Vous êtes sur la page 1sur 59

Out of 31 questions, you answered 9 correctly, for a final grade of 29%.Please answer all questions.

The correct answer for each question is indicated by a .


The _______ is the physical path over which a message travels.
A)Protocol
B)Medium
C)Signal
D)All the above
The information to be communicated in a data communications system is the _______.
A)Medium
B)Protocol
C)Message
D)Transmission
Frequency of failure and network recovery time after a failure are measures of the _______ of a network.
A)Performance
B)Reliability
C)Security
D)Feasibility
An unauthorized user is a network _______ issue.
A)Performance
B)Reliability
C)Security
D)All the above
Which topology requires a central controller or hub?
A)Mesh
B)Star
C)Bus
D)Ring
Which topology requires a multipoint connection?
A)Mesh
B)Star
C)Bus
D)Ring
Communication between a computer and a keyboard involves ______________ transmission.
A)simplex
B)half-duplex
C)full-duplex
D)automatic
A television broadcast is an example of _______ transmission.
A)simplex
B)half-duplex
C)full-duplex
D)automatic
A _______ connection provides a dedicated link between two devices.
A)point-to-point
B)multipoint
C)primary
D)secondary
In a _______ connection, more than two devices can share a single link.
A)point-to-point
B)multipoint
C)primary
D)secondary
In _______ transmission, the channel capacity is shared by both communicating devices at all times.
A)simplex
B)half-duplex
C)full-duplex
D)half-simplex
In the original ARPANET, _______ were directly connected together.
A)IMPs
B)host computers
C)networks
D)routers
This was the first network.
A)CSNET
B)NSFNET
C)ANSNET
D)ARPANET
Which organization has authority over interstate and international commerce in the communications field?
A)ITU-T
B)IEEE
C)FCC
D)ISOC
_______ are special-interest groups that quickly test, evaluate, and standardize new technologies.
A)Forums
B)Regulatory agencies
C)Standards organizations
D)All of the above
Which agency developed standards for physical connection interfaces and electronic signaling specifications?
A)EIA
B)ITU-T
C)ANSI
D)ISO
_______ is the protocol suite for the current Internet.
A)TCP/IP
B)NCP
C)UNIX
D)ACM
_______ refers to the structure or format of the data, meaning the order in which they are presented.
A)Semantics
B)Syntax
C)Timing
D)All of the above
________ defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation.
A)Semantics
B)Syntax
C)Timing
D)None of the above
_______ refers to two characteristics: when data should be sent and how fast it can be sent.
A)Semantics
B)Syntax
C)Timing
D)none of the above
Data flow between two devices can occur in a _______ way.
A)simplex
B)half-duplex
C)full-duplex
D)all of the above
In a ______ connection, two and only two devices are connected by a dedicated link.
A)multipoint
B)point-to-point
C)(a) and (b)
D)none of the above
In a ________ connection, three or more devices share a link.
A)multipoint
B)point-to-point
C)(a) and (b)
D)none of the above
______ refers to the physical or logical arrangement of a network.
A)Data flow
B)Mode of operation
C)Topology
D)None of the above
Devices may be arranged in a _____ topology.
A)mesh
B)ring
C)bus
D)all of the above
A _______ is a data communication system within a building, plant, or campus, or between nearby buildings.
A)MAN
B)LAN
C)WAN
D)none of the above
A ______ is a data communication system spanning states, countries, or the whole world.
A)MAN
B)LAN
C)WAN
D)none of the above
________ is a collection of many separate networks.
A)A WAN
B)An internet
C)a LAN
D)None of the above
There are ______________ Internet service providers.
A)local
B)regional
C)national and international
D)all of the above
A ________ is a set of rules that governs data communication.
A)forum
B)protocol
C)standard
D)none of the above
________ is an idea or concept that is a precursor to an Internet standard.
A)RCF
B)RFC
C)ID
D)none of the above
Out of 48 questions, you answered 13 correctly, for a final grade of 27%.Please answer all questions.
The correct answer for each question is indicated by a .
The Internet model consists of _______ layers.
A)Three
B)Five
C)Seven
D)Eight
The process-to-process delivery of the entire message is the responsibility of the _______ layer.
A)Network
B)Transport
C)Application
D)Physical
The _______ layer is the layer closest to the transmission medium.
A)Physical
B)Data link
C)Network
D)Transport
Mail services are available to network users through the _______ layer.
A)Data link
B)Physical
C)Transport
D)Application
As the data packet moves from the upper to the lower layers, headers are _______.
A)Added
B)Removed
C)Rearranged
D)Modified
The _______ layer lies between the network layer and the application layer.
A)Physical
B)Data link
C)Transport
D)None of the above
Layer 2 lies between the physical layer and the _______ layer.
A)Network
B)Data link
C)Transport
D)None of the above
When data are transmitted from device A to device B, the header from A's layer 4 is read by B's _______ layer.
A)Physical
B)Transport
C)Application
D)None of the above
The _______ layer changes bits into electromagnetic signals.
A)Physical
B)Data link
C)Transport
D)None of the above
Which of the following is an application layer service?
A)Remote log-in
B)File transfer and access
C)Mail service
D)All the above
Why was the OSI model developed?
A)Manufacturers disliked the TCP/IP protocol suite.
B)The rate of data transfer was increasing exponentially
C)Standards were needed to allow any two systems to communicate
D)None of the above
The _______ model shows how the network functions of a computer ought to be organized.
A)CCITT
B)OSI
C)ISO
D)ANSI
The physical layer is concerned with the movement of _______ over the physical medium.
A)programs
B)dialogs
C)protocols
D)bits
The OSI model consists of _______ layers.
A)three
B)five
C)seven
D)eight
In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______.
A)added
B)removed
C)rearranged
D)modified
In the OSI model, when data is transmitted from device A to device B, the header from A's layer 5 is read by B's _______
layer.
A)physical
B)transport
C)session
D)presentation
In the OSI model, what is the main function of the transport layer?
A)node-to-node delivery
B)process-to-process message delivery
C)synchronization
D)updating and maintenance of routing tables
In the OSI model, encryption and decryption are functions of the ________ layer.
A)transport
B)session
C)presentation
D)application
When a host on network A sends a message to a host on network B, which address does the router look at?
A)port
B)logical
C)physical
D)none of the above
To deliver a message to the correct application program running on a host, the _______ address must be consulted.
A)port
B)IP
C)physical
D)none of the above
IPv6 has _______ -bit addresses.
A)32
B)64
C)128
D)variable
ICMPv6 includes _______.
A)IGMP
B)ARP
C)RARP
D)a and b
The ______ layer is responsible for moving frames from one hop (node) to the next.
A)physical
B)data link
C)transport
D)none of the above
The ______ layer adds a header to the packet coming from the upper layer that includes the logical addresses of the
sender and receiver.
A)physical
B)data link
C)network
D)none of the above
The_________ layer is responsible for the delivery of a message from one process to another.
A)physical
B)transport
C)network
D)none of the above
The Internetworking Protocol (IP) is a ________ protocol.
A)reliable
B)connection-oriented
C)both a and b
D)none of the above
_______ is a process-to-process protocol that adds only port addresses, checksum error control, and length information
to the data from the upper layer.
A)TCP
B)UDP
C)IP
D)none of the above
__________ provides full transport layer services to applications.
A)TCP
B)UDP
C)ARP
D)none of the above
The ________ address, also known as the link address, is the address of a node as defined by its LAN or WAN.
A)port
B)physical
C)logical
D)none of the above
Ethernet uses a ______ physical address that is imprinted on the network interface card (NIC).
A)32-bit
B)64-bit
C)6-byte
D)none of the above
A port address in TCP/IP is ______ bits long.
A)32
B)48
C)16
D)none of the above
The ____ created a model called the Open Systems Interconnection, which allows diverse systems to communicate.
A)OSI
B)ISO
C)IEEE
D)none of the above
The seven-layer _____ model provides guidelines for the development of universally compatible networking protocols.
A)OSI
B)ISO
C)IEEE
D)none of the above
The physical, data link, and network layers are the ______ support layers.
A)user
B)network
C)both (a) and (b)
D)neither (a) nor (b)
The session, presentation, and application layers are the ____ support layers.
A)user
B)network
C)both (a) and (b)
D)neither (a) nor (b)
The _______ layer links the network support layers and the user support layers.
A)transport
B)network
C)data link
D)session
The _______ layer coordinates the functions required to transmit a bit stream over a physical medium.
A)transport
B)network
C)data link
D)physical
The _______ layer is responsible for delivering data units from one station to the next without errors.
A)transport
B)network
C)data link
D)physical
The ______ layer is responsible for the source-to-destination delivery of a packet across multiple network links.
A)transport
B)network
C)data link
D)physical
The ________ layer is responsible for the process-to-process delivery of the entire message.
A)transport
B)network
C)data link
D)physical
The ______ layer establishes, maintains, and synchronizes the interactions between communicating devices.
A)transport
B)network
C)session
D)physical
The _______ layer ensures interoperability between communicating devices through transformation of data into a
mutually agreed upon format.
A)transport
B)network
C)data link
D)presentation
The _________ layer enables the users to access the network.
A)transport
B)application
C)data link
D)physical
TCP/IP is a ______ hierarchical protocol suite developed ____ the OSI model.
A)seven-layer; before
B)five-layer; before
C)six-layer; before
D)five-layer; after
The TCP/IP _______ layer is equivalent to the combined session, presentation, and application layers of the OSI model.
A)application
B)network
C)data link
D)physical
The ________ address, also known as the link address, is the address of a node as defined by its LAN or WAN.
A)physical
B)IP
C)port
D)specific
The ____ address uniquely defines a host on the Internet.
A)physical
B)IP
C)port
D)specific
The_____ address identifies a process on a host.
A)physical
B)IP
C)port
D)specific
Out of 34 questions, you answered 10 correctly, for a final grade of 29%.Please answer all questions.
The correct answer for each question is indicated by a .
Before data can be transmitted, they must be transformed to ________.
A)periodic signals
B)electromagnetic signals
C)aperiodic signals
D)low-frequency sine waves
A periodic signal completes one cycle in 0.001 s. What is the frequency?
A)1 Hz
B)100 Hz
C)1 KHz
D)1 MHz
In a frequency-domain plot, the horizontal axis measures the ________.
A)peak amplitude
B)frequency
C)phase
D)slope
In a time-domain plot, the horizontal axis is a measure of ________.
A)signal amplitude
B)frequency
C)phase
D)time
If the bandwidth of a signal is 5 KHz and the lowest frequency is 52 KHz, what is the highest frequency?
A)5 KHz
B)10 KHz
C)47 KHz
D)57 KHz
What is the bandwidth of a signal that ranges from 1 MHz to 4 MHz?
A)4 MHz
B)1 KHz
C)3 MHz
D)none of the above
As frequency increases, the period ________.
A)decreases
B)increases
C)remains the same
D)doubles
Given two sine waves A and B, if the frequency of A is twice that of B, then the period of B is ________ that of A.
A)one-half
B)twice
C)the same as
D)indeterminate from
A sine wave is ________.
A)periodic and continuous
B)aperiodic and continuous
C)periodic and discrete
D)aperiodic and discrete
If the maximum amplitude of a sine wave is 2 V, the minimum amplitude is ________ V.
A)2
B)1
C)-2
D)between -2 and 2
A signal is measured at two different points. The power is P1 at the first point and P2 at the second point. The dB is 0.
This means ________.
A)P2 is zero
B)P2 equals P1
C)P2 is much larger than P1
D)P2 is much smaller than P1
________ is a type of transmission impairment in which the signal loses strength due to the resistance of the
transmission medium.
A)Attenuation
B)Distortion
C)Noise
D)Decibel
________ is a type of transmission impairment in which the signal loses strength due to the different propagation speeds
of each frequency that makes up the signal.
A)Attenuation
B)Distortion
C)Noise
D)Decibel
________ is a type of transmission impairment in which an outside source such as crosstalk corrupts a signal.
A)Attenuation
B)Distortion
C)Noise
D)Decibel
When propagation speed is multiplied by propagation time, we get the ________.
A)throughput
B)wavelength of the signal
C)distortion factor
D)distance a signal or bit has traveled
Data can be ________.
A)analog
B)digital
C)(a) or (b)
D)none of the above
_______ data are continuous and take continuous values.
A)analog
B)digital
C)(a) or (b)
D)none of the above
_______ data have discrete states and take discrete values.
A)Analog
B)Digital
C)(a) or (b)
D)None of the above
Signals can be ________.
A)analog
B)digital
C)either (a) or (b)
D)neither (a) nor (b)
_____ signals can have an infinite number of values in a range.
A)Analog
B)Digital
C)(a) or (b)
D)None of the above
_______ signals can have only a limited number of values.
A)Analog
B)Digital
C)(a) or (b)
D)None of the above
Frequency and period are ______.
A)inverse of each other
B)proportional to each other
C)the same
D)none of the above
________is the rate of change with respect to time.
A)Amplitude
B)Time
C)Frequency
D)Voltage
_______ describes the position of the waveform relative to time 0.
A)Frequency
B)Phase
C)Amplitude
D)Voltage
A sine wave in the ______ domain can be represented by one single spike in the _____ domain.
A)time; frequency
B)frequency; time
C)time; phase
D)phase; time
A _________ sine wave is not useful in data communications; we need to send a _______ signal.
A)composite; single-frequency
B)single-frequency; composite
C)single-frequency; double-frequency
D)none of the above
The _____ of a composite signal is the difference between the highest and the lowest frequencies contained in that
signal.
A)frequency
B)period
C)bandwidth
D)amplitude
A(n)_________ signal is a composite analog signal with an infinite bandwidth.
A)digital
B)analog
C)either (a) or (b)
D)neither (a) nor (b)
Baseband transmission of a digital signal is possible only if we have a ____ channel.
A)low-pass
B)bandpass
C)low rate
D)high rate
If the available channel is a ____ channel, we cannot send a digital signal directly to the channel.
A)low-pass
B)bandpass
C)low rate
D)high rate
For a ______ channel, the Nyquist bit rate formula defines the theoretical maximum bit rate.
A)noisy
B)noiseless
C)bandpass
D)low-pass
For a ______ channel, we need to use the Shannon capacity to find the maximum bit rate.
A)noisy
B)noiseless
C)bandpass
D)low-pass
_________ can impair a signal.
A)Attenuation
B)Distortion
C)Noise
D)All of the above
The _________ product defines the number of bits that can fill the link.
A)bandwidth-period
B)frequency-amplitude
C)bandwidth-delay
D)delay-amplitude
Out of 48 questions, you answered 14 correctly, for a final grade of 29%.Please answer all questions.
The correct answer for each question is indicated by a .
Unipolar, bipolar, and polar encoding are types of _______ encoding.
A)line
B)block
C)NRZ
D)Manchester
_______ encoding has a transition at the middle of each bit.
A)RZ
B)Manchester
C)Differential Manchester
D)All the above
_______ encoding has a transition at the beginning of each 0 bit.
A)RZ
B)Manchester
C)Differential Manchester
D)All the above
PCM is an example of _______ conversion.
A)digital-to-digital
B)digital-to-analog
C)analog-to-analog
D)analog-to-digital
If the frequency spectrum of a signal has a bandwidth of 500 Hz with the highest frequency at 600 Hz, what should be
the sampling rate, according to the Nyquist theorem?
A)200 samples/s
B)500 samples/s
C)1000 samples/s
D)1200 samples/s
The Nyquist theorem specifies the minimum sampling rate to be_______.
A)equal to the lowest frequency of a signal
B)equal to the highest frequency of a signal
C)twice the bandwidth of a signal
D)twice the highest frequency of a signal
Which of the following encoding methods does not provide for synchronization?
A)NRZ-L
B)RZ
C)NRZ-I
D)Manchester
Which encoding method uses alternating positive and negative values for 1s?
A)NRZ-I
B)RZ
C)Manchester
D)AMI
Which quantization level results in a more faithful reproduction of the signal?
A)2
B)8
C)16
D)32
Block coding can help in _______ at the receiver.
A)Synchronization
B)Error detection
C)Attenuation
D)(a) and (b)
In _______ transmission, bits are transmitted simultaneously, each across its own wire.
A)Asynchronous serial
B)Synchronous serial
C)Parallel
D)(a) and (b)
In _______ transmission, bits are transmitted over a single wire, one at a time.
A)asynchronous serial
B)synchronous serial
C)parallel
D)(a) and (b)
In _______ transmission, a start bit and a stop bit frame a character byte.
A)asynchronous serial
B)synchronous serial
C)parallel
D)(a) and (b)
In asynchronous transmission, the gap time between bytes is _______.
A)fixed
B)variable
C)a function of the data rate
D)zero
___________ conversion involves three techniques: line coding, block coding, and scrambling.
A)Analog-to-digital
B)Digital-to-analog
C)Analog-to-analog
D)Digital-to-digital
________ is the process of converting digital data to a digital signal.
A)Block coding
B)Line coding
C)Scrambling
D)None of the above
_______ provides redundancy to ensure synchronization and inherent error detection.
A)Block coding
B)Line coding
C)Scrambling
D)None of the above
________ is normally referred to as mB/nB coding; it replaces each m-bit group with an n-bit group.
A)Block coding
B)Line coding
C)Scrambling
D)None of the above
________ provides synchronization without increasing the number of bits.
A)Scrambling
B)Line coding
C)Block coding
D)None of the above
Two common scrambling techniques are ________.
A)NRZ and RZ
B)AMI and NRZ
C)B8ZS and HDB3
D)Manchester and differential Manchester
The most common technique to change an analog signal to digital data is called __________.
A)PAL
B)PCM
C)sampling
D)none of the above
The first step in PCM is ________.
A)quantization
B)modulation
C)sampling
D)none of the above
There are three sampling methods: __________.
A)quantized, sampled, and ideal
B)ideal, sampled, and flat-top
C)ideal, natural, and flat-top
D)none of the above
______ finds the value of the signal amplitude for each sample; ____ finds the change from the previous sample.
A)DM; PCM
B)PCM; DM
C)DM; CM
D)none of the above
While there is (are) only _____ way(s) to send parallel data, there is (are) three subclass(es) of serial transmission.
A)one; two
B)two; three
C)one; three
D)none of the above
In ______ transmission, we send 1 start bit (0) at the beginning and 1 or more stop bits (1s) at the end of each byte.
A)synchronous
B)asynchronous
C)isochronous
D)none of the above
In _________ transmission, we send bits one after another without start or stop bits or gaps. It is the responsibility of
the receiver to group the bits.
A)synchronous
B)asynchronous
C)isochronous
D)none of the above
The ________ mode provides synchronization for the entire stream of bits must. In other words, it guarantees that the
data arrive at a fixed rate.
A)synchronous
B)asynchronous
C)isochronous
D)none of the above
A _________ digital signal includes timing information in the data being transmitted.
A)self-synchronizing
B)self-modulated
C)self-transmitted
D)none of the above
In decoding a digital signal, the receiver calculates a running average of the received signal power, called the _______.
A)baseline
B)base
C)line
D)none of the above
The ________ rate defines the number of data elements sent in 1s; the ______ rate is the number of signal elements
sent in 1s.
A)data; signal
B)signal; data
C)baud; bit
D)none of the above
The signal rate is sometimes called the ____ rate.
A)baud
B)bit
C)signal
D)none of the above
The data rate is sometimes called the ___ rate.
A)baud
B)bit
C)signal
D)none of the above
In a _____ scheme, all the signal levels are on one side of the time axis, either above or below.
A)polar
B)bipolar
C)unipolar
D)all of the above
In ______ schemes, the voltages are on the both sides of the time axis. For example, the voltage level for 0 can be
positive and the voltage level for 1 can be negative.
A)polar
B)bipolar
C)unipolar
D)all of the above
In _____, the level of the voltage determines the value of the bit.
A)NRZ-I
B)NRZ-L
C)both (a) and (b)
D)neither (a) nor (b)
In ______, the change or lack of change in the level of the voltage determines the value of the bit.
A)NRZ-I
B)NRZ-L
C)both (a) and (b)
D)neither (a) nor (b)
The idea of RZ and the idea of NRZ-L are combined into the ________ scheme.
A)Manchester
B)differential Manchester
C)both (a) and (b)
D)neither (a) nor (b)
The idea of RZ and the idea of NRZ-I are combined into the ________ scheme.
A)Manchester
B)differential Manchester
C)both (a) and (b)
D)neither (a) nor (b)
In _______ encoding, the duration of the bit is divided into two halves. The voltage remains at one level during the first
half and moves to the other level in the second half. The transition at the middle of the bit provides synchronization.
A)Manchester
B)differential Manchester
C)both (a) and (b)
D)neither (a) nor (b)
In ___________ there is always a transition at the middle of the bit, but the bit values are determined at the beginning
of the bit. If the next bit is 0, there is a transition; if the next bit is 1, there is none.
A)Manchester
B)differential Manchester
C)both (a) and (b)
D)neither (a) nor (b)
In Manchester and differential Manchester encoding, the transition at the middle of the bit is used for __________.
A)bit transfer
B)baud transfer
C)synchronization
D)none of the above
The minimum bandwidth of Manchester and differential Manchester is ____ that of NRZ.
A)the same as
B)twice
C)thrice
D)none of the above
In _______encoding, we use three levels: positive, zero, and negative.
A)unipolar
B)bipolar
C)polar
D)none of the above
The _____ scheme uses data patterns of size 2 and encodes the 2-bit patterns as one signal element belonging to a four-
level signal.
A)4B5B
B)2B1Q
C)MLT-3
D)none of the above
The ______ scheme uses three levels (+V, 0, and -V) and three transition rules to move between the levels.
A)4B5B
B)2B1Q
C)MLT-3
D)none of the above
______ substitutes eight consecutive zeros with 000VB0VB.
A)B4B8
B)HDB3
C)B8ZS
D)none of the above
______ substitutes four consecutive zeros with 000V or B00V
A)B4B8
B)HDB3
C)B8ZSf
D)none of the above
Out of 34 questions, you answered 9 correctly, for a final grade of 26%.Please answer all questions.
The correct answer for each question is indicated by a .
ASK, PSK, FSK, and QAM are examples of ________ conversion.
A)digital-to-digital
B)digital-to-analog
C)analog-to-analog
D)analog-to-digital
AM and FM are examples of ________ conversion.
A)digital-to-digital
B)digital-to-analog
C)analog-to-analog
D)analog-to-digital
In QAM, both ________ of a carrier frequency are varied.
A)frequency and amplitude
B)phase and frequency
C)amplitude and phase
D)none of the above
If the baud rate is 400 for a QPSK signal, the bit rate is ________ bps.
A)100
B)400
C)800
D)1600
If the bit rate for an ASK signal is 1200 bps, the baud rate is ________.
A)300
B)400
C)600
D)1200
If the bit rate for an FSK signal is 1200 bps, the baud rate is ________.
A)300
B)400
C)600
D)1200
If the bit rate for a 16-QAM signal is 4000 bps, what is the baud rate?
A)300
B)400
C)1000
D)1200
If the baud rate for a 64-QAM signal is 2000, what is the bit rate?
A)300
B)400
C)1000
D)12000
Given an AM radio signal with a bandwidth of 10 KHz and the highest-frequency component at 705 KHz, what is the
frequency of the carrier signal?
A)700 KHz
B)705 KHz
C)710 KHz
D)Cannot be determined from given information
_______ conversion is the process of changing one of the characteristics of an analog signal based on the information in
the digital data.
A)Digital-to-analog
B)Analog-to-analog
C)Analog-to-digital
D)Digital-to-digital
Which of the following is not a digital-to-analog conversion?
A)ASK
B)PSK
C)FSK
D)AM
In ________, the amplitude of the carrier signal is varied to create signal elements. Both frequency and phase remain
constant.
A)ASK
B)PSK
C)FSK
D)QAM
In _________, the frequency of the carrier signal is varied to represent data. Both peak amplitude and phase remain
constant.
A)ASK
B)PSK
C)FSK
D)QAM
In ________, the phase of the carrier is varied to represent two or more different signal elements. Both peak amplitude
and frequency remain constant.
A)ASK
B)PSK
C)FSK
D)QAM
A constellation diagram shows us the __________ of a signal element, particularly when we are using two carriers (one
in-phase and one quadrature).
A)amplitude and phase
B)amplitude and frequency
C)frequency and phase
D)none of the above
Quadrature amplitude modulation (QAM) is a combination of ___________.
A)ASK and FSK
B)ASK and PSK
C)PSK and FSK
D)none of the above
________ uses two carriers, one in-phase and the other quadrature.
A)ASK
B)PSK
C)FSK
D)QAM
_________ conversion is the representation of analog information by an analog signal.
A)Digital-to-analog
B)Analog-to-analog
C)Analog-to-digital
D)Digital-to-digital
Analog-to-analog conversion is needed if the available bandwidth is _______.
A)low-pass
B)band-pass
C)either (a) or (b)
D)neither (a) nor (b)
Which of the following is not an analog-to-analog conversion?
A)AM
B)PM
C)FM
D)QAM
In _____ transmission, the carrier signal is modulated so that its amplitude varies with the changing amplitudes of the
modulating signal.
A)AM
B)PM
C)FM
D)none of the above
In _____ transmission, the frequency of the carrier signal is modulated to follow the changing voltage level (amplitude) of
the modulating signal. The peak amplitude and phase of the carrier signal remain constant, but as the amplitude of the
information signal changes, the frequency of the carrier changes correspondingly.
A)AM
B)PM
C)FM
D)none of the above
In _____ transmission, the phase of the carrier signal is modulated to follow the changing voltage level (amplitude) of the
modulating signal.
A)AM
B)PM
C)FM
D)none of the above
In _______, the peak amplitude of one signal level is 0; the other is the same as the amplitude of the carrier frequency.
A)PSK
B)OOK
C)FSK
D)none of the above
How many carrier frequencies are used in BASK?
A)2
B)1
C)0
D)none of the above
How many carrier frequencies are used in BFSK?
A)2
B)1
C)0
D)none of the above
How many carrier frequencies are used in BPSK?
A)2
B)1
C)0
D)none of the above
How many carrier frequencies are used in QPSK?
A)2
B)1
C)0
D)none of the above
The constellation diagram of BASK has ______ dots.
A)2
B)1
C)0
D)none of the above
The constellation diagram of BPSK has ______ dots.
A)2
B)1
C)0
D)none of the above
The constellation diagram of QPSK has ______ dots.
A)2
B)1
C)4
D)none of the above
The constellation diagram of 16-QAM has ______ dots.
A)4
B)16
C)8
D)none of the above
The Federal Communications Commission (FCC) allows ______kHz for each AM station.
A)5
B)10
C)20
D)none of the above
The Federal Communications Commission (FCC) allows ______ kHz for each FM station.
A)20
B)100
C)200
D)none of the above
Out of 25 questions, you answered 9 correctly, for a final grade of 36%.Please answer all questions.
The correct answer for each question is indicated by a .
The sharing of a medium and its link by two or more devices is called _______.
A)modulation
B)encoding
C)line discipline
D)multiplexing
Which multiplexing technique transmits analog signals?
A)FDM
B)TDM
C)WDM
D)(a) and (c)
Which multiplexing technique transmits digital signals?
A)FDM
B)TDM
C)WDM
D)None of the above
Which multiplexing technique shifts each signal to a different carrier frequency?
A)FDM
B)TDM
C)Both (a) and (b)
D)None of the above
In synchronous TDM, for n signal sources of the same data rate, each frame contains _______ slots.
A)n
B)n + 1
C)n - 1
D)0 to n
In TDM, the transmission rate of the multiplexed path is usually _______ the sum of the transmission rates of the signal
sources.
A)greater than
B)less than
C)equal to
D)not related to
Which multiplexing technique involves signals composed of light beams?
A)FDM
B)TDM
C)WDM
D)none of the above
_________ utilization is the use of available bandwidth to achieve specific goals.
A)Frequency
B)Bandwidth
C)Amplitude
D)None of the above
________ can be achieved by using multiplexing; ______ can be achieved by using spreading.
A)Efficiency; privacy and antijamming
B)Privacy and antijamming; efficiency
C)Privacy and efficiency; antijamming
D)Efficiency and antijamming; privacy
________ is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link.
A)Demodulating
B)Multiplexing
C)Compressing
D)None of the above
In a multiplexed system, __ lines share the bandwidth of ____ link.
A)1; n
B)1; 1
C)n; 1
D)n; n
The word ______ refers to the portion of a _______ that carries a transmission.
A)channel; link
B)link; channel
C)line; channel
D)line; link
______ can be applied when the bandwidth of a link (in hertz) is greater than the combined bandwidths of the signals to
be transmitted.
A)TDM
B)FDM
C)Both (a) or (b)
D)Neither (a) or (b)
FSM is an _________technique.
A)analog
B)digital
C)either (a) or (b)
D)none of the above
____ is designed to use the high bandwidth capability of fiber-optic cable.
A)FDM
B)TDM
C)WDM
D)None of the above
______ is an analog multiplexing technique to combine optical signals.
A)FDM
B)TDM
C)WDM
D)None of the above
_____ is a digital process that allows several connections to share the high bandwidth of a link.
A)FDM
B)TDM
C)WDM
D)None of the above
_____ is a digital multiplexing technique for combining several low-rate channels into one high-rate one.
A)FDM
B)TDM
C)WDM
D)None of the above
We can divide ____ into two different schemes: synchronous or statistical.
A)FDM
B)TDM
C)WDM
D)none of the above
In ________ TDM, each input connection has an allotment in the output even if it is not sending data.
A)synchronous
B)statistical
C)isochronous
D)none of the above
In ________ TDM, slots are dynamically allocated to improve bandwidth efficiency.
A)synchronous
B)statistical
C)isochronous
D)none of the above
In ________, we combine signals from different sources to fit into a larger bandwidth.
A)spread spectrum
B)line coding
C)block coding
D)none of the above
_______ is designed to be used in wireless applications in which stations must be able to share the medium without
interception by an eavesdropper and without being subject to jamming from a malicious intruder.
A)Spread spectrum
B)Multiplexing
C)Modulation
D)None of the above.
The _______ technique uses M different carrier frequencies that are modulated by the source signal. At one moment, the
sign modulates one carrier frequency; at the next moment, the signal modulates another carrier frequency.
A)FDM
B)DSSS
C)FHSS
D)TDM
The ______ technique expands the bandwidth of a signal by replacing each data bit with n bits.
A)FDM
B)DSSS
C)FHSS
D)TDM
Out of 28 questions, you answered 10 correctly, for a final grade of 36%.Please answer all questions.
The correct answer for each question is indicated by a .
Transmission media are usually categorized as _______.
A)fixed or unfixed
B)guided or unguided
C)determinate or indeterminate
D)metallic or nonmetallic
Transmission media lie below the _______ layer.
A)physical
B)network
C)transport
D)application
_______ cable consists of an inner copper core and a second conducting outer sheath.
A)Twisted-pair
B)Coaxial
C)Fiber-optic
D)Shielded twisted-pair
In fiber optics, the signal is _______ waves.
A)light
B)radio
C)infrared
D)very low-frequency
Which of the following primarily uses guided media?
A)cellular telephone system
B)local telephone system
C)satellite communications
D)radio broadcasting
Which of the following is not a guided medium?
A)twisted-pair cable
B)coaxial cable
C)fiber-optic cable
D)atmosphere
What is the major factor that makes coaxial cable less susceptible to noise than twisted-pair cable?
A)inner conductor
B)diameter of cable
C)outer conductor
D)insulating material
In an optical fiber, the inner core is _______ the cladding.
A)denser than
B)less dense than
C)the same density as
D)another name for
The inner core of an optical fiber is _______ in composition.
A)glass or plastic
B)copper
C)bimetallic
D)liquid
When a beam of light travels through media of two different densities, if the angle of incidence is greater than the critical
angle, _______ occurs.
A)reflection
B)refraction
C)incidence
D)criticism
When the angle of incidence is _______ the critical angle, the light beam bends along the interface.
A)more than
B)less than
C)equal to
D)none of the above
Signals with a frequency below 2 MHz use _______ propagation.
A)ground
B)sky
C)line-of-sight
D)none of the above
Signals with a frequency between 2 MHz and 30 MHz use ______ propagation.
A)ground
B)sky
C)line-of-sight
D)none of the above
Signals with a frequency above 30 MHz use _______propagation.
A)ground
B)sky
C)line-of-sight
D)none of the above
A parabolic dish antenna is a(n) _______ antenna.
A)omnidirectional
B)bidirectional
C)unidirectional
D)horn
A(n) _____ medium provides a physical conduit from one device to another.
A)guided
B)unguided
C)either (a) or (b)
D)none of the above
________ cable consists of two insulated copper wires twisted together.
A)Coaxial
B)Fiber-optic
C)Twisted-pair
D)none of the above
_______ cable is used for voice and data communications.
A)Coaxial
B)Fiber-optic
C)Twisted-pair
D)none of the above
__________ consists of a central conductor and a shield.
A)Coaxial
B)Fiber-optic
C)Twisted-pair
D)none of the above
_____ cable can carry signals of higher frequency ranges than _____ cable.
A)Twisted-pair; fiber-optic
B)Coaxial; fiber-optic
C)Coaxial; twisted-pair
D)none of the above
______ cables are composed of a glass or plastic inner core surrounded by cladding, all encased in an outside jacket.
A)Coaxial
B)Fiber-optic
C)Twisted-pair
D)none of the above
______ cables carry data signals in the form of light.
A)Coaxial
B)Fiber-optic
C)Twisted-pair
D)none of the above
In a fiber-optic cable, the signal is propagated along the inner core by _______.
A)reflection
B)refraction
C)modulation
D)none of the above
_________ media transport electromagnetic waves without the use of a physical conductor.
A)Guided
B)Unguided
C)Either (a) or (b)
D)None of the above
Radio waves are _________.
A)omnidirectional
B)unidirectional
C)bidirectional
D)none of the above
Microwaves are _________.
A)omnidirectional
B)unidirectional
C)bidirectional
D)none of the above
_______ are used for cellular phone, satellite, and wireless LAN communications.
A)Radio waves
B)Microwaves
C)Infrared waves
D)none of the above
________ are used for short-range communications such as those between a PC and a peripheral device.
A)Radio waves
B)Microwaves
C)Infrared waves
D)none of the above
Out of 30 questions, you answered 11 correctly, for a final grade of 37%.Please answer all questions.
The correct answer for each question is indicated by a .
Traditionally, _____ methods of switching have been important.
A)four
B)three
C)five
D)six
We can divide today's networks into ____ broad categories.
A)four
B)three
C)five
D)two
Packet-switched networks can also be divided into ______subcategories: virtual-circuit networks and datagram networks
A)four
B)three
C)two
D)five
A ________ network is made of a set of switches connected by physical links, in which each link is divided into n
channels.
A)line-switched
B)frame-switched
C)circuit-switched
D)none of the above
Circuit switching takes place at the ________ layer.
A)data line
B)physical
C)network
D)transport
In _______, the resources need to be reserved during the setup phase; the resources remain dedicated for the entire
duration of data transfer phase until the teardown phase.
A)datagram switching
B)circuit switching
C)frame switching
D)none of the above
In _________, there is no resource allocation for a packet.
A)datagram switching
B)circuit switching
C)frame switching
D)none of the above
In _________, resources are allocated on demand.
A)datagram switching
B)circuit switching
C)frame switching
D)none of the above
In __________, each packet is treated independently of all others.
A)datagram switching
B)circuit switching
C)frame switching
D)none of the above
In _______ there are no setup or teardown phases.
A)datagram switching
B)circuit switching
C)frame switching
D)none of the above
A _________ network is a cross between a circuit-switched network and a datagram network. It has some characteristics
of both.
A)virtual-circuit
B)packet-switched
C)frame-switched
D)none of the above
We can say that a packet switch has _______ types of components.
A)two
B)three
C)four
D)none of the above
The simplest type of switching fabric is the ______ switch.
A)crosspoint
B)crossbar
C)TSI
D)STS
A ________ switch is a multistage switch with microswitches at each stage that route the packets based on the output
port represented as a binary string.
A)crossbar
B)TSI
C)banyan
D)none of the above
In a banyan switch, for 8 inputs and 8 outputs, we have _____ stages.
A)8
B)4
C)3
D)2
In a banyan switch, for 8 inputs and 8 outputs, we have _____ microswitches at each stage.
A)8
B)4
C)3
D)2
A ________ switch combines space-division and time-division technologies to take advantage of the best of both.
A)TST
B)SSS
C)TTT
D)none of the above
The most popular technology in time-division switching is called the _________.
A)STI
B)ITS
C)TSI
D)none of the above
Based on the Clos criteria, if N = 200, then n must be equal to or greater than ____.
A)10
B)20
C)30
D)40
Based on the Clos criteria, if N = 200, then k must be equal to or greater than ____.
A)21
B)19
C)31
D)41
Based on the Clos criteria, if N = 200, then the minimum number of crosspoints is greater than or equal to _______.
A)15,200
B)18,000
C)42,000
D)20,000
In a one-stage space division switch, if N = 200, the number of crosspoints is ______.
A)10,000
B)20,000
C)40,000
D)30,000
In a three-stage space division switch, if N = 200, the number of crosspoints is ______.
A)40,000
B)greater than 40,000
C)less than 40,000
D)greater than 100,000
A ________ switch combines crossbar switches in several (normally three) stages.
A)multistage
B)multiple crossbar
C)multiple path
D)none of the above
In _______ switching, the paths in the circuit are separated from one another spatially.
A)time-division
B)space-division
C)two-dimensional
D)three-dimensional
A switched WAN is normally implemented as a _______ network.
A)virtual-circuit
B)datagram
C)circuit-switched
D)none of the above
In a ________ network, two types of addressing are involved: global and local.
A)virtual-circuit
B)datagram
C)circuit-switched
D)none of the above
The network layer in the Internet is designed as a __________ network.
A)virtual-circuit
B)datagram
C)circuit-switched
D)none of the above
A switch in a datagram network uses a routing table that is based on the ______ address.
A)source
B)destination
C)local
D)none of the above
The _______ address in the header of a packet in a datagram network normally remains the same during the entire
journey of the packet.
A)source
B)destination
C)local
D)none of the above
Out of 31 questions, you answered 5 correctly, for a final grade of 16%.Please answer all questions.
The correct answer for each question is indicated by a .
A local telephone network is an example of a _______ network.
A)packet-switched
B)circuit-switched
C)message-switched
D)none of the above
The local loop has _______ cable that connects the subscriber telephone to the nearest end office.
A)twisted-pair
B)coaxial
C)fiber-optic
D)none of the above
Data from a computer are _______; the local loop handles _______ signals.
A)analog; analog
B)analog; digital
C)digital; digital
D)digital; analog
_______ is suitable for businesses that require comparable upstream and downstream data rates.
A)VDSL
B)ADSL
C)SDSL
D)(a) and (b)
DMT is a modulation technique that combines elements of _______ and _______.
A)FDM; TDM
B)QDM; QAM
C)FDM; QAM
D)PSK; FSK
The largest portion of the bandwidth for ADSL carries _______.
A)voice communication
B)upstream data
C)downstream data
D)control data
_______ was designed as an alternative to the T-1 line.
A)VDSL
B)ADSL
C)SDSL
D)HDSL
HDSL encodes data using _______.
A)4B/5B
B)2B1Q
C)1B2Q
D)6B/8T
Another name for the cable TV office is the _______.
A)splitter
B)fiber node
C)combiner
D)head end
A traditional cable TV network transmits signals ______.
A)upstream
B)downstream
C)upstream and downstream
D)none of the above
In an HFC network, the downstream data are modulated using the _______ modulation technique.
A)PSK
B)QAM
C)PCM
D)ASK
In an HFC network, the upstream data are modulated using the _______ modulation technique.
A)QAM
B)QPSK
C)PCM
D)ASK
The standard for data transmission over an HFC network is called _______.
A)MCNS
B)DOCSIS
C)CMTS
D)ADSL
The original telephone network, which is referred to as the plain old telephone system (POTS), was an ________ system.
A)digital
B)analog
C)digital as well as analog
D)none of the above
The modern telephone network is now ________.
A)digital
B)analog
C)digital as well as analog
D)none of the above
The telephone network is made of ______ major components.
A)2
B)3
C)4
D)none of the above
The United States is divided into many _______.
A)LECs
B)LATAs
C)IXCs
D)none of the above
The carrier that handles intra-LATA services is called a(n) _____ .
A)POP
B)IXC
C)LEC
D)none of the above
The carrier that handles inter-LATA services is called a(n) _______.
A)POP
B)IXC
C)LEC
D)none of the above
In ______signaling, the same circuit is used for both signaling and data.
A)in-band
B)out-of-band
C)mixed
D)none of the above
In ________signaling, a portion of the bandwidth is used for signaling and another portion for data.
A)in-band
B)out-of-band
C)mixed
D)none of the above
The protocol that is used for signaling in the telephone network is called ______.
A)POP
B)SSS
C)SS7
D)none of the above
Telephone companies provide two types of analog services: analog _______ services and analog _____services.
A)switched; in-band
B)out-of-band; in-band
C)switched; leased
D)leased; out-of-band
The two most common digital services are ________ service and ______.
A)switched/56; switched/64
B)switched/56; DDS
C)DDS; swiched 64
D)leased; out-of-band
The term modem is a composite word that refers to the two functional entities that make up the device: a signal _______
and a signal _______.
A)modulator; demodulator
B)demodulator; modulator
C)modern; demo
D)none of the above
Most popular modems available are based on the ________standards.
A)V-series
B)X-series
C)VX-series
D)none of the above
______technology is a set of technologies develpoed by the telephone companies to provide high data rate transmission.
A)ASL
B)DSL
C)LDS
D)none of the above
The traditional cable TV system used ________cable end to end.
A)twisted-pair
B)coaxial
C)fiber-optic
D)none of the above
The second generation of cable networks is called a(n) _________ network.
A)HFC
B)HCF
C)CFH
D)none of the above
The HFC network uses _______ cable.
A)twisted-pair
B)coaxial
C)fiber-optic
D)a combination of (b) and (c)
To use a cable network for data transmission, we need two key devices: a ______ and a _________
A)CM; CMS
B)CT; CMTS
C)CM; CMTS
D)none of the above
Out of 34 questions, you answered 7 correctly, for a final grade of 21%.Please answer all questions.
The correct answer for each question is indicated by a .
Which error detection method uses one's complement arithmetic?
A)Simple parity check
B)Two-dimensional parity check
C)CRC
D)Checksum
Which error detection method consists of just one redundant bit per data unit?
A)Simple parity check
B)Two-dimensional parity check
C)CRC
D)Checksum
In cyclic redundancy checking, what is the CRC?
A)The divisor
B)The quotient
C)The dividend
D)The remainder
In cyclic redundancy checking, the divisor is _______ the CRC.
A)The same size as
B)one bit less than
C)one bit more than
D)none of the above
A burst error means that two or more bits in the data unit have changed.
A)double-bit
B)burst
C)single-bit
D)none of the above
In ________ error correction, the receiver corrects errors without requesting retransmission.
A)backward
B)onward
C)forward
D)none of the above
In ________ error correction, the receiver asks the sender to send the data again.
A)backward
B)retransmission
C)forward
D)none of the above
We can divide coding schemes into two broad categories: ________ and ______coding.
A)block; linear
B)linear; nonlinear
C)block; convolution
D)none of the above
In modulo-2 arithmetic, __________ give the same results.
A)addition and multiplication
B)addition and division
C)addition and subtraction
D)none of the above
In modulo-2 arithmetic, we use the ______ operation for both addition and subtraction.
A)XOR
B)OR
C)AND
D)none of the above
In _____ coding, we divide our message into blocks, each of k bits, called ___.
A)block; blockwords
B)linear; datawords
C)block; datawords
D)none of the above
We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called _________.
A)datawords
B)blockwords
C)codewords
D)none of the above
The ________ between two words is the number of differences between corresponding bits.
A)Hamming code
B)Hamming distance
C)Hamming rule
D)none of the above
To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block code must be
_______.
A)5
B)6
C)11
D)none of the above
To guarantee correction of up to 5 errors in all cases, the minimum Hamming distance in a block code must be ________.
A)5
B)6
C)11
D)none of the above
In a linear block code, the _______ of any two valid codewords creates another valid codeword.
A)XORing
B)ORing
C)ANDing
D)none of the above
A simple parity-check code can detect __________ errors.
A)an even-number of
B)two
C)no errors
D)an odd-number of
_______codes are special linear block codes with one extra property. If a codeword is rotated, the result is another
codeword.
A)Non-linear
B)Convolution
C)Cyclic
D)none of the above
The _____of errors is more difficult than the ______.
A)correction; detection
B)detection; correction
C)creation; correction
D)creation; detection
In modulo-11 arithmetic, we use only the integers in the range ______, inclusive.
A)1 to 10
B)1 to 11
C)0 to 10
D)none of the above
In modulo-2 arithmetic, we use only ______.
A)1 and 2
B)0 and 2
C)0 and 1
D)none of the above
Adding 1 and 1 in modulo-2 arithmetic results in _________.
A)1
B)2
C)0
D)none of the above
In block coding, if k =2 and n =3, we have _______ invalid codewords.
A)8
B)4
C)2
D)none of the above
The Hamming distance between equal codewords is _________.
A)1
B)n
C)0
D)none of the above
The Hamming distance between 100 and 001 is ________.
A)2
B)0
C)1
D)none of the above
In block coding, if n = 5, the maximum Hamming distance between two codewords is ________.
A)2
B)3
C)5
D)none of the above
If the Hamming distance between a dataword and the corresponding codeword is three, there are _____ bits in error.
A)3
B)4
C)5
D)none of the above
The _______ of a polynomial is the highest power in the polynomial.
A)range
B)degree
C)power
D)none of the above
The divisor in a cyclic code is normally called the _________.
A)degree
B)generator
C)redundancy
D)none of the above
A generator that contains a factor of ____ can detect all odd-numbered errors.
A)x
B)x + 1
C)1
D)none of the above
Checksums use _________ arithmetic.
A)two's complement arithmetic
B)one's complement arithmetic
C)either (a) or (b)
D)none of the above
In one's complement arithmetic, if positive 7 is 0111, then negative 7 is ________.
A)1111
B)1101
C)1000
D)none of the above
The checksum of 1111 and 1111 is _________.
A)1111
B)0000
C)1110
D)0111
The checksum of 0000 and 0000 is __________.
A)1111
B)0000
C)1110
D)0111
Out of 46 questions, you answered 15 correctly, for a final grade of 33%.Please answer all questions.
The correct answer for each question is indicated by a .
In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers?
A)0 to 63
B)0 to 64
C)1 to 63
D)1 to 64
In Go-Back-N ARQ, if frames 4, 5, and 6 are received successfully, the receiver may send an ACK _______ to the sender.
A)5
B)6
C)7
D)any of the above
ARQ stands for _______.
A)Automatic repeat quantization
B)Automatic repeat request
C)Automatic retransmission request
D)Acknowledge repeat request
For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed.
A)exactly 10
B)less than 10
C)more than 10
D)none of the above
HDLC is an acronym for _______.
