Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem1. The information to be transferred in data communications system is the ______.

(a) Message

(b) Protocol

(c) Medium

(d) Transmission

problem2. Which topology needs a multi-point connection?

(a) Star

(b) Mesh

(c) Ring

(d) Bus

problem3. Data flow between two devices can take place in a _______ way.

(a) Full-duplex

(b) Half-duplex

(c) Simplex

(d) All of the above

problem4. As data moves from the lower to the upper OSI layers, headers are _______.

(a) Modified

(b) Rearranged

(c) Added

(d) Removed

problem5. The physical layer is concerned with movement of __ over the physical medium.

(a) Programs

(b) Protocols

(c) Bits

(d) Dialogues

problem6. ________ is a kind of transmission impairment in which the signal loses strength due to the dissimilar propagation speeds of each frequency that makes up the signal.

(a) Crosstalk

(b) Thermal Noise

(c) Distortion

(d) Impulse Noise

problem7. In asynchronous transmission, the gap time between bytes is _______.

(a) Variable

(b) Fixed

(c) A function of data rate

(d) Zero

problem8. _______ encoding has a transition at the middle of each bit.

(a) Manchester

(b) RZ group

(c) Differential Manchester

(d) All of above

problem9. The maximum data rate over a 2 MHz channel with SNR of 20 dB is _____.

(a) 3.33 Mbps

(b) 2.16 Mbps

(c) 6.66 Mbps

(d) 13.32 Mbps

problem10. ASK, PSK, FSK are instances of ________ conversion.

(a) Digital-to-digital

(b) Digital-to-analog

(c) Analog-to-digital

(d) Analog-to-analog

problem11. Quadrature amplitude modulation (QAM) is combination of _________.

(a) ASK and FSK

(b) ASK and PSK

(c) PSK and FSK

(d) None of the above

problem12. Which multiplexing method transmits digital signals?

(a) CDM

(b) FDM

(c) TDM

(d) None of the above

problem13. A parabolic dish antenna is a (n) _______ antenna.

(a) Unidirectional

(b) Omni-directional

(c) Bi-directional

(d) Horn

problem14. In cyclic redundancy checking, the divisor is _______ the CRC.

(a) One bit more

(b) One bit less

(c) The same size as

(d) Two bits less

problem15. The most used method to convert analog data to a digital signal is called _____.

(a) PCM

(b) Sampling

(c) PAM

(d) Shift-keying

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M98052

Have any Question? 


Related Questions in Computer Network & Security

Proposal projectchoose one of the following for this

Proposal Project Choose one of the following for this project and See attachment for complete instruction and please remember to send a turnitin report. 1) Metasploit 2) Wireshark 3) Back Track 4) Nessus 5) Cain & Abel P ...

Multiple-choice questions1 which of the following is not a

Multiple-Choice Questions: 1. Which of the following is NOT a feature of an Intranet? A. uses Internet based standards, such as HTML and SMTP B. is used to connect both local and remote sites into one network C. is used ...

1 list and describe the four types of computer networks

1. List and describe the four types of computer networks from largest to smallest.  2. Define client/server computing, packet switching, and TCP/IP.  Explain how these three things make the Internet so powerful and robus ...

Taskprovide short answers to the following six questions

Task Provide short answers to the following six questions. Your answers should be clear, concise and to the point. Prepare a single document (MS Word or PDF, NOT both) along with title page and submit it online using EAS ...

Networking trends paperin this paper you will research and

Networking Trends Paper In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization, security, hardware, network man ...

Ppp data path completion using dummy network interface term

PPP Data Path Completion using Dummy Network Interface Term Project Goal of Term project 3 1. Completes the user level PPP program - Making a connection on both sides of the program YOU made 2. Try to make the full data ...

Assignmentyour boss has had an intrusion or so she says on

Assignment Your boss has had an intrusion (or so she says) on his home network. She has brought in a packet capture file for you to analyze. She says: "Something has happened on my home network. I use my network for inte ...

What is a dmz is this really a good name for the function

What is a DMZ? Is this really a good name for the function that this type of subnet performs? What is RADIUS? What advantage does it have over TACACS? How does a network-based IDPS differ from a host-based IDPS? What is ...

Assignment network consultation for designitthis assignment

Assignment: Network Consultation for DesignIT This assignment contains two Sections: Network Consultation Proposal and Network Consultation Presentation. You must submit both sections as separate files in order to comple ...

Cryptography assignment1 decrypt the following message

Cryptography Assignment 1. Decrypt the following message. Assume direct letter substitution. blf szev yvvm z tivzg xozhh. I drhs blf zoo hfxxvhh zmw hzkkrmvhh. 2. Research the RSA cryptographic algorithm. a. If the Publi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen