CS601 Updated Finalterm Mcqs
CS601 Updated Finalterm Mcqs
Important NOTE:-
TDMA…….confirm
PPP……confirm
3. In each character protocol each character of frame is encoded using ____ coding system .
Bit-oreinted
Multiple-access protocol/……confirm
5. The orginal Etherrnet technology with the data rate of 10 MBps is called______?
Standard Ethernet….confirm
PPP……confirm
PAP……confirm
9. If duration of noise is decreased during a transmission over noisy channel, fixed data rate
of the channel will cause _______ number of bits being impacted by the noise
More…..confirm
10. For carrier sense Multiple Access/Collision Detection (CSMA/CD), we need a restriction on
the
Collision size….confirm
12. In hexadecimal notation of Ethernet address, each byte is separated by _______ symbol.
Colon….confirm
13. In a linear block code, the _______ of any two valid codewords creates
another valid codeword.
14.
XOR…..confirm
15. In the ______ method, the stations in a network are organized in a logical ring.
Token-passing….confirm
17. In order to find the location of two errors in an eight bit stream, we have to see ________
different combinations.
28….confirm
18. If we need to correct a single error in an 8-bit data unit, we need to consider _____ possible
error locations
16…..confirm
19. In _______ each station sends a frame whenever it has a frame to send.
Slotted ALoHA…..confirm
Line coding…..confirm
21. In case of higher data rate, the number of impacted bits will be ________.
Higher
22. In _ protocol, the sender sends one frame at a time and wants for an acknowledgment
before sending the next one.
Stop-and-wait
23. In block coding we divide our message into blocks of K bits called as _____.
Data words….confirm
Modulation…..confirm
26. CHAP is an Authentication Protocol, which uses ______ process to authenticate user
information.
Unicast…confirm
28. In the context of Ethernet address, the destination address is always a ______ address.
29. __________ transmission technology (based on Ethernet) provides a data rate of 1 billion
bits per second.
Gigabit Ethernet….confirm
100…..confirm
31. In random access method, when two or more than two nodes transmit at the same time
when
Two…..confirm
33. If the harming distance between sent and received code word is ______ then it shows that
received data is corrupted.
34. In order to find hamming distance between two pair of words, _____ logical operation is
used.
XOR….confirm
6….confirm
36. In ________ a station monitors the medium after it sends a frame to see if the transmission
was successful.
CSMA/CD……confirm
Frame size…confirm
39. What was the main drawback in the aloha random access method
Redundancy in data
Point-of presence
42. In Ethernet, the source address field in the MAC frame is the _ address
15
10 base 5
2000
47. Transmission technology based on Ethernet provides a data rate of 1 billion bits per
second.
48. Works with topologies in which one device is designated as a primary station and the other
devices are secondary stations
48 bits
50. The type of aloha which improves the efficiency of pure aloha is.
Slotted aloha
51. A personal computer or workstation on an Ethernet network must have _____ card
NIC
52. In which controlled access method all data exchange must be made through primary device
even when the ultimate destination is a secondary device
Polling
53. In _ each band is reserved for a specific station and it belongs to the station all the time
FDMA
54. In pure aloha the vulnerable time is ___ the frame transmission time
Two times
56. In the context of Ethernet address, the source address is always a __________ address
Multicast
57. The original Ethernet technology with the data rate of 10 Mbps is called
Standard ethernet
59. When we represent the data in CDMA if a station Is idle then it sends
Point of presence
61. What was the main drawback in the aloha random access method
62. _transmission technology based on Ethernet provide a data rrate of 1 billion bits per
second
Gigabit Ethernet
63. In which controlled access method all data exchanges must be made through a primary
device even when the ultimate destination is a secondary device.
Polling
Point of presence
48 bits
66. In _____ collision are avoided by deferring transmission even if the channel is idle
15
6 byte
70. In _____ each band is reserved for a specific station and it belongs to the station all the
time
FDMA
71. The original Ethernet technology with a data rate of 10MBps is called
Standard Ethernet
72. The _ method has the highest chance of collision because two or more stations may find the
line idle and send their frames immediately
1 persistent method
73. IN allocated a time slot during which it can send data each station is
TDMA
74. In which controlled access method al data exchanges must be made through primary
device even when the ultimate destination is a secondary device
Polling
76. Works with topologies in which one device is designated as a primary station and the other
device are secondary stations
Polling
77. In Ethernet, the source address field in the MAC frame is the address
1. Private
3. Local
4. Global
1. true
2. false
1. Token-passing
2. Polling
3. Reservation
1. Ring
2. Mesh
3. Star
4. Bus
1. Same as
3. Two times
4. Four times
2. communication channel
3. protocol
4. gateways
1. Continuous
2. Discrete
3. Periodic
4. Aperiodic
1. 3
2. 4
3. 2
1. Shannon
2. Nyquist
3. Propagation
4. Greedy
10. There are three types of Hubs that exist. Which of the following
options correctly describes these three?
1. Voltage
2. Time
3. Frequency
4. Amplitude
1. Physical
2. Network
3. Presentation
1. 0.5
2. 0.6
3. 0.3
4. 0.2
1. Signal rate
2. Bit rate
3. Decibel
4. Pulse Rate
1. Active hub
2. passive hub
1. 0s are
2. 1s are
3. a polynomial is
4. a CRC remainder is
1. to the resender
2. to the sender
3. to the atmosphere
1. Duplicated
2. Blocked
3. Cleaned
4. Escaped
2. Ground propagation
3. Space propagation
4. Tropospheric propagation
20. Which of the following consist of just one redundant bit per
data unit?
2. CRC
4. Checksum
21. The term _______means that only one bit of a given data unit is
changed from 1 to 0 or from 0 to 1.
1. Packet Error
2. Burst Error
4. Character Error
1. Bit errors
1. Transport
2. Application
3. Session
4. Network
1. Light
2. Sound
3. Wave
1. NRZ-L
2. NRZ-I
3. RZ
1. Redundancy in Data
2. Potential Collision
1. twisted pair
2. fiber-optic
3. coaxial
4. microwave
1. Slotted ALOHA
2. Fragmented ALOHA
3. Pure ALOHA
1. 1,2,3 only
2. 6,5,7 only
3. 5,4,3 only
4. 6,5,4,3,2 only
1. Yes
2. No
2. PAP
3. LCP
4. ICMP
1. Application Layer
3. Transport Layer
4. Network Layer
1. Amplitude, Frequency
2. Amplitude, phase
3. Frequency, Phase
4. Amplitude, Samples
35. Which error detection method consists of a parity bit for each
unit as well as an entire data unit of parity bits?
1. Checksum
1. True
2. False
1. BNC
2. RJ-45
3. RJ-11
4. RJ-57
1. 1
2. 2
3. 0
4. 4
1. 0.2
2. 0.1
3. 0.5
4. 0.3
2. QAM
1. 2
2. 3
3. 4
4. 5
1. Application Layer
2. Session Layer
4. Presentation Layer
1. True
2. False
2. DTE
1. 25
2. 10
3. 15
4. 30
1. Amplitudes
2. Frequencies
3. Phases
2. NRZ-L
3. RZ
4. Manchester
2. Exchange Management
3. Flow Control
4. Recovery
50. Time domain plot show changes in signal phase with respect
to time.
1. true
2. false
1. Polling
2. Reservation
3. Token Passing
4. Port Forwarding
1. Log L
2. Log Base 2 L
3. L Square
4. Log(2*L)
1. RG-58
2. RG-59
3. RG-11
4. RG-47
1. true
2. false
1. Analog to analog
2. Analog to digital
3. Digital to Digital
4. Digital to analog
1. AM, PM and FM
57. The original Ethernet technology with the data rate of 10 Mbps
is called ________?
1. Standard Ethernet
2. Fast Ethernet
3. Gigabit Ethernet
4. 10 Gigabit Ethernet
1. Amplitude
2. Segmentation
3. Phase
4. Frequency
1. Routing
2. Flow Control
4. Congestion Control
60. In order to find the location of two errors in an eight bit stream,
we have to see ________ different combinations.
2. 16
3. 8
4. 4
1. Interframe Window
2. Contention Window
3. Fragmented Window
4. Collided Window
1. Frame sequencing
2. Acknowledgement numbering
1. Polling
2. Token Passing
3. Reservation
1. Manchester
2. Differential Manchester
4. None of given
1. 0 to 63
2. 0 to 64
3. 1 to 63
4. 1 to 64
1. Sine Waves
2. Digital Signals
3. Aperiodic Signals
1. Analog-to-Digital Conversion
2. Digital-to-Digital Conversion
68. At the CRC checker, ___________ means that the data unit is
damaged.
1. A string of 0s
2. A string of 1s
4. A nonzero remainder
1. TDMA
2. CDMA/CD
3. ALOHA
4. CDMA/CA
1. Digital
2. Analog
3. Discrete
3. Input frequency
4. Multiplexed T lines
1. 'NULL
2. Cable
3. DSL
1. 16
2. 2
3. 4
4. 8
74. Asynchronous TDM is efficient only when the size of the time
slot is kept relatively ___________.
1. Large
2. Small
3. Medium
4. Zero
75. The ________ protocol uses both flow and error control.
2. HDLC
3. ICMP
4. Stop-and-Wait
1. CDMA
2. NDMA
3. TDMA
4. FDMA
77. The extra bits added with the original data for error
detection/correction are called ________.
1. Fault bits
2. Port numbers
3. Redundant bits
4. Process IDs
1. N+1
2. N-1
3. N(N+1)
4. NxN
1. signal rate
2. modulation rate
3. Data rate
4. pulse rate
3. Acknowledgements
1. RG-58
2. RG-59
3. RG-1
4. RG-47
1. Line discipline
2. Flow control
3. Error control
4. Network control
1. Reassembly of data
1. Synchronous
2. Asynchronous
3. Isochronous
4. Metasochronous
1. Application
2. Transport
3. Network
4. Session
86. The ________ is the number of signal elements sent per unit
time.
1. Data rate
2. Signal rate
3. Bit rate
4. Period
2. Direct
3. Indirect
4. Tangible
1. 0.2
2. 0.1
3. 0.5
4. 0.3
1. 2
2. 3
3. 4
4. 5
1. Constant
2. More
3. Less
4. Zero
1. User data
2. Control
3. Redundant
4. Original
92. The __________ generates the data and passes it along with
any control information to a __________.
1. DTE, DCE
2. DCE, DTE
3. DTE, DTE
4. DCE, DCE
1. Slotted ALOHA
2. Upper ALOHA
3. Integrated ALOHA
4. Lower ALOHA
1. 0.2
2. 0.1
3. 0.5
1. Wideband De-Modulation
1. Two
2. Three
3. Four
4. Five
1. Physical
2. Direct
3. Indirect
4. Tengible
1. EOT
2. EKT
4. ESP
1. Time domain
2. Frequency domain
3. Frequency spectrum
1. Two-way
2. Three-way
3. Four-way
4. Five-way
1. Return to Z
2. Retire a Zero
3. Return ot Zero
1. FDMA
3. TDMA
4. CSMA
1. Encapulation
2. De-encapulation
3. Packetizing
4. Framing
1. Code words
2. Data words
3. Passwords
4. Cross words
1. Delay
2. Speed
3. Throughput
4. Errors
2. Useless
3. Informal
4. Difficult
1. Twice
2. Half
3. Same
4. Three Times
1. Slow
2. Fast
3. Costly
4. None effective
2. Hybrid
3. Digital
4. Automated
1. Two
2. Three
3. Four
4. Five
1. Exactly 4
2. Exactly 8
3. Exactly 32
4. Any
1. Message
2. Packet
3. Segment
4. Frame
1. Retransmitted
2. Forwarded
3. Selected
4. Rejected
1. B=(1+d)S
2. B=(1*d)S
3. B=(d-1)S
1. Analog-to-Digital Conversion
2. Digital-to-Digital Conversion
3. Digital-to-Analog Conversion
18. If the Hamming distance between sent and received code word
is ________, then it shows that received data is corrupted.
1. ≠ 0
2. = 0
3. ≠ 1
4. = 1
1. FSK, PSK
2. PSK, FSK
3. ASK, PSK
4. ASK, FSK
1. True
2. False
1. Reservation
2. Polling
3. Token
1. Virtual LANs
3. Ethernet links
24. If users must take turns using the link, then it is called Spatial
Sharing.
1. true
2. false
1. Physical
2. Network
3. Presentation
4. Data link
1. Circuit switching
2. Packet switching
27. Signals travel through fiber optic cable are in the form of
________.
1. Light
2. Bits
3. Electromagnetic
4. Bytes
1. Active hub
2. Passive hub
1. Frequency
2. Amplitude
1. IP and TCP
2. UDP
3. IP and UDP
4. TCP
1. Framing
2. Modulation
3. Error Control
4. Flow Control
1. domain address
2. protocol address
3. IP address
4. Web address
1. Attenuated
2. Distorted
4. Noisy
1. 4
2. 8
3. 16
4. 32
1. Path
2. Circuit
3. Link
4. Router
2. Application layer
3. Physical layer
4. Session layer
37. Which of the following sublyer resolves the contention for the
shared media.
1. MAC
3. Physical
1. 2
2. 3
3. 7
4. 5
1. Dedicated
2. Shared
3. Multiplexed
4. Infinite
2. Positive
3. Binary
4. Integral
1. Bipolar
2. Unipolar
3. Polar
1. 1024
2. 256
3. 128
4. 512
44. Like Data link layer, ___________ is also responsible for Flow
control.
1. Transport Layer
2. Session Layer
3. Nonzero
1. Less than
2. Equal to
3. Greater than
4. Same as
1. Direct Point
2. Bridge
3. Channel
4. Access Point
1. 100
2. 500
3. 300
4. 600
1. CSMA/CD
2. CSMA/CA
3. Line coding
4. Segmentation
1. Fast Ethernet
2. Standard Ethernet
3. Gigabit Ethernet
4. 10BASE-T Ethernet
1. Data Link
2. Network
3. Transport
1. Same as
2. Two times
3. Three times
4. Four times
1. 100
2. 900
3. 300
4. 600
55. ________ signal can take infinite levels of intensity over time.
1. Digital
2. Discrete
3. Analog
4. Logical
56. Mr. Asif while sitting in Lahore is talking with his friend in
Dubai through Skype is an example of ________.
57. Which layer is concerned with the syntax and semantics of info
exchange between two systems?
1. Physical
2. Application
3. Session
4. Presentation
3. time
1. Amplitude
2. Phase
3. Sample
4. Frequency
1. Carrier Signal
2. Analog signal
4. Modulated signal
1. PSK
2. ASK
3. FSK
4. QAM
1. True
2. False
1. Duplicated
2. Blocked
3. Cleaned
4. Escaped
1. PDM
2. CSMA
3. TDM
1. Time
2. Amplitude
3. Frequency
4. Signal Rate
1. Continuous
2. Discrete
1. satellite
2. protocol
4. network
3. Checksum
1. Time
2. Space
3. Frequency
1. 0.5
3. 0.3
4. 0.2
1. 60
2. 12
3. 20
4. 10
1. True
2. False
1. Application
2. Transport
3. Presentation
4. Data link
1. I-frames
3. S-frames
4. N-frames
1. Burst
2. Single-Bit
3. Uni-Bit
4. Hamming