Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem1. The information to be transferred in data communications system is the ______.

(a) Message

(b) Protocol

(c) Medium

(d) Transmission

problem2. Which topology needs a multi-point connection?

(a) Star

(b) Mesh

(c) Ring

(d) Bus

problem3. Data flow between two devices can take place in a _______ way.

(a) Full-duplex

(b) Half-duplex

(c) Simplex

(d) All of the above

problem4. As data moves from the lower to the upper OSI layers, headers are _______.

(a) Modified

(b) Rearranged

(c) Added

(d) Removed

problem5. The physical layer is concerned with movement of __ over the physical medium.

(a) Programs

(b) Protocols

(c) Bits

(d) Dialogues

problem6. ________ is a kind of transmission impairment in which the signal loses strength due to the dissimilar propagation speeds of each frequency that makes up the signal.

(a) Crosstalk

(b) Thermal Noise

(c) Distortion

(d) Impulse Noise

problem7. In asynchronous transmission, the gap time between bytes is _______.

(a) Variable

(b) Fixed

(c) A function of data rate

(d) Zero

problem8. _______ encoding has a transition at the middle of each bit.

(a) Manchester

(b) RZ group

(c) Differential Manchester

(d) All of above

problem9. The maximum data rate over a 2 MHz channel with SNR of 20 dB is _____.

(a) 3.33 Mbps

(b) 2.16 Mbps

(c) 6.66 Mbps

(d) 13.32 Mbps

problem10. ASK, PSK, FSK are instances of ________ conversion.

(a) Digital-to-digital

(b) Digital-to-analog

(c) Analog-to-digital

(d) Analog-to-analog

problem11. Quadrature amplitude modulation (QAM) is combination of _________.

(a) ASK and FSK

(b) ASK and PSK

(c) PSK and FSK

(d) None of the above

problem12. Which multiplexing method transmits digital signals?

(a) CDM

(b) FDM

(c) TDM

(d) None of the above

problem13. A parabolic dish antenna is a (n) _______ antenna.

(a) Unidirectional

(b) Omni-directional

(c) Bi-directional

(d) Horn

problem14. In cyclic redundancy checking, the divisor is _______ the CRC.

(a) One bit more

(b) One bit less

(c) The same size as

(d) Two bits less

problem15. The most used method to convert analog data to a digital signal is called _____.

(a) PCM

(b) Sampling

(c) PAM

(d) Shift-keying

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M98052

Have any Question? 


Related Questions in Computer Network & Security

Select one of the following topics in which you will base

Select one of the following topics in which you will base your responses in the form of a term paper: • Network Neutrality • Web2.0 • Wireless Technology • Broadband Convergence • U.S. Telecommunication Policy • Internet ...

Networking trends paperin this paper you will research and

Networking Trends Paper In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization, security, hardware, network man ...

Assignmentyou have been asked by a local charity retail

Assignment You have been asked by a local charity retail organization to install a network in its downtown office. It currently has seven PCs running Windows XP Home Edition. They are configured as follows: Pentium 4 at ...

Short papercompare and contrast cat 6 unshielded twisted

Short Paper Compare and contrast cat. 6 unshielded twisted pair (UTP), coaxial, and single mode fiber optic cabling types. Describe one or two of the advantages and/or disadvantages associated with using each cable type ...

A company in manhattan still keeps to the traditional

A company in Manhattan still keeps to the traditional mailing approaches even though the nature of their business strictly involves confidential documents that need to be sent to clients. Tell this Manhattan Company why ...

Current attack vectors and secure network designa friend

Current Attack Vectors and Secure Network Design A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 ...

Cryptography assignment1 decrypt the following message

Cryptography Assignment 1. Decrypt the following message. Assume direct letter substitution. blf szev yvvm z tivzg xozhh. I drhs blf zoo hfxxvhh zmw hzkkrmvhh. 2. Research the RSA cryptographic algorithm. a. If the Publi ...

Assignment services in your arearesearch dsl and cable

Assignment: Services in Your Area Research DSL and cable modem services available closest to your community. You may use neighboring communities or regions if your community does not have access to DSL or cable modem ser ...

Assignmentyour have been contracted by healthfirst hospital

Assignment Your have been contracted by HealthFirst Hospital Foundation (HHF), a charitable organization that provides services to community clinics in Atlanta, Georgia. Due to the organization's tremendous growth, it wi ...

What is the typical relationship between the untrusted

What is the typical relationship between the untrusted network, the firewall, and the trusted network? How is an application-layer firewall different from a packet filtering firewall? Why is an application-layer firewall ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro