P. 1
Transmission MCQs

Transmission MCQs

|Views: 109|Likes:
Published by anser123459
transmission mcq
transmission mcq

More info:

Categories:Types, Research
Published by: anser123459 on Dec 16, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/27/2015

pdf

text

original

T305a- Finals MCQ Final 2009 (24 Questions) 1. Which layer is immediately below the Network layer? a. Physical b.

Network c. Transport d. data link layer

Page 1 of 27
Nice Hint: OSI layers 1. all-application 2. people-presentation 3. should-session 4. try-transport 5. new-network 6. Diet -data link 7. Pepsi-physical

2. The communication protocol which is used to achieve communication between agents and managers is ___________. a. TCP b. FTP c. CCNP d. CMIP 3. For simplifying network management, the ITU standards have divided the management domain into __________ layers. a. Two b. Three c. Four d. Five 4. ___________ is that part of a network element which provides a home within the telecommunication system for the agent that will manage the network element. a. Reference function block b. Mediation function block c. Q adaptor function block d. Network element function block 5. The tree arrangement in the figure below shows how timing is distributed from the primary reference clock (PRC) to a series of slave clocks. This is an example of ____________.

a. Inter-station synchronization c. Ultra-station synchronization

b. Intra-station synchronization d. Multi-station synchronization

6. One second period that contains 30% or more of errored blocks is called ________. a. Highly errored second b. Severely errored second c. Large errored second d. Huge errored second 7. The main role of the ____________ is to determine whether a request from the PC’s operating system is for local or remote resource. a. NetBIOS b. TCP/IP protocol stack c. Server Message Block d. Redirector 8. In network environment, providing a reliable service is the main concern of _____________. a. Internet protocol b. Transmission control protocol c. Universal datagram protocol d. Ethernet protocol 9. Which of the following is the error-detection and correction method? a. Parity b. Hamming code c. Checksum checking d. Cyclic redundancy checking 10. Which type of error detection uses binary division? a. Parity b. Longitudinal redundancy checking c. Checksum checking d. Cyclic redundancy checking 11. The solution to the problem of scalability of the Internet is to break the network down into manageable parts, or domains each called ____________. a. Router b.Autonomous system c.Interface d.Bridge

T305a- Finals MCQ

Page 2 of 27

12. for a CSMA/CD network, twice the propagation time between the two most distant stations is called _________________. a. Transfer time b.slot time c. Round trip delay time d.Both b and c 13. When a network interface has a failure in its circuitry, it sends a continuous stream of frames causing the Ethernet LAN to enter a Collapse state. This condition is known as __________. a. Scattering b.Jabbering c.Blocking d.Refreshing 14. In an object-oriented model, when different classes have operations with the same name but different implementation, they are having the property of ___________. a. Inheritance b.Association c.Polymorphism d.Aggregation 15. Ethernet, point to point protocols are examples of protocols that are used in ____________________. a. Application layer of OSI reference model b.Presentation layer of OSI reference model c. Session layer of OSI reference model d.Data link layer of OSI reference model

16. Session control, file and printer are three categories of messages which pass requests and acknowledgements in a client-server platform. They are used by __________________. a. SMB protocol b.TCP/IP protocol c.Ethernet protocol d.CSMA/CD protocol 17. ____________________ is a technique which transforms an analogue telephone circuit into a digital signal, and involves three consecutive processes: sampling, quantization and encoding. a. Pulse Code Modulation (PCM) b.Frequency Modulation (FM) c.Amplitude Modulation (AM) d.Phase Modulation (PM) 18. The frame alignment word is a sequence of bits that allows the start of each STM-1 frame to be clearly identified within SDH network. It is contained within _________________. a. Regenerator section overhead b.Multiplex section overhead c. Synchronous section overhead d.Sequence section overhead 19. the failure density function, f (t) is used to give the probability of failure during an interval of time. It is known as ______________. a. Cumulative probability distribution b.Probability density distribution c. Cumulative density distribution d. Normal probability distribution 20. _______________ is one of the Telecommunication management network (TMN) functional blocks that will convert TMN information into a format that can be easily understood by the user. a. Operations system function block b.Workstation function block c. Reference function block d..Network element function block

21. In Telecommunication management Network (TMN) system, the role of the manager is to issue commands and requests to the agent. These commands and requests are known as ________________. a. Notifications b.Feedbacks c.Operations d.Acknowledgements 22. The sequence of the binary digits representing the outcomes of parity checks in Hamming codes is known as _________________. a. Look-up entry b.Hamming distance c.Radix d.Syndrome 23. Rather than sending the absolute value of each sample, it is possible to achieve a smaller transmission bit-rate by sending the difference between consecutive samples. This is known as _______________.

Adaptive delta modulation Page 3 of 27 b. a _________ is used in a star topology. there is considerable correlation between neighboring areas that is a high degree of redundancy in the data to compress. a) simple mail transfer b)connection-oriented c)connectionless d)point-to-point . The individual window objects are said to be ___________ of the window class. a) transport layer b)network layer c)data link layer d)physical layer 9. a) square waves b)sine waves c) sawtooth waves d)triangular waves 2. For example. Random compression Final 2008 (20 questions) 1. a) border gateway protocol (BGP) b)interior gateway protocol (IGP) b) internet protocol d )autonomous system protocol 4. A class is a collection of same-type objects. The equation that represents the cosine waveform is: a) y = 2 cos 1000 π t b) y = 2 cos 2000 π t c) y = 2 cos 3000 π t d) y = 2 cos 4000 π t 3. The routing of packets among nodes within an autonomous system is carried out by the routers using a protocol called _______________. a) subclasses b)parent classes c)super-classes d)instances 7. a) bridge b)hub c)repeater d)carrier sense 5. frequencies and phases. In order to avoid spread data too widely across a LAN. This type of compression is known as _____________.T305a. One of the compression techniques in communication uses the fact that in most pictures. Dynamic compression d.Finals MCQ a. Fourier theorem states that any periodic signal can be thought of as a sum of a number of ______________ of different amplitudes. This device directs traffic by acting intelligently upon address information contained within the header of every packet it receives. a) Signal sequence diagrams b)State transition tables c)State transition diagrams d)Models 6. ___________ or block-diagram equivalent circuits are used throughout engineering to represent the behavior and structure of systems. An object contains a collection of data items relating to a particular component of the system called ____________. a.Differential PCM 24. Temporal compression b. The ___________ of the OSI reference model is concerned with the transmission of the raw bit-stream and will have to deal with all necessary interfacing to send and receive that bit-stream over the physical medium. a) operations b)attributes c)services d)methods 8. a model of a graphical user interface will contain several different ‘window’ objects. Spatial compression c.Delta–sigma modulation d. User datagram protocol (UDP) is a _____________ protocol for use with applications that do not need sequencing and flow control.Delta modulation c.

encoding and justification d)quantization. and line coding . a) efficiency b)memory c)probability d)entropy 18.Finals MCQ Page 4 of 27 10. channel. All functions carried out by the network element must be presented to the agent using object descriptions as defined by managed objects. The agent is ______________ which can handle many objects in a particular network element. or ideal. quantization and encoding c) sampling. _______________ is a term used to describe the phase variation (in the time domain) of a digital signal from its normal. a) plesiochronous b)sunchronization c)quantization d)justification 12. This is independent of how symbols from the source are coded. A code word can be translated as soon as it arrives so we say that the code is __________________. and line coding c)error. and involves three consecutive processes called __________________. a) variable length code b)uniquely decodable c) instantaneously decodable d)efficient code 19. Once in service. is handled by a process called _____________ which can add extra bits to match the bit-rate of each tributary to the aggregate bit-rate. The ___________ is a characteristic of the source. quantization and justification b)sampling. In PDH the variation in timing. all the stages that are necessary in deciding where. The _______________ is the probability that a component will survive to time t . the responsibility falls to the ___________ to monitor network elements to detect alarms and other performance indicators defined in the information model. In managing SDH networks. when and how a ring should be installed can be classed as _____________ process. and error coding b)message. a)message. The capability to manage telecommunication equipment from many different manufacturers is very important to TMN a) a managed object b)an open system c)a manager d)a network element 17. a) configuration manager b)accounting manager c)Security manager d)performance manager 16. a) managing b)performance c)planning d)configuration 15. There are three main types of coding used in digital telecommunications called ________________. a) failure function b)reliability function c)failure density function d)reliability density function 14. between the tributaries. error.T305a. channel. The pulse code modulation PCM is a technique which transforms an analogue telephone circuit into a digital signal. and line coding d)message. representing the average amount of information it provides. encoding and justification 11. a) sampling. channel. time position a) Wander b)Buffer c)Jitter d)Reference signal 13.