A)High-duplex line communication
B)High-level data link control
C)Half-duplex digital link combination
D)Host double-level circuit
Data link control deals with the design and procedures for ______ communication.
A)node-to-node
B)host-to-host
C)process-to-process
D)none of the above
_______ in the data link layer separates a message from one source to a destination, or from other messages going from
other sources to other destinations.
A)Digitizing
B)Controlling
C)Framing
D)none of the above
In _______ framing, there is no need for defining the boundaries of frames.
A)fixed-size
B)variable-size
C)standard
D)none of the above
In ________ framing, we need a delimiter (flag) to define the boundary of two frames.
A)fixed-size
B)variable-size
C)standard
D)none of the above
_________framing uses two categories of protocols: character-oriented and bit-oriented.
A)Fixed-size
B)Variable-size
C)Standard
D)None of the above
In a ________ protocol, the data section of a frame is a sequence of characters.
A)bit-oriented
B)character-oriented
C)either (a) or (b)
D)none of the above
In a _________ protocol, the data section of a frame is a sequence of bits.
A)byte-oriented
B)bit-oriented
C)either (a) or (b)
D)none of the above
In _________ protocols, we use ________.
A)character-oriented; byte stuffing
B)character-oriented; bit stuffing
C)bit-oriented; character stuffing
D)none of the above
Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same
pattern as the ______.
A)header
B)trailer
C)flag
D)none of the above
In ________ protocols, we use ________.
A)byte-oriented; bit stuffing
B)character-oriented; bit stuffing
C)bit-oriented; bit stuffing
D)none of the above
Bit stuffing means adding an extra 0 to the data section of the frame when there is a sequence of bits with the same
pattern as the ________.
A)header
B)trailer
C)flag
D)none of the above
_______ control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting
for acknowledgment.
A)Flow
B)Error
C)Transmission
D)none of the above
______ control refers to methods of error detection and correction.
A)Flow
B)Error
C)Transmission
D)none of the above
The Simplest Protocol and the Stop-and-Wait Protocol are for ______ channels.
A)noisy
B)noiseless
C)either (a) or (b)
D)neither (a) nor (b)
The Stop-And-Wait ARQ, Go-Back-N ARQ, and the Selective Repeat ARQ are for ______ channels.
A)noisy
B)noiseless
C)either (a) or (b)
D)neither (a) nor (b)
The ____ Protocol has neither flow nor error control.
A)Stop-and-Wait
B)Simplest
C)Go-Back-N ARQ
D)Selective-Repeat ARQ
The _______Protocol has flow control, but not error control.
A)Stop-and-Wait
B)Simplest
C)Go-Back-N ARQ
D)Selective-Repeat ARQ
The _______Protocol has both flow control and error control.
A)Stop-and-Wait
B)Go-Back-N ARQ
C)Selective-Repeat ARQ
D)both (b) and (c)
In the _____ Protocol, the sender sends its frames one after another with no regard to the receiver.
A)Stop-and-Wait
B)Simplest
C)Go-Back-N ARQ
D)Selective-Repeat ARQ
In the _____ Protocol, the sender sends one frame, stops until it receives confirmation from the receiver, and then sends
the next frame.
A)Stop-and-Wait
B)Simplest
C)Go-Back-N ARQ
D)Selective-Repeat ARQ
The _________Protocol, adds a simple error control mechanism to the _______Protocol.
A)Stop-and-Wait ARQ; Stop-and-Wait
B)Go-Back-N ARQ; Stop-and-Wait
C)Selective Repeat ARQ; Go-Back-N ARQ
D)none of the above
In the _________Protocol, if no acknowledgment for a frame has arrived, we resend all outstanding frames.
A)Stop-and-Wait ARQ
B)Go-Back-N ARQ
C)Selective-Repeat ARQ
D)none of the above
In the _________ protocol we avoid unnecessary transmission by sending only frames that are corrupted.
A)Stop-and-Wait ARQ
B)Go-Back-N ARQ
C)Selective-Repeat ARQ
D)none of the above
Both Go-Back-N and Selective-Repeat Protocols use a _________.
A)sliding frame
B)sliding window
C)sliding packet
D)none of the above
In Go-Back-N ARQ, if 5 is the number of bits for the sequence number, then the maximum size of the send window must
be _____
A)15
B)16
C)31
D)1
In Go-Back-N ARQ, if 5 is the number of bits for the sequence number, then the maximum size of the receive window
must be _____
A)15
B)16
C)31
D)1
In Selective Repeat ARQ, if 5 is the number of bits for the sequence number, then the maximum size of the send window
must be _____
A)15
B)16
C)31
D)1
In Selective Repeat ARQ, if 5 is the number of bits for the sequence number, then the maximum size of the receive
window must be _____
A)15
B)16
C)31
D)1
High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-point and multipoint links.
A)bit-oriented
B)byte-oriented
C)character-oriented
D)none of the above
The most common protocol for point-to-point access is the Point-to-Point Protocol (PPP), which is a _________protocol.
A)bit-oriented
B)byte-oriented
C)character-oriented
D)none of the above
_______ control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting
for acknowledgment.
A)Flow
B)Error
C)Transmission
D)none of the above
_________control in the data link layer is based on automatic repeat request, which is the retransmission of data.
A)Flow
B)Error
C)Transmission
D)none of the above
In Stop-and-Wait ARQ, we use sequence numbers to number the frames. The sequence numbers are based on
__________arithmetic.
A)modulo-2
B)modulo-4
C)modulo-m
D)none of the above
In Stop-and-Wait ARQ, the acknowledgment number always announces in ______ arithmetic the sequence number of the
next frame expected.
A)modulo-2
B)modulo-4
C)modulo-m
D)none of the above
In the Go-Back-N Protocol, if the size of the sequence number field is 8, the sequence numbers are in ________
arithmetic,
A)modulo-2
B)modulo- 8
C)modulo-256
D)none of the above
Stop-and-Wait ARQ is a special case of Go-Back-N ARQ in which the size of the send window is 1.
A)2
B)1
C)8
D)none of the above
In _________, the station configuration is unbalanced. We have one primary station and multiple secondary stations.
A)ABM
B)NRM
C)ARM
D)NBM
In _________, the configuration is balanced. The link is point-to-point, and each station can function as a primary and a
secondary.
A)ABM
B)NRM
C)ARM
D)NBM
In PPP, the ________ is responsible for establishing, maintaining, configuring, and terminating links.
A)NCP
B)LCP
C)CHAP
D)PAP
In PPP, ________ is a simple authentication procedure with a two-step process:
A)NCP
B)LCP
C)CHAP
D)PAP
In PPP, _______ is a three-way hand-shaking authentication protocol in which the password is kept secret; it is never
sent online.
A)NCP
B)LCP
C)CHAP
D)PAP
Out of 38 questions, you answered 11 correctly, for a final grade of 29%.Please answer all questions.
The correct answer for each question is indicated by a .
In ________ each station sends a frame whenever it has a frame to send.
A)pure ALOHA
B)slotted ALOHA
C)both (a) and (b)
D)neither (a) nor (b)
In pure ALOHA, the vulnerable time is ______ the frame transmission time.
A)the same as
B)two times
C)three times
D)none of the above
The maximum throughput for pure ALOHA is ________ per cent.
A)12.2
B)18.4
C)36.8
D)none of the above
In __________, each station is forced to send only at the beginning of the time slot.
A)pure ALOHA
B)slotted ALOHA
C)both (a) and (b)
D)neither (a) nor (b)
In slotted ALOHA, the vulnerable time is ______ the frame transmission time.
A)the same as
B)two times
C)three times
D)none of the above
The maximum throughput for pure ALOHA is ________ per cent.
A)12.2
B)18.4
C)36.8
D)none of the above
The vulnerable time for CSMA is the ________propagation time.
A)the same as
B)two times
C)three times
D)none of the above
In the _________ method, after the station finds the line idle, it sends its frame immediately. If the line is not idle, it
continuously senses the line until it finds it idle.
A)nonpersistent
B)1-persistent
C)p-persistent
D)none of the above
In the ________method, a station that has a frame to send senses the line. If the line is idle, it sends immediately. If the
line is not idle, it waits a random amount of time and then senses the line again.
A)nonpersistent
B)1-persistent
C)p-persistent
D)none of the above
In the _______method, after the station finds the line idle it sends or refrain from sending based on the outcome of a
random number generator. If the line is busy, it tries again.
A)nonpersistent
B)1-persistent
C)p-persistent
D)none of the above
We have categorized access methods into _______ groups.
A)two
B)three
C)four
D)five
In ___________ methods, no station is superior to another station and none is assigned the control over another.
A)random access
B)controlled access
C)channelization
D)none of the above
In ______, the chance of collision can be reduced if a station senses the medium before trying to use it.
A)MA
B)CSMA
C)FDMA
D)CDMA
________ requires that each station first listen to the medium before sending.
A)MA
B)CSMA
C)FDMA
D)CDMA
__________ augments the CSMA algorithm to detect collision.
A)CSMA/CA
B)CSMA/CD
C)either (a) or (b)
D)both (a) and (b)
In ________, a station monitors the medium after it sends a frame to see if the transmission was successful. If so, the
station is finished. If, however, there is a collision, the frame is sent again.
A)CSMA/CA
B)CSMA/CD
C)either (a) or (b)
D)both (a) and (b)
To avoid collisions on wireless networks, ________was invented.
A)CSMA/CA
B)CSMA/CD
C)either (a) or (b)
D)both (a) and (b)
In _______, collisions are avoided through the use of three strategies: the interframe space, the contention window, and
acknowledgments.
A)CSMA/CA
B)CSMA/CD
C)either (a) or (b)
D)both (a) and (b)
In _______ methods, the stations consult one another to find which station has the right to send.
A)random access
B)controlled access
C)channelization
D)none of the above
In _______ methods, a station cannot send unless it has been authorized by other stations.
A)random access
B)controlled access
C)channelization
D)none of the above
We discussed ______ popular controlled-access methods.
A)two
B)three
C)four
D)none of the above
In the ________ method, a station needs to make a reservation before sending data. Time is divided into intervals.
A)reservation
B)polling
C)token passing
D)none of the above
In the _____ method, time is divided into intervals. In each interval, a reservation frame precedes the data frames sent
in that interval.
A)reservation
B)polling
C)token passing
D)none of the above
In the ______ method, all data exchanges must be made through the primary device even when the ultimate destination
is a secondary device.
A)reservation
B)polling
C)token passing
D)none of the above
In the _______ method, the primary device controls the link; the secondary devices follow its instructions.
A)reservation
B)polling
C)token passing
D)none of the above
In the _______ method, the stations in a network are organized in a logical ring.
A)reservation
B)polling
C)token passing
D)none of the above
In the _______ method, each station has a predecessor and a successor.
A)reservation
B)polling
C)token passing
D)none of the above
In the _________ method, a special packet called a ______ circulates through the ring.
A)reservation: control frame
B)polling: poll request
C)token passing: token
D)none of the above
_________ is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through
code, between different stations.
A)Random access
B)Controlled access
C)Channelization
D)none of the above
We discussed ________ channelization protocols.
A)two
B)three
C)four
D)none of the above
In ________, the available bandwidth is divided into frequency bands.
A)FDMA
B)TDMA
C)CDMA
D)none of the above
In ______, each station is allocated a band to send its data. In other words, each band is reserved for a specific station,
and it belongs to the station all the time.
A)FDMA
B)TDMA
C)CDMA
D)none of the above
In _______, the stations share the bandwidth of the channel in time.
A)FDMA
B)TDMA
C)CDMA
D)none of the above
In _____, each station is allocated a time slot during which it can send data. Each station transmits its data in its
assigned time slot.
A)FDMA
B)TDMA
C)CDMA
D)none of the above
In _____, each station transmits its data in its assigned time slot.
A)FDMA
B)TDMA
C)CDMA
D)none of the above
In ______, the stations use different codes to achieve multiple access.
A)FDMA
B)TDMA
C)CDMA
D)none of the above
_______ is based on coding theory and uses sequences of numbers called chips.
A)FDMA
B)TDMA
C)CDMA
D)none of the above
In _______, the sequences are generated using orthogonal codes such the Walsh tables.
A)FDMA
B)TDMA
C)CDMA
D)none of the above
Out of 42 questions, you answered 13 correctly, for a final grade of 31%.Please answer all questions.
The correct answer for each question is indicated by a .
What is the hexadecimal equivalent of the Ethernet address 01011010 00010001 01010101 00011000 10101010
00001111?
A)5A:88:AA:18:55:F0
B)5A:81:BA:81:AA:0F
C)5A:18:5A:18:55:0F
D)5A:11:55:18:AA:0F
If an Ethernet destination address is 07:01:02:03:04:05, then this is a ______ address.
A)unicast
B)multicast
C)broadcast
D)any of the above
If an Ethernet destination address is 08:07:06:05:44:33, then this is a ______ address.
A)unicast
B)multicast
C)broadcast
D)any of the above
Which of the following could not be an Ethernet unicast destination?
A)43:7B:6C:DE:10:00
B)44:AA:C1:23:45:32
C)46:56:21:1A:DE:F4
D)48:32:21:21:4D:34
Which of the following could not be an Ethernet multicast destination?
A)B7:7B:6C:DE:10:00
B)7B:AA:C1:23:45:32
C)7C:56:21:1A:DE:F4
D)83:32:21:21:4D:34
_______ is the most widely used local area network protocol.
A)Token Ring
B)Token Bus
C)Ethernet
D)none of the above
The IEEE 802.3 Standard defines _________ CSMA/CD as the access method for first-generation 10-Mbps Ethernet.
A)1-persistent
B)p-persistent
C)non-persistent
D)none of the above
The _______ layer of Ethernet consists of the LLC sublayer and the MAC sublayer.
A)data link
B)physical
C)network
D)none of the above
The _____ sublayer is responsible for the operation of the CSMA/CD access method and framing.
A)LLC
B)MII
C)MAC
D)none of the above
Each station on an Ethernet network has a unique _______ address imprinted on its network interface card (NIC).
A)5-byte
B)32-bit
C)48-bit
D)none of the above
The minimum frame length for 10-Mbps Ethernet is _______bytes.
A)32
B)80
C)128
D)none of the above
The maximum frame length for 10-Mbps Ethernet is ________ bytes.
A)1518
B)1500
C)1200
D)none of the above
_________ uses thick coaxial cable.
A)10Base5
B)10Base2
C)10Base-T
D)10Base-F
__________ uses thin coaxial cable.
A)10Base5
B)10Base2
C)10Base-T
D)10Base-F
_________ uses four twisted-pair cables that connect each station to a common hub.
A)10Base5
B)10Base2
C)10Base-T
D)10Base-F
________ uses fiber-optic cable.
A)10Base5
B)10Base2
C)10Base-T
D)10Base-F
Fast Ethernet has a data rate of ________Mbps.
A)10
B)100
C)1000
D)10,000
In _________, autonegotiation allows two devices to negotiate the mode or data rate of operation.
A)Standard
B)Fast Ethernet
C)Gigabit Ethernet
D)Ten-Gigabit Ethernet
__________ uses two pairs of twisted-pair cable.
A)100Base-TX
B)100Base-FX
C)100Base-T4
D)none of the above
_________ uses two fiber-optic cables.
A)100Base-TX
B)100Base-FX
C)100Base-T4
D)none of the above
_________ uses four pairs of voice-grade, or higher, twisted-pair cable.
A)100Base-TX
B)100Base-FX
C)100Base-T4
D)none of the above
Gigabit Ethernet has a data rate of ________Mbps.
A)10
B)100
C)1000
D)10,000
Gigabit Ethernet access methods include _______ mode.
A)half-duplex
B)full-duplex
C)both (a) and (b)
D)neither (a) nor (b)
__________ uses two optical fibers and a short-wave laser source,
A)1000Base-SX
B)1000Base-LX
C)1000Base-T
D)none of the above
__________uses two optical fibers and a long-wave laser source.
A)1000Base-SX
B)1000Base-LX
C)1000Base-T
D)none of the above
__________ uses four twisted pairs.
A)1000Base-SX
B)1000Base-LX
C)1000Base-T
D)none of the above
________ uses short-wave 850-nm multimode fiber.
A)10GBase-S
B)10GBase-L
C)10GBase-E
D)none of the above
________uses long-wave 1310-nm single mode fiber.
A)10GBase-S
B)10GBase-L
C)10GBase-E
D)none of the above
________ uses 1550-mm single mode fiber.
A)10GBase-S
B)10GBase-L
C)10GBase-E
D)none of the above
In Ethernet addressing, if the least significant bit of the first byte is 0, the address is _________.
A)unicast
B)multicast
C)broadcast
D)none of the above
In Ethernet addressing, if the least significant bit of the first byte is 1, the address is _________.
A)unicast
B)multicast
C)broadcast
D)none of the above
In Ethernet addressing, if all the bits are 1s, the address is _________.
A)unicast
B)multicast
C)broadcast
D)none of the above
______defines a protocol data unit (PDU) that is somewhat similar to that of HDLC.
A)MAC
B)LLC
C)LLU
D)none of the above
The purpose of the _______ is to provide flow and error control for the upper-layer protocols that actually demand these
services
A)MAC
B)LLC
C)LLU
D)none of the above
In the Ethernet, the _______field is actually added at the physical layer and is not (formally) part of the frame.
A)CRC
B)preamble
C)address
D)none of the above
In the Ethernet frame, the _______ field contains error detection information.
A)CRC
B)preamble
C)address
D)none of the above
Standard Ethernet (10-Mbps) uses _______ encoding
A)NRZ
B)AMI
C)Manchester
D)differential Manchester
100Base-TX uses _________ block coding and ________ line coding.
A)4B/5B; NRZ
B)8B/10B; NRZ
C)4B/5B; MLT-3
D)8B/10B; NRZ
100Base-FX uses _________ block coding and ________ line coding.
A)4B/5B; NRZ-I
B)8B/10B; NRZ
C)4B/5B; MLT-3
D)8B/10B; NRZ
100Base-T4 uses ________ line coding.
A)NRZ
B)8B6T
C)MLT-3
D)Manchester
1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding.
A)4B/5B; NRZ
B)8B/10B; NRZ
C)4B/5B; MLT-3
D)8B/10B; NRZ
1000Base-T uses ________ line coding.
A)4D-PAM5
B)8B6T
C)MLT-3
D)Manchester
Out of 41 questions, you answered 10 correctly, for a final grade of 24%.Please answer all questions.
The correct answer for each question is indicated by a .
IEEE has defined the specifications for a wireless LAN, called _______, which covers the physical and data link layers.
A)IEEE 802.3
B)IEEE 802.5
C)IEEE 802.11
D)IEEE 802.2
In IEEE 802.11, a ___ is made of stationary or mobile wireless stations and an optional central base station, known as
the access point (AP).
A)ESS
B)BSS
C)CSS
D)none of the above
In IEEE 802.11, a BSS without an AP is called an _________.
A)an ad hoc architecture
B)an infrastructure network
C)either (a) or (b)
D)neither (a) nor (b)
In IEEE 802.11, a BSS with an AP is sometimes referred to as ____________.
A)an ad hoc architecture
B)an infrastructure network
C)either (a) or (b)
D)neither (a) nor (b)
In IEEE 802.11, communication between two stations in two different BSSs usually occurs via two ________.
A)BSSs
B)ESSs
C)APs
D)none of the above
In IEEE 802.11, a station with ________ mobility is either stationary (not moving) or moving only inside a BSS.
A)no-transition
B)BSS-transition
C)ESS-transition
D)none of the above
In IEEE 802.11, a station with ________mobility can move from one BSS to another, but the movement is confined inside
one ESS.
A)no-transition
B)BSS-transition
C)ESS-transition
D)none of the above
In IEEE 802.11, a station with ________ mobility can move from one ESS to another.
A)no-transition
B)BSS-transition
C)ESS-transition
D)none of the above
In IEEE 802.11, _______ is an optional access method that can be implemented in an infrastructure network (not in an
ad hoc network).
A)DCF
B)PCF
C)either (a) or (b)
D)neither (a) nor (b)
In IEEE 802.11, when a frame is going from one station in a BSS to another without passing through the distribution
system, the address flag is _____
A)00
B)01
C)10
D)11
In IEEE 802.11, when a frame is coming from an AP and going to a station, the address flag is _______.
A)00
B)01
C)10
D)11
In IEEE 802.11, when a frame is going from a station to an AP, the address flag is _____.
A)00
B)01
C)10
D)11
In IEEE 802.11, when a frame is going from one AP to another AP in a wireless distribution system, the address flag is
_____
A)00
B)01
C)10
D)11
The IEEE 802.11 standard for wireless LANs defines two services: ______ and _______.
A)BSS; ASS
B)ESS; SSS
C)BSS; ESS
D)BSS; DCF
In IEEE 802.11, the access method used in the DCF sublayer is _________.
A)ALOHA
B)CSMA/CA
C)CSMA/CD
D)none of the above
In IEEE 802.11, the access method used in the PCF sublayer is ______.
A)contention
B)controlled
C)polling
D)none of the above
In IEEE 802.11, the ______ is a timer used for collision avoidance.
A)NAV
B)BSS
C)ESS
D)none of the above
In IEEE 802.11, the MAC layer frame has ______ fields.
A)four
B)five
C)six
D)none of the above
In IEEE 802.11, the addressing mechanism can include up to ______addresses.
A)four
B)five
C)six
D)none of the above
The original IEEE 802.11, uses _________.
A)FHSS
B)DSSS
C)OFDM
D)either (a) or (b)
The IEEE 802.11a, uses _________.
A)FHSS
B)DSSS
C)OFDM
D)either (a) or (b)
The IEEE 802.11b, uses _________.
A)FHSS
B)DSSS
C)OFDM
D)either (a) or (b)
The IEEE 802.11g, uses _________.
A)FHSS
B)DSSS
C)OFDM
D)either (a) or (b)
The original IEEE 802.11, has a data rate of _____Mbps.
A)1
B)6
C)11
D)22
IEEE 802.11a, has a data rate of _____Mbps.
A)1
B)2
C)6
D)none of the above
IEEE 802.11b, has a data rate of _____Mbps.
A)1
B)2
C)5.5
D)none of the above
IEEE 802.11g, has a data rate of _____Mbps.
A)1
B)2
C)11
D)22
The IEEE 802.11 wireless LANs use ________ types of frames.
A)four
B)five
C)six
D)none of the above
Bluetooth is a _______ technology that connects devices (called gadgets) in a small area.
A)wired LAN
B)wireless LAN
C)VLAN
D)none of the above
A Bluetooth network is called a ________.
A)piconet
B)scatternet
C)bluenet
D)none of the above
In Bluetooth, multiple ________ form a network called a _________.
A)scatternet; piconets
B)piconets: scatternet
C)piconets: bluenet
D)bluenet; scatternet
A Bluetooth network consists of _____ primary device(s) and up to ____ secondary devices.
A)one; five
B)five; three
C)two; six
D)one; seven
The RTS and CTS frames in CSMA/CA ____ solve the hidden station problem. The RTS and CTS frames in CSMA/CA ____
solve the exposed station problem.
A)can; cannot
B)cannot; can
C)can; can
D)cannot; cannot
In Bluetooth, the current data rate is ____Mbps
A)2
B)5
C)11
D)none of the above
In Bluetooth, the _______ layer is roughly equivalent to the physical layer of the Internet model.
A)radio
B)baseband
C)L2CAP
D)none of the above
In Bluetooth, the _____layer is roughly equivalent to the MAC sublayer in LANs.
A)radio
B)baseband
C)L2CAP
D)none of the above
In Bluetooth, the L2CAP sublayer, is roughly equivalent to the LLC sublayer in LANs.
A)radio
B)baseband
C)L2CAP
D)none of the above
The access method in Bluetooth is ________.
A)FDMA
B)TDD-TDMA
C)CDMA
D)none of the above
In Bluetooth, the _____ link is used when avoiding latency (delay in data delivery) is more important than integrity
(error-free delivery).
A)SCO
B)ACL
C)ACO
D)SCL
In Bluetooth, the _____ link is used when data integrity is more important than avoiding latency.
A)SCO
B)ACL
C)ACO
D)SCL
Bluetooth uses ______method in the physical layer to avoid interference from other devices or other networks.
A)DSSS
B)FHSS
C)FDMA
D)none of the above
Out of 38 questions, you answered 9 correctly, for a final grade of 24%.Please answer all questions.
The correct answer for each question is indicated by a .
A repeater is a connecting device that operates in the _______ layer of the Internet model.
A)physical
B)data link
C)network
D)all of the above
A _______ regenerates a signal, connects segments of a LAN, and has no filtering capability.
A)repeater
B)bridge
C)router
D)none of the above
A _______ is a connecting device that operates in the physical and data link layers of the Internet model.
A)repeater
B)bridge
C)router
D)none of the above
A ________ bridge can forward and filter frames and automatically build its forwarding table.
A)simple
B)dual
C)transparent
D)none of the above
A bridge can use the _________ algorithm to create a loopless topology.
A)binary tree
B)spanning tree
C)multiway tree
D)none of the above
A _______ LAN allows several LANs to be connected.
A)backbone
B)wireless
C)wired
D)none of the above
A backbone is usually a ______.
A)bus
B)star
C)either (a) or (b)
D)neither (a) nor (b)
A virtual local area network (VLAN) is configured by _________.
A)software
B)physical wiring
C)hardware
D)none of the above
Membership in a VLAN can be based on _________.
A)port numbers
B)MAC addresses
C)IP addresses
D)all of the above
VLANs can_________.
A)reduce network traffic
B)provide an extra measure of security
C)either (a) or (b)
D)both (a) and (b)
_________ is just a connector.
A)An active hub
B)A passive hub
C)either (a) or (b)
D)neither (a) nor (b)
In a star-topology Ethernet LAN, _______ is just a point where the signals coming from different stations collide; it is the
collision point.
A)An active hub
B)A passive hub
C)either (a) or (b)
D)neither (a) nor (b)
________ is part of the media; its location in the Internet model is below the physical layer.
A)An active hub
B)A passive hub
C)either (a) or (b)
D)neither (a) nor (b)
A _______ is a device that operates only in the physical layer.
A)passive hub
B)repeater
C)bridge
D)router
A ________receives a signal and, before it becomes too weak or corrupted, regenerates the original bit pattern. It then
sends the refreshed signal.
A)passive hub
B)repeater
C)bridge
D)router
A __________ forwards every frame; it has no filtering capability.
A)passive hub
B)repeater
C)bridge
D)router
________ is actually a multiport repeater. It is normally used to create connections between stations in a physical star
topology.
A)An active hub
B)A passive hub
C)either (a) or (b)
D)neither (a) nor (b)
A ________ operates in both the physical and the data link layer.
A)passive hub
B)repeater
C)bridge
D)router
A _______ can check the MAC addresses contained in the frame.
A)passive hub
B)repeater
C)bridge
D)router
A ______ has a table used in filtering decisions.
A)passive hub
B)repeater
C)bridge
D)none of the above
A ________ is a device in which the stations are completely unaware of its existence.
A)passive hub
B)repeater
C)simple bridge
D)transparent bridge
IEEE 802.1d specification, defines _________ criteria for a transparent bridges.
A)two
B)three
C)four
D)none of the above
A spanning tree is a graph in which there is no _____.
A)node
B)branch
C)loop
D)arc
In a bridged LAN, the _______ algorithm creates a topology in which each LAN can be reached from any other LAN
through one path only.
A)spanning tree
B)binary tree
C)unary tree
D)none of the above
A three-layer switch is a kind of ________.
A)repeater
B)bridge
C)router
D)none of the above
A two-layer switch is a ______.
A)repeater
B)bridge
C)router
D)none of the above
Some new two-layer switches, called _______ switches, have been designed to forward the frame as soon as they check
the MAC addresses in the header of the frame.
A)cut-through
B)go-through
C)come-through
D)none of the above
A _______ is a three-layer device that handles packets based on their logical addresses.
A)repeater
B)bridge
C)router
D)none of the above
A ______ normally connects LANs and WANs in the Internet and has a table that is used for making decisions about the
route.
A)repeater
B)bridge
C)router
D)none of the above
A ______ switch is a faster and more sophisticated router.
A)two-layer
B)three-layer
C)four-layer
D)none of the above
A ________ is normally a computer that operates in all five layers of the