CS601 SOLVED MCQs FINAL TERM BY JUNAID
CS601 SOLVED MCQs FINAL TERM BY JUNAID
CS601 SOLVED MCQs FINAL TERM BY JUNAID
Communication
(Solved MCQ’s)
LECTURE FROM
(23 to 45)
Junaidfazal08@gmail.com FOR MORE VISIT JUNAID MALIK
Bc190202640@vu.edu.pk
VULMSHELP.COME 0304-1659294
AL-JUNAID INSTITUTE GROUP
Question No: 1
Ethernet Address is of ---------------- bytes
4
6
8
12
Question No: 2
In Pure ALOHA, the vulnerable time is --------------the frame transmission time.
Same as
Two times
Three times
Four times
Question No: 3
_ _ was used as a medium in 10 Base-T
Thick coaxial Cable
Think coaxial Cable
Twisted Pair Cable
Two Mode For Cable
Question No: 4
When data are transmitted from device A to device B, the header from A’s layer 4 is read by B’s
layer.
physical
transport
application
none of the given
Question No: 5
In encoding, we use three levels: positive, zero, and negative.
polar
nonpolar
mmultilevel
bipolar
Question No: 6
A periodic signal completes one cycle in 0.001 s. What is the frequency?
1 Hz
100 Hz
1 KHz
1 MHz
AL-JUNAID TECH INSTITUTE
Question No: 7
There are basic modes for the propagation of light in fiber-optic cables.
3
4
5
2
Question No: 8
A parabolic dish antenna is a(n) antenna.
Omnidirectional
Bidirectional
Horn
Unidirectional
Question No: 9
Zero crossing bandwidth is also called as equivalent noise bandwidth.
True
False
Question No: 10
During the transmission, transmitting device produces a high frequency signal which acts as
a basis for the transmission. This base signal is called .
Analog signal
Digital signal Not Confirm
Modulated signal
Carrier signal
Question No 11:
There are _ types of serial transmission:
1
2
3
4
Question No 12:
Synchronous transmission have .
a start bit
a stop bit
gaps between bytes
none of the given
Question No 13
Using encoding scheme in digital transmission, we represent 0 by zero voltage
level and represent 1 by any positive voltage level.
Polar
AMI
Bipolar
Unipolar
Question No 14
AL-JUNAID TECH INSTITUTE
is the formula for finding number of bits sent per level.
Log L
Log2
Log2*2
Log2 L
Question No 15
Which of the following is an example of ITU-T modem standards:?
T-series
X-series
N-series
V-series
Question No 16
The maximum data rate in the uploading direction is still .
26.6 Kbps
33.6 Kbps
36.6 Kbps
46.6 Kbps
Question No 16
In each station is forced to send a frame only at beginning of time slot
Pure ALOHA
Slotted ALOHA
Fragmented ALOHA
None of the given
Question 17
In each station sends a frame whenever it has a frame to send
Pure ALOHA
Slotted ALOHA
Fragmented ALOHA
None of the given
Question No 18
The data rate of a T-1 line is .
1.544 Gbps
2.544 Mbps
1.544 Kbps
1.544 Mbps
Question 19
Circuit switched networks have efficiency but delay compared to the
packet switched networks.
high, minimal
AL-JUNAID TECH INSTITUTE
high, high
low, minimal
Question No 20
Category 5 UTP cable is used for data transmission of upto .
100 Mbps
200 Mbps
250 Mbps
400 Mbps
Question No 21
All of popular Fiber optic connectors are _ shaped.
Conical
Barrel
Circular
Rectangular
Question No 22
SONET stands for
synchronous optical network
synchronous operational network
stream optical network
shell operational network
Question No 23
Fast Ethernet has a data rate of Mbps.
10
100
1000
10,000
Question No 24
The VLF and LF bands use propagation for communications.
Ground
Sky
Line of sight
Space
Question No 25
In Bit-oriented framing, bit pattern is used as a flag to define beginning and end
of a frame.
(11111111)2
(10000001)2
Single
(01111110)2
Question No 26
Traditionally, protocols have been defined for the data-link layer to deal with flow
and error control.
o Two
o Three
AL-JUNAID TECH INSTITUTE
o Five
o Four
Question No 27
Multiplexing is the set of techniques that allows simultaneous TX of multiple signals across
data link
Single
Multi
Single and Multi
none of the given
Question N0 28
Need for Addressing makes Asynchronous TDM inefficient for bit or byte .
Interleaving
Addition
Substraction
None of the given
Question No 29
takes data from one high speed line and breaks it into portions.
► Multiplexing
► Inverse multiplexing
► Inverse subtraction
► Inverse addition
Question No 30
For Carrier Sense Multiple Access/Collision Detection (CSMA/CD) we need a restriction on the
Collision Size
Signal Size
Frame Size
Station Size
Question No 31:
In Y-MODEM Multiple files can be sent simultaneously
► True
► False
Question No 32
At the data-link layer, protocol is designed to handle both flow and error control,
but communication is one frame at a time.
Simple
Go-Back-N
Selective-Repeat
Stop-and-Wait
Question No 33
AL-JUNAID TECH INSTITUTE
The PPP protocol uses , which is responsible for establishing,
maintaining, configuring, and terminating links.
Internet Protocol Control Protocol (IPCP)
Challenge Handshake Authentication Protocol (CHAP)
Network Control Protocols (NCPs)
Link Control Protocol (LCP)
Question No 34
Aloha, CSMA/CD and CSMA/CA are part of .
Controlled Access protocol
Channelization protocol
Mutual access protocol
Random Access protocol
Question No 35
Which of the following is an example of ITU-T modem standards:
T-series
X-series
N-series
V-series
Question No 36
The maximum data rate in the uploading direction is still .
26.6 Kbps
33.6 Kbps
36.6 Kbps
46.6 Kbps
Question No 37
Category 5 UTP cable is used for data transmission of upto .
100 Mbps
200 Mbps
250 Mbps
400 Mbps
Question No 38
ALOHA the earliest random access method was developed in early .
1950s
1960s
1980s
1970s
Question No 39
In block coding, we divide our message into blocks, each of bits; and add redundant
bits to each block to make the codewords of bit length.
m, r, c
AL-JUNAID TECH INSTITUTE
n, k, r
n, r, k
k, r, n
Question No 40
All of popular Fiber optic connectors are _ shaped.
Conical
Barrel
Circular
Rectangular
Question No 41
MAC stand for
Media Access Controller
Main Access Control
Mandatory Access Control
Media Access Control
Question No 42
Which one of the following is a Random-Access protocol
CDMA/CA
ALOHA OR CSMA/CD Both are correct
CDMA/CD
TDMA
Question No 43
The VLF and LF bands use propagation for communications.
Ground
Sky
Line of sight
Space
Question No 44
Multiplexing is the set of techniques that allows simultaneous TX of multiple signals across
data link
Single
Multi
Single and Multi
none of the given
Question No 45
Need for Addressing makes Asynchronous TDM inefficient for bit or byte .
Interleaving
Addition
Subtraction
None of the given
Question No 46
CDMA stands for _
Carrier Data Multiple Access
Code Division Multiple Access
Code Data Multiple Access
Carrier Division Multiple Access
Question No 47
AL-JUNAID TECH INSTITUTE
In Ethernet, the source address field in the MAC frame is the _ _ address.
Sender’s logical
Previous station’s physical
Next destination’s physical
Sender’s service port
Question No 48
takes data from one high speed line and breaks it into portions.
Multiplexing
Inverse multiplexing
Inverse subtraction
Inverse addition
Question No 49
A traditional telephone line has a bandwidth of _ .
► 2000Hz
► 4000 Hz
► 2000 MHz
► 4000 MHz
Question No 50
To detect five errors, the Hamming distance between each pair of codewords should be
at least_ .
4
5
11
6
Question No 51
For FEC using XOR operation, we divide a packet into N chunks, and need to send
chunks to the receiver side.
o N
o 2N
o (N+1)/2
o N+1
Question No 52
If the ASCII character H is sent and the character I is received, what type of error is this?
Single-bit
Multiple-bit
Burst
Recoverable
Question No 53
At the CRC generator, _ added to the data unit after the division process
0s are
1s are
The polynomial
The CRC remainder is
Question No 54
Error control in the data link layer is based on
AL-JUNAID TECH INSTITUTE
► automatic repeat request
Question No 55
In a technique called, compounding High-and-Low Resolution Packets, the low-
resolution section in the first packet is .
► CRC Not Sure
► Parity code
► Empty
Question No 56
In line discipline the initiator first transmits a frame called an
Enquiry
Acknowledgment
NAK
Reques
Question No 57
Primary device uses to receive transmission from the secondary devices.
Question No 59
HDLC is an acronym for .
High-duplex line communication
High-level data link control
Half-duplex digital link combination
Host double-level circuit
Question No 59
The BNC-T connector is a T-shaped device with ports
Three
Two
Four
Five
Question No 60
Each station in the Token Ring regenerates the frame.
True
False
AL-JUNAID TECH INSTITUTE
Question No 61
Repeater works on layer.
Data Link
Physical
Network
Application
Question No 62
Trunks are transmission media such as that handle the telephone to the nearest end
office.
Satellite links
Twisted-pair & Fiber-optic
Twisted-pair
Fiber-optic
Question No 63
At the data-link layer, protocol is designed to handle both flow and error control,
but communication is one frame at a time.
o Simple
o Go-Back-N
o Selective-Repeat
o Stop-and-Wait
Question No 64
The PPP protocol uses , which is responsible for establishing,
maintaining, configuring, and terminating links.
Internet Protocol Control Protocol (IPCP)
Challenge Handshake Authentication Protocol (CHAP)
Network Control Protocols (NCPs)
Link Control Protocol (LCP)
Question No 65
The original Ethernet technology with the data rate of 10 Mbps is called ?
Standard Ethernet
Fast Ethernet
Gigabit Ethernet
10 Gigabit Ethernet
Question No 66
Normally the value of Kmax in pure ALOHA is .
10
15
25
30
Question No 67
Which one of the following is not a Channelization Protocol?
CSMA
CDMA
AL-JUNAID TECH INSTITUTE
FDMA
TDMA
Question No 68
In CSMA/CA is the amount of time divided into slots.
Contention Window
Interframe Window
Fragmented Window
Collided Window
Question No 69
Aloha, CSMA/CD and CSMA/CA are part of .
Physical
Data-link
Transport
Network
Question No 75
Following are the examples of connecting devices EXCEPT .
Link Layer Switches
Hub
Routers
Wire
Question No 76
eliminates collision and connect heterogeneous devices.
o Hub
o Repeater
o Bridge
o Switch
Question No 77
creates looping problem in learning switch.
Unicast
Multicast
None of the Given
Broadcast
Question No 78
The term FTTC stands for .
Question No 79
Multiple-access Protocol is divided into .
Two categories
Four categories
Five categories
Three categories
AL-JUNAID TECH INSTITUTE
Question No 80
The original Ethernet technology with the data rate of 10 Mbps is called Ethernet.
Fast
Gigabit
10 Gigabit
Standard
Question No 81
CSMA/CD is not used in Ethernet.
Standard
Fast
Gigabit
10 Gigabit
Question No 82
The amplitude of a digital signal depends upon the to represent a bit.
Phase
Wavelength
Bandwidth
Voltage
Question No 83
In IEEE 802.11, a station with mobility can move from one BSS to another, but the
movement is confined inside one ESS.
None of the choices are correct
No-transition
ESS-transition
BSS-transition
Question No 84
In IEEE 802.11, communication between two stations in two different BSSs usually occurs
via two .
BSSs
ESSs
None of the given
Aps
Question No 89
A property of a signal where it is being received by receiver after reflection from different
intermediate objects (Building, iron polls, walls) is called
o Attenuation
o Interference
o Error
o Multipath Propagation
Question No 90
medium is used in wireless LANs for transportation of data.
Copper pair cable
AL-JUNAID TECH INSTITUTE
Optical fiber cable
Coaxial cable
Air
Question No 91
In context of control signaling network, what does STP stand for
o Shielded twisted pair
o Signaling transmission point
o Signal transportation procedure
o Signal transfer point
Question No 92
POP stands for
o Presentation of points
o Points of points
o Points of packets
o Points of Presence
Question No 93
What does LATA stand for
Local Area Transmission Arena
Local-Access Transit Access
Local-Areas Transport Areas
Local-Access Transport Areas
Question No 94
Unipolar encoding scheme is not supported over the medium having .
The capability of handling DC component
Low speed
High speed
No capability of handling DC component
Question No 95
The amplitude of a digital signal depends upon the to represent a bit.
► Phase
► Wavelength
► Bandwidth
► Voltage
Question No 96
Transmission Control Protocol is a(n) layer protocol
Application
Network
Session
Transport
AL-JUNAID TECH INSTITUTE
Question No 97
In each station is allotted a time slot during which it can send data
NDMA
CDMA
TDMA
FDMA
Question No 98
In collisions are avoided by deferring transmission even if the channel is idle
The Slotted Frame
The Deployment Frame
The Contention Window
The Interframe Space
Question No 99
In the context of Ethernet Implementations, maximum medium length of 10 Base-F was
_ meters.
500
1000
2000
150
Question No 100
Collisions in CSMA/CA are avoided through
The Interframe Space
The Contention Window
Acknowledgments
All of the given
Question No 101
The extra bits added with the original data for error detection/correction are called
► Process IDs
► Redundant bits
► Fault bits
► Port Number
Question No 102
are used to exchange session management and control between connected devices.
► U-frames
► N-frames
► S-frames
► I-frames
Question No 103
The message 1110 sent by source is received by a destination as 1011.This is types of err.
► Hamming
AL-JUNAID TECH INSTITUTE
► Single-Bit
► Uni-Bit
► Brust
Question No 104
In Block code we divide our message into blocks of K bits called as
► Password
► Code word
► Data words
► Cross words
Question No 105
DLC in Data Link Layer stand for
► Demand Link coordination
► Data Line Code
► Data Link Control
► Divide Line Communication
Question No 106
is responsible for governing node to node Communication.
► Data Link Layer
► Session Layer
► Presentation Layer
► Application Layer
Question No 107
Go-Back-N protocol is one of the Layer protocol, which is used to control the flow
of data during the transmission
► Presentation
► Network
► Data Link
► Physical
Question No 108
Error correction in more than the erro detection.
► Useless
► Informal
► Difficult
► Easy
Question No 109
Stop-and-Wait protocol is used for_
► Flow control Only
► Neither flow nor error control
AL-JUNAID TECH INSTITUTE
► Both flow and error control
Question No 110
is not a function of Data Link control
► Framing
► Error Control
► Flow Control
► Modulation
Question No 111
Payload filed of the PPP frame is of variables Size and it can carry maximum Data up to
► 10 Bytes
► 500 Bytes
► 100 Bytes
► 1500 Bytes
Question No 112
In Block Coding Scheme, number of Code word is always data wods.
► Equal to
► same as
► Greater Then
► Less then
Question No 113
High-Level Data Link Control(HDLC) defines _types of frames to deal with the transfer
modes.
► Three
► Two
► Four
► Six
Question No 114
Congestion control is a feature of layer(S)
► Transport
► All Mentioned
► Network
► Data Link
Question No 115
Error detection and correction are the services provided by Layer.
► Physical Layer
► Application Layer
► Data Link Layer
AL-JUNAID TECH INSTITUTE
► Session Layer
Question No 116
IN Linear Block codes,_ of two valid code words creates another valid code word.
► AND
► OR
► XOR
► NOR
Question No 117
Stop-and-Wait protocol is used for_
► Bothe flow and error control
► Error control Only
► Flow control Only
► Nether flow nor error control
Question No 118
CHAP is an Authentication protocol, which uses_ process to authenticate user information.
► Four way
► Three Way
► Two Way
► Five way
Question No 119
Data link layer is divided into sub Layer
► Seven
► Two
► Five
► Three
Question No 120
If we need to correct a single error in an 8-bit data unit, we need to consider possible error
location.
► 16
► 2
► 8
► 4
Question No 121
is not a function of Data Link Control.
► Framing
► Modulation
► Flow control
► Error control
AL-JUNAID TECH INSTITUTE
Question No 122
The is the number of single elements sent per unit time.
► Single rate
► Period
► Bit rate
► Data rate
Question No 123
In ASK, both and remain constant.
► Amplitude, Frequency
► Amplitude, phase
► Frequency, Phase
► Amplitude, Samples
Question No 124
In an analog hierarchy to carry voice channels, a group can carry
voice channels.
► 60
► 12
► 20
► 10
Question No 125
Which of the following sublyer resolves the contention for theshared media.
► MAC
► LLC
► Physical
► None of the given.
Question No 126
What is the period of a Sine wave having frequency of 5 Hz?
► 0.2
► 0.1
► 0.5
► 0.3
Question No 127
In CRC there is no error if the remainder at the receiver is
.
► Equal to the remainder at the sender
► Zero
► Nonzero
► The quotient at the sender
Question No 128
Analog To Analog Conversion Methods include .
► AM, PM and FM
► AM, FSK and PM
AL-JUNAID TECH INSTITUTE
► AM, PM and QAM
► None of the given
Question No 129
Signals travel through fiber optic cable are in the form of
.
► Light
► Bits
► Electromagnetic
► Bytes
Question No 130
If the Hamming distance between sent and received code word is
, then it shows that received data is corrupted.
► ≠0
► =0
► ≠1
► =1
Question No 131
The flag in PPP is a byte that needs to be whenever it
appears in the data section of the frame.
► Duplicated
► Blocked
► Cleaned
► Escaped
Question No 132
is normally used where speed is priority in datatransfer.
► Serial data transmission
► Hybrid data transmission
► Parallel data transmission
► Both parallel and serial data transmission
Question No 133
Baud rate is greater than or equal to the bit rate.
► True
► False
Question No 134
is an Authentication Protocol, which is used by the PPPto authenticate
passwords.
► CHAP
► PAP
► LCP
► ICMP
Question No 135
In Pure ALOHA, the vulnerable time is the frame
transmission time.
► Same as
AL-JUNAID TECH INSTITUTE
► Two times
► Three times
► Four times
Question No 136
A broadcast signal is received by the orbiting satellites whichrebroadcasts .
► to the resender
► to the sender
► to the atmosphere
► none of the given
Question No 137
In TCP/IP protocol suite, the process of adding header at eachlayer on sending side is
known as .
► Encapulation
► De-encapulation
► Packetizing
► Framing
Question No 138
By using system, change in the file contentsduring file transmission can be
avoided.
► Routing
► Flow Control
► Error Detection and Correction
► Congestion Control
Question No 139
Which of the following consist of just one redundant bit per dataunit?
► Two dimensional Parity check.
► CRC
► Simple Parity Check
► Checksum
Question No 140
If duration of noise is decreased during a transmission over noisychannel, fixed data rate of the
channel will cause _number of bits being impacted by the noise.
► Constant
► More
► Less
► Zero
Question No 141
The extra bits added with the original data for errordetection/correction are
called .
► Fault bits
► Port numbers
► Redundant bits
► Process IDs
AL-JUNAID TECH INSTITUTE
Question No 142
Flow control is needed to prevent .
► Bit errors
► Overflow of the sender buffer
► Overflow of the receiver buffer
► Collision between sender and receiver
Question No 143
The inversion of the level represents a 1 bit in encoding
► NRZ-I
► NRZ-L
► RZ
► Manchester
Question No 144
The term means that only one bit of a given data unit ischanged from 1 to 0 or from 0 to
1.
► Packet Error
► Burst Error
► Single Bit Error
► Character Error
Question No 145
A sine wave is defined by characteristics.
► 2
► 3
► 4
► 5
Question No 146
Quadrature Amplitude Modulation (QAM) is the combination of
and .
► FSK, PSK
► PSK, FSK
► ASK, PSK
► ASK, FSK
Question No 147
If we need to correct a single error in an 8-bit data unit, we needto consider possible error
locations.
► 16
► 2
► 4
► 8
Question No 148
Question No 162
Analog refers to something that is continuous in .
► Time
► Space
► Frequency
► None of the given
Question No 163
Time domain shows changes in .
► time w.r.t signal amplitude
► signal amplitude w.r.t time
► time
► All of the given
Question No 164
Mr. Asif while sitting in Lahore is talking with his friend in Dubaithrough Skype is an
example of .
► Local Area Network
► Metropolitan Area Network
► Wide Area Network
► Home Based Network
Question No 165
Which level of the TCP/IP reference model routesdata/information across a
network channel?
► Application Layer
► Data Link Layer
► Transport Layer
► Network Layer
Question No 166
There are types of serial transmission.
► 3
► 4
► 2
► None of the given
Question No 167
Question No 170
Which error detection method consists of a parity bit for each unit aswell as an entire data unit
of parity bits?
► Checksum
► Cyclic Redundancy Check (CRC)
► Longitudinal Red Check (LRC)
► Vertical Redundancy Check (VRC)
Question No 171
Central Hub in a Tree is an .
► Active hub
► passive hub
Question No 172
Time domain plot show changes in signal phase with respect to time.
► true
► false
Question No 172
is an Authentication Protocol, which uses two-step processto authenticate user
information?
► CHAP
► LCP
► PAP
► ICMP
Question No 173
CHAP is an Authentication Protocol, which uses process to
AL-JUNAID TECH INSTITUTE
authenticate user information.
► Two-way
► Three-way
► Four-way
► Five-way
Question No 174
No matter whether the link is dedicated or broadcast, data link control
(DLC) layer provides services between .
► Virtual LANs
► Two adjacent nodes
► Ethernet links
► Source and destination PCs
Question No 175
Encoding digital data into digital signals is called .
► Analog-to-Digital Conversion
► Digital-to-Digital Conversion
► Digital-to-Analog Conversion
► None of the given
Question No 176
encoding is almost obsolete today
► Bipolar
► Unipolar
► Polar
► None of the given
Question No 177
The Internet is .
► software for sending e-mail around the world
► a government-owned agency that links computers
► a global network of computers networks
► a specialised form of local area network
Question No 178
PSK is susceptible to the noise degradation.
► True
► False
Question No 179
Low pass channel has bandwidth between two stations.
► Dedicated
► Shared
► Multiplexed
► Infinite
Question No 180
In ASK, Noise usually affects the .
► Amplitude
► Phase
AL-JUNAID TECH INSTITUTE
► Sample
► Frequency
► Infinite
Question No 181
The flag in PPP is a byte that needs to be whenever it
appears in the data section of the frame.
► Duplicated
► Blocked
► Cleaned
► Escaped
Question No 182
Which of the following is not a characteristic of a sine wave?
► Amplitude
► Segmentation
► Phase
► Frequency
► Infinite
Question No 183
In statistical time division multiplexing, number of slots in frame areless than .
► Output data rate
► Input lines
► Input frequency
► Multiplexed T lines
► Infinite
Question No 184
If a digital signal has "L" number of levels. is the numberof
bits required to represent each level.
► Log L
► Log Base 2 L
► L Square
► Log(2*L)
► Infinite
Question No 185
is responsible for governing node to node communication.
► Application Layer
► Session Layer
► Data Link layer
► Presentation Layer
► Infinite
Question No 186
The original Ethernet technology with the data rate of 10 Mbps is
called ?
► Standard Ethernet
► Fast Ethernet
► Gigabit Ethernet
AL-JUNAID TECH INSTITUTE
► 10 Gigabit Ethernet
► Infinite
Question No 187
What is the period of a Sine wave having frequency of 2 Hz?
► 0.2
► 0.1
► 0.5
► 0.3
Question No 188
In line discipline after the data transmission, the sending system
finishes with an
► EOT
► EKT
► ENT
► ESP
► Infinite
Question No 189
are used for Multi cas communication, such as radio and Television.
► Microwaves
► Radio Waves
► Light waves
► Infrared Waves
Question No 190
POTS stand for ?
► Plain Old Telephone System
► Plain Old Telephone Services
► Plain Old Time Sharing
► Plain Old Telephone Set
Question No 191
In , a station monitors the medium after it sends a frame to see if the
transmission was successful.
► CSMA
► None of Given
► CSMA/CA
► CSMA/CD
Question No 192
DSL stand For
► Digital Subscribe Line
► Data Subscribe Line
► Data Switched Line
► Digital Switched Line
Question No 193
In Ethernet frame, both destination and sender addresses are of length _.
AL-JUNAID TECH INSTITUTE
► 2 byte
► 4 byte
► 6 byte
► 5 byte
Question No 193
Data Link layer provides services to the _ layer.
► Network
► Transport
► Application
► Session
Question No 194
is/are un-reliable protocol(s).
► TCP
► IP and TCP
► IP and UDP
► UDP
Question No 195
When we represent the data in CDMA, if a station is idle then it sends .
► -1
► 1
► Infinity
► 0
Question No 196
In the context of Ethernet address, the source address is always a address.
► Multicast
► Broadcast
► Unicast
► 128 Broad Cast
Question No 197
is the process of converting digital data to digital signals.
► Line Coding
► Multicast
► Broadcast
► Unicast
Question No 198
In even parity check code, the value of syndrome is if the number of 1s is even.
► 4
► 0
► 1
► 2
Question No 199
In each band is reserved for a specific station, and it belongs to the station
all the time.
► FDMA
AL-JUNAID TECH INSTITUTE
► TDMA
► CSMA
► CDMA
Question No 200
MAC address is of .
► 48 bits or 64 bits
► 24 bits
► 36 bits
► 42 bits
Question No 201
Checksum is an error-detection technique that can be applied to a message of length.
► Exactly 8
► Exactly 4
► Exactly 32
► Any
Question No 202
A personal computer or workstation on an Ethernet network must have _ card.
► None of the Given
► TDI
► PCI
► NCI
Question No 203
One of the most common protocols for point-to-point access is _ .
► PPP
► IP
► UDP
► TCP
Question No 204
In order to find Hamming distance between two pair of words, logical operation is
used.
► NAND
► XOR
► AND
► OR
Question No 205
In order to resolve link layer address of the next node, the first generated ARP request is always
in mode.
► Multicast
► Unicast
► Multiplex
► Broadcast
Question No 206
transmission technology (based on Ethernet) provides a data rate of 1 billion bits per
AL-JUNAID TECH INSTITUTE
second.
► Gigabit Ethernet
► Standard Ethernet
► 10BASE-T Ethernet
► Fast Ethernet
Question No 207
The message 1110 sent by a source is received by a destination as 1011. This is type of
error.
► Hamming
► Single-Bit
► Uni-Bit
► Burst
Question No 208
a3:34:45:11:92:F1 is a link layer address.
► Unicast OR Data Both are correct
► Broadcast
► Multicast
► Multiplexer
Question No 209
In which controlled-access method all data exchanges must be made through primary device
even when the ultimate destination is a secondary device?
► Port Forwarding
► Reservation
► Polling
► Token Passing
Question No 210
was used as the medium in 10 Base-T.
► Twisted Cable
► Thick Coaxial Cable
► Thin Coaxial Cable
► Two Mode Fiber Cable