Sequence section overhead . try-transport d. It is best with small frames d. Longitudinal redundancy checking c. Receive an acknowledgment c.Sequence section overhead 18. session layer of OSI reference model d. Transport 4. It is contained within _________________. Either a or b d.Finals MCQ Page 5 of 27 Final 2007 (30 questions) 2. a. It is contained within _________________.receiver d. The IEEE 802. Converting data into signals by transforming and encoding the information to produce electromagnetic signals is the functionality of a ___________. Which of the following is the simplest error-detection method? a.destination 4. presentation layer of OSI reference model c.Multiplex section overhead c. It is complex c. source b. Either a or b d. Retransmission c. Application 5. data link layer of OSI reference model Note: here are two question repeated in 2009 + 2007 with different answer.UDP protocol 15. Diet -data link 7. new-network 6. all-application a. Parity b.application layer of OSI reference model b. FTP. Point-to-point b. a. Telnet. a. Multipoint c. Which layer is immediately below the data link layer? 1. Checksum checking d. The frame alignment word is a sequence of bits that allows the start of each STM-1 frame to be clearly identified within SDH network. SMTP. Neither a nor b 7. What does flow control determine? a. Both a and b d.Synchronous section overhead d. Detection-error coding d. Cyclic redundancy checking 9. HTTP are examples of protocols that are used in ____________________. When a device can transmit b. Send an acknowledgment b. An example of one implementation of medium access control is _______________. Simplex b.IP protocol d. Network 3. 18.3 specification divides the data link layer into two sub-layers: the Logical link control sub-layer and the medium access control sub-layer. What must a sender do before a receiver’s sliding windows buffer can expand? a. Synchronous section overhead d. The frame alignment word is a sequence of bits that allows the start of each STM-1 frame to be clearly identified within SDH network. most probably Synchronous section overhead is correct. DNS. TCP protocol b. Whether a device is connection oriented or connectionless c. Pepsi-physical 3.CSMA/CD protocol c. It is simple b. Which of the following is also called forward error correction? a. should-session c. Which of the following describes stop-and-wait flow control? a.Multiplex section overhead c. Neither a nor b Nice Hint: OSI layers 1. Error-correction coding 13. Physical 2. Neither a nor b 6.T305a.Regenerator section overhead b.transmitter c. a. It is best over long distances 5. people-presentation b. Regenerator section overhead b. Controlled access line discipline is used with which type of circuit? a. a.

Ultra-station synchronization 20. quantization noise c. a. a. correction-error Final 2006 (30 questions) 1) The solution to the problem of of the Internet is to break the network down into manageable parts. or domains each called Autonomous System. The error represented by the difference between the original and quantized signals set a fundamental limitation to the performance of PCM systems known as __________________. a.Run-length encoding d.Delta Modulation.Huffman encoding c. Reversible or lossless coding is a type of coding for which the exact data can be recovered after decoding. The figure below shows an example of a modulation system used in digital communication. This is an example of ___________________. What is that modulation system? a. The electron beam in the cathode ray tube (CRT) inside the TV set is made to scan the whole visible surface of the screen in a zigzag pattern.frame d. c.SONET 26. b.Finals MCQ Page 6 of 27 19.Multi-station synchronization ____________ is the standard defined by the American National Standard Authority.STM-1 c. PCM encoding b. This is known as ____________. The Star arrangement in the figure below shows how it is used to distribute the timing source within a telecommunication station in SDH network. a. a. PCM Modulation. raster b.Differential Modulation. ANSI T1 for synchronous operation used in North America. Sigma Modulation. This type of coding is used by _________________. detection-error d.broadcast 27. b.Inter-station synchronization d.picture line c. Intra-station synchronization c.Both b and c 30. . d.ADM d.DXC b. dynamic range b. 29.T305a.

