Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem1. The information to be transferred in data communications system is the ______.

(a) Message

(b) Protocol

(c) Medium

(d) Transmission

problem2. Which topology needs a multi-point connection?

(a) Star

(b) Mesh

(c) Ring

(d) Bus

problem3. Data flow between two devices can take place in a _______ way.

(a) Full-duplex

(b) Half-duplex

(c) Simplex

(d) All of the above

problem4. As data moves from the lower to the upper OSI layers, headers are _______.

(a) Modified

(b) Rearranged

(c) Added

(d) Removed

problem5. The physical layer is concerned with movement of __ over the physical medium.

(a) Programs

(b) Protocols

(c) Bits

(d) Dialogues

problem6. ________ is a kind of transmission impairment in which the signal loses strength due to the dissimilar propagation speeds of each frequency that makes up the signal.

(a) Crosstalk

(b) Thermal Noise

(c) Distortion

(d) Impulse Noise

problem7. In asynchronous transmission, the gap time between bytes is _______.

(a) Variable

(b) Fixed

(c) A function of data rate

(d) Zero

problem8. _______ encoding has a transition at the middle of each bit.

(a) Manchester

(b) RZ group

(c) Differential Manchester

(d) All of above

problem9. The maximum data rate over a 2 MHz channel with SNR of 20 dB is _____.

(a) 3.33 Mbps

(b) 2.16 Mbps

(c) 6.66 Mbps

(d) 13.32 Mbps

problem10. ASK, PSK, FSK are instances of ________ conversion.

(a) Digital-to-digital

(b) Digital-to-analog

(c) Analog-to-digital

(d) Analog-to-analog

problem11. Quadrature amplitude modulation (QAM) is combination of _________.

(a) ASK and FSK

(b) ASK and PSK

(c) PSK and FSK

(d) None of the above

problem12. Which multiplexing method transmits digital signals?

(a) CDM

(b) FDM

(c) TDM

(d) None of the above

problem13. A parabolic dish antenna is a (n) _______ antenna.

(a) Unidirectional

(b) Omni-directional

(c) Bi-directional

(d) Horn

problem14. In cyclic redundancy checking, the divisor is _______ the CRC.

(a) One bit more

(b) One bit less

(c) The same size as

(d) Two bits less

problem15. The most used method to convert analog data to a digital signal is called _____.

(a) PCM

(b) Sampling

(c) PAM

(d) Shift-keying

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M98052

Have any Question? 


Related Questions in Computer Network & Security

Security frameworks or policy paperwrite one to two pages

Security Frameworks or Policy Paper Write one to two pages on ONE of the following topics: Security Framework • How does a security framework assist or affect in the design and implementation of a security infrastructure ...

Analyzing network trafficone of our goals for this week is

Analyzing Network Traffic One of our goals for this week is to install and run a packet-capture utility, such as Wireshark. If you are successful with this task, run the packet capture while you do a familiar online task ...

Current attack vectors and secure network designa friend

Current Attack Vectors and Secure Network Design A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 ...

What special function does a cache server perform why does

What special function does a cache server perform? Why does this function have value for larger organizations? How does screened-host firewall architecture differ from screened-subnet firewall architecture? Which offers ...

Module discussion questionpersonal factors such as anger

Module Discussion Question Personal factors, such as anger, revenge, and lack of rewards and recognition, may increase the risk of someone stealing from or spying against employees. Organizations should apply adequate se ...

Assignmentplanning is an important aspect with any

Assignment Planning is an important aspect with any enterprise network structure. However, planning must encompass several aspects including not only the assessment of the technology required, but also keeping the stakeh ...

Learning team recommend pki technologythe head network

Learning Team: Recommend PKI Technology The head network engineer at ACME Corp. is concerned about nefarious parties being able to freely plug in devices to the company LAN. Even though he is skilled at network administr ...

Assignmentthe vice president of sales for your company has

Assignment The Vice President of Sales for your company has asked you for more information on cloud-based office productivity suites. He tells you that the Sales team is often remote and needs to be able to stay connecte ...

Case study cyber security in business Case Study: Cyber Security in Business

Case Study: Cyber Security in Business Organizations Protecting organizational assets and information within the company has become a top priority for many organizational leaders. Review the article titled "Missed Alarms ...

Case study wireless and mobile technologiesin this very

Case Study: Wireless and Mobile Technologies In this very competitive climate, many companies are seeking ways to connect with customers in ways that add value. Mobile and wireless computing have become key focal points ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen