|
Which of the following does not allow multiple users or devices to share one communications line?
_____________________________________________________________________________________
|
Which of the following best illustrates the default subnet mask for a class A,B, and C Network
_____________________________________________________________________________________
|
MTU is specified by
_____________________________________________________________________________________
|
In which congestion control policy the router can discard less sensitive packets when congestion is likely to happen?
_____________________________________________________________________________________
|
Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine?
_____________________________________________________________________________________
|
In an IPv4 datagram, the M bit is 0, the value of HLEN is 10, the value of total length is 400 and the fragment offset value is 300. The position of the datagram, the sequence numbers of the first and the last bytes of the payload, respectively are
_____________________________________________________________________________________
|
The value of N(S) is related to the value of P(S) as
_____________________________________________________________________________________
|
Which of following divides the high speeds signals into frequency bands?
_____________________________________________________________________________________
|
Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE
_____________________________________________________________________________________
|
Which channel is deployed by the radio station for transmission?
_____________________________________________________________________________________
|
Match the following with link quality measurement and handoff initiation : (a) Networked-Controlled Handoff(NCHO) (i) MS connect to BS (b) Mobile-Assisted Handoff(MAHO) (ii) Process via channel the target BS (c) Forward Handoff (iii) First Generation Analog Cellular System (d) Hard Handoff (iv) Second Generation Digital Cellular System
_____________________________________________________________________________________
|
To prevent signal alternation ,what is the maximum number of repeaters that can be placed on one 10 Base 5 or 10 Base 2 network?
_____________________________________________________________________________________
|
Who strips the data frame from the token ring network?
_____________________________________________________________________________________
|
ATM is an example of
_____________________________________________________________________________________
|
FDM devices can operate
_____________________________________________________________________________________
|
.......uses two carriers one in phase and the other quadrature?
_____________________________________________________________________________________
|
The research and development department at your office has been experimenting with different technologies to help improve the performance of the network. One group has been examining the use of a broadband network versus a based band network. Select the correct statement about broadband and baseband.
_____________________________________________________________________________________
|
Error detection at a data link level is achieved by
_____________________________________________________________________________________
|
Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?
_____________________________________________________________________________________
|
Which of the following device is used to connect two systems, especially if the systems use different protocols?
_____________________________________________________________________________________
|
What is the maximum window size in sliding window protocol used in a computer network ?
_____________________________________________________________________________________
|
You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should you assign?
_____________________________________________________________________________________
|
Frames from one LAN can be transmitted to another LAN via the device
_____________________________________________________________________________________
|
The receiver equalizer reduces delay distortions using
_____________________________________________________________________________________
|
The device which connects dissimilar LANs of different topologies using different sets of communication protocols so that information can flow from one to another is called
_____________________________________________________________________________________
|
The _____ houses the switches in token ring
_____________________________________________________________________________________
|
IEEE 802.3 popularly called
_____________________________________________________________________________________
|
In IPv4 header, the ______ field is needed to allow the destination host to determine which datagram a newly arrived fragments belongs to.
_____________________________________________________________________________________
|
In token ring ,the tokens can be removed by
_____________________________________________________________________________________
|
Which of the following field of the TCP header tells how many bytes may be sent starting at the byte acknowledged ?
_____________________________________________________________________________________
|
802.11i standard included an encryption scheme is known as
_____________________________________________________________________________________
|
Error rate is
_____________________________________________________________________________________
|
When you ping the loopback address, a packet is sent where?
_____________________________________________________________________________________
|
An error-detecting code inserted as a field in a block of data to be transmitted is known as
_____________________________________________________________________________________
|
ICMP (Internet Control Message Protocol) is
_____________________________________________________________________________________
|
Maximum speed of LAN(Local Area Network)
_____________________________________________________________________________________
|
In classful addressing, the IP address 190.255.254.254 belongs to
_____________________________________________________________________________________
|
Radio signals generally propagate according to the following mechanisms
_____________________________________________________________________________________
|
The unlicensed National Information Infrastructure band operates at the _________ frequency
_____________________________________________________________________________________
|
The addressing especially used by Transport Layer is
_____________________________________________________________________________________
|
802.11g standard running speed is
_____________________________________________________________________________________
|
In ATM which facility support multimedia applications that require minimal delays?
_____________________________________________________________________________________
|
GSM/CDMA systems
_____________________________________________________________________________________
|
The count-to-infinity problem is associated with
_____________________________________________________________________________________
|
For the transmission of the signal, Bluetooth wireless technology uses
_____________________________________________________________________________________
|
Brouter
_____________________________________________________________________________________
|
Which channel of transmission is used in a telephone call?
_____________________________________________________________________________________
|
X.25 is ________ Network
_____________________________________________________________________________________
|
IEEE 802.16 standard for
_____________________________________________________________________________________
|
The single stage network is also called
|