a)IGP b) BGP c)EGP d)PGP 4) In an object-oriented model. main fields that are defined inside a) a TCP segment b) an IP segment c) an Ethernet segment d)a MAC segment 7) In an attempt to improve the email service. and failure function. a) bit-interleaving b) byte-interleaving c)octet-interleaving d) word-interleaving 15) The reliability function. the manager commands are known as a) operations b) feedbacks c) notifications d) acknowledges 20) For a communication system. and sequence and acknowledge numbers are . providing a reliable service is the main concern of a) internet protocol b) transmission control protocol c) universal datagram protocol D)Ethernet protocol 10) A key principle for digital transmission is a) serial synchronization c) frame synchronization b) d) _. R (t ). routers using a protocol called a)IGP b)BGP c)EGP d)PGP 3) Routing between Autonomous Systems uses a different protocol called a _.T305a. one special type of relationship that exists between objects is when one object is part of another. extension for SMTP. the number of symbols used in the code alphabet is known as a) radix b) dot c) dash d) code word . This protocol is known as a) ESMTP b) MIME c) MOME d) MITP 8) In network environment. This is called . a) multiplicity b)aggregation c) containment d) both b and c 6) Source and destination port numbers. a) probability density distribution b) cumulative probability distribution c) cumulative density distribution d) normal probability distribution 16) is that part of a network element which provides a home within the telecommunication system for the agent that will manage the network element. frequency synchronization multiplexing synchronization _. a) Q adaptor function block b) Mediation function block c) Reference function block d) Network element function block 18) In telecommunication management network (TMN) system. a new protocol has been proposed as an . 11) The figure below is an example of a time division multiplexing process that is based on . Q (t ) that give the probability of something happening up to specified time are known as .Finals MCQ a) high cost Page 7 of 27 b) scalability c) interfaces d) different protocols 2) The routing of packets among nodes within Autonomous System is carried out by the . the agent replies to _.

Run-length encoding d.Hamming encoding b. a) Asynchronous b) Synchronous c) Full duplex 28) A point-to-point circuit can be a) half-duplex b) . the failure of the reconstructed signal to follow the original .Both b and c 2. a) Shannon’s first theorem b) Shannon’s second theorem c) Shannon’s third theorem d) Shannon’s fourth theorem Page 8 of 27 22) In a communication system.Huffman encoding c. c) either a or b d) full-duplex d) neither a nor b 29) At a) physical layer.T305a.The minimum sampling rate is called? a. a) to identify which application is used b) to identify performance and speed c) to provide control information on how to handle data/packets d) to show the user the order of responsibility of each layer 24) a) is used to ensure that the sender does not overwhelm the receiver.Which layer of the OSI model is responsible for the routing of packets in a network? a.Symbol rate c. a) none b) 1 c) 50 d) 27) data link protocol uses start and stop bits. one is known as a) falling construction b)falling slope c)overload failure d) slope overload 23) The main reason for adding headers in each layer of OSI model is .Physical layer c. Data control b) Send control c) Receive control d) Flow control acknowledgments medium dependable Simplex 25) For a message of 50 frames using stop-and-wait flow control.Data link layer 3.Which of the following is a reversible or lossless compression technique? a.Nyquist rate d. b) data link c) network d) application 30) A sender must before a sender’s sliding windows buffer can expand.Finals MCQ 21) The Shannon’s noiseless coding theorem is based on _.Bit rate . a) send an acknowledgment b) receive an acknowledgment c) either a or b d) neither a nor 1.Network layer b.Data rate b. physical addressing occur.Transport layer d. would be returned to the sender.

None of the above 11.MPEG stands for _________.Radix 3 c. so a binary code has radix __________.Hamming length 8.The frequency of occurrence of an event may be expressed as a fraction of the total number of events.The maximum signaling rate which can be transmitted along a channel is numerically equal to ______________.None of the above 10.The cchannel bit-rate c. a.The number of digits by which any two binary sequences differ is called the _______.Three times channel 5. a.Finals MCQ Page 9 of 27 4. a.Checksum checking c.Moving Picture Expert Group c.Rectangular code b.None of the above 6.Radix 4 d. a.The number of symbols in the code alphabet is known as the radix of the code.Session layer of the OSI model d. the Logical link control sub-layer and the medium access control sub-layer.The IEEE 802.Radix 2 b. a. a.Hamming distance c.Relative frequency c.CSMA/CA protocol d.Hamming weight b.Multi Picture Expert Group b. An example of one implementation of medium access control is __________.Hamming code d.Date link layer of the OSI model 9.Physical layer of the OSI model c.The channel bandwidth d.Twice the channel bandwidth b.Ethernet protocol c.UDP protocol b.Conditional probability d.CMP protocol . a.Frequency reference b. into two sub-layers.T305a.11 WLAN specification divides the data link layer.Motion Picture Expert Group d.Hamming code d.Network layer of the OSI model b. This is called a _________.Which of the following is not a part of the channel coding? a.Huffman code 7.The ___________ is concerned with the transmission of the raw bit-stream.

Notification b. This technique is known as ____________.A technique used is speech coding to achieve a smaller dynamic range in quantization levels sends only the difference between consecutive samples. a.Delta modulation c.Information management d.Random delta modulation d. a.SDH uses ___________ to measure block errors.Rectangular code c.On. a.Common management information protocol c.Simple parity check 13The management carried out by a TMN is called ___________.Instruction c.CMIP in TMN stands for: a.Remote management c.None of the above .Operations d.Communication management information protocol b.The way the agent sends information to the manager in a TMN is via ________.Telecommunication management b.Common management interface protocol d.off keying 15.Finals MCQ Page 10 of 27 12.None of the above 16.What is that modulation used in system in the figure a below? abcd- Direct Modulation Delta Modulation DPCM Modulation On-Off Modulation 17.None of the above 14. a.CRC b.PCM modulation b.Bit-interleaved parity (BIP) d.T305a.

VC-12 Question3 In Telecommunication management Network (TMN) system. None of the above Question 2 The _____________ occupies all the payload area (9x261) plus row four of the overhead in STM1. AU-4 b. Choose one answer. This type of compression is known as ____________. Choose one answer. Composition c. notifications b.T305a. a. TU d.Temporal compression b.Random compression Question 1 A has-a relationship is implemented via : Choose one answer. a.Dynamic compression c. All of the above d. VC-4 c. operations d.Spatial compression d. feedbacks c. Inheritance b. a. a. the role of the manager is to issue commands and requests to the agent.One of the compression techniques in MPEG uses the fact that in most pictures. acknowledgements . there is considerable correlation between consecutive frames.Finals MCQ Page 11 of 27 18. These commands and requests are known as ________________.

a. What is the time interval between byte slips? Choose one answer. 8 * 80 = 640 bit/s d. 155. 8 / 8 = 1 kbit/s c. Environment d. 8 * 84 = 32 kbit/s Question 6 __________________ is the external world of the system Choose one answer.52*106/1011=0. Question 5 In PCM. as shown in the figure below. Hence the bit-rate for one encoded speech signal is : Choose one answer. none of the answers is correctly calculated as 155.52 Mbit/s link connects two networks.52*106=643 seconds b. and the sampling rate is 8KHz. 8 * 8000 = 64 kbit/s b. A variation of 10-11 will result in a bit slip in every 1011 bits. or 8000 times per second.Finals MCQ Page 12 of 27 Question 4 A 155.T305a. Signal c. Instance . A variation of 10-11 will result in a bit slip in every 1011 bits. a. 155.0015552 seconds c. The timing of the received STM1 varies by 10-11 from the clock in the adjacent network. 155.52 *106 bits received in 1 second. 1011/155. 8 bits are used to encode each sample.52 *106 bits are received in 1 minute and not 1 second. Process b.52 *106 bits received in 1 second. a.

a. pointers . Slot time d. Choose one answer. overhead c. it immediately stops transmission of the frame. All of the choices Question 10 General definition of slot time with repeaters is Choose one answer. d. c. Network c. a power fixed spectrum. Application Question 9 When a station detects collision. virtual containers b. a. Propagation delay + delay at repeaters b. a power density spectrum. Exponential b. a power spectrum.T305a. It then calculates a delay using ____________________ algorithm to restart transmission. Transport d. tributary unit d. a. a. b. a power light spectrum Question 8 Which layer is immediately below the data link layer? Choose one answer. Exponential backoff c. a. Physical b. Twice the (propagation delay + delay at repeaters) Question 11 Containers in payload area of the STM-1 have extra overhead bytes added to them to become: Choose one answer. Only propagation delay c.Finals MCQ Page 13 of 27 Question 7 A continuous power spectrum is known as Choose one answer. Only delay at repeaters d.

smallest first is: a.15 b. The reliability of the individual components for two months service R(2)=0.Finals MCQ Page 14 of 27 Question 12 A quantity of 100 components all fail within one year of service. The cumulative failure also called the failure density in the first month is f(2)=0. Which statement is untrue? Choose one answer. a. 3.85 d. 1. 3 b. 2.05 Question 13 Order the following figures in terms of their total reliability. 1. 5 components failed during the first month. 1.T305a. b and c are equal . The probability of failure that one component fails within two months F(2)=0. 15 components have failed within 2 months. 3 d. 2. The probability of failure that 15 components fail within two months F(2)=0. 2 c.15 c.

T305a. forecast management Question 15 ____________________ is a term used to describe the phase variation (in the time domain) of a digital signal from its normal. or ideal. accounting management f. a. Choose one answer. a. planning management c. network management d. Choose at least one answer. a. train pulse Question 16 ________________ allows a number of signals that have a relatively small bandwidth to share a medium that has a much larger bandwidth. Choose one answer. Cumulative probability distribution c. standardization Question 17 The failure density function. Frequency division multiplexing b. time position. Choose one answer. a. performance management b. pulse code modulation c. It is known as ______________. wander c. jitter b. security management h. Probability density distribution b. configuration management e. plesiochronous digital hierarchy d. Cumulative density distribution d. service management g. Failure probability distribution . f(t) is used to give the probability of failure during an interval of time.Finals MCQ Page 15 of 27 Question 14 Which of the following management layers have been identified for use within TMN? Choos e all that apply.

a. State machine b. instance variables. International Service protocol b.Finals MCQ Page 16 of 27 Question 18 The data in a class are also called: Choose one answer. An IP packet forwarding device inside one collision domain Question 21 Marks: 1 For a CSMA/CD network. stochastic Question 20 A Repeater is Choose one answer. Internet System protocol d. c. both a and c Question22 ISP stands for ______________. Choose one answer. it is possible to predict its future behavior from the knowledge of its current condition and input signals. Choose one answer. A bit-forwarding device inside one collision domain c. International Systems protocol . Choose one answer. a. all of the above Question 19 For a __________________________system . transfer time c. Deterministic c. attributes. a. fields. b. Non-deterministic d. a. slot time b.T305a. d. a. A frame forwarding device inside one collision domain b. round trip delay time d. Internet Service provider c. twice the propagation time between the two most distant stations is called _________________.

they are formed using multiplexing Question 26 MTBF is Choose one answer. Smalltalk c. and 60% are received. they are formed using byte-interleaving b. a. 40% of the sent packets are lost . a basic measure of reliability for non-repairable items b.67 b. 0. 0. What is the probability that 2 out of the next three packets will be lost? Choose one answer. a. Java b. Physical Layer b.T305a. Choose one answer.28 c. a basic measure of reliability for non-identical items d. SDL d. a basic measure of reliability for repairable items Question 27 On a network during the day . Data link layer c. 0.9 .52 d. Transport layer Question 24 Which language is used by the International Telecommunication Union (ITU) for describing telecommunication systems: Choose one answer. a.Finals MCQ Page 17 of 27 Question 23 Logical Link Control and Medium Access Control are sub-layers __________________. Network layer d. a. a basic measure of reliability for identical items c. All of the above Question 25 How are four STM-1 signals formed to make an STM-4? Choose one answer. they are formed using synochronization c. 0. a.

encoding and appending. Management layers d. Inter-station synchronization b. Multi-station synchronization . Choose one answer.T305a. Choose one answer. 261 columns*9 rows*8(bits in a byte)=18792 bits. c.Finals MCQ Page 18 of 27 Question 28 _____________ provide a general architecture for the transport of management data within the TMN. Intra-station synchronization c. d. b. computer programs b. sampling. sampling and appending. Ultra-station synchronization d. a. a. 270 columns*9 rows*8(bits in a byte)=19440 bits. c. 261 columns*9 rows=2349 bits. encoding and decoding. Choose one answer. encoding and appending. quantization. Objects Question 29 Calculate the block size for one frame of VC-4? Choose one answer. b. sampling. Question31 The tree arrangement in the figure below shows how timing is distributed from the primary reference clock (PRC) to a series of slave clocks. Functional blocks c. quantization. This is an example of ____________. Question 30 List the steps that an analogue speech signal goes through to become a PCM signal. a. a.

one collision domain per LAN c. super b. digital signals None of the above Question 34 A MAC address is Choose one answer. Exponential backoff time . a. The IP address given by NetBios Question 35 Original Ethernet is Choose one answer.Finals MCQ Page 19 of 27 Question 32 Subclass constructors can call super class constructors via the keyword: Choose one answer. a. Point to point links. Point to point links. a. Jam time b. none of the above Question 33 Modulation can be used for : Choose one answer. a. Shared medium. twice the propagation time between the two most distant stations is called _________________________. The serial number of the Ethernet adapter c. both analogue signals and digital signals b. Slot time d. a. several collision domains per LAN Question 36 For a CSMA/CD network. this c. given by a system administrator b. one collision domain per LAN b. analogue signals c. Message delay c.T305a. Choose one answer. The address of the machine.

a. P(AB) d.000 hours b. 200. the MTBF is: Choose one answer. TU Question 40 If a component has a failure rate of 2 failures per million hours.T305a.00 hours c. Only one d. P( A) + P( B) . none b. P( A) + P( B) c. then P( A OR B) = Choose one answer. a. P( A) + P( B) + P(AB) . All of the above Question 39 The ____________ in STM-1 frame is used to locate the start of the VC-4 which unlike the AU-4 does not have a fixed position within the STM-1. Choose at least one answer.Finals MCQ Page 20 of 27 Question 37 Internet is an example of __________________. a. a. VC-12 e.000 hours d.000 hours Question 41 If A and B are disjoint. One or more c. VC-1 d. Packet Switched Network d. pointer address b. 1000. Choose one answer. overhead address c. a. 500. None of the above Question 38 In a one-to-one relationship how many instance(s) of each class takes part in the relationship: Choose one answer. Choose all that apply. Datagram Network c. Circuit Switched Network b. 500.P(AB) b.

performance management b. using 140 Mbit/s line system. Choose one answer. 34/140 and 8/140 Question 44 _________________ is the range contained between the lowest and highest frequency. 8/140 and 34/140 c. bandwidth c. service management g. Choose at least one answer. a. 2/8. 2/34. frequency b. planning management c. configuration management e. forecast management Question 43 A PDH network could have provided a similar capacity as the STM-1 in figure below. accounting management f.T305a. security management h. standardization . If we have to “add/drop” 2Mbits PDH paths at ADMs how many multiplexers we would need? Choose one answer. multiplexing d. 2/8. a. network management d. 8/34 and 34/140 b. a.Finals MCQ Page 21 of 27 Question 42 Which of the following management layers have been identified for use within TMN? Choos e all that apply.

