Ask Question, Ask an Expert


Ask Computer Network & Security Expert

problem1. The information to be transferred in data communications system is the ______.

(a) Message

(b) Protocol

(c) Medium

(d) Transmission

problem2. Which topology needs a multi-point connection?

(a) Star

(b) Mesh

(c) Ring

(d) Bus

problem3. Data flow between two devices can take place in a _______ way.

(a) Full-duplex

(b) Half-duplex

(c) Simplex

(d) All of the above

problem4. As data moves from the lower to the upper OSI layers, headers are _______.

(a) Modified

(b) Rearranged

(c) Added

(d) Removed

problem5. The physical layer is concerned with movement of __ over the physical medium.

(a) Programs

(b) Protocols

(c) Bits

(d) Dialogues

problem6. ________ is a kind of transmission impairment in which the signal loses strength due to the dissimilar propagation speeds of each frequency that makes up the signal.

(a) Crosstalk

(b) Thermal Noise

(c) Distortion

(d) Impulse Noise

problem7. In asynchronous transmission, the gap time between bytes is _______.

(a) Variable

(b) Fixed

(c) A function of data rate

(d) Zero

problem8. _______ encoding has a transition at the middle of each bit.

(a) Manchester

(b) RZ group

(c) Differential Manchester

(d) All of above

problem9. The maximum data rate over a 2 MHz channel with SNR of 20 dB is _____.

(a) 3.33 Mbps

(b) 2.16 Mbps

(c) 6.66 Mbps

(d) 13.32 Mbps

problem10. ASK, PSK, FSK are instances of ________ conversion.

(a) Digital-to-digital

(b) Digital-to-analog

(c) Analog-to-digital

(d) Analog-to-analog

problem11. Quadrature amplitude modulation (QAM) is combination of _________.

(a) ASK and FSK

(b) ASK and PSK

(c) PSK and FSK

(d) None of the above

problem12. Which multiplexing method transmits digital signals?

(a) CDM

(b) FDM

(c) TDM

(d) None of the above

problem13. A parabolic dish antenna is a (n) _______ antenna.

(a) Unidirectional

(b) Omni-directional

(c) Bi-directional

(d) Horn

problem14. In cyclic redundancy checking, the divisor is _______ the CRC.

(a) One bit more

(b) One bit less

(c) The same size as

(d) Two bits less

problem15. The most used method to convert analog data to a digital signal is called _____.

(a) PCM

(b) Sampling

(c) PAM

(d) Shift-keying

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M98052

Have any Question? 

Related Questions in Computer Network & Security

Project assignment software defined networks1introductionin

Project Assignment: Software Defined Networks 1 Introduction In this assignment you will learn how to use the OpenFlow protocol to program an SDN controller in a Mininet emulated network using POX. The following sections ...

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

Perimeter securitythe project deliverables are as

Perimeter Security The project deliverables are as follows: • Update the Information Network Security Architecture Design document title page with a new date and project name. • Update your previously completed sections ...

Assignmentthis assignment requires you to use presentation

Assignment This assignment requires you to use presentation tools and allows you to be creative. The presentation subject is to be network security on the Boeing 787 Dreamliner. To begin, get familiar with the topic by r ...

Topic one discuss fisma and its relevance to cybersecurity

TOPIC One: Discuss FISMA and its relevance to cybersecurity. (must be 200 words with references) Topic Two: (must be 200 words with references) Define the terms below and describe the environment in which each access con ...

Assignment case study handmade furniture ltdthis case study

Assignment case study: HandMade Furniture Ltd. This case study provides background information for both assignment 1 and assignment 2. As a network consultant, your initial examination of the company has discovered the f ...

Securritypost for elprofessoripart 1based on your teams

Securrity Post for elprofessori Part 1 Based on your team's Week Five Learning Team Collaborative discussion, write the Network Security Policy section of the Information Security Policy. Include the following: • Network ...

Assignment description1overview of the assessmentthe

Assignment Description 1 Overview of the assessment: The purpose of this assignment is to develop skills to independently think of a situation and Apply skills to analyze complex problems in network security under superv ...

Term paper planning an it infrastructure audit for

Term Paper: Planning an IT Infrastructure Audit for Compliance Note: Chapter 5 of the required textbook may be helpful in the completion of the assignment. The audit planning process directly affects the quality of the o ...

Maintaining the network please respond to the following-

"Maintaining the Network" Please respond to the following: - Examine three cable maintenance tools that you would consider essential for a network team. Of the three tools that you have examined, determine the one that y ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro