You are on page 1of 9

1.

A signaling method relating to a multiplicity of circuits is


conveyed over a single channel by labeled messages.
a. code signaling
b. synchronous
c. common channel signaling
d. asynchronous
2. How many OSI layers are covered under
the X.25 standard?
a. 3
b. 4
c. 7
d. 2
3. The generating power polynomial x7 + x5 + x4 + x2 + x1 + x is
equivalent
a.101101110
b. 101101111
c. 010010001
d. 10110111
4. What is the other name for parity?
a. BCC
b. LRC
c. VRC
d. CRC
5. ______ is a network operating system within several
buildings in compound.
a. Internet
b. Novell netware
c. 10BASE-t
d. intranet
6. Equation used to determine the number of Hamming bits in the
hamming code.
a. 2n = m+ n +1
b. 2n > m +n +1
c. 2n > m +n +1
d. 2n < m +n +1
7. A TCP segment is encapsulated in __________.

a. an IP datagram
b. an Ethernet frame
c. a UDP user datagram

d. none of the above

8. A signal at the input to a mu-law compressor is positive


with its voltage one-half the maximum value. What proportion
of the maximum output voltage is produced?
a.
0.786Vmax
b. 0.876Vmax
c. 0.867Vmax
d. 0.678Vmax
uVin
ln (1+
)
Vmax
v =Vmax
ln(1+u)

ln(1+
v =Vmax

( 255 ) (0.5 Vmax )


)
Vmax
ln(1+255)

v =0.876 Vmax

9. Distortion created by using too low a sampling rate when


coding an analog signal for digital transmission
a.
aliasing
b. foldover distortion
c. either a or b
d. neither a nor b
10.
A network with bandwidth of 10 Mbps can pass only an
average of 12000 frames per minute with each frame carrying
an average of 10000 bits. What is the throughput of this
network?
a.
b.
c.
d.

1
2
3
4

Mbps
Mbps
Mbps
Mbps

Throughput=

12000 x 10 000
60

= 2 Mbps

11.
The thick coaxial cable implementation of standard
Ethernet
a. 1000 Base-T
b. 10 Base-T
c. 10 Base 2
d. 10 Base 5
12.
A block coding technique in which four bits are encoded
into a five bit code
a.
Baudot
b. 2B1Q Encoding
c. 4B/5B Encoding
d. 4A/5A Encoding
13. It consists of 36 unique codes representing the 10 digits
and 26 uppercase letters
a.
Discrete code
b. code 39
c. continuous code
d. 20 code
14.______ is the mode of transmission in public data network
in which data are transferred from source to the network
then to the destination in an asynchronous data format
a Synchronous mode
b Start/stop mode
c Packet mode
d Circuit mode
15._______uses a single bit PCM code to achieve a digital
transmission of analog signal
a. Quadrature Amplitude Modulation
b. Frequency Shift Keying(FSK)
c. Delta Modulation(DM)
d.Phase Modulation(PM)
16.Synchronous modems cost more than asynchronous modems
because
a. They are larger
b. They must contain clock recovery circuits
c. The production volume is larger
d. They must operate on a larger bandwidth
17.The capacity of the standard 4-kHz telephone channel
with 30 dB S/N is
a. 455225 bps

b. 42525 bps
c. 39846 bps
d. 39840 bps

18.CCITT V.26 modem has a modulation rate of


_____.
a. 1200 Hz
b. 1200 bauds
c. 1560 cps
d. 9600 bauds
19.What can a smart modem do?
a. detect transmission errors and
correct them
automatically
b. correct answer multiple choice
quizzes
c. accepts commands from the terminal
via RS232
interface
d. do a smart game
20.When did ISO adapt the seven-layer OSI model?
a. 1983
b. 1973
c. 1963
d. 1953
21.PCM systems require _____.
a. analog signals
b. large bandwidth
c. digital signals
d. fiber optic cable
22._____ is the difference between the original and
reconstructed signal
a. quantizing noise
b. fade margin
c. noise margin
d. noise figure
23.What is the reason why companding is employed in PCM
system?
a. to solve quantizing noise problem
b. to allow amplitude limits in the receivers
c. to protect small signals in PCM
from quantizing
distortion
d. to overcome impulse noise in PCM receivers
24.Error control used in high frequency radio data
transmission.
a. FEC
b. ARQ

c. Hamming
d. Parity
25.Before attempting to transmit data, each station has to
listen to the channel.
a. CSMA/CD
b. token passing
c. CSMA/CA
d. polling
26.When one station is designated as master and the rest of
the stations are considered slaves, message handling is
_____.
a. store and forward
b. polling
c. CSMA/CD
d. token passing
27. Which mode of transmission achieves less than fullduplex but more than half-duplex?
a. full\full duplex
b. echoplex
c. isochronous
d. synchronous
28. A data communications component that provides control or
supporting services for other computers, terminals, or
devices in a network.
a. Host
b. Communication controller
c. Cluster controller
d. Interface equipment
29. The Baudot code
a. was invented by the Baudot
b. required the escape character
c. requires shift characters to
combinations
d. a descendant of Morse code
30. Digital to analog converter in
signals to the
a. modulator
b. transmission lines
c. terminal
d. equalizer
31. ASCII means
a. terminals using synchronous
b. terminals using synchronous
c. terminals using asynchronous

brothers
to
print numbers
provide sufficient
synchronous modems send

transmission in EBCDIC
transmission in ASCII
transmission in ASCII

d. any terminal having an American


keyboard

(dollar-sign)

32. _____ is a device used to convert a time varying


electrical quantity to an appropriate form.
a. Codec
b. Transducer
c. ADC/DAC
d. Modem
33. The transparency mechanism used with SDLC is called
a. zero-bit insertion
b. modified link test
c. beacon test
d. invert-on-zero coding
34. In a _____ ATM LAN, an ATM switch connects stations.
a.
b.
c.
d.

legacy
pure
mixed architecture
none of the above

35. ________ is the cell relay protocol designed by the


corresponding Forum and adopted by the ITU-T.
a.
b.
c.
d.

Frame Relay
ATM
X.25
none of the above

36. In Frame Relay, the EA field defines the number of bytes; it


is _____ in the last byte of the address.
a.
0
b. 1
c. 2
d. 3
37. The IEEE 802.3 Standard defines _________ CSMA/CD as the
access method for first-generation 10-Mbps Ethernet.
a. non-persistent
b. p-persistent
c. 1-persistent

d. none of the above


38. __________uses two optical fibers and a long-wave laser
source.
a. 1000Base-T
b. 1000Base-SX
c. 1000Base-LX
d. none of the above

39. The purpose of the _______ is to provide flow and error


control for the upper-layer protocols that actually demand these
services.
a.
LLC
b. LLU
c. MAC
d. none of the above
40. In the Ethernet, the _______field is actually added at the
physical layer and is not (formally) part of the frame.
a.
b.
c.
d.

address
CRC
preamble
none of the above

41. In IEEE 802.11, a station with ________ mobility is either


stationary (not moving) or moving only inside a BSS.
a.
b.
c.
d.

ESS-transition
no-transition
BSS-transition
none of the above

42. In Bluetooth, the L2CAP sublayer, is roughly equivalent to


the LLC sublayer in LANs.
a.
b.
c.
d.

baseband
L2CAP
radio
none of the above

43. The RTS and CTS frames in CSMA/CA ____ solve the hidden
station problem. The RTS and CTS frames in CSMA/CA ____ solve the
exposed station problem.
a.
b.
c.
d.

cannot; cannot
can; cannot
cannot; can
can; can

44. UDP uses _______ to handle incoming user datagrams that go to


different processes on the same host.
a.
b.
c.
d.

flow control
multiplexing
demultiplexing
none of the above

45. The local host and the remote host are defined using IP
addresses. To define the processes, we need second identifiers
called ____________.
a.
b.
c.
d.

UDP addresses
transport addresses
port addresses
none of the above

46. A SYN segment cannot carry data; it consumes _____ sequence


number(s).
a.
b.
c.
d.

no
one
two
none of the above

47. When the IP layer of a receiving host receives a datagram,


_______.
a. delivery is complete
b. a transport layer protocol takes over

c. a header is added
d. none of the above
48. The connection establishment procedure in TCP is susceptible
to a serious security problem called the _________ attack.
a.
b.
c.
d.

ACK flooding
FIN flooding
SYN flooding
none of the above

49. Stream Control Transmission Protocol (SCTP) is a new


_____________protocol.
a.
b.
c.
d.

reliable, character-oriented
reliable, message-oriented
unreliable, message-oriented
none of the above

50. One of the responsibilities of the transport layer protocol


is to create a ______ communication.
a.
b.
c.
d.

host-to-host
process-to-process
node-to-node
none of the above