Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1) Data communication needs a sending device, a receiving device and a _________:

A. Network Administrator
B. Telephone Line
C. Server
D. Communication Channel

problem 2) A WAN spans normally:

A. Over a large area
B. From one room to another
C. Within a single building
D. None of the above

problem 3) Data transmission is meant in which format:

A. Analogue
B. Digital
C. Both of the above
D. None of the above

problem 4) ____ are attached to computer systems using USB or serial ports, and uses dial-up technology:

A. Internal Modems
B. External Modems

problem 5) The two types of twisted pair are:

A. STP and UTP
B. SFP and UFP
C. STP and UFP
D. SFP and UTP

problem 6) ____ transmit data using light and are immune to electrical noise:

A. Twisted Pair
B. Coaxial Cable
C. Optical Fibre
D. None of the above

problem 7) A satellite receiving signals from the earth station is called as:

A. Upload
B. Download
C. Downlink
D. Uplink

problem 8) A device connected to network is referred to as:

A. Computer
B. Server
C. Node
D. Switch

problem 9) A ____ topology has central device for managing the network:

A. Ring
B. Star
C. Bus
D. Mesh

problem 10) Distortion in a signal is known as:

A. Phase
B. Frequency
C. Fluctuation
D. Noise

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96064

Have any Question? 

Related Questions in Computer Engineering

You are currently working for a company with outdated

You are currently working for a company with outdated multimedia tools. Give proposal to your manager that includes the following: An overview describing how multimedia has evolved The tools or protocols you recommend fo ...

The registration area has just opened at large convention

The registration area has just opened at large convention of building contractors in New York. There are 600 people arriving per hour (exponential interarrival times), and their cost of waiting in queue is valued at $40 ...

1 what are the three primary aspects of information

1. What are the three primary aspects of information security risk management? Why is each important? 2. What is a management maintenance model? What does it accomplish? 3. What changes needed to be made to the model pre ...

Consider the uc davis policy on reading electronic mail a

Consider the UC Davis policy on reading electronic mail. A research group wants to obtain raw data from a network that carries all network traffic to the Department of Political Science. a. Discuss the impact of the elec ...

Design and implement list insertion and deletion algorithms

Design and implement list insertion and deletion algorithms that use arrays to store both the names and the pointers. Unused (either initially unused or deleted) storage should be maintained as a free list. That is, all ...

Create a view integration to represent the combination

Create a View Integration to represent the combination between the conversion process with the acquisition payment, human resource and revenue process based on the REA patterns described on the textbook and slides for ea ...

Kirchoffs laws75 to 150 wordsdiscuss how kirchoffs voltage

Kirchoff's Laws75 to 150 words Discuss how Kirchoff's Voltage and Current Laws can be used to help analyze any type of circuit. Discuss the differences between a loop and a mesh.

Explain how microsoft project enables you to track

Explain how Microsoft Project enables you to track dependencies across multiple projects and establish resource pools. Critique what might be some downsides to one program manager tracking several projects. What if one o ...

Assignmentpart 1 discussion points1 what are the steps for

Assignment Part 1: Discussion Points 1. What are the steps for designing a relational database from a domain class model? 2. What is the normalization process and the different normal forms? Why is normalization importan ...

1 in sctp a packet is carrying two data chunks each

1. In SCTP, a packet is carrying two DATA chunks, each containing 22 bytes of user data. What is the size of each DATA chunk? What is the total size of the packet? 2. In SCTP, a SACK chunk reports the receipt of three ou ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro