You are on page 1of 1

1. ___ is compromised when an unauthorized person gets access to a message.

2. ___ of a message is compromised when it is changed during transmission.


3. In ___ encryption, the same key is used for encryption and decryption.
4. In public key encryption, the message is encrypted with the receiver’s ____.
5. Data can be lost in ___.
a) Lossless compression
b) Encryption
c) Lossy compression
d) All of the above
6. Optical fibres use ___ for data transmission.
7. Off all the guided media, ___ has the highest data transmission rates.
a) Optical fibre
b) Coaxial cable
c) UTP
d) STP
8. The process of handing over the signal from the old channel to the new one is called ___.
9. A ___ can connect two different networks for enabling communication between them.
10. ___ helps Ethernet recover from simultaneous transmissions causing errors.
11. The IPv4 address has a size of ___ bits.
12. If an IP address starts with a bit sequence of 110, it is a class ___ address.
13. (IP/TCP/UPD) is a reliable delivery mechanism.
14. ___ protocol is used to retrieve emails from a remote server.
15. ___ protocol is used for transferring mails over the Internet.
16. ___ allows non-text data to be sent along with an email message.
17. If a signal’s lowest frequency component is 100 Hz and its highest frequency component is 5000
Hz, then its bandwidth is ___ Hz.
18. An amplifier amplifies ___
19. Only the original signal
20. Only the noise
21. The original signal and noise
22. The original signal but not the noise
23. Amplifiers are used in ___ transmission of ___ signals.
24. A ___ is used to send digital data over analog telephone lines.
25. Modulation of a digital signal can be done by varying the ___, ___, or ___ of a signal.
26. In ___ the whole block of data bits is transferred at once, instead of a character at a time.

You might also like