwave system . b. _________ was the foremost multiplexing scheme to have the benefits of wide scale network deployment and till today. e. Frequency Division Multiplexing(FDM) Time Division Multiplexing(TDM) Code Division Multiplexing(CDM) Wavelength Division Multiplexing(WDM) Both b & c Both a & b Both c & d 214. Multiplexing Modulation Encoding technique De-multiplexing The various ways to multiplex are Frequency Division Multiplexing(FDM) Time Division Multiplexing(TDM) Code Division Multiplexing(CDM) Wavelength Division Multiplexing(WDM) All of these 210. The two alternative technologies of multiplexing for digital sources are a. satellite system or a telephone lines .
Frequency Division Multiplexing(FDM) Time Division Multiplexing(TDM) Code Division Multiplexing(CDM) Wavelength Division Multiplexing(WDM) The TDM are implemented in two ways are Synchronous TDM Asynchronous TDM Both a & b None of these e. 218. c. a. d. FDM TDM CDM None of these To overcome the inefficiency of standard TDM. b. b. Synchronous TDM Asynchronous TDM Both a & b None of these The Asynchronous TDM is properly known as Statistical TDM Static TDM Dynamic TDM None of these Which ways of Multiplex are more flexible FDM TDM CDM None of these 219. a single channel is divided into time slots and each transmitting device is assigned for least one of the time slots for its transmission a. a. c. 215.a. b. 220. d. 216. c. c. c. a. a technique known as a. In which way of multiplex . d. d. In which type of TDM . d. CDM . b. 217. d.the whole amount for a certain amount of time is provided to the user and all user uses the same frequency but at different time a. c. b. b.
d. b. CDM FDM STDM CDMA The number of different frequency per bit are called Bit rate Data rate Baud rate Chip rate If one or more bits are transmitted at the same frequency are called Frequency doping Frequency hopping Frequency hoping Frequency hipping The main disadvantage of CDM is Protection from interference Tapping as only the sender know the spreading code Tapping as only the receiver know the spreading code All of these The Code Division Multiple Access(CDMA) was widely introduced in 1963 1989 1979 1958 In CDMA system . c. d. b. b. c. CDMA 221. a.b. d. a. a. STDM d. b. 225.all user transmit in the ______ bandwidth simultaneously . c. a. 226. b. c. b. a. The word UHF means Ultra -High –Form Ultra –Half-Form Ultra.High-Frequency Ultra-Half-Frequency 222. FDM c. c. d. d. ________ may be defined as the form of multiplexing where the transmitter encodes the signal using a pseudo random sequence a. c. 224. 223. d. 227.
d. d. d. b. a. 229. a. Different Same Both a & b None of these The spread spectrum technology of CDMA is ___________ than TDMA More secure Provides higher transmission quality Both a & b None of these A CDMA call starts with a standard rate of ___________ bits per second 9500 9200 9300 9600 The code used with the signal for spreading have Low cross-correlation values Unique to every user Higher transmission quality Both a & b 231. b. b. In spread spectrum technique. d. b. Receiver Transmitter Both a & b Signal The major advantage of spread spectrum technique may be enumerated as Low power spectral density Interference limited operation Privacy due to unknown random codes Reduction of multi path affects All of these The word FHSS stands for frequency hopping spread spectrum file hopping spread spectrum file hiding spread spectrum frequency hopping special spectrum .a. c. a. c. c. d. e. a receiver is only capable of selecting the desired signal if it has the knowledge about the code of the intended a. b. c. 233. c. 232. e. a. b. 228. c. 230. b. d. a. c. d. e.
c. b. a. a.234. b. a. c. d. 239. b. FHSS includes_______ technology FDM TDM CDM Both a & b ________ time is the time spent on a channel with certain frequency FDM Dwell Dowel Dowry -1 and1(polar) 0 and 1(non-polar) Both a & b None of these . A pseudo random noise code is a sequence of chips valued________ with noiselike properties a. d. c. b. The word DSSS stands for digital sequence spread spectrum direct sequence spread spectrum digital sequence special spectrum direct signal spread spectrum The pattern of switching from one channel to another channel is known as Hipping Hyping Harping Hopping 236. e. FHSS FCSS DSSS DHSS 237. d. c. d. d. 238. c. b. d. e. a. b. c. ________ is best known spread spectrum technique in which a pseudo random noise code multiples the signal a. 235.
a. 240. b. c. 246. System Carrier Carrier system None of these T-carrier signaling scheme was developed by Bell Laboratory Hell Laboratory Dull Laboratory None of these T1 standards is widely used in a. a. a. b. 242. 244. d. DS1 or DS-1 which is known as T1 E1 DS0 DS1 DS-1 conveys the meaning of Direct Service-Level 1 Digital Service-Level 1 Double Service-Level 1 Digital Slide-Level 1 E1 signifies another carrier system that finds use outside a. b. __________ a multi-channel system in which a number of individuals channels are multiplexed for transmission a. Individual channels are Data Audio Video or their combination All of these 241. c. 243. Japan North America Both a & b None of these T-carrier was digital signal 1. d. c. c. Japan . c. b. a.e. b. North America b. c. d. d. 245. d. b. d.
South Korea d. All of these 247. b. a. c. 252. By sampling each 8-bit frame for 8000 times per second. c. DS1 is full-duplex circuit in which the circuit does concurrent transmission and reception at a data rate of ___ a. 249. b.539Kbit/s Framing schemes are of two types: Super Frame(SF) Extended Super Frame(ESF) Both a & b None of these Framing channel has been divided into two each with ______ in Super Frame .555Mbit/s 251. d. 1. total bandwidth achieved is ________ a. b. b.533Mbit/s 1. c.536Kbit/s 1.537Kbit/s 1. b. d. d. b. c. d. c. 248. d. 253.566Mbit/s 1. 1. a.538Kbit/s 1.544Mbit/s 1. each of 8 bits 24 channels 26 channels 28 channels 30 channels 24 channels are also called Timeslots DS0 Both a & b None of these DS0 channel is a ______ that is multiplexed 68Kbit/s 64Kbit/s 62Kbit/s 70Kbit/s 250. A DS1 circuit comprises ________ . a. c. d. a.c.
d. c. e. 258. 255. 254. b. Alignment of terminal is carried out with frames having _______ in the super frame a. c. b. d. d. b. e. a. d. a. d. d. c. c. a. c. 257. b. a.a. a. 256. c. Even-number . 2Kbit/s 3Kbit/s 4Kbit/s 6Kbit/s There are _____ contiguous frames of 193-bit each in a Super Frame 10 12 14 16 There are _____ contiguous frames of 193-bit each in a Extended Super Frame 20 22 24 26 Framing channel has been divided into two each with _______ in Super frame 2Kbit/s 4Kbit/s 6Kbit/s 8Kbit/s One is used for alignment of ________ Terminal frame Signaling frame Super frame Switching frame Second is used for alignment of ________ Terminal frame Signaling frame Super frame Switching frame 259. b. b.
d. c.533Mbit/s T1 used the encoding technique _______ AMI LAN DS1 CEPT AMI means Analog Memory Interchange Alternate Memory Interchange Alternate Mark Inversion Analog Mark Interchange AMI requires less Bandwidth Signal Both a & b None of these CEPT means Conference European of Postal Telecommunications European Conference of Postal and Telecommunications European Control of Postal Telecommunications None of these 266. None of these 260. b. c. c. Even-number Odd-number Prime-number None of these T1 is recognized by its original ______ line rate 1. 262. d. 264. b. c. CEPT after ten years of launch of T1 system used _____ for framing known as European E1 . d.555Mbit/s 1. a.566Mbit/s 1. b. 263.544Mbit/s 1. A frame having _________ in the super frame is used for signaling alignment of frame a. d. b. 261. a. a. d. a. c. a. 265. Odd-number c. b. d. Prime-number d. b. c.b.
268. T-carrier system Protocols Frame Relay Cell Relay Both a & b None of these . 270. c. a. 2bits 4bits 8bits 16bits An E1 carrier carries digital information at ______ 2. c. d.048Mbps 2. b. d. b. CEPT revised and improved the technology adopted by a. 60Kbps 62Kbps 64Kbps 66Kbps An E1 frame has a total of _________ 128bits 256bits 64bits 192bits 271.088Mbps An E1 circuit has been divided into ____ time slots 30 32 34 36 269. b. a.044Mbps 2. b. d. e. b. c. a. c. 267. 272.084Mbps 2. c. Which is used to exchange information over the E1 carriers that connect remote zones a.a. c. 32 time slots implements an individual communication channel supporting a bit rate of ________ a. d. b. d. d.
273. 274. USA Japan. 40 277. None of these e. d. a. 20 b.b. Japan USA. d. 278. Both a & b d. b. d. b. c. b. a. c. USA. 275. b. High quality of call is ensured since transmission takes place with a constant Latency Capacity Both a & b None of these Another timeslot is reserved for signalling purposes TS16 TS15 TS14 TS13 . a. Canada. America. d. d. America. c. a. c. Which was taken by International Telecommunication Standardization Sector(ITU-T) a. 30 d. T-carrier system E-carrier system E1 system T1 system ITU-T finds wide use all over the world except three nations namely UK. only ___ are used two of these are used for framing and signalling call setup a. Canada PDH means Plesiochronous Digital Hierarchy Plasma Digital Hierarchy Pointer Double Hard disk Plasma Double Hierarchy Telecommunications Union 276. Japan Japan. 15 c. In 32 timeslots of E1. c. E-carrier system c. b.
d. c. c. d. c. Which is controlled some standard protocols in the field of telecommunications Teardown Call setup Both a & b None of these 280. 285. d. c.279. a. b. a. b. d. d. d. c. d. b. a. b. c. E1 is different from earlier T-carrier systems since all ___ of every sampling are available for every call a. a. b. b. a. a. 281. 282. 4bits 8bits 16bits 32bits There are two general categories of transmission media Bounded(guided) media Unbounded(unguided) media Both a & b None of these __________ are bounded media Twisted pair Coaxial cable Fibre optic cables All of these ________ are known as unbounded transmission microwave and satellite transmission both travel through the air which has no boundaries all of these Wireless transmission systems do not make use of a Physical conductor Guide to bind the signal Logical conductor Both a & b Energy travels through the air rather than Copper Glass Both a & b None of these . c. 283. 284. b.
b.e. 286. 290. 287. a. d. d. d. 291. c. a. d. . a. c. d. b. c. b. d. 288. d. a. c. c. c. 289. a. b. 292. b. a. The transmission systems addressed under this category include Microwave Satellite Infrared All of the above Which are used in radio transmission in one form or another Radio TV Cellular phones All of these _______ is the one example of long distance communication Satellite signal Satellite relay Analog signal Digital signal The RF(Radio Frequency) is divided in different ranges starting from Very low frequency(VLF) Extremely high frequency(EHF) Both a & b None of these Two transmitters cannot share the same frequency band because of Mutual interference Band usage is regulated Both a & b None of these PDAs means Personal Digital Assistants Personal Double Assistants Personal Digital Analogs Power Digital Assistants ADSL means Analogs Digital Subscriber Lines Asymmetric Digital Subscriber Lines Assistants Digital Subscriber Lines Asymmetric Digital Subscriber language a. b. b. c.
4-0.6 0. 298. b. c.8 ______ are the substances used for insulation purposes Teflon(r) Flouropolymer resin Polyvinyl chloride Polyethylene All of these . a.2-0. d. The unshielded twisted pair states the link between the end in the communication closet and the outlet which is further restricted to a.293. b. f. 296. b. 2 to 240 b. d. a. d. 294. 60metres 90metres 100metres 190metres A UTP cable contains __________ twisted pairs a. c. 2 to 4200 c. e. d.8 0. c. 2 to 2400 _______ was first used in telephone system by Alexander Graham Bell Copper medium Copper signal Copper set up None of these In modem data rate is restricted to approximately____: 24Kbps 28Kbps 30Kbps 32Kbps 0. c.2-0. 295.4-0. c. d. b. e. 297. e. a. b. A pair of copper wires twisted together and wrapped with a plastic coating as a twisted pair and which has a diameter of ____: a.7 0.
5/125 82. 305. c. c. a.5/125 What are the biggest advantage of UTP Flexibility Cost-effective media Usability of both data communication and voice All of these LED means Light Emitting Device Light Emitting Diode Light Exchange Device Light Exchange Diode . a. None of these 299. b. d. The major disadvantage of UTP is Bandwidth is lower Bandwidth is higher Bandwidth is limited Bandwidth is dynamic STP stands for Shielded twisted pair Signal transmission pair Shielding twisted process Shielded transmission pair 150Ohms STP contains ________IBM connector or RJ45 1 pair 2 pairs 3 pairs 4 pairs 100Ohm UTP contains _________ and 8-pin modular connector(ISDN) 2 pairs 3 pairs 4 pairs 5 pairs ________ contains multi-mode fibre 52. a. 302.5/125 72. c. a. b. a. c. d. 300. b. d.5/125 62. b. c. d. a. a.d. 304. b. c. d. d. c. b. d. 301. b. 303.
a. d. e. 309. d. b. b. a. 307. b. 311. c. Traditional coaxial cable is quite ________ of which Ethernet LAN 10Base5 is an example a. a. d. c. b. b. 308. 312.306. The effective capacity of coaxial cable depends on the Spacing of amplifiers The length of the circuit The gauge of the centre conductor Other intermediate devices All of these LANs function over coaxial cable to the __________ specifications 10BASE5 10BASE2 10BASET All of these Coaxial cables are of two types Baseband Broadband Both a & b None of these The gauge of coaxial cable is _____ than the twisted pair Thicker Thinner Heavy Bulky 310. d. Thick Heavy Bulky All of these Twin axial cables contains _____ such configurations within a single cable sheath 2 3 4 5 The mechanical protections cover the _________ . c. a. d. c. c. c. a. d. b.
In which multimode fibre . 317. Single mode fibre b. Step index multimode fibre c.a. 10 to 20 20 to 30 30 to 40 40 to 50 314. All of these 315. In which multimode fibre. Single mode fibre b. b. How well a particular fibre’s index profile minimizes model dispersion The wavelength of light launched into the fibre Both a & b None of these The typical bandwidth of graded index multimode fibre range from 100MHz-Km to over 1GHz-Km 200 MHz-Km to over 1GHz-Km 300 MHz-Km to over 1GHz-Km 150 MHz-Km to over 1GHz-Km Which multimode fibre has a thinner inner core Single mode fibre/ Monomode fibre Step index multimode fibre Graded index multimode fibre All of these 318. b. d. b. d. d. b. Step index multimode fibre c. d. c. 316. c. The bandwidth is typically ________ over a length of one kilometer of fibre expressed as ‘MHz-Km’ a. The actual bandwidth of graded index multimode fibre depends on a. b. Secondary buffer coating Primary buffer coating Both a & b None of these 313. Graded index multimode fibre d. light is refracted by an increasing amount as it moves away from the core a. a. different wavelength of light travel at a different speeds a. d. c. c. a. Graded index multimode fibre . c.
None of these 324. a. d. All of these 319. 321. b. c. Electronics Magnetic Interference/Redundancy Frequency Interference c. f. Monomode fibre optic systems routinely are capable of transmitting signal over distances in excess of a. 323. 322. d. a. b. b. 250Km 350Km 225Km 325Km CAD means . d. 320. The single mode fibers have the Very broadest bandwidth Lowest cost Lowest attenuation of any optical fibre All of these The advantage of single mode fibre are Small size and light weight Large bandwidth Flexibility and high strength Secure against signal leakage and interference No short circuit problems All of these The fibre optic systems consists of a Light sources Cables Light detectors All of these In a fiber optic system. c. d.d. e. a. b. c. ______ are opto-electric devices Repeater EMI RMI RFI EMI/RFI means a. Electro Minute Intrinsically/ Radio Fibre Interference d. 325. Electro Magnetic Interference / Radio Frequency Interference b. a. d. c. c. b.