Aggregation/containment d. 3 kHz c. 3 Hz Question 49 A Repeater is a. polymorphism. Polymorphism b.T305a. a. Specialization Question 48 This is graph of a sinewave with frequency : a. 1/3 kHz b. Failure probability distribution Question 46 Object Oriented Programming is characterized by using: a. encapsulation.Finals MCQ Page 22 of 27 Question 45 The failure density function. A bridge b. all of the above. f(t) is used to give the probability of failure during an interval of time. inheritance. c. Probability density distribution b. Cumulative density distribution d. A repeater c. b. d. Cumulative probability distribution c. It is known as ______________. A frame forwarding device inside one collision domain b. Question 47 One special type of relationship when one object is part of another is known as: a. 6 kHz d. A bit-forwarding device inside one collision domain c. A router . Multiplicity c. An IP packet forwarding device inside one collision domain Question 50 A system that allows several cables to be part of the same collision domain is a.

270*9*8/125=155.552 Mbits/s c. 0. All of the above Question 54 Given that each frame is made up of a 270 by 9 blocks of bytes. a. a.991 c.T305a. 0. a.872 d.959 Question 56 The gives the probability of failure during: Choose one answer.52 Mbits/s b. 270*9*8/125*10=15. 0. what is the availability of the system? Choose one answer.99. Fast Ethernet c. each with availability 0. Gigabit Ethernet d.Finals MCQ Page 23 of 27 Question 51 What is the most commonly used LAN technology today? a. 270*9*8/125*10-6=155. Demand for high data rates Question 53 In a one-to-one relationship how many instance(s) of each class takes part in the relationship: Choose one answer. and one frame is transmitted in 125µs. time interval when both components fail b. a small time interval c. calculate the bit-rate of the STM-1 signal. Increase in the number of users c. a. Bandwidth hungry applications such as multimedia d. 10 gigabit Ethernet Question 52 What are the reasons for evolution of fast Ethernet and gigabit Ethernet? a. total failure . a long time interval d. Choose one answer.980. Ethernet b. One or more c. All the options are correct b. none b. are linked by three parallel routes. 0. Only one d.52 bits/s Question 55 Two exchanges. each with availability A = 0.912 b.

computer programs b. 34/140 and 8/140 Question 59 What is the bit-rate of the primary signal if each frame contains 32 bytes.Finals MCQ Page 24 of 27 Question 57 _____________ provide a general architecture for the transport of management data within the TMN. 32*8/125*10-6=2048 kbits/s b. If we have to “add/drop” 2Mbits PDH paths at ADMs how many multiplexers we would need? Choose one answer. 2/34. and each frame is constructed in 125µs ? Choose one answer. 8/34 and 34/140 b. Management layers d. using 140 Mbit/s line system. 2/8. a. Functional blocks c. 32*16/125*10-6=32768 kbits/s c.T305a. a. 32*16/125*8-6=12768 kbits/s d. 2/8. Choose one answer. Objects Question 58 A PDH network could have provided a similar capacity as the STM-1 in figure below. a. 8/140 and 34/140 c. none of the choices is correct .

another word for a class. Inter-station synchronization b. b. Non-deterministic d. Choose one answer. it is possible to predict its future behavior from the knowledge of its current condition and input signals. Multi-station synchronization Question 61 An object is: Choose one answer. stochastic . one instance of a class. State machine b. Choose one answer. a. Question 62 For a __________________________system . Intra-station synchronization c. c. a class with static methods. This is an example of ____________. a. a. Deterministic c. d.Finals MCQ Page 25 of 27 Question 60 The tree arrangement in the figure below shows how timing is distributed from the primary reference clock (PRC) to a series of slave clocks.T305a. a method that accesses class attributes. Ultra-station synchronization d.

T305a. Physical b. a. White noise c. Switch d. Noise b. data link layer Question 66 Different types of signals or many signals are combined using device called __________________.Finals MCQ Page 26 of 27 Question 63 below. Router b. Frequency Question 64 Using bridging we can have Choose one answer. Multiplexer c. Choose one answer. Transport d. Antenna Question 67 . Network c. a. __________ has a constant power spectral density for all frequencies as shown Choose one answer. Several LANs per collision domain Question 65 Which layer is immediately below the Network layer? Choose one answer. a. a. One collision domain per LAN c. Power density d. Several collision domains per LAN b.

Message delay c. Choose one answer. twice the propagation time between the two most distant stations is called _________________________. Slot time d. a.Finals MCQ Page 27 of 27 For a CSMA/CD network.T305a. Jam time b. Exponential backoff time .

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->