Hertz Micro decibel Kilometer 330. b.a. d. In data communication the signal has to travel through the transmission media that may be a. small size 327. b. 328. d. d. c. c. 326. c. d. well Sensitive to noise. c. limited nodes bandwidth. noise comparison to twisted) distances immunity security is better in pair cable Optical fibre cable Very High bandwidth. Attenuation Distortion Noise None of these Attenuation is measured in terms of a. b. long Physical dimensions. b. a. 329. d. cost distances. high security. b. noise immunity. security hazard because of easy interception Coaxial cable (in High bandwidth. easy to add distances. c. short established . . Wired Wireless Both a & b None of these There exist three causes of impairment in transmission errors Attenuation Distortion Noise All of these ___________ is the loss of the signal power while traversing a transmission media including electronic circuitry a. Computer aided distribution Computer application design Computer aided design None of these Bounded Media Comparison Chart Media Twisted pair cable Advantages Disadvantage Inexpensive. long Connections.
a. c. e. e. b. b. 333. 334. b. c. d. j. f. a. d. e. 335. c. d. a.331. i. c. Equalizing devices are ________ at intermediate points to keep the shape of the signal intact a. Created Inserted Modified Deleted 337. h. 332. Distortion is calculated as the ratio of the Signal at two different points Relative power of two signals at the same point Both a & b None of these A negative value of decibel indicates _______ of signal strength Loss Gain Either loss or gain None of these A positive value of decibel indicates _______ of signal strength Loss Gain Either loss or gain None of these The attenuation includes a number of factors like Transmitting and receiving antennas Transmitter powers Modulation techniques Frequency of the transmission Atmospheric conditions All of these Distortion is proportional to the square of the _________ Atmospheric conditions Modulation techniques Operating frequency Operating system 336. Data processing and transmission systems experience errors due to several reasons . g. h. f. d. b. g.
All of these The main constraints are due to the physical medium that produces a. c. b. c. d. double exchange detection Single error code. double error detection The types of errors are Single Bit Errors Burst Errors Both a & b None of these . Inductance b. c. c. Resistance Noise Distortion Both a & b None of these The use of several parity bits are Help to detect any error Find if any bits are inverted They should be re-inverted so that the original data is restored All of these SECDEC means Single error correction. a. a. lead to distortion c. b. 341. a. Inductance and capacitance. Capacitance c. e. impulses from static in the atmosphere. d. c. The digital signals do not suffer from ___________ but they are susceptible to dropouts a. Noise Distortion Attenuation Dropouts All of these 339. a. b. 343. double error detection Single error character. d. b. 340. 342. d. b. Electrostatic interference can be caused from circuits or machines lying close by b. double error detection Single exchange correction.338. d. etc. A transmission cable has a. loss in transmission due to leakages. Resistance to current in a cable can be caused due to attenuation d. e.
b. c. c.d. 349. c. 347. d. b. e. b. b. b. b. d. All of these 344. a. Which type of error corrupt the multiple bits of transmission Burst errors Single bit errors Both a & b None of these ENQ means Enquiry Encryptions Enquire None of these BER stands for Byte Enquiry Rate Bit Error Rate Burst Enquiry resistance Burst Error Rate The inductance and capacitance tends to Causes the amplitude of the signal to reduce Distort the shape of a signal Both a & b None of these The resistance tends to Causes the amplitude of the signal to reduce and therefore loss of power Distort the shape of a signal Both a & b None of these Which type of error corrupt the single bits of transmission Burst errors Single bit errors Both a & b None of these NAK means a. d. a. 346. c. Noise Acknowledge . 345. None Acknowledge b. 348. d. 350. a. a. a. c. d. a. c. d.
d. b. c. d. b. a. Duration of the noise Transmission time of the no of bits of the transmitted packet Both a & b None of these The redundant bit enables a. e. 356. c. correction of errors detection of errors Redundancy check All of these The types of redundancy processes are a. Network Acknowledgement The No of bits that get affected in burst errors depends upon the a. Negative Acknowledgement d. e. 357. a. b. b. Which redundancy process can detect the more than 95 per cent of all errors CRC Parity check Checksum All of these CRC means Circuit Redundancy Check Cyclic Redundancy Check Checksum Rail Check None of these The Two-dimensional parity check method can not CRC Parity check Checksum All of these . Parity check Cyclic redundancy check Checksum All of these 352. 354. 353. d. c. c. c. b. d. c. b. __________ is the technique of providing a data string that is added to information packets used to detect errors in data packets a. c. 355. d.351. d.
b. 359. c. a. 358. a. b. d. this is called Signal attenuation Signal bandwidth Frequency Data rate The CRC is validated by using _______ conditions 1 2 3 4 . d.a. c. d. b. Correct the errors Detect the errors Correct and detect the errors None of these When signal amplitude degrades along a transmission medium . c.
b. ARPANET ERNET SKYNET DARPANET e. ATM stands for e. Resources Information Both a & b None of these 2. d. h. g. ______ is a network that covers geographic areas that are larger. c. It should possess exactly one bit less than the divisor b. such as districts or cities a. c.360. b. Automatic taller machine Automated teller machine Automatic transfer machine Automated transfer machine _______ is the technology that connects the machines and people within a site in a small area a. d. Both a & b Data Communication And Networks 02 1. The first operational computer network in the world was the _________ for the United States Department of Defense a. c. The two conditions of CRC are a. d. A computer network permits sharing of a. When CRC is appended to the end of the data stream c. 3. b. LAN MAN WAN None of these 5. f. b. LAN MAN WAN None of these . c. d. 4.
d. b. c. LAN is a network that is restricted to a relatively a. 11. b. Ethernet Token ring Both a & b None of these 12. d. c. LAN MAN WAN None of these 7. b. b. b. d. c. d. The components used by LANs can be categorized into a. c. b. ______ is a collection of point-to-point links that may form a circle a. c. d. The Institute of Electrical and Electronics Engineers established a project named IEEE project 802 during the year _____ . The various LAN protocols are a. 6. c.e. d. Hardware Cabling protocols Standards All of these e. LAN MAN WAN Ring topology 8. ______ is a network that this technology connects sites that are in diverse locations a. SMS DTMF GSM None of these 9. ______ refers to tone signals used for various control purposes via the telephone network a. Small area Large area Both a & b None of these 10.
The following are the important standards proposed by IEEE a. Logical link layer(LAC) equivalent to the upper part of the data link layer d. IEEE 802. IEEE 802. IEEE 802.1. Network layer. IEEE 802. The 802. All of these 16. All of these 17. d. d. b. the OSI network layer. 2 3 4 5 14. c. Unacknowledged Connectionless Both a & b None of these 18. b. c. 1990 1970 1980 1960 13. IEEE 802. d.2 compatible interfaces provide two major types of services. c.overview and relationship among the various IEEE standards b.a. the IEEE standard contains the following layers: a. Medium access control(MAC) equivalent to the lower part of the OSI data link layer c.5 or token ring e.6 or MAN protocol f. 1977 1987 1997 1999 15. In 1985. Physical layer b. which are a. b.3 or CSMA/CD bus c. that performs some of the higher order layer functions e. d. the committee issued a set of ___ standards a. ISO revised these standards and reintroduced them as ISO 8802 standards during ____ a. The ________ follows the ring topology . c.4 or token bus d. b. When compared with the OSI reference model.
c. b. None of these 23. d. b. c. b. In a token ring. d.a. Send messages Send data Delete data Create data . c. c. the stations are connected to the __________ a. IBM of LAN b. d. Start of frame and end of frame are used to _______ the frame boundaries a. None of these e. b. 19.6 or MAN protocol 24.5 or token ring IEEE 802. Frame type c. Mark Modify Delete Find 22. 20. Four-byte Three-byte Two-byte One-byte 21. c. Frame technique b. The destination address and source address field is similar to a. d.4 or token bus IEEE 802. Both a & b d. Both a & b d. d. A _________ preamble is used to synchronize the receiver’s clock a.3 or CSMA/CD bus IEEE 802. IEEE 802. Info field is used to ________ a. b. Frame control is also used to specify the ________ a. Logical ring Physical ring Both a & b None of these e. LAN of IBM c.
30. In MAN. 8182 & 2 bits 8182 & 2 bytes 8182 & 4 bits 8182 & 4 bytes 26. 8174 bytes & 8 bytes d. Industries Citizens Both a & b None of these e. c. b. The maximum length of this field is _______ when the address is _______ a. Telephone exchange b. The maximum length of this field is _______ when the address is _______ a. Solicit-successor frame contains the address of the a. d. d. Check sum is used for a. b. Computer wires . d. 8174 bits & 6 bytes 27. b. Sending station Successor Both a & b None of these 29. c. b. 8174 bytes & 6 bytes c.25. c. different LANs are connected through a local _______ a. c. Government agencies and local libraries often use a MAN to connect to private a. d. Not span a city Span a city Either span or not None of these 31. 8174 bytes & 6 bits b. b. The geographical limit of a MAN may a. d. Error correction Error detection Both a & b None of these e. c. 28.
35. e. h. ATM Frame relay Switched multimeagabit data service X. h. Packet switching technologies such as _____________ are used to implement WAN along with statistical multiplexing e. b. WAN technologies function at the lower three layers of the OSI reference model a. Machine asynchronous network 34. c. RS-232 X. Both a & b d. Metropolitan asynchronous network d. g. Some of the widely used protocols for MAN are a. h. Local exchange Long distance carrier Both a & b Small distance carrier 36. f.c. d. f.25 All of these 37.25 Frame relay Asynchronous transfer mode(ATM) ISDN OC-3lines(155 Mbps) ADSL(asymmetric digital subscriber line) All of the above 33. Physical layer Data link layer Network layer All of these e. c. MAN uses only a a. Machine area network b. WAN also uses switching technology provided by ____________ e. Metropolitan area network c. i. g. MAN stands for a. g. b. None of these 32. f. Long exchange . d.
Both a & b d.b. Hardware Protocols(software) Applications(useful software) All of the above 40. h. d. b. g. f. The Government of India had set up ERNET in ______ to provide TCP/IP connections for education and research communities in India a. In MAN. b. The other government organizations like _______________ to enter this field to bring the Internet to common people a. The liberalized policies encouraged many private players like a. d. a network is accomplished using basic components e. c. d. The Internet(internetworking) ha become a potent tool for a. 1976 1986 1996 1999 42. c. In MAN. c. 39. 38. b. NIC . DISHNET JAINTV Mantra online All of these 43. None of these e. Local carrier c. Hardware Protocols Both a & b None of these e. a network is accomplished using components a. d. Education Productivity Enlightenment All of these 41. c. b.
Following are different options for setting up the Intranet. MAN. b. c. Terminal Controller c. etc………….single city c. Terrestrial WAN VSAT WAN Both a & b None of these e. education portal or ecommerce. 44. b. 45. The networks can be broadly divided into three categories namely a. The major network infrastructure available in the country has two types of WAN a. All of the above e. d. The host to terminal connection is a conventional type of connection between a. TC means a. Terminal Computer b. Leased line Dial Up connection VSAT Radio link All of the above 46. c. Internetwork Internet Network None of these . c. a. All of the above 47. MTNL d. VSNL c. LAN for a single building b. d. d. Main frame Dumb terminals Both a & b None of these 48. WAN-country. e. Technical Computer d. None of these 49.b. c. d. continent and planet d. b. b. A collection of interconnected networks is known as a.
Inexpensive System Digital Network d. c. Control packet Data packet Both a & b None of these 51. Low speed line High speed line Single WAN line Both a & b 52. c. c. None of these 53. b. Interaction System Digital Network c. ISDN Leased Line Frame relay All of these e. Which function allows dumping of invalid packets for a specific network instead of forwarding a. Forwarding function Filtering function Both a & b None of these 56. Which function allows selection of the appropriate route based on IP header information and sends packets through this route a. ISDN stands for a. which are mainly used a.25 are as follows a. d. d. c. A terminal controller may be used to integrate two or more terminals for connection with a a. Forwarding function Filtering function Both a & b None of these 55. b. 50. c.e. Integrated Service Digital Network b. 54. d. d. b. For LAN to LAN connection. The type of packet format supported by X. b. Routing in the same network may be termed as . b. d.
the network administration determines which of the routers the messages should be sent to. e. The processing required to transferring a packet from the source host to the destination host or to the relaying router are called a. None of these 58. b. d. g. d. If two or more routers are connected to the same subnet. Combination of destination address b. b._____ are used . Next hops that corresponds to that address c.. c. Fixed routing Dynamic routing Both a & b Distributed routing 59. b. c. to eliminate this problem. c. d. c. Fixed routing Dynamic routing Both a & b Distributed routing 60. Both a & b d. Fixed routing Dynamic routing Local routing Distributed routing e.a. If routing information is automatically updated by routers when changes are made to the network configuration are called a. Address Resolution Protocol Address Routing Protocol Address Routing Packet Address Routing Program 62. f. d. h. Local routing Static routing Dynamic routing Distributing routing 57. is called a. The routing table possessed by a router includes a. b. 61. ARP stands for e. If there is a fixed route information to each router.
If there are two or more routes to reach the same destination at the same cost. d. If there is no any specific intention. High possible cost Least possible cost Link cost Both b & c 64. c. All of these 67. d. MAC messages ICMP messages INDP messages IMCP messages e. 1 2 3 4 65. b. which method is applicable to determine how to select this route a. The Mixed method remains _________ for the amount of processing required a. the cost for a single link is usually set at ___ a. Effective Ineffective Both a & b None of these 68. c. b. b. c. d. d. Backbone c. d. which route should be selected a. b. Mixed method d. If two or more routers are available in distributed routing. c. Random selection method c. Multi-path routing can be achieved in a. Domain b. Inter-domain router . c. Distance-vector type Link-state type Both a & b None of these 66.a. A set of networks interconnected by routers within a specific area using the same routing protocol is called a. Round robin method b. b. 63.
b. d. c. c. d. Intra.domain routing Inter. b. Domain Backbone Inter-domain router All of these 71. Domain Backbone Inter-domain router All of these 70. d.domain routing Both a & b None of these 75. All of these 69.domain routing Inter. c. To communication between two or more domains.domain routing Both a & b None of these 74. b. c. Two or more domains may be further combined to form a a. d. Domain Backbone Inter-domain router Higher-order domain 72.d. c. Each domain is also called a. Operation domain Backbone Inter-domain All of these e. b. d. Intra. b. Some Intra-domain protocols are . c. A router within a specific domain is called a. b. which are used a. 73. d. Routing protocol in such an internet system can be broadly divided into two types named a. A network composed of inter-domain router is called a.
Routing Information Protocol b. RIP(Routing Information Protocol) b. OSPF(Open Shortest Path First) c. the load on router will be a. In link state protocol. 81. All of these 76. Distance-Vector Protocol Link-State Protocol Both a & b None of these 77. The Link state protocol are a. c. c. c. Complex Simple Both a & b None of these . For large load on router. Distance vector protocols are a. b. c. d. b. b. Routing Intra Protocol c. b. the processing is a. RIP stands for a. IS-IS(Intermediate System to Intermediate System ) d. Small Large Medium None of these e. Resolution Information Protocol 79.a. d. d. RIP IGRP(Interior Gateway Routing Protocol ) Both a & b None of these 78. ________ are the algorithms are available to update contents of routing tables a. d. d. c. OSPF(Open Shortest Path First) IS-IS(Intermediate System to Intermediate System) Both a & b None of these 80. b. Route Intermediate Protocol d.
g. OSPF is a hierarchical routing composed of a. f. b. c. d. d. c. IS-IS(Intermediate System to Intermediate System) c. j. The word SLIP stands for a. Both a & b d. b. b. Packet type Packet length Router ID Area ID Authentication type Authentication data Version Checksum Individual information part All of these 84. b.82. None of these 83. The word PPP stands for a. Point to Packet Protocol d. i. c. Point to Point Protocol b. d. Packet to Packet Protocol c. e. Domain border router Internal router Area border router All of these 85. The common part of OSPF packet format is a. OSPF(Open Shortest Path First) b. Serial Line IP Standard Line IP Serial Link IP Standard Link IP 87. c. Which protocol are used in link state type routing protocol developed for use in large scale network a. Packet to Point Protocol . d. The router may be classified into three types named a. Intra-area routing Inter-area routing Inter-domain routing All of these 86. h.
d. SLIP PPP Both a & b None of these 90. b. The bandwidth of wireless radio LAN is a. c. c. d. A hub antennae is located at a _________ from where line-of-sight can be established with the various terminal antennae. b. 900 MHz bands 2GHz bands 5 GHz bands All of these 93. b. The effective throughput is more in the range of _________ per hub . The frequency range of wireless LAN is a. SLIP PPP Both a & b None of these e. b. ________ is used mainly for connection between LANs that are remotely located from one another a. a. 24Mbps 2 Mbps 4 Mbps 8 Mbps 92. 89.88. None of these 91. c. Provide LAN capabilities in temporary quarters c. Both a & b d. d. c. _________ is used for connection between routers or equipment that must be highly reliable a. Avoidance of cabling cost b. The wireless LANs offers the obvious advantage of a. d. d. Highest point Lowest point Central point None of these 94. b. c.
b. b. University System Bus Universal System Board University System Board University Serial Bus 97.11a IEEE802.11a IEEE803. IEEE802.11a and IEEE802.11a and IEEE802.11b 99. d.11b 98. c. d.11b have a distance limitation up to _____ from the access point router a. Pointer Description Assistant c. 100. b.11b IEEE803. _______ are wireless network standard with a data rate of only 2Mbps a. c. IEEE802. d. Personal Description Analog 96. c. b. USB stands for a.11a IEEE802.4GHz 4. d. d. b. a.4GHz 2.4GHz .a. c.11a IEEE803. 1 to 2 Mbps 2 to 3 Mbps 3 to 4 Mbps 4 to 5 Mbps 95. c. IEEE802. Personal Device Assistant b.11b IEEE803.4GHz 3.11b uses _____ band 1. b. PDA stands for a. _______ are wireless network standard with a data rate of only11Mbps a. d. 1000feet 100feet 101feet 110feet IEEE802. c. Personal Digital Assistant d.
Low cost microprocessor Digital switching Both a & b None of these Cellular radio has another popular names as . d. a. e. a. d. 102. e. c. 106. a. c.11a IEEE803. b. c. b. c. a. h. ________ technology allows speeds up to 54Mbps IEEE802. 105. d. 104. f. e.11g IEEE803.101.11b IEEE802. d. b. d. A user can access to the same or similar telecommunication services at different places a. g. The availability of _________ made the wireless communication popular among the masses.11a ________ allows the movement of device with or without user User mobility Device portability Both a & b None of these 103. e. b. A number of mobile and wireless device are Sensor Mobile-phone PDA Embedded controller Pager Palmtop Notebook All of these User mobility Device portability Both a & b None of these i. b. c.
Cellular mobile Cellular phone Both a & b None of these Radio is basically a device. d. c. d. Wireless ca be defined as the ____________________ by means of high frequency electrical waves without a connecting wire . a. 108. b. e. which has Receiver Transmitter Both a & b None of these Wireless communication can be carried out Use of radio Without using radio Both a & b Without use of video The term radio may be defined as consisting of ______________ of the signal Modulation Radiation Both a & b None of these 110. b. b. b. c. c. d. A transmitter and an antenna are used to ____________ the modulated signal within radio spectrum a. 2kHz 3 kHz 4 kHz 5 kHz 112. d.a. a. c. a. c. 107. 111. b. c. 109. In telephone system as we know that a voice with bandwidth of approximately ____ modulates the current of a telephone line a. d. b. d. Modulate Radiate Both a & b None of these e.
c. b. c. e. a. c. b. a.a. b. b. c. 118. 117. 114. 113. c. d. d. 119. d. b. d. c. b. 115. b. c. 116. a. a. d. a. Radio transmission Reception of signals Both a & b None of these The frequency of a cell may be ________ after the interference zone Reused Used Not be used Not be reused PSTN stands for Public Switched Transport Network Public System Transport Network Public System Transfer Network Public Switched Telephone Network The radii of a cell may vary from ___________ in a building to a city One of meters to tens of kilometers Tens of meters to tens of kilometers Hundreds of meters to tens of kilometers Hundreds of meters to hundreds of kilometers The shape of cell mat not be a ___________ and depends up on the environment Hexagon Circle Pentagon Both a & b SDM stands for System Division Multiple System Division Multiplexing Space Division Multiplexing System Double Multiplexing Frequencies for communication may vary from very high frequency to ________ Medium range Microwave range Digital range None of these The signal may be analog or digital with _______ . a. d. d.
d. USA UK Europe Japan The proposed system was expected to meet certain as mentioned as a. b. 121. d. b. 122. 123. d. a. c. Low terminal and service cost . c. adjacent-channel All of these The important issues on wireless communication are Cell sizing Frequency reuse planning Channel allocation strategies All of these 124. In the beginning around 1980. d. b. c. c. b.a. a. c. b. 120. f. g. e. Amplitude Frequency Phase modulation All of these The multiplexing and access techniques are SDM(Space Division Multiplexing) FDM(Frequency Division Multiplexing) TDM(Time Division Multiplexing) CDM(Code Division Multiplexing) All of these The advantages of mobile communication may be looked into Higher capacity Higher number of users Less transmission power needed More robust Decentralized base station deals with interference Transmission area All of these The disadvantages of mobile communication are Fixed network needed for the base stations Handover(changing from one cell to another) necessary Interference with other cells such as co-channel. e. b. analog cellular telephone systems were developing in ___________ a. c. d. 125. d. Good subjective speech quality b. a. a.
In a channel the separation between adjacent carrier frequencies is known as channel separation which is _______ in case of GSM .c. b. b. a. d. 126.8kbps First generation Second generation Third generation None of these 129. Support for international terminals Spectral efficiency ISDN compatibility All of these ETSI stands for European Telecommunication Standards Institute European Telephone Standards Institute European Telecommunication Systems Institute European Telecom Standards Institute a. d. c. 127. c. 128. c. e. b.6kbps 9.6kbps 7. 130. GSM(Global System for Mobile Communication) is a _______ digital mobile telephones standard using a combination Time Division Multiple Access(TDMA) and FDMA(Frequency Division Multiple Access) a. GSM provides only _______ data connection 8. f. The uplink and downlink frequencies for GSM are different and therefore a channel has a pair of frequencies _______ apart a. e. b. d. d. d. a.6kbps 8. c. b. c. d. 70MHz 80MHz 90MHz 60MHz The separation between uplink and downlink frequencies are called Duplex distance Double distance Triplex distance None of these 131.
b. a. h. d. d.32 Both a & b None of these There are basic types of services offered through GSM are Telephony or teleservices Data or bearer services Supplementary services All of these The supplementary services are used to enhance the features of Bearer Teleservices Both a & b None of these Dual tone signals are used for various control purposes via the Telephone network Different from dual pulses Both a & b None of these . d. a. d. 134. d. e. e.a. e.25 X. b. b. c. 136. f. c. c. f. 133. a. 137. b. g. d. a. c. 100kHz 200 kHz 300 kHz 400 kHz The services supported by GSM are Telephony Fax and SMS Call forwarding Caller ID Call waiting All of these GSM supports data at rates up to 9. e.6kbps on POTS(Plain Old Telephone Service) ISDN Packet Switched Public Data Networks Circuit Switched Public Data Networks All of these The access methods and protocols for GSM may be from X. 132. b. c. 135. a. b. c.
141. c. 150 160 170 180 GSM supports ______ Group 3 facsimile CCIIT CCITT CCCIT CCTTI Call forwarding is a ________________ Telephony or teleservices Data or bearer services Supplementary services All of these The other services of call forwarding are Cell broadcast.138. a. b. 142. d. SMS(Short Message Service) is a message consisting of a maximum of ______ alphanumeric characters a. a. c. fax mail Barring of outgoing and incoming calls conditionally Call hold. c. c. conferencing Closed user groups All of these GSM consists of many subsystems. b. b. 139. d. voice mail. The generic GSM network architecture which is composed of three subsystem are__________ a. c. d. 140. a. b. a. a. d. b. c. 143. e. Radio subsystem (RSS) . e. d. such as the Mobile station(MS) Base station subsystem(BSS) Network and Switching subsystem(NSS) Operation subsystem(OSS) All of these Which forms a radio subsystem Mobile station Base station subsystem Both a & b None of these 144. call waiting. b. d.
d. b. 149. c. a. All of these 145. 151.b. b. c. a. 148. Cell sites Cell systems Cell forwarding None of these A cell is simply represented by simple ____________ . The RSS is basically consisting of radio specific equipment such as ____________ to control the radio link a. d. b. e. 150. d. c. d. 147. b. Mobile station(MS) Base station subsystem(BSS) Both a & b None of these The chief components of RSS are BSS Cellular layout Base station controller(BSC) All of these SIM stands for System Identity Module Subscriber Identity Module Subscriber Identity Modem Subscriber Input Modem MS contains a SIM card in the form of a very _______ inside the equipment Large chip Small chip Both a & b None of these Cell site is defined as the location where _______________ are placed Base station Antennas Both a & b None of these Cells are the basic constituents of a cellular layouts with ________ a. Network and switching subsystem c. d. a. a. c. 146. c. b. d. Operation subsystem d. b. c.
Base station may also be placed near center of cell and known as Excited cell Center excited cell Center cell None of these The actual cell is the _____ hexagon. a. b. e. d. 154. a. c. b. Red 5Kms 10Kms 15Kms 20Kms The portions covered by the antenna are called Portions Sectors Cell sector None of these The BTS or Base Transceiver Station is also called RBS PCS GSM SIM BTS are housed with all radio equipments such as Antennas Signal processors Amplifiers All of these . c. a. c. 153.a. d. b. c. c. b. b. with the towers at the corners a. 155. d. 157. Pentagon Hexagon Both a & b None of these e. d. b. The size of cells in case of GSM and Personal Communication Service(PCS) are much smaller in the range of _______ a. c. d. 156. d. a. 152.
FDMA TDMA CDMA All of these 163. c. d. d. Um interface e. 160. d. a. Antenna always transmits inward to each cell and area served depends on Topography Population Traffic All of these Network and switching subsystem is composed of the ________________ Mobile Services Switching Center(MSC) Home Location Register(HLR) Visitor Location Register(VLR) All of these The mobile stations(MS) communicates only via the a. BSS c. b. Red and blue d. Um 161. 25MHz 35MHz 24MHz 20MHz . b. BTS b. c. Abis interface with BSC d. The Um interface basically consists of _________ for wireless transmission a. A BTS is connected to a mobile station via the a. Blue c. a. c. None of these 158. d. The FDMA involves the division up to the maximum of _______ bandwidth into 124 carrier frequencies spaced 200 kHz apart a. BSC d. b. 159.b. Both c & d 162. c. b. BTS b. BSS c.
168. 167.377ms 0. c. 170. b. a. a. b. 169. b. b. c. d. The eight burst period are grouped into a TDMA frame which forms the basic unit for definition of a. d. d.577ms 165. c. Physical channel Logical channel Both a & b None of these One _______ is one burst period per TDMA frame Physical channel Logical channel Both a & b None of these The more channel increases the GSM No of base station No of mobile station Transmitter power The more channel decreases the GSM No of base station No of mobile station Transmitter power The other popular name for MSC(Mobile Switching Center ) is BS(Base Station) MS(Mobile Switch) MTSO(Mobile Telecommunication Switching Office) Both b & c MSC is connected to a ____________ at one end a. Base station . The FDMA channel are further divided in time with a burst period of approximately _______ using a TDMA technique a. c. Mobile station b. d. d.477ms 0. 166. 0. b. c. d.277ms 0.164. c. b. a. a.
MSC is connected to a ____________ at other end MSCs PSTN ISDN None of these MSCs acts as a __________ Switching Local Switching exchange Remote Switching exchange None of these The MSC also provides all the functionality such as Registration Handover Authentication Location updating Call routing to a roaming subscriber All of these The MSC provided to establish link with other fixed networks termed as Local MSC Router MSC Gateway MSC Remote MSC The main task of MSC are entrusted upon as Interworking function(IWF) Mobility management operations Data service unit(DSU) SS7 All of these Name the two chief databases Home location register(HLR) Visitor location register(VLR) Both a & b None of these Which has its main task as associated with MSC . c. 175. d. d. c. b. 173. 174. b. c. a. c. b. 172. e. a. 177. a. d. d. f. c. 176. a. a. None of these 171. Transmitter station d. c. e. d.c. b. d. a. b. b.
b.a. g. h. f. i. 182. HLR keeps the ____________ of each mobile that belongs to the MSC to which it is interacting a. c. f. e. d. c. Home location register Visitor location register Both a & b None of these IMEI stands for International mobile equipment identity International mobile equipment information Interworking mobile equipment information Interworking management equipment information 179. b. Delivery of calls Information and messages Both a & b None of these HLR maintains user information in the form of Static information Dynamic information Both a & b None of these The static information is the . IMEI number Directory number Current city Last visited area The class of service subscriber All of these 180. d. b. c. Last location First location Current location None of these 181. 178. d. j. Subscriber’s all administrative information along with the current location in GSM network including in database of HLR are e. h. g. c. a. e. b. 183. d. HLR performs the functions such as _____________ to subscribers at their current locations by using user profile information a.
c. b. VLR main tasks are association with MSC IMSI TMSI Roaming All of these Last location First location Current location None of these The HLR handles SS7 transactions with both MSCs VLR nodes Both a & b None of these 187. d. 188. The dynamic information is the _________ area of the mobile subscriber which is the identity of the currently serving VLR a. e. d.a. 185. b. b. e. e. b. d. International Mobile Subscriber Identity Service subscription information authentication key Account status All of these 184. The operations and Maintenance Center oversees the all important for__________ Proper operation Setup of the network Provides Telecommunication Management Network(TMN) All of these HLR VLR Both a & b None of these . f. c. h. e. a. a. c. g. d. In nutshell we can say that both the ___________work together to provide local connections as well as roaming outside the local service area a. b. d. 186. c. c.
d. f. b. c. e. b. AuC is responsible for maintaining all data needed to authenticate a call and to encrypt __________________ a. b. a. d. e. d. h. 193. 194. g. a. Authentications Center(AuC) is used for Authentication Security by generating authentication algorithms Cryptographic codes All of these X. d.23 interface None of these 191. Operation Subsystem also provides interface NSS via O-Interface that may be __________ a. 192. b. a. GSM network checks the __________________ of a mobile device through EIR database Voice traffic Signaling messages Both a & b None of these EIR stands for Equipment Identification Register Equipment Identification Remote Equipment Information Remote Equipment Information Register EIR fulfills the ______________ requirement of GSM Security Authentication Both a & b None of these SIM card has a secret key for ________________ over the radio channel Authentication Encryption Both a & b None of these . c. c.25 interface X.189. d. c. c. 195. e. 190. b.32 interface X.
a. c. 198. b. 890-910MHz b. b. g. 197. e. d. h. 890-901MHz d. f. d. 201. Mobile station Base station Both a & b None of these GSM 900 operates on a frequency range of _________ for uplink a. c. 199.a. c. Type Serial number Both a & b None of these EIR maintains a database of ______________ Manufacturing devices Malfunctioning devices Functioning devices None of these Um is the link between a a. 890-915MHz. 200. GSM 900 operates on a frequency range of _________ for downlink 935-960MHz 940-970MHz 945-950MHz 925-960MHz FDM is used to ___________ the available frequency band in GSM Addition Divide Both a & b None of these The GSM has many burst types such as a. c. d. Access burst . a. 890-911MHz e. 196. b. d. c. e. e. b. Normal burst b.
c. When a slot repeated every 4. c. 205.615ms constitute a _______ channel which can be split into several logical channel a. a. d. b. b. Which is a dedicated time slots within a data or bit stream which repeats after a certain period of time a. d. a. c. d. c. c. b. f. b. Physical . a. d. d. 202. e. 203. Frequency Amplitude Channel Normal burst The channel can be further divided into Dedicated channel Common channel Both a & b None of these Both the dedicated and common channel are allocated to a Base station Mobile station Mobile switch All of these e. c. a. d. Synchronization burst Frequency correction burst Dummy burst All of these The normal burst period lasts Approximately 577ms or 15/26ms Approximately 572ms Approximately 567ms Approximately 578ms Which is provided to avoid overlap with other burst Frequency space Guard space Information space Bandwidth space 204. 206. Logical b. b. 207.
c. The length of 24 TDMA frames are kept 120ms 130ms 150ms 160ms A Traffic Channel(TCH) is defined for speech and data at a rates of 9. b. a. a. d. d. c. a. 210. d. b. a. b. d. d. d. a. c. a. b.6kb/s 4.8kb/s 2. c. c. b. e. Both a & b d. c. 213. 209. 211. None of these 208. 212.4kb/s All of these TDMA is used to split carrier frequency of 200kHz into_______ time slots 4 8 16 24 GSM 900 has _____ physical full duplex channels 125 124 248 247 GSM 900 has _____ physical half duplex channels 125 124 248 247 Time slot is also known as Logical channel Physical channel Both a & b None of these . c. e. b.
1 24 25 16 How many frames are included for currently unused in 26TDMA frames 1 24 25 16 Which are basically used to control the logical channels CCHs TCH Both a & b None of these e. b.they are categorized in e. b. f. 217. 218. d. b. a. 216. b. d. d. Depending upon the task performed by the Control Channels(CCHs). How many frames are included for Slow Associated Control Channel(SACCH) in 26TDMA frames a. c. d. c. Broadcast Control Channels(BCCH) Common Control Channels(CCCH) Dedicated Control Channels(DCCH) All of these The different control channel are accessed by Idle mode Dedicated mode mobile Both a & b None of these . a. How many frames are included for traffic in 26TDMA frames 1 24 25 16 215. a. c. g. b. a.214. 219. h. d. c. c.
b. c. GSM specifies a multiplexing scheme to integrate several frames where a periodic pattern of 26 slots occurs in all TDM frames with a TCH . c. the combination of these frames are called a. d. GSM is already mentioned that the duration of one TDMA frame is a. SACCH(Slow Associated Control Channel) b. BCCH CCCH DCCH All of these 223. 4. Out of 26 frames. one is used for the __________ and one is currently unused a.220. Which is bi-directional point to multi-point signaling channel that exchanges the signaling information for network access management and transport information regarding connection setup between MS and BTS a. BCCH CCCH DCCH All of these 221. CCCH 225. b. 24 are used for traffic. e. d. d. c.615ms . Which is a unidirectional downlink point to multi-point signaling channel from BTS to MS a. FACCH(Fast Associated Control Channel) c. BCCH d. 4. b. 222. BCCH CCCH DCCH All of these f. c.516ms b. b. d. Multiframe Traffic-multiframe Multiprogramming None of these 224. location updating and authentication in order to set up a call or TCH a. Which is bidirectional and are multiplexed on a standard channel for registration.
c. c. Control multiframe comprises of 51 TDMA frame with a duration of ________ 234. a. d. 227. b. d. None of these . 230. In OSI model. c.5ms 233. b. c. e.5ms 235. the lower three layers usually terminate in the ______ but it is not true in case of GSM a. 4. Lowest layer b. the RR part of layer three is spread over the MS BTS BSC MSC All of these 231. d.3ms 2048 superframes constitute a ________ hyperframe lowerframe strongerframe none of these GSM has three functional layers a. First layer d.4ms 235.165ms 226. Physical layer is the ___________ which provides transfer of bit streams over the physical radio links through Um interface a. a.156ms d. Data link layer c. 4. Highest layer c. Physical layer b.c. b. d. 228. a. Another node Same node Two nodes None of these In protocols. b. All of these 229. Layer three in correspondence with OSI model d.
f. c. Authentication BSC MSC Both a & b None of these . c.232. MS BTS Both a & b None of these The communication on Abis interface between _____ and BSC is established by using the standard LAPD a. h. b. d. e. b. f. e. The layer three chiefly comprises of _____________ RR(radio resource management) MM(Mobility management) CM(call control management) All of these What are the functions of mobility management a. Physical layer handles all radio specific functions such as ________________ Creation of bursts Multiplexing of bursts into TDMA frame Synchronization with BTS Channel coding. Location update b. c. a. A reliable data link service is provided between _________ through Message Transfer Part of SS7 a. e. MS BTS MTS None of these 235. b. 237. c. 234. e. The digital modulation and security related issues such as encryption of digital data are carried over the radio interface between ____________ a. d. error detection and correction Quality control on the downlink All of these 233. 236. d. d. g. b.
c. 239. 243. b. 238. All of these f. 240. a. b.c. d. b. d. b. c. b. a. BSC BSS MS Both b & c 242. The radio resource management is used to establish physical connections over the call-related signaling and traffic channels between the ______________ a. a. d. c. d. Reallocation e. Temporary Mobile Subscriber Identity d. c. Handover . The RR layer is the part of RR layer is implemented in the BTS to provide functions between the ___________ a. BTS BSC MSC Both a & b The __________ is also responsibility of the layers a. CM performs other supporting Supplementary service(SS) Short Message Service(SMS) Both a & b None of these The radio resource management sublayer terminates at the BSC BSS MSC MTS CM performs Establishment Maintenance Termination of a circuit-switched call All of these 241. d. e. c.
Handoff notifications are sent to respective ____ which in turn forward them to HLRs a. c. c. these are a. c. b. d. None of these 244. d. d. 247. b.b. c. b. d. b. a. MSC BSS BSC Both a & b 245. first-to-end end-to-end end-to-first first-to-first CM protocols are used in GSM network. Both a & b d. b. The Communication Management protocol controls __________ call establishment a. Handoff c. Transaction Capabilities Application Part(TCAP) protocol . VLRs VLCs VCDs LCDs 246. 249. Low Top Center First MM is used to Establish Maintain Release connections between the MS a The network MSC e. d. c. Which uses signal strength measurements and cell congestion information to determine when a handoff should occur a. All of these 248. The mobility management sublayer on the _____ of the RR is terminated at the MSC a.
c. c. a. d. a. a. d. b. MSC VLR HLR AuC All of these 251. Both a & b d. ____________ Together with the MSC. 253. b. 252. e. c. None of these MAP is used between _________in the form of query and response messages a. b. c. a. HLR VLR CLR Both a & b MSISDN stands for Mobile Subscriber ISDN Number Mobile Station ISDN Number Mobile Switching ISDN Number Mobile Standard ISDN Number Which number caller used to reach a mobile subscriber MSISDN number IMSI number TMSI number MSRN MSISDN number consists of Country code(such as 91 for India) National subscriber destination code Subscriber number All of these Which number of MSISDN is the address of the GSM provider Country code(such as 91 for India) National subscriber destination code Subscriber number All of these Which is a unique identification number allocated to each mobile subscriber a. d. b. c. d. c. MSISDN Number . b. d. b. d.250. Mobile Application Part(MAP) protocol c. b. 256. 254. Provide the call routing and roaming capabilities of GSM where a subscriber can roam nationally and even internationally a. 255.
b. c. d. a. Which is a temporary location-dependent ISDN number assigned by the locally responsible VLR to each mobile station in its area a. MS a. MSISDN Number IMSI Number TMSI Number MSRN 260. b. d. In TMSI nobody can determine the identity of the subscriber by listening to the __________ a. Which is used in the place of the IMSI for the definite identification and addressing of the mobile station a. MSISDN Number b. GSM used the _______ byte TMSI for local subscriber identification 2 4 6 8 Video channel Radio channel Audio channel None of these 262. c. e. d.b. MSRN 257. TMSI Number d. IMSI Number . c. c. c. 258. d. b. which can be carried out anywhere and can be used in any MSISDN Number IMSI Number TMSI Number MSRN The IMSI number consists of MCC(Mobile Country Code consisting of three digits) MNC(Mobile Network Code consisting of two digits) MSIN(Mobile Subscriber Identity Number consisting of ten digits) All of these 259. b. a. d. 261. b. It sits inside SIM card. IMSI Number c.
b. TMSI Number d. Handoff Handover Haddon Handwork Handover involves a number of procedures depending upon the location are Intra-cell handover Inter-cell. MSRN 263. d. d. Intra-cell handover Inter-cell. c. b. b. c. c. b. 266. c. a. Which involve the transfer of the connection from one BTS to another BTS on the same BSC a. ___________ becomes necessary when mobile moves from area of one BSC into another area of the same or into another BSC a. d. e. intra-MSC handover Inter MSC handover 268. c. d. a. intra-BSC handover Inter-BSC. The MSRN consists of VCC(Visitor country code) VNDC(Visitor national destination code) The identification of the current MSC along with the subscriber number(SN) All of these GSM call may be classified into two types namely MTC(Mobile Terminated Call) MOC(Mobile Originated Call) Both a & b None of these 265. intra-BSC handover Inter-BSC. Intra-cell handover Inter-cell. d. b. a. intra-MSC handover Inter MSC handover All of these 267.c. b. Which involve the transfer of connections from one channel to another channel on the same BTS a. intra-BSC handover Inter-BSC. intra-MSC handover Inter MSC handover . d. c. 264.
a. intra-MSC handover Inter MSC handover 270. 274. 273. Intra-cell handover Inter-cell. b. intra-BSC handover Inter-BSC. a. c. d. b. a. d. b. d. Intra-cell handover Inter-cell. c. c. d. c. b. intra-MSC handover Inter MSC handover A collection of interconnected networks is known as Internet Internetwork Network Internetworking The process of interconnecting different network is called Internet Internetwork Network Internetworking The internetworking protocol is known as SMTP PPP TCP/IP NNTP The Network element that connects individual network is known as Gateway Router TCP/IP Both a & b 275. d. intra-BSC handover Inter-BSC. The connections is transferred between BTS belonging to two different BSCs within one MSC is called a. b. 272. b. Which involve the transfer of a connection to a BTS between two cells within another MSC a. c. If single computer network is divided into segments and router are added between them it forms an . 271. d. a. c.269.
b. 280. 277. d. b. a. c. b. a. d. c. b. a. c. c. Which protocol provides a reliable data transfer TCP UDP IP Both a & b Catenet Bridge PANs Novell netware The computer network are of different types…some are PANs(Personal Area Networks) Novell Netware Both a & b None of these The word Internet and internet are Different Same Dependent on each other None of these Which signifies the specific network model internet Internet Both a & b None of these Which means generic interconnection of networks internet Internet Both a & b None of these . d.a. e. 279. d. c. c. b. Which was used as original term for an internetwork which meant a method for connecting networks with disparate technologies a. 281. c. b. Internet Internetwork Network Internetworking 276. d. a. d. a. b. d. 278.
285. c. g. 283. e-mail Application Layer Protocol Transport Layer Protocol Internet Layer Protocol Hardware Layer 288. b. SMTP. b. Which protocol uses TCP routes to an application on a computer by use of a port number . c. d. f. __________ is used for every computer needs one protocol stack for communicating on the Internet a. d. c. HTTP. b. c. a. d. c. e. a. b. 287. etc a. 284. FTP. h. d. Which protocol provides a unreliable data transfer TCP UDP IP Both a & b Every computer has a unique address called IP UDP TCP None of these The IP address lies between 0 to 245 0 to 254 0 to 255 0 to 265 DHCP stands for Dynamic Host Configuration Protocol Digital Host Communication Provider Digital Host Communication Protocol Dynamic Host Configuration Provider 286. a.282. b. d. Protocol stack Protocol Transmission protocol None of these Which protocol layer uses the protocols are WWW. e.
Application Layer Protocol Transport Layer Protocol Internet Layer Protocol Hardware Layer Which protocol moves IP packets to a specific computer by use of an IP address Application Layer Protocol Transport Layer Protocol Internet Layer Protocol Hardware Layer 290. 292. 293. Application Layer Protocol Transport Layer Protocol Internet Layer Protocol Hardware Layer Hardware layer handle raw Bytes of data Bits of data Both a & b None of these Where is the TCP layer is situated in the application layer in the protocol stack Below Top Center None of these TCP uses port number to route correct application on the ___________ Source computer Destination computer Both a & b None of these TCP is __________ in nature a. c. a. a. a. 294. c. d. c. c. Textual b. d. b. b. d. Not textual c. d. None of these . b. d. Which contains network interface cards. a. b. 291. c. modems for phones or wireless lines for converting binary packet data to network signals and vice versa a. d. c. 289.a. b. b.
b. d.d. a. TCP also contains a ___ checksum 16bit 16byte 32bit 32byte What is the port number of the HTTP 80 25 23 20/21 What is the port number of the SMTP 25 23 20/21 27960 What is the port number of the Telnet 25 23 20/21 27960 What is the port number of the FTP 25 23 20/21 27960 What is the port number of the Quake III Arena 25 23 20/21 27960 TCP is ______________ a. a. a. d. d. b. Connection-oriented . 297. a. c. 299. d. b. a. b. 296. c. c. b. c. a. 298. 295. c. 300. d. c. b. d. 301.
e. 303. e. 305. h. a. IP does not ensure movement of a packet to its destination and have no knowledge of __________ a. d. SMDS stands for Switched Multiple Data Services Switched Multimegabit Data Services Switched Multiple Double Services Switched Multiple Data Subscriber IP packets ________ arrive in the order in which it is sent May May not May or may not None of these Port numbers Connections Both a & b None of these 306. 304. c. c. 302. None of these e. f. g. Reliable c. h. c. d.b. connectionless public data service that extends e. g. IP is ___________ Connectionless Unreliable Both a & b None of these e. b. Both a & b d. high speed. the service follows . b. d. SMDS is a packet switched. a. 307. Local Area Network Metropolitan Area Network Wide Area Network All of these In SMDS. b. f. e.
e. c.5Mbit/s 45Mbits/s 155Mbit/s 1. IEEE 802. b. d. b. a.6 DQDB(Distributed Queue Dual Bus) IEEE 802.4 DQDB(Distributed Queue Dual Bus) IEEE 803. b. c.2 SMDS is capable of variety of technologies including DQDB(Distributed Queue Dual Bus) Broadband ISDN(B-ISDN) Both a & b None of these North American implementation uses DQDB with DS1 at a data rate of 1. h.6 DQDB(Distributed Queue Dual Bus) The SMDS is defined for MAN under_______ standard IEEE 802. 312.5Mbit/s 45Mbits/s 1. c. e. d. c. b. 309.6Mbit/s 46Mbit/s North American implementation uses DQDB with DS3 at a data rate of 1. d.5 DQDB(Distributed Queue Dual Bus) IEEE 802.6 IEEE 802. a. 313.6Mbit/s 46Mbit/s SMDS network also planned to link B-ISDN and SONET OC3 with a data rate of 1. c. g. d. d. b. 310.4 IEEE 802. a. b.5 IEEE 802. a.9Mbit/s SMDS is a Data service Telephone service Frame service Video service . c. f. d. a. 311. 308.5Mbit/s 45Mbits/s 1. a.
314. c. d. f. d. e. a. Address of source and destination in SMDS both consists of 4 bit code followed by a telephone no of max. e. d. a. a. b. a. 315. SMDS is a Technology Protocol Both a & b None of these The word CPE means Customer Premises Equipment Computer Premises Equipment Customer Packet Equipment Customer Protocol Equipment The SMDS is designed to handle Continuous traffic Finite traffic Bursty traffic All of these The telephone service is designed to handle Continuous traffic Finite traffic Bursty traffic All of these In SMDS . c. h. b. c. d. b. b. e. 317. g. . c. 318. the telephone number consists of Country code Area code Subscriber code All of these The SMDS can serve Only area Only nationally Internationally None of these 320. 319. a. d. b. c. 316.
d. b. 321. f. 323. a.000 bytes/sec 100.3 IEEE802. c. d. c. a. with a tick every 10msec user can send_________ on the average 100. Scalability . b. 326. g. c. e. 322. d. c. a.a. b. 324. b. e.000. h. d. d. e. SNMP b. a. b.5 FDDI All of these SMDS make use of Copper Fiber media Both a & b None of these In SMDS.000 bytes/sec 10.0000 bytes/sec 100. 12 decimal digits 16 decimal digits 15 decimal digits 20 decimal digits The SMDS is similar to which transfer mode Synchronous transfer mode Asynchronous transfer mode Both a & b None of these SMDS make use of cell relay with _______ per cell 53 octets 56 octets 58 octets 55 octets The data unit of SMDS can encapsulate frames of IEEE802. 325.00 bytes/sec Which means the network can expand with minimal investment a. c.
d. c. d. b. d. 329. d. b. 330. defined by IETF(Internet Engineering Task Force) a. e. The user can have access to high speed lines ______ connected to MAN 32Mbits/s 33Mbits/s 34Mbits/s 35Mbits/s The user can having access capacity of ______ connected to MAN 151Mbits/s 152Mbits/s 154Mbits/s 155Mbits/s The backbones of MAN has working data rate of ________ 139Mbits/s 140Mbits/s 155Mbits/s 134Mbits/s User is charged for maximum rate of __________ bandwidth 34Mbits/s 4Mbits/s 10Mbits/s 16Mbits/s 25Mbits/s Except (a) all are answers SMDS was primarily used for connecting SNMP Scalability Screening Multicasting . a. c. a. Which is a network protocol that is based on UDP and is a component of the component of the Internet Protocol Suite. b. Screening d.c. c. f. c. 331. a. Simple e. 328. 327. b. a. e. 332. b. c. d.
a. b. b. d. c. 338. d. c. d. 337. Group addressing Security features Both a & b None of these . d. a. MAN interconnect Ethernet Token ring networks Both a & b None of these SMDS networks have many underlying devices for supporting high-speed service Subscriber network interface(SNI) Carrier equipment Customer Premises Equipment (CPE) All of these CPE may be devices such as PCs(Personal computers) Intermediate nodes Terminals All of these Which are intermediate nodes provided by SMDS carrier Multiplexers Modems Routers All of these PDUs contain Source address Destination address Both a & b None of these Addressing in SMDS has provision for a. c. b. are a. a. c. b. d. b. c. b. b. 335. d. c. 336. c. d. e. LAN MAN WAN PAN In SMDS. a. a. 333. 334.
25 Speed Matching Speed matching None of these In X.2kbps . 20. In X. 344.25. 18. b.2kbps c. c. b.25 DTEs are not required to use the same line speed because of the Store Forward nature of packet switching Excellent flow control All of these 345. there are two useful security features. b. c. d. it was developed for computer connections used for Timesharing connection Terminal connection Both a & b None of these X.25. 19. a. a. d. 340. d. d. c. d. 342. b. c. In SMDS.25 provides a virtual high-quality digital network at Low cost High cost Medium cost All of these Which is another useful characteristics of X.339.2kbps b. A host connected at 56kbps and communicating with numerous remote sites can be linked with cheaper______ lines a. c. b. d. c. 341. a. a. namely Source address validation Address screening Both a & b None of these CCITT stands for Consultative Committee International for Telegraphy and Telephony International Consultative Committee for Telegraphy and Telephony International Consultative Committee for Telephony and Telegraphy Consultative Committee International for Telephony and Telegraphy X. b. a. a. 343.
d. 22.2kbps 346. a. b. c. d. 347. line a. b. c. d. e. 348. a. b. c. d. 349. a. b. c. d. 350. a. b. c. d. 351. a. b. c. d. 352. To enable control of 4096 logical channels in X.25, there are ____ channel groups 256 16 4096 2556 Each logical channel group is divided into ____ logical channels 256 16 4096 2556 The channel grouping in X.25 are known as Logical channel group number(LCGN) Logical channel number(LCN) Both a & b None of these X.25 is a Protocol Data service Telephone service Technology X.25 protocol was recommended by CCITT in a. 1975 b. 1976 In X.25 defines the protocols from Layer 2 to Layer 3 Layer 1 to Layer 2 Layer 1 to Layer 3 Layer 3 to Layer 2 Based on X.25 rules, how many logical channel can be set on a single physical 256 16 4096 2556
c. 1977 d. 1978 353. a. b. c. d. 354. a. b. c. d. X.25 protocol exchanged the data control information between A node A user device Both a & b None of these The user device and node are properly referred to as DTE DCE Both a & b None of these
355. A terminal of 1.2kbit/s can communicate with host computer at _______ through the packet switched network a. b. c. d. 9600bits/s 8600bits/s 7600bits/s 6600bits/s
356. The transmission speed of sender should be ___________ as that of receiver in the X.25 a. b. c. d. 357. a. b. c. d. 358. a. b. c. d. 359. Same Different Both a & b None of these X.25 make use of _______ service Connectionless Connection-oriented Both a & b None of these PAD stands for Packet Assembly and Disassembly Procedure Assembly and Disassembly Permanent Assembly and Disassembly Package Assembly and Disassembly X.25 supports two types of packet format named
a. b. c. d. e. 360. a. b. c. d. 361. a. b. c. d. 362. a. b. c. d. 363. a. b. c. d. 364. a. b. c. d. 365. a. b. c. d. 366.
Control packet Data packet Both a & b None of these A X.25 packet make up the ______ of an HDLC frame Frame field Data field Information field Both b and c are same Maximum packet sizes in X.25 vary from 64bytes to 128bytes 64bytes to 4096 bytes 64bytes to 256bytes 32bytes to 64bytes A X.25 protocol use Store and forward method Stop and wait method Store and stop method None of these The advantage of X.25 are Was developed to recover errors Packet switching eases compatibility problems in communications between PCs Packet switching cannot waste bandwidth All of these Frame relay constitutes of the OSI _____ layer First Second Third Fourth Logical channels are identified by a number referred by DLCI(Data Link Connection Identifier) VLCI(Very Large Connection Identifier) HDLC(High Level Data Link Control ) QLLC DLCI can have a value between
367. 369. d. 0 and 1025 0 and 125 0 and 256 0 and 1023 e. c. f. a. c. g. a. h. c. c. Frame relay indicates network congestion using two flags namely ________ bits in data frames e. The device which splits data into frames as well as combines frames into data is referred as e. to as a.a. g. 370. b. d. 371. f. 372. FRAD(Frame relay and Disassembly) FDLC HDLC DLCI 368. h. d. b. b. Forward Explicit Congestion Notification(FECN) Backward Explicit Congestion Notification(BECN) Both a & b None of these Cell relay is data transmission services that uses transmission technology referred ATM(Asynchronous Transfer Mode) BTM STM DTM The data transmission is a fixed length of data known as Cell Frame Relay Cell relay Advantages of cell relay are High-speed transmission Multiplexing transmission Both a & b None of these Disadvantages of cell relay are . b. d.
378. 377. c. a. d. b. data link layer is referred to as DLC layer ATM layer STM layer Protocol layer In cell relay these logical channels are represented as Virtual Channels(VCs) Virtual Paths(VPs) Both a & b None of these A VC is a virtual channel composed of Frames Cells Relay Protocol VP is a bundle of VCs VCM VCI VIP Identifiers are called ___________________ are used to identify VPS and VCs VCIs VIPs Both a & b None of these . b. 375. a. c. b. a. b. d. c. 373. d.a. 376. a. 374. d. c. b. c. c. a. that is. d. a. b. d. b. d. c. Cell discarding occurs with congestion High cost Both a & b None of these The cell relay protocol corresponds to first ____ layer of OSI One Two Three Four The part that corresponds to second layer.
380. b. d. Payload(48bytes) b. a. c. ATM is an a. Voice Video Data All of these Data traffic in ATM tend to be Continuous Bursty Discontinuous None of these ATM cell has a fixed length of __________ 52bytes 53bytes 54bytes 55bytes Which is a portion carries the actual information a. Connectionless Interconnected Connection oriented None of these 382. b. separate networks are used to carry _________ information mostly a. c. Payment . International Telecommunication Union-Telecommunication ATM networks are a. 384. b. In today ATM. c. d. 385. c. d. a. c. International Telecommunication Union-Telecommunication Standardization Sector(ITU-T) d. International Telecommunication b. a.379. International Telecommunication-Union c. b. In cell relay communication performed between Two VP Two VC VP and VC VP and VCI 381. d. b. 383. d.
a. video. 388. a. . Circuit-switched voice Circuit-switched data Low-speed packet High-speed packet All of these The cell relay is considered to be the __________ of the future a. c. b. d. c. The transport speeds of most ATM applications are most often 155Mbps and 622Mbps b. d. The characteristics of ATM are as follows a. c. ATM is a flexible service made possible by the size of the packets (cells).c. 387. a. Transport service 392. b. The small cell size allows a variety of applications to run on ATM networks including voice. d. c. c. e. a. 390. d. and data Single Double Multiple None of these ATM can support Different speeds Traffic types Quality of service attached to applications All of these ATM cells coming from a user are guaranteed delivery at the other end with a High probability Low delay Both a & b None of these 391. 389. b. b. c. Payroll d. d. The purpose of ATM is to provide High speed Low-delay multiplexing Switching networks All of these ATM is specifically designed as ________ technology for voice. video and data d. Transmission service b. All of these Narrow band ISDN provides for the following services a. None of these 386. b.
397. b. e. Transfer service d. BRA affords an ISDN user with simultaneous access to two _____ data channels 32kbps 64kbps 128kbps 256kbps The ISDN Internetworking Equipment devices are a. b. ISDN is a group of __________ standards relating to digital transmission across conventional copper wire telephone lines. Narrow band ISDN is a digital service where the transport speeds are ______ (T1) or less a. a. The range of speeds for the broadband ISDN services usually range from ______ to the Gigabit range a.c. b. 1. c. None of these 393. c. c. d. 396.555Mbps 1. d. d. c. d.544Mbps 1. c. b. 398. a. ISDN Bridges 24Mbs 25Mbs 26Mbs 27Mbs BRA stands for Basic Rate Access Basic Random Assembly Bit Rate Assembly Bursty Rate Assembly . b. d. CCITT ITU Both a & b None of these 394.552Mbps 395. as also other media a.533Mbps 1. Terminal Adapters(TAs) b.
User devices b. d. ISDN c. All of these 399. c. e. 401. c. d. b. e. The Another channel in BRA(Basic Rate Access) is referred as D-channel Functions at a. b. c. ISDN Routers d. Both a & b . a. b. c. a. 12Kbps 14Kbps 16Kbps 18Kbps The D-channel in BRA is used for sending and receiving signal between a. b. d. d. Each channel in BRA is referred to as A-channel B-channel C-channel F-channel The B-channel is capable of carrying both Voice Data Both a & b None of these ISDN connections mat be seen as very _______ digital conduits High rate-of-error Low rate-of-error Both a & b None of these Advantages of ISDN internetworking are Quality Economy Availability All of these 403. a. a. 404. c.c. b. 402. 400. d.
as per CCITT I.430 I. The CCITT eventually was reformed in to the group which is now called the ________ a. d.450 407. c. a. c. a. b. b. as per CCITT I. d.422 I. c. The total transmission rate of BRA workout to a combined total of 144kbit/s 145kbit/s 146kbit/s 147kbit/s BRA is also known as ____________.420 I. b. d. 410.421 I.440 I. Which service provide up to thirty independent 64kbps B channels and a separate 64kbps D channel to carried the signaling a.423 409.420 I. b. b. c. b. d. 411. c.d. c. d. a. None of these 405. 408. 406. Basic rate access Primary rate access Both a & b None of these Primary rate access is also known as __________. d. a. ITU-T UIT-T TIU-T TUI-T The two standards ISDN connectors are RJ-45 type plug and socket uses unshielded twisted pair cable One for accessing primary rate ISDN through a coaxial cable Both a & b None of these ISDN can be accessed as per CCITT by using two service called .
f. BRI(Basic Rate Interface) PRI(Primary Rate Interface) Both a & b None of these BRI includes ______ B channels and ________ D channel One . two BRI providing data transmission speed of 62kbps 63kbps 64kbps 65kbps 414. h. two Two. ________ lines of data or voice channels . 412. b. 20+D 30+D 40+D 50+D PRI can carry up to 30 independent. c. 415. a. three Two. c. d.a. d. PRI is popularly referred to as ____________ due to the number of channels as per CCITT a. b. e. d. one(may be written as 2B+D) Three. g. 413. c. b. e.
c. 62kbps 63kbps 64kbps 65kbps Data Communication And Networks 03 1. International Organization Standardization d. d. b. b. d. c. c. TCP/IP model is the _______ .a. c. each layer is responsible for a ________ amount of work a. International Organization for Standardization b. Client Server Both a & b None of these 4. Finite . d. Oldest protocol Not so old protocol Newly established protocol None of these 6. ISO stands for a. International for Organization Standardization 2. which is used in the OSI model a. d. Which type of network operating system in Novell Netware a. How many layers a Novell Netware protocol stack uses a. b. Infinite b. b. b. Separation of responsibility Addition of responsibility Subtraction of responsibility None of these 3. Internet Organization for Standardization c. In layered architecture. d. c. The main principle of layered architecture is a. 3 4 5 6 5.
Large d. Peer Layer protocol Network None of these 9. which correctly obeys the appropriate protocol . d. None of these 7. f.c. d. Layering the communications process means breaking down the communication process into______ and _____ to handle interdependent categories a. Peer Layer protocol Network None of these e. g. Smaller Easier Both a & b None of these The convention and rules used in such communications are collectively known as a. b. 10. d. b. Network is the term used for a group of a. h. 8. The groups of layers provides information to allows _________. c. d. protocols layers Both a & b None of these 12. c. c. c. b. b. OSI has two meanings refers to e. The entities comprising the corresponding layers on different computers are called ________ which communicate by using layer protocol a. OSI basic reference model Protocol that are authorized by ISO Both a & b None of these 11.
Interface specification Implementation details Both a & b None of these e.a. d. compatible implementation of encoding b. The information exchanged between two computers is physically carried by means of _________ with the help of certain coding method a. c. Communication buffers Communication media Both a & b None of these computer must be capable of distinguishing between information Carrying signal and mere noise . commonly known as___________ for the sake of transmission and reception of data a. b. b. Hardware implementation Software implementation Both a & b None of these 13. b. c. b. Desirable bandwidth Immunity to noise Attenuation properties All of these e. Electronics signal Electrical signal Physical signal Physical circuits 15. interpreting data carrying electrical signals c. d. c. Transmission media deals with the types of medium used . None of these 16. c. 17. d. Which are never form a part of the architecture because they are not visible from the outside a. For two computers to reliably exchange data. Both a & b d. c. d. 14. The data communication process allocates memory resources. which is dictated by the a. they must have a a. d. b.
The check pointing circumvent session recovery requirement by retransmitting only the a. c. b. Depending on the nature of the involved application in layered architecture. Duplex Half duplex Simplex mode All of these 23. b. 1 2 3 4 22. b. c. d. In error control. the dialog type may be a. b. d. Checkpoint Check mechanism Character encoding Terminal emulation 24. this corruption could be in the form of ________________ a. c. c. Noise Electromagnetic interference Both a & b None of these 20. Error control Logical channels Routing All of these 19. d. d. Data exchange can take place between any _____ workstations a. The session recovery can be achieved by providing a a. 2 3 4 5 21. Saving time c. d. b. Protocols should provide at least ______ logical channels per connection a. Bandwidth .a. c. d. Affected files b. c. b.
b. This is the entities in the same layers but on different computers a. Peer entities Entities Service provider SAP 28. Peer entities Entities Service provider SAP 30. Peer entities Entities Service provider Service user 29. b. Peer entities Entities Service provider SAP 27. b. c. b. c. b. IO chips in every layers a. Which function of the layer provides certain services a. ASCII EBCDIC Both a & b None of these e. 25. Which are the active elements such as processes. c. Peer entities Entities Service provider SAP .d. 26. c. d. d. c. c. Which function of the layer uses certain services a. d. b. d. Which is the point from where services can be accessed . d. d. Some good examples of presentation problems are the existing incompatibilities between the__________ standard of character encoding a. All of these e.each point is the unique address a.
b. c. Protocol Primitives Confirmed service SAP 36. connection-oriented connectionless Both a & b None of these 35. A confirmed services is defined with a a. b. Client-server model User model Server model None of these Which service is specified by a set of primitives available to a service user to interact with the service provider a. e. b. b. d. c. d. b. In which model. Registered E-mail Junk E-mail Both a & b None of these e. d. b. d. Which is the unreliable connectionless service without acknowledgement a. Request Confirm Response Indication Primitives All of these . c. d. 34. Which is the reliable connectionless service with acknowledgement a. f. c. c. Which are parameters to define conditions a. c. Registered E-mail Junk E-mail Both a & b None of these 32. d. Request-reply command is example of connectionless service a.31. 33.
42. c. b. Name Content Function Total no of layers depend on type of network All of these f. Protocol to service Service to protocol Service primitives None of these 41. The characteristic of each layer are as a. b. Request Indication Confirm Response Both a & b All of these 39. 37. e. The basic function of each single layer is to provides service to the a. Layer of the top b. c. 40.g. Protocol Primitives Confirmed service SAP 38. d. b. An unconfirmed is defined with a a. Services Protocol Both a & b None of these e. c. d. f. Layer of the bottom . e. d. Which are the distinct concepts and are important to release connections between sender and receiver a. c. b. c. b. d. d. Which is provided to the upper layer by an immediate lower layer a. The Service primitives are the part of a.
Breaching Branching Broaching Brunching 44. b. d. c. d. IBM DEC Both a & b None of these 47. Smaller Easier Simpler design problems All of these 46. c. Which is a reliable connection-oriented service has two subparts a. c. b. d. Message sequences Byte streams Both a & b None of these . b. Which is the computers from the same manufacturer it was not possible to run both_______ solution and _______ simultaneously a. The network architecture can be termed as a a. Layer below it 43. ISO-OSI reference model these could only be run one at a time by the end__________ a. c. d. The hectic task of designing the whole network can be distributed in the a. d. Layer above it d. d. c. Set of layers Set of protocols Set of machines Both a & b 45. b. ________ the protocol can make communication between the two either difficult or impossible a. b. 1969s 1971s 1970s 1972s 48. c.c. b.
49. Unreliable datagram Acknowledged datagram Both a & b None of these 52. Hardware implementation d. d. Physical layer b. c. d. Unreliable connectionless service can be also termed as a. free of all the others a. Supporting rules for low-level signaling c. c. c. b. Connection-oriented services Connectionless services Both a & b None of these 51. The various types of services provided by the interface to the layers above them are listed as follows a. Connection-oriented services Connectionless services Both a & b None of these 50. The seventh and the highest layer is the application layer that deals with the . Byte stream service d. None of these 53. b. b. Which is similar to postal system where every message contains the complete destination address and is mapped through the system. All of these 55. The first and the lowest layer is called the ___________________________ a. c. b. By the end of _________. 1980 1970 1990 1960 54. d. Datagram service b.e. The connectionless services can be further sub-divided into many categories a. d. the Open System Interconnection model was developed by the International Organization for Standardization to break the barrier a. Data service c.
Hardware of networks The specific methods of sending bits from one device to another Both a & b None of these 58. b. g. Signaling Hardware Both a & b None of these e. h. d. The transport layer is the one. c. c. b. The seventh layer does not deal with __________ concepts very much a. the level of abstraction ________ a. d. b. User interface Applications Both a & b None of these 56. b. Increases Decreases May be increases or decreases None of these e. Hardware-oriented protocol Software-oriented protocol Both a & b None of these 60. The first layer deals with the actual ____________ e. c. 59. Which is collectively known as a protocol data unit(PDU) a. Hardware . The second layer also deals with ________________ a. d. f. b. In moving from layer one to layer seven. d. Data Header Both a & b None of these 61. d. c.a. c. 57. which links the communication process to this _________________ a.
d.7 5.6.6 5. 1. Software Hardware Both a & b None of these e.3. Even operating system c. The lower layers are layers a. c.2.4.7 6. b.5. Dependent on same layer d. c. Both a & b d. 67. b. The seven layers of the OSI model are categorized into ________ groupings a. Dependently of every other layer b.b.2. The basic philosophy of the seven-layer model is that each layer may be defined a. c. The lower layers are implemented by using ______________ with the incidence of hardware ‘reducing’ to software from layer 1 to layer 4 a. None of these 63. None of these 62.3 1. b. The upper layers are not expected to know anything about ____________ a. d. 5.6 65.3. b. The upper layers are layers a. 2 3 4 5 64. d. b.4 1.5 2.2. c. d. Independently of every other layer c. d.7 66.3.4. Networking Network addresses Both a & b None of these . c.
69. b. Vertical communication Horizontal communication Protocols OSI interfaces 72. Which OSI model supports the interconnection of different implementations of various autonomous layers a. c. b. d. c. c. d. The bottom four layers take the responsibility of _________________ a. Protocols d. Modularity Inter-layer interactions Both a & b None of these . Vertical communication b.68. b. OSI interfaces 73. Layer n Layer n-1 Layer n+1 All of these 70. This refers to communication up and down the protocol stack every time any data is sent received across the network a. Horizontal communication c. b. c. d. c. The OSI interface is a process of communication between adjacent layers in which data is passed between a. d. Pass control Pass Data information Both a & b None of these 71. b. d. Networking Network addresses Both a & b None of these e. The layers 3 and 4 interface are used by protocol to _____________ a. Which is a communication process running at a particular layer on one host machine can accomplish logical communication with a similar process running at the same layer on another host machine a.
f. Current c. b. It is also responsible for endto-end connection It aims to keep different applications data separately and provides dialog control It provides rules to present data. some of them are a. database and application services 75. compression and translation services It aims to provide a user interface like file. Voltage b. c. The functions of the OSI layer model are 1 2 3 4 5 6 7 Layers Physical Data link Network Transport Session Presentation Application Functions It moves bits between devices by using media It tends to assemble packets into bytes and bytes into frames and provides access to media by using MAC address It is responsible for providing logical addressing which routers use for path determination and routing It provides reliable or unreliable delivery and performs error correction before retransmit. Phase or frequency . Open wire circuits Twisted pair cables Coaxial cables Fiber optic cables Wireless All of these 76. e.e. d. message. print. A number of transmission media exist. The physical layer specifies the representation of each bit as a a. 74. handle processing like encryption.
All of these 77. 1 0 1. Manchester encoding by using phase signaling d. b. What are the two types of systems that are used to provide timing signal a. The timing signal identifies the boundaries between the a. b. RZ(return to zero) by using pulse signaling b. b. c. NRZ-I(non return to zero-invertive) by using bandwidth e. All of these 78.d. c.0 None of these 81. d. c. Which bit stream is to be transmitted with the objective that when the received by the receiving side as 1 bit. not as ___ bit a. The physical layer uses four types of bit signaling approaches these are a. Asynchronous communications Synchronous communications Both a & b None of these 79. d. Which bit stream is to be transmitted with the objective that when the sending side sends _____ bit a. It defines the electrical and mechanical aspects of interfacing to a physical medium for transmitting data ________________________________ a. Bytes Bits Gigabyte Megabyte 80. d.0 None of these 82. c. d. b. 1 0 1. c. As well as setting up Maintaining Disconnecting physical links All of these . NRZ(non return to zero) transmission by using level signaling c. b. d.
Data transmission and reception d. The data link layer also deals with the issue of addressing what is popularly known as a. from bit stream to frame and vice versa. b. Describing hardware specifications b. c. to send across the network a. CSMA/CD for Ethernet b. Encoding and signaling c. The physical layer supports various encoding and signaling functions to convert data. c. None of these . Token passing for the Token Ring network c. d. HDLC Ethernet Both a & b None of these 87. c. Logical Link control(LLC) b. Both a & b d. The functions of the data link layer are a. Addressing e. All of these 84. d.83. d. Some of the examples of MAC are a. Error detection and handling f. d. b. b. Examples of data link layers are a. c. Media Access Control(MAC) c. What is an example of a physical layer definition a. Hardware Address MAC address All of these 89. All of these 88. The functions of the physical layer are a. Data framing d. Describing hardware specifications Encoding and signaling Data transmission and reception None of these 85. RS-323C/D RS-232C/D RS-233C/D RS-322C/D 86. b.
In broadcast network . c. The routing of network layer may be a. b. The functions of the Network layer are a. Network layer b. d. Presentation layer . d. b. d. b. e. so the network layer is often thin or even nonexistent a. 95. Software application Hardware application Both a & b None of these e. d. c. Logical addressing Routing Datagram encapsulation Fragmentation and reassembly All of these 91. b. Static Dynamic Both a & b None of these e. b. Session layer c.90. The transport layer accepts data from the ______ and splits it up into smaller units so that it can be passed to the network layer a. c.the routing problem is ________. The network layer uses which service for delivering packets across the network a. The transport layer provides the necessary function to enable communication between _____________ processes on different computers a. c. d. Connection-oriented Connectionless service Both a & b None of these 93. Complex Simple Both a & b None of these 94. 92. c.
b. RPCs b. d. APIs . The session layer provides enhanced useful services in some applications such as a. d. Flow control g. management and termination e. d. The session layer is responsible for _______________ the dialogues between communicating applications a. Segmentation. e. 99. c. Acknowledgements and retransmission f. The functions of transport layer are a. Which protocol uses the transport layer a. Which enable an application to complete specified high level communications over the network successfully and easily with the help of a standardized set of services a. Process-level addressing b. 100. All of these 98. Remote login Remote file transfer Both a & b None of these Some examples of APIs are NetBIOS TCP/IP sockets Remote Procedure Calls (RPCs) All of these Establishing Maintaining Arbitrating All of these 101. c. Connection establishment . FTP TFTP HTTP TCP/IP 97. c. b. b. d. Multiplexing and de-multiplexing c. a. b. packaging and reassembly d. c. Physical layer 96.d.
b. d.c. The data link layer is also known as Link layer Data layer Open layer None of these Some example of data link layers are HDLC Ethernet Both a & b None of these 104. c. b. d. c. IEEE802. All of these 102. e. Physical layer Data link layer Transport layer Presentation layer Which layer is responsible for the reliable transfer of data across the physical link Physical layer Data link layer Transport layer Presentation layer The responsibility of data link layer include functions such as Data flow control Breaking the input data Frame formatting Transmission of the frame sequence Error detection Link management All of these 107. b. f.11 etc to function a. Which provides link to many wireless and wired local area networking (LAN) like Ethernet . c. c. d. c. g. b. TCP/IP d. Which layer performs functions relative to the syntax and semantics of the information transmitted a. 103. a. a. 106. a.FDDI. 105. Physical layer . d. d. a. b.
b. c. PCs Macintoshes UNIX systems AS/400 servers All of these Which layer allows the user to use the network Physical layer Data link layer Application layer Presentation layer The application layer provides network-based services to the user are Distributed database Electronic mail Resource sharing File transfer Remote file access Network management All of these Which layer provides user interface to communicate with a computer Physical layer Application layer Transport layer Presentation layer The most popular application layer protocols are . d. e. Data link layer c. e. a. d. b. a. The types of data handling issue that presentation layer provides are as follows Translation Compression Encryption All of these 109. c. a. different types of computers like _____________in an Internetwork have many distinct characteristics and represent data in different ways a. 112. d. g. c. b.b. f. b. d. In translation. a. Transport layer d. c. 111. b. Presentation layer 108. c. 110. d. 113.
Most users rely on ______ for the purpose of file transfers. e.a. b. f. a. a. d. How many layers TCP/IP model has 2 3 4 5 TCP/IP layer specifies the __________ layer Physical layer Application layer Transport layer Presentation layer TCP/IP defines a four-layer model consisting of the Internet layer Transport layer Application layer Network interface layer All of these TCP/IP SMTP DHCP NFS TCP/IP Reference model SMTP model Telnet model NNTP model . 117. c. DHCP NFS. d. c. e. 116. e. b. 118. b. e. b. c. electronic mail(email) and remote login services a. Telnet SNMP. FTP SMTP. HTTP. IRC All of these 114. Which model is considered the oldest protocol of all computer networks like the ARPANET and its successor. a. 115. d. d. d. b. the Internet a. c. POP3 NNTP. c. c. b. d.
122. 123. b. None of these 121. The Internet layer of the TCP/IP matches with the which layer of the OSI model a.119. Serial Line Internet Protocol(SLIP) b. TCP Network layer Physical layer Session layer Data link layer The Packet format and protocol at internet layer is called Network protocol Internet protocol OSI protocol None of these Which protocols are found in a Internet Layer of TCP/IP model IP ICMP RIP BGP All of these Which protocols are found in a Network interface Layer of TCP/IP model Ethernet FDDI Token Ring All of these . TCP/IP architecture is based on the three sets of interdependent processes are Application-specific processes Host-specific processes Network-specific processes All of these 120. c. a. c. c. Which TCP/IP standards define protocols for TCP/IP networks for layer two implementation to fill the gap between the network layer and the physical layer a. b. c. 125. b. d. c. b. a. b. d. e. a. Both a & b d. a. d. Point-to-Point Protocol(PPP) c. e. Which protocols are found in a Transport Layer of TCP/IP model a. 124. d. d.
a. d. c. c. Service b. Both a & b ii. None of these The UDP Protocols are a. 130. Sequence control Error recovery and control Flow control All of these TCP layer is a a. None of these 128. b. Which protocols are found in a Application Layer of TCP/IP model FTP TFTP SMTP NFS TELNET SNMP All of these h. 127. Connection type service c. d.b. g. FDDI d. Connectionless type service . c. b. a. b. Which protocols are found in the application layer Numerous UDP TCP IP 129. Both c & d iii. d. c. e. Both a & b 126. Reliable Connection-oriented Connectionless Unreliable i. b. d. Which other function include __________________and identification of port number a. f. UDP c.
c. None of these 131. b. d. Remote machine Sends an arbitrary file Fetches an arbitrary file All of these FTP addresses the Issues of authentication Listing of directory contents ASCII or binary files All of these Another aspect of the application layer is to __________ . None of these 132. 134. 135. telnet a. remote host to remote host d. b. News server News client Web(HTTP)-based protocol for communication on the WWW All of these FTP is among the oldest protocols used in the_____ a.this application is called Login remotely Logout Remotely None of these TCP connection with another location and then pass keystrokes from the _______ a. Internet b. 133. a. Web c. To identify the destination machine c. b. c.d. d. Both a & b . To identify the source machine b. The basic functions of application layer are _____________ that wish to communicate with one another a. d. c. Local host to Local host 136. 137. d. b. Both a & b d. there are many other applications such as NNTP enabling communication between a ___________ a. Local host to remote host c. Remote host to local host b. The Internet has definite standards for FTP that connects to a a. c. Similarly.
c. FTP is widely available on almost all-browsers indicating that all computing platforms. c. 142. 143. SMTP TCP FTP NNTP 139. d. e. c. 141. b. DOS b. All of these 140. including _________ a. b. c. None of these 138. d. a. Which is a file server access protocol that enables a user to transfer files between two hosts a. a. Which dose not require any familiarity with the remote operating system a. b. a. d.d. d. e. OS/2 c. Which is invoked for the entire duration of transfer of file or FTP session Control connection Data connection Both a & b None of these Modern FTP servers known as _______ TCPD FTPD SMTD CTPD FTPD support two different TCP connections namely_______ Control connection Data connection Both a & b None of these SMTP TCP FTP NNTP . b. UNIX and up to the mainframe level have this service available d. b. d. c.
h. 146. c. b. d. c. Which connection is establish as and when it is required Control connection Data connection Both a & b None of these e. a. TFTP FTP Both a & b None of these TFTP does not provide _____________ Password protection User directory capability Both a & b None of these TFTP is simpler than the ___________ but less capable FTP SMTP NNTP FTPD Which is one of the most popular network services . Clients at the server’s request Clients at the client’s request Server at the server’s request Server at the client’s request TFTP stands for Transfer file trivial protocol Transfer file transfer protocol Trivial file trivial protocol Trivial file transfer protocol 147. The main function of data connection is to facilitate transfer of file and directory to and from the________ e. e. g. b. 148. Which is also an internet service intended for the transfer of files from one computer to another over a network a. d. b. f. 145. 150. 149. c. a. g. h. b.144. a. d. c. f. d.
The MTA has to perform more complex jobs than other applications a. c.a. d. c. Mailbox names b. c. d. a. e. c. b. b. Electronic message Electronic mail Electric mail None of these Electronic mail works like an Post mail Postal mail Post card None of these E-mail has two parts namely User agent Message Transfer agent Both a & b None of these MTA stands for Message Transmission Agent Machine Transfer Agent Message Transfer Agent Mobile Transfer Agent 154. d. d. b. 153. 155. c. a. files and video in a message d. 151. b. e-mail address consist of the following components a. 152. d. a. Symbolic names c. voice appending documents. MTA needs to deliver copies of a message to several machines c. b. MTA handles temporary failures when a destination machine is temporarily unavailable e. Which is a software package that transports the message created by a user to destination mailboxes possibly on remote machines a. MTA allows mixing of text. User agent MTA Both a & b None of these 156. Group names(mail exploders) . All of these In MTA. MTA distinguishes between local and remote recipients b.
c. Forward a mail message to other recipients e. b. c. which basically specifies the address of the user’s mail server All of these . E-mail address has three parts a. d. In MTA. Send and receive mail messages b. Print mail messages d. b. Reply to mail messages f. Mailbox names Symbolic names Group names(mail exploders) All of these 160. c. Some of them are free like ____________________. d.d. There are a number of e-mail packages available. while some are paid a. d. b. d. 158. a. that consults an internal database to specify the mail addresses a. All of these 157. all of them are also not alike but most of the e-mail software have common basic functionality these are a. a. Which refers to an alias for a set of recipients. Attach a file to a mail message g. c. Which is the user interface to the mail system User agent MTA Both a & b None of these Which refers to the name of a service rather than a specific user Mailbox names Symbolic names Group names(mail exploders) All of these 159. Google mail Yahoo mail Hotmail All of these 161. d. b. b. Save your messages in a file c. c. A user identity or name An ‘at’ sign(@) The domain name. All of these 162.
d.163. c. a. 164. c. d. d. b. a. b. a. FTP c. c. 165. b. c. 168. 166. c. d. d. b. which has now become a standard with its varied version a. d. a. a. 167. FTPD b. SMTP is the ________ standard for an electronic mail service provider dee facto de facto de fact none of these SMTP uses ______ transport for the reliably delivery of mail messages FTP TCP MTA FTPD The SMTP server also allows _____ NNTP Telnet service FTPD none of these SMTP can be considered as a complement of ______ UUDP UUCP UCCP UCPD SMTP commands consist of human-readable __________ EBCDIC strings ASCII strings Both a & b None of these MIME stands for Multipurpose Internet Machine Extensions Multiprogramming Internet Machine Extensions Multipurpose Internet Mail Extensions Multipurpose Internet Mail Exchange 169. MIME . b. c. b. ________ standards were used to encode binary files for transfer through SMTP. a.
b. g. h. Telnet works as a _____________ model where it establishes a virtual connection by using the TCP transport protocol a. d.d. h. e. b. c. POP3 stands for Postal Office Protocol Post Office Protocol Post Office Program Posting of Protocol IMAP stands for Internet Machine Access Protocol Internet Message Access Protocol Internet Multipurpose Access Protocol Inkjet Message Access Protocol Which one is a push kind of protocol SMTP POP3 IMAP All of these Which one is a pull kind of protocol SMTP POP3 IMAP Both b & c Telnet can also be used to connect other ports serving as _____________ User-defined services Well-known services Both a & b None of these 175. UUCP e. b. 172. User-defined Well-known Client-server All of these . a. d. c. b. a. d. g. c. 174. c. d. f. 170. a. 171. f. e. 173.
Client type Server type Both a & b None of these Novell NetWare uses a protocol stack having _____ a. The Telnet program requires two arguments The name of a computer on which the server runs The protocol port number of the server Both a & b None of these ______________ to support centralized terminal management can support Transfer binary data Support byte macros Emulate graphics terminals Convey information All of these 178. h. e. 177. 3 layers b. h. 179. f. 4 layers . Novell NetWare is a ___________ network operating system that was created by Novell.e. 181. i. 176. g. b. b. Telnet service is unique in the manner that is ___________ like other TCP/IP services a. d. f. c. g. Platform-specific Not platform-specific Platform-service None of these 0Some of the Telnet commands are as follows Interrupt Process(IP) Abort output(AO) Are You there(AYT) It terminates the running program It refers to discarding of any buffered output This command allows a client to send an out-of-band query to verify whether the remote end is still there Erase character(EC) It refers to the erasing of the previous character Erase line(EL) It deletes the entire current line Synchronize It clears the data path to the remote party Break It is equivalent to the BREAK or ATTENTION key 180. e. d. Inc a. c.
b.x namely are a. d. Both a & b d. 16-bit 32-bit 64-bit 128-bit 187. d. b. NLM(NetWare Loadable Module) b. Which managed all functions and was activated at startup or at the time of requirement a. Intel 80. c. 6 layers 182. c. IPX stands for Internet Packet Exchange Inter-network Packet Exchange Inter-network Protocol Exchange Internet Package Exchange 183.0a b.x. b. _______ is a networking protocol used by the Novell NetWare operating systems for performing connectionless communication a. b. c. Two methods of operation were supported by NetWare 286 2. c. NetWare 286 2. assistance for _____ protected mode was included. removing the 16MB memory limit of NetWare 286 a. d. Dedicated Non-dedicated Both a & b None of these e. FTPD 188. 186. d. 5 layers d. The rise 1985 saw the rise of Novell NetWare when _____________ were launched a. FTP c. SMTP d.c. A set of protocols used in the communication network can be termed as . None of these 185. Beginning with NetWare 3. NVT IPX IP FTP 184.286 16-bit processor c. a.
When data travels downwards from upper the layer in TCP/IP. c. 193. 189. e. c.a. Netware directory service were added to the Netware version 4 1993 1996 1998 2001 Stripping in Stripping off Tackling off Tackling in . c. 192. Protocol Protocol stack Protocol layer None of these According to RFC 1122 the TCP/IP consists of ________ 2 layers 3 layers 4 layers 5 layers The lowest layers of the TCP/IP establishes communication with Upper layer Physical media Next layer Protocol 191. d. b. b. a. d. d. In which year. a. d. e. c. d. Footer Header Standard None of these e. e. b. c. 190. a. After the transmission of data in bit form to another machine it travels upward. b. b. ____________ the header till data reaches the application layer a. d. c. b. each upper layer attaches a a.
b. a. In which year. NetWare5 was launched in October 1993 1996 1998 2001 In which year. b. a. c. 195. Which is a remote terminal protocol that enables a user at one location to establish a TCP connection with another location a. b. FTPD FTP Telnet PPP . 197. a. d. d. 196. c. d. Version 4. d. b. d. across the network or Internet using TCP a. a. Which is a file server access protocol that enables a user to transfer file between two hosts.194. c. b. c. e. d. c. b. FTPD FTP Telnet PPP 199. NetWare6 was launched 1993 1996 1998 2001 Every protocol with a certain from of contact is known as Protocol stack Protocol suite Stack Suite 198.11 was launched by Novell 1993 1996 1998 2001 In which year. c.
Which protocol is used by network computers operating system for sending error messages .200.
e. FTPD FTP Telnet ICMP d. d. 5. 368. c. 364. a. c. 370. 366. The characteristics of the Thick Ethernet cable are 380. d. Cable supports a max distance of 500meters 382.5Km 383. Max distance covered by a network using Thick Ethernet is 2. None of these 390. Blue hose 387. b. b. d. Data Link layer c. b. None of these 3. a. Transceiver 395. 365. All of these 385. Which protocol was based on the specification called the Ethernet a. a. MAC(Medium Access Control)sub layer is between the a. 373. a. a. Repeater 397. b. Twisted pair cable 392. d. A 10 Mbps cable is like a 386. b. All stations in a Thick Ethernet is connected to a 391. Both a & b d. Physical layer b. CSMA/CD 394. CSMA/CD c. Coaxial cable 393. Black hose 389. 4. All of these 379. Star LAN(10baseT) 377. Yellow hose 388. 369.3 b. None of these 361. Segments 399. Transceiver 398.a. Both a & b d. None of these 2. 362. c. Depending on the transmission media used. 363. 367. b. Optical Fibre CSMA/CD LAN (10baseF) 378. e. d. IEEE 802. the Ethernet can be classified into following categories are 374. Data Communication And Networks 05 1. d. 7. c. 6. Thick Ethernet or 10base5 375. Max no of stations supported by the Ethernet is 1024 384. 372. Groups . Provides connectivity to max of 1024 stations 381. c. Cheaper Net or Thin Net(10base2) 376. A group of stations connected to a cable forms a 396. c. 371.
c. a. 2 413. Repeater 434. Both a & b 421. All of these 432. Groups 410. Medium access 425. Station interface 429. c. Data packet generator 430. Each cable is connected to a Ethernet cable through a 406. which in turn is connected to the transmission cable through a 433. Preamble-7byte 439. b. Source address-6byte 442. Segments 436. Transceiver 408. The computer or station is connected to a Ethernet card. The functions performed by logical layer are 422. d. A repeater consists of _______ transceiver 411. a. b. Segments 409. c. d. Ethernet card consists of 428. d. Segments 404. b. Encoding the data 418. c. a. 1 412. Both a & b 426. which are separated by a long distance 401. d. e. 13. 11. . c. a. Destination address-6byte 441. Repeater 407. a. b. Link management 424. d. Repeater 402. 15. b. A link management unit 431. c. Groups 405. d. c. b. Medium access 419. The functions performed by physical layer are 417. 14. c. b. 4 415. a. d. d. e. Data encapsulation 420. e. Length-2byte 443. a. Information field-46to 1500bytes 400. 416.8.3 Ethernet frame format are 438. a. 12. 3 414. f. Which device is used to link two network segments. The IEEE802. The output of a Ethernet card is connected to the data encoder/decoder. Data encapsulation 423. 9. b. 427. Start of frame-1byte 440. Transceiver 435. Groups 437. 10. Transceiver 403.
A token ring is a ring topology created by IBM in 484. a. Low loss of power 474. c. g. Less weight 476. a. e. 445. d.g. Good immunity to the electromagnetic interference 473. All of these 459. None of these 464. Frame check sequencer-4byte h. Each group of stations is connected to a local hub 469. a. b. 22. f. c. The third variation of IEEE802. The hubs are connected in the form of tree 470. b. High transmission security 477. The local area networks that do not require the capabilities of complete Ethernet system. 444. All of these 478. Cable diameter is 0. It operates data rate up to 1Mbps 466. 19.5meters 456. Star LAN 449. c. b. c. d. d.25inches 457. d. Both a & b 482. e. c. .3 standard committee has created a new standard called 447. None of these 483. BNC-T-connector is used to connect cables and N-series connector 458. Max stations per network is 1024 455. Twisted pair cable already used in telephone lines for transmission media 468. d. f. d. b. 21. the IEEE802. 17. Coaxial cable version of Ethernet 480.3 standard was a 460. a. None of these 451. a. 1970 487. The optical fibre version of CSMA/CD LAN has a no of advantage than the 479. All of these 471. b. All of these 16. Thin net 448. Max no of nodes is 30 454. Twisted cable version of Ethernet 481. c. a. 18. Star LAN 462. f. e. Node spacing is 0. c. e. The characteristics of Star LAN are 465. Optical fibre CSMA/CD 450. 1990 486. Max distance is up to 200meters 453. a. Optical fibre CSMA/CD 463. The characteristics of optical fibre CSMA/CD LAN are 472. The characteristics of thin net or cheaper net is 452. d. 1960 485. Thin net 461. The configuration contains up to 5 upward levels of hubs 467. b. b. High bandwidth 475. 446. 1980 488. 20.
30. None of these 515. CSAU 497. Both a & b 519. CSAU 508. SSAU 509. Preamble 529. 4Mbps 517. 506. c.23. 491. None of these 526. 29. 493. Both a & b 525. Token Ring d. 494. a. 28. d. b. a. b. b. 1Gbps 524. a. The advantage of Token ring mechanism is 500. Network administrator Upstream Neighbour 514. 100Mbps 523. MSAU(Multi Station Access Unit ) 507. 25. c. d. Which uses electromechanical relays to make the physical star into a logical ring 505. Network Active Upstream Neighbour 513. b. 528. e. 16Mbps 518. c. A stream of data is called a a. g. Source Address 533. e. Frame c. a. MSAU(Multi Station Access Unit ) 496. b. e. c. Start Delimiter 530. 492. Token b. NAUN stands for 511. None of these 504. d. Ensures delivery of frame 502. d. d. Nearest Active Upstream Neighbour 512. b. SSAU 498. None of these 499. a. 27. 26. None of these 510. Destination Address 532. . a. Date 489. 490. a. c. None of these 24. c. None of these 520. It prevents collision by ensuring that only one station at a time is transmitting 501. A central hub called _______ is used to connect each station in a star type of topology 495. c. 521. Frame Control 531. b. f. d. Both a & b 503. High-Speed Token Ring(HSTR) technology is also available with speed of 522. The frame format of a token ring in a ring topology is 527. IBM token ring products were available with speeds of 516. d.
546. 535. 544. 569. 541. 543. Multi programming c. signal speed of this media is a. 537. None of these 35. 542. Listen mode b. 6Mbps c. stations are connected to a a. Physical ring b. 2 c. 1Mbps b. None of these 34. None of these 37. Both a & b d. 558. FCS i. 562.h. 553. Bottom b. 563. 552. All of these 31. 551. The MAC sub layer is on the____ of the physical layer a. 572. d. Top d. 549. 573. 545. Frame status k. 7-byte 577. 8Mbps d. None of these 32. 567. a. Logical ring c. Both a & b d. Mid c. None of these 38. End Delimiter j. 561. 4 33. Manchester b. 16Mbps 36. 5-byte 576. 568. 556. 554. 4Mbps c. 3-byte 575. . 539. 566. 559. IBM released a token ring version that can operate at a speed of ______ a. 571. How many modes a ring interface can operate a. 570. A ring interface can operate different modes a. Both a & b d. 555. When there is no traffic on the ring______ token circulates continuously until some station grabs it 574. Talk mode c. 557. 540. 565. 4Mbps b. 564. 39. In a token ring . Differential_______ encoding schema is used for encoding the digital data a. In physical layer of token ring . The length of the frame_________________ 534. 9-byte 578. 1 b. b. 547. Multi processor d. 3 d. 550. 548. 536. 538. 560. c.
All of these 43. 618. All of these 44. 580. Fibre Distributed Data Incorporation b. 613. 588. None of these e. The FDDI network is based on the a. High-speed b. Access control c. 598. 604. 623. Short b. 606. Both a & b d. Fibre Distributed Data Interface d. All of these 42. 591. 603. 612. The token ring management activities are a. 609. Orphan frames e. Lost tokens e. 583. 581. May be long or short d. Token time b. 614. 610. 584. The stations crashed after transmitting a short frame form a. Ring initialization d. 600. 607. 587. Lost tokens d. The characteristics of FDDI network are . Ring initialization c. 596. Frame control d. None of these 40. 615. Fibre Distributed Data Institute c. 582. 595. 616. 589. 605. 47. 617. Fibre Distributed Dual Incorporation 45. Logical transmission d. 608. 599. Physical transmission b. The FDDI network stands for a. b. 621. None of these 41. 624. 620. Long c. The FDDI network is a a. 597. Checksum f. 602. Monitor stations b. a. High-bandwidth c. 585. 592. 601. Token ring d. Source address and destination address e. None of these 46. The maximum time a station is permitted to hold the token is known as________ a.5 token frame format are a. 590. Token holding time c. The IEEE802. 594. Orphan frames f. Start of frame and end of frame b. Monitor stations c. 611. 593. Optical transmission c.579. 622. 586. 619.
a. None of these 625. e. 52. 629. j. a. c. It was designed to run through fibre cables or copper media g. 631. 627. 658. 48. PMD 666. The FDDI considered as a _______ of IEEE802. 1989 652. Successor 655. Predecessor 654. 632. The ANSI began working on the FDDI-standard in 638. It helps and support extend the capabilities of older LANs . Easier to maintain 635. Compatible to standard-based components and various operating systems 636. d. 1983 645. 626. 1986 647. The FDDI specification was released in 643. b. Physical layer 660. None of these 663. All of these 637.5standard 653. 50. c. c. b. a. PHY 667. i. The most key elements of FDDI was defined in 648. a. It was based on ring topology with token passing h. 51. It can support up to 500stations on a single network c. It provides a reliable infrastructure for businesses . 1986 649. b.moving even missioncritical applications to networks 634. c. 1982 641. such as Ethernet and token ring 633. d. k. l. 1980 639. 1981 640. Rapid transfer of large amount of data e. 628. b. 664. e. 53. Both a & b 668. c. 1982 650. FDDI network consists of two counter-rotating rings f. FDDI network comprises 2 bottom layer in ISOs OSI model namely 659. b.a. This network is used for connecting high-end computers d. Data link layer 661. 1983 642. c. a. 1985 651. d. 630. . d. a. Tool 656. d. The physical layers are 665. d. 1984 646. Both a & b 662. None of these 657. 1982 644. It transport data at a rate of 100Mbps b. b. 49.
674. 687. 707. 712. 700. 676. None of these e. 701. 672. SMF-PMD(Single Mode Fibre-PMD) . 693. which PMD is used a. Both a & b d.669. The PMD stands for a. Less than LAN d. Efficient ANTC d. Ethernet b. European ANTC b. The FDDI is a. 702. Advanced Network Test Center b. 62. For copper media . 682. For optical fibre media . Multimode fibre optic cable b. Both a & b 57. Physical Medium Distance c. Physical Media Dependent d. 695. 699. 688. The word EANTC stands for a. Token ring c. Shielded twisted-pair copper wiring e. 677. 685. Fibre PMD c. 706. Less than WAN c. 696. 711. 678. The FDDI network can easily be added to network topologies such as a. 698. Unshielded twisted-pair copper wiring d. More than LAN b. 681. Easily ANTC c. which PMD is used a. e. 710. 61. Other two significant PMD are a. 709. 690. Both a & b d. Single mode fibre optic cable c. 684. 691. 679. American National Token Center d. TP-PMD b. 714. 705. TP-PMD b. 708. None of these 56. 683. 703. 689. Physical Medium Dependent b. 673. 670. None of these e. 692. 671. Permitting Medium Dependent 60. 704. None of these 58. 713. None of these 55. All of these 59. Fibre PMD c. American National Test Center c. Both a & b d. 686. The FDDI supports four different types of cables as a. 54. 680. 675. 697. 694. The ANTC stands for a.
721. 731. 757. 200 b. Data Attachment Station 69. Dual Access Station b. 741. Single Access Station b. Network protocol d. Intensity of light g. Fibre components b. 753. All of these 67. 725. 724. 738. Data link layer protocol b. 755. 68. All of these 65. 62. 760. Attenuation and bandwidth c. None of these 63. 720. 737. 1800 e. 500 c. 759. 718.715.5/125 b. 734. The max number of PHYs pre FDDI are a. 1000 d. 100/140 e. Dispersion of optical media e. Single Attachment Station c. 50/125 d. 743. Jitter of pulse h. The PHY are a. 736. 756. Dual Attachment Station c. Which standard is applied in the LLC(Logical Link Control) layer . 722. 728. 749. 742. 727. 729. The micrometer graded index fibre are a. 726. 744. None of these 70. 745. SAS stands for a. b. None of these 64. 723. 748. 85/125 c. 750. 733. 746. Data Access Station d.5/48 describes the physical layer that uses a. 751. The characteristics and parameters of the optical fibre cable allowed for FDDI are a. 716. 752. Both a & b d. 735. Both a & b d. Max bit error rate d. Physical layer protocol c. The DAS stands for a. None of these 66. 719. 740. 717. 747. Allowed power between two stations i. Numerical aperture(normal is 0. Wavelength of light(normal is 1300nm) b. Single Attached Station d. 754. 730. 739. The fibre PMD-ANSI X3T9. 758. 732. Optical components c. LCF-PMD(Low Cost Fibre-PMD) c.275) f.
a. 766. 767. SNAP 777. c. Protocol Device Unit 798. d. Both a & b d. Automatic Request Repeat 784. 772. Asynchronous Data traffic c. 771. 3 794. IEEE802. LLC header contains _______ additional eight-bit address fields known as service access points or SAPs to request SNAP service 791. 762. Subnetwork Access Protocol 790. Protocol Data Unit 799. b. PDU stands for 796. c. LAN media 803. d. IEEE802. 77. 1 792. Connection-oriented c. b. Automatic Repeat Request 783. a. 770. c. The MAC layer specifies how to handle a. IEEE802. Protocol Data Universal 800. LLC 779. a. None of these 73. b. the destination machine to retransmit the data known as _____________ 776. 773. ARQ stands for 781. a. IEEE802. 76.2 c. c. a. None of these 761. c. Synchronous data traffic b. Array Repeat Request 782. 74. MAC 780. MAN media 804. Both a & b d. b. Acknowledgement Repeat Request 785.5 b. 765. SNAP stands for 786. 2 793. None of these 72.3 Ethernet has become one of the most used ________ 801. Structured Access Protocol 789.4 71. d. b. Subnetwork Access Packet 788.2 standard works on ______________ modes a. d. d. 774. Connectionless b. a. d. 769. If the received data is damaged or lost. 764. IEEE802. 78. 763. b. Subnetwork Access Package 787. IEEE802. Packet Device Unit 797.a. 768. 775. ARQ 778. .6 d. 75. WAN media 802. 4 795. c.
2 809. d. DLMAC 812. Heavy coaxial cable 826. 64bytes 843. Xerox 839. e. 1960s 832. a. 128bytes 844. Fibre optic cable 828. c. c. d. 10 million bits per second 822.79. c. 1965s 835. Ethernet frames travel at the data link layer of the OSI model and must be a minimum of ________ 841. . 85. Ethernet is the ______ expensive high-speed LAN alternative 816. a. Ethernet transmits and receives data at a speed of ___________ 820. 86. a. IEEE802. Thick net 827. b. d. 20 million bits per second 824. c. 84. 1980s 834. a. None of these 819. d. Around 1984. b. 1970s 833. LAN 814.1 808. 5 million bits per second 821. Intel 838. Intel and Xerox) and IEEE created standards for Ethernet. b.3 810. a. 830. c. Data is transferred between wiring closets using either a __________ 825. a. In 1980. All of these 829. IEEE802. IEEE802. ____________ came out with a joint specification which has become the de facto standard 836. IEEE802. More 817. ARQ 813. b. b. DIX(a consortium of Digital. SNAP 815. 256bytes 805.3 807. Least 818. 15 million bits per second 823. which are popularly known as the ________ 806. a. Ethernet was first designed and installed by Xerox Corporation at its Palo Alto Research Center(PARC) in the mid _________________ 831. 80. c. 81. b. 32bytes 842. Which another group took the responsibility for developing medium access protocols 811. b. 82. 83. c. c. a. d. d. d. All of these 840. In Ethernet. b. DEC 837.
c. c. c. Frame Check Sequence 856. d. a. 1517bytes 849. d. d. Preamble (P) 860.87. a. d. c. CSMA/CA 866. Frame Check System 855. 1516bytes 848. d. _________ cable is used widely as a backbone technology 870. Token passing 867. Both a & b 879. CSMA/CD 865. 500MHz 885. Polling 868. FCS stands for 854. 89. Ethernet frames travel at the data link layer of the OSI model and must be a maximum of ________ 846. 200MHz 882. b. 1518bytes 850. TV 871. a. Small extent 845. Fibre 872. d. Frame Checksum Sequence 858. b. b. All of these 869. 875. e. None of these 880. All of these 863. Microwave 877. b. a. None of these 874. d.3 frame description of each field in ___________________ 859. 1515bytes 847. 400MHz 884. c. 300MHz 883. some of the important methods are listed below: 864. 852. a. Destination Address 862. 93. 94. a. 851. Infrared systems 878. a. The need for devising a mechanism to avoid such deadlocks. 91. e. better error performance and lack of severe distance limitation 881. Which are used to connect LANs and LAN segments in a campus environment 876. b. 90. Fibre optic cable 873. Start Frame Delimiter (SFD) 861. 88. b. 853. b. c. The advantages of coaxial cable include high bandwidth in the range of ________ and more. a. The disadvantage of coaxial cable have been mitigated to a _______ through the development of new coaxial designs 886. . Ethernet IEEE802. c. 92. Frame Cyclic Sequence 857.
A coaxial cable _______ in diameter known as thick coaxial cable is used as a transmission line 897. 15mm 900. In 10Base5(Thick Net/ Yellow Ethernet) the minimum allowable distance between transceivers is _______ 917. 5mm 898.b. 10Mbps 924. 55 metres 916. . Transmitter 905. LAN 910. 102. 97. None of these e. Which uses traditional thick baseband coaxial cable in a bus topology to connect multiple computers. 10Base stands for ___________ 923.5 metres 918. 50 metres 915. A transceiver is used to connect a ____________________ 902. 20mm 901. a. None of these 927. d. 45 metres 914. b. 96. In 10Base5(Thick Net/ Yellow Ethernet) the maximum length of this cable is ______. 3. b. 922. 99. d. 10Base5(Thin Net/Black Ethernet) 896. 10mm 899. b. d. 889. c. 890. 891. 98. this single line transmission is called a Segment 892.5 metres 920. d. b. e. 10Base2(Thin Net/Black Ethernet) 895. d. a. Either large or small d. Large extent c. d. The 5 of 10Base5 signify a maximum of _________ segment length 887. Both a & b 926. 95. c. 101. Coaxial cable 903. d. a. 888. c. Terminals 904. Baseband transmission system 925. 100. c.5 metres 919. AUI(Attachment Unit Interface) 909. a. a.5 metres 921. 40 metres 913. b. a. Both a & b 906. ALU 908. up to 100 transceivers can be connected to each segment 912. MAN 911. b. 2. c. 1. c. a. 10Base2(Thick Net/Yellow Ethernet) 893. b. c. 10Base5(Thick Net/Yellow Ethernet) 894. A transceiver cable also referred to as an __________ cable and is used to connect a transceiver and the NIC 907. 4.
105. 107. 10Base5(Thick Net/Yellow Ethernet) 940. BNC 963. 936. 109. 108. b. a. b. b. 1000 metres c. 2000 metres 104.a. c. 10Base2(Thick Net/Yellow Ethernet) 939. 500 metres b. d. b. 1500 metres d. 10Base2 signifies in the same manner as 10Base5 except 2 is signified here as _______ maximum segment length(actually 185 metres) 952. 200 metres 954. Bayonet Neil Connector 959. 550. Bayonet Neil Connection 958.metre 103. 10mm 945. a.metre b. 15mm 946. 932. b. a. 930. b. 300 metres 956. b. c. Which is used to connect a cable and terminals or terminators 962.metre d. Bayonet Neil Connectionless 960. 934. 50. 929. The 5 of 10Base5 segment may be extended up to ______ by using repeaters a. c. 935. 5000. BNC stands for 957. The thinner cable is less costly to acquire and deploy. 100 metres 953. 250 metres 955. d. c. 20 nodes 928. 933. 10 nodes 968. Cheapnet 950. T-connector 964. c. In 10Base2(Thin Net/Black Ethernet) a coaxial cable of thinner gauge of _______ in diameter 943. Both a & b 965. None of these 966. Only up to ______ per segment can be connected to a T-connector 967. a. a. c. 10Base5(Thin Net/Black Ethernet) 942. 110. . a. d. 10Base2(Thin Net/Black Ethernet) 941. Which uses thinner baseband coaxial cable in a bus topology so that multiple computers can be connected to a single transmission line 938. 5mm 944. 937. Chaplet 949. None of these 951. d. 106. a.metre c. 931. 20mm 947. d. 500. although its performance is less in terms of transmission distance because of its cost it is sometimes called ___________ 948. Bayonet Network Connection 961.
990. 998. 992. 989. 115. 975. a. 970. 972. 117. d. 116. a. c. 971.50Mbps 100Mbps 150Mbps 200Mbps 10BASET(twisted pair Ethernet) uses _______________ Cat 3 Cat 4 5 UTP All of these Ethernet Specifications 10Base5 10Base2 10BaseT Transmission speed 10Mbps 10Mbps 10Mbps Transmission Coaxial cable Coaxial cable UTP Cat 3.5 metres 1.4. b. 993. 111. b. 977.5 metre 2. Token ring 1000. c. 969. a. 978. d. d. 981. distances 987. d. 996. b.5 metre between node Repeaters/Series 4 4 4 Maximum network 2500 metre 925 metre 500 metre length 997. a. 991. 980. c. 994. 985. 982.2 metres 0.5 metres 2. b. 986. 113. 973. c. 976. b. Token bus c. c. a. d. 30 nodes 40 nodes The minimum allowable distance is ____ between consecutive connections 0. 112. 114. b. 983. 984. d. a. 979. The two general types of token passing schemes are 999. 988. 995.5 metres UTP stands for Universal Twisted Pair Unshielded Twisted Pair Universal Transmission Pair Unique Twisted Pair STP stands for System Twisted Pair Shielded Twisted Pair System Twisted Panel Subscriber Twisted Protocol UTP has been proved to perform at very high data rates _____ over short .5 medium Maximum segment 500 metre 185 metre 100 metre length Maximum 100 30 node/segment Minimum length 2. 974.
The cell is broken into the two main sections called a. Header b. 1029. None of these 125. c. 1019. Both a & b d. a. 1036. None of these 122. Both a & b d. Connection oriented service c. Voice 1012. ITU-TSS(International Telecommunication Union-Telecommunication 1016. 1038. Video transmission 1013. Payload(48bytes) c. TIU-ESS c. MAN 1006. PTU-DSS d. 1042. Which sections of cell carries the actual information(voice. 1031. 1026. 1020. All of these 1008. The ATM cell has a fixed length of a. Header(5bytes) b. 1009. 53bytes d. 1030. d. 1040. a. e. d. 120. WAN 1007. 1027. d. 1028. Which sections of cell is the addressing mechanism a. c. 1032. None of these 124. None of these . Both a & b d. 1039.1001. Both a & b 1002. 118. 1033. 1034. All of these 1014. b. 119. The DQDB supports _______ based on cell switching technology similar to Asynchronous Transfer Mode(ATM) 1010. Standardization Sector) b. 1022. Both a & b d. The ATM networks are a. None of these 121. 62bytes c. A DQDB(Distributed Queue Dual Bus) provides service over cable interface for 1004. 1035. data or video) a. 1024. Data 1011. 1041. 1018. Payload(48bytes) c. 1021. 1017. LAN 1005. 1025. a. None of these 1003. Header b. 1037. The Asynchronous Transfer Mode(ATM) is an _________ for cell relay 1015. 1023. b. c. 51bytes b. Connection-less service b. 63bytes 123. 1043. Payload c.
General Partition System c. b. b. 1056. a. GPS stands for a. a. c. a. 131. c. None of these 1068. Which frequency is used to transmit signal from the earth station to satellite 1085. d. 1055. d. c. Geostationary orbit 1071. b. 1046. Geostationary satellite 1076. Uplink frequency 1081. . MID(Message Identifier) d. Information e. Global Positioning System d. 1069. Geosynchronous orbit 1072. None of these 1084. All of these 1079. Uplink frequency 1086. b. Which satellite communication involve a satellite relay station that is launched into a geostationary. 1059. e. ST(Segment Type) c. Global Partition System b. The frame format of DQDB are a. 1048. 1060. Temporary 1065. 1051. c. High bandwidth c. 132. 130. 1062. Permanent 1067. 1050. c. 1054. High susceptibility to error d. 1052. General Positioning System 129. Fixed bandwidth distribution 127. Contemporary 1066. In case of satellite communication two different frequencies are used as carrier frequency to avoid interference b/w incoming and outgoing signals are 1080. Geosynchronous satellite 1078. 1061. 1049. The disadvantage of DQDB is to have a. a. 1047. 1053. d. 126. Both a & b 1083. Geostatic orbit 1073. geosynchronous. Geostatic satellite 1077.e. The contemporary satellite communication are called 1075. All of these 1074. a. LEN(Data Length) f. 1058. CRC(Cyclic Redundancy Check) g. The contemporary satellite communication launched into a 1070. b. 133. 1063. Downlink frequency 1087. or geostatic orbit 1064. Fluctuating data rate b. d. Header b. Broadcast 1044. 1045. All of these 128. 1057. Downlink frequency 1082.
b. 140. Satellite provides extensive error detection and correction capabilities 1107. b. e. e. Wired satellite technology 1126. Fixed assigned TDMA 1116. Uplink frequency 1098. 139. 136.000 km in each direction 1103. Very Small Access Topology 1122. 1090. TDM/TDMA 1115. d. Very Small Aperture Terminal 1123. The VSAT technology is based on the 1125. f. 141. a. 135. d. e. b. Wireless satellite technology 1127. satellite can serve a point-to-multipoint network requirement through a single uplink station and multiple downlink stations 1097. d. Time Division Multiple Access 1112. Downlink frequency 1099. Slotted ALOHA 1117. None of these 1124. The VSAT stands for 1120. Very Small Accessing Terminal 1121. c. b. Each signal travel 36. All of these 1119. a. Both a & b 1128. Time Division Multiplexing Access 1110. b. Time Division Multiple Assigning 1113. Broadcast 1094. All of these 1108. a. Time Dynamically Multiple Access 1111. a. Satellite provides increment in bandwidth 1106. The cost of satellite communication is quite high 1104. None of these 1129. Which frequency is used to transmit signal from the satellite to earth station 1091. None of these 1101. b. The most commonly used satellite access schemes are 1114. Data . c. d. a. In which manner. d. None of these 1089. c. Broadcast 1100. Uplink frequency 1092. c. e. b. Internet 1131. 134. c.1088. TDMA stands for 1109. The VSAT networks offer value added satellite based services capable of supporting the 1130. c. d. Dynamic reservation 1118. Security must be imposed through encryption 1105. None of these 1095. d. 1096. b. Downlink frequency 1093. 138. a. c. a. a. The general properties of satellite communication______________ 1102. 137. d.
d. g. 1148. e. 1141. 1154.800GHz Both a & b None of these The VSAT system operates under Ku-Band 1 frequency are 4.700GHz Both a & b None of these The Ku-band networks are commonly used in Europe and North America Asia and Africa Latin America Both a & b The C-band networks are commonly used in Europe and North America Asia and Africa Latin America Both b & c Which band of frequencies require the large VSAT antenna Ku-band C-band Both a & b None of these Which band of frequencies require the smaller VSAT antenna Ku-band C-band Both a & b . c.1132. d.500 to 4.950 to 11.025GHz 4. 145. 1140. 1138. 1144. c. 1163. 1162. c. 1159. 1142. a. 142.700to 4. d. 1168. 1155. 1135.500GHz 10. 1170. 1171. 1134. private and public network commn solutions All of these The VSAT system operates in two different bands named Ku-band C-band Both a & b None of these The VSAT system operates under C-band frequency are 5. 148. d. 1167. a. 1151. b. 1174. 1147. c. b. c. a. 1172. c.200GHz Both a & b None of these The VSAT system operates under Ext-Cband frequency are 6. 1165. 1173. 1137. 1146. 1158. d. a. 146. c. 1153. 143. 1164. c. 1139. 1161. a. 1150. 147. 1149. b. e. a. 1143. 1157.925to 6. Satellite based video Audio LAN Voice or fax communication Provide powerful. 1136. f. a. 1177. 1152. d.725 to 7. b. 1169. c. 149. d. b. 1160. 144. 1156. 1176. d. 1145. dependable. 1175. 1133.425 GHz 3. b.000 to 14. e. 1166. a. b. b.
152. b. d. 151. c. 1185. 1218. c. 1222. b. d. 1198. d. 1202. d. b. 1179. 1217. d. a. 1207. a. c. 1221. up converter High-power amplifier All of these The IF and base-band equipment consists of IF combiner/divider Modulator and demodulator Customer equipment interface Processing equipments All of these The customer equipment interface unit provides the interface to the Customer host equipment Protocol emulation Both a & b None of these The remote earth station of VSAT comprises of Outdoor unit(ODU) Indoor unit(IDU) Inter-facility link(IFL) All of these The outdoor unit is generally installed in the Ground . c. b. None of these The components of VSAT network are Master earth station Remote earth station Satellite All of these The first component-master earth station is also known as Central hub station Central satellite Backbone All of these The master earth station has a large _______ meter antenna 3 6 5 4 The hub earth station consists of Radio frequency(RF) Intermediate frequency(IF) Base-band equipment All of these The RF equipment consists of the following sub-systems are Antenna Low noise amplifier(LNA) Down converter. b. d. 1212. 1184. 156. 1203. 1223. 1206. 150. 1211. a. 1186. 1197. 1201. a. c.1178. 154. b. 1191. 1180. 1183. 1216. d. 1195. 1220. 157. e. 1187. 1214. a. 1213. 1205. 1189. b. 1190. a. a. 1208. 1200. 1193. a. d. b. 1194. 1210. 158. 1192. 1196. e. 1181. c. c. 1204. d. 1182. 1199. a. 1219. 1209. 153. 1215. 1188. e. c. 155.
160. e. Indoor unit Both a & b None of these The VSAT outdoor unit consists of Standard 1. d. 1229. b. 159. a. 1228. 1230. 1225. b. 1227. c. 1233. c. d.1224. 1231. 1226.8 meter offset feed antenna Solid-state amplifier(SSPA) Low Noise Amplifier(LNA) Feed horn All of these The indoor unit functions as a . 1232.
1234. 1236. 1237. c. 1235. a. b. Amplifier Modem PCs None of these . d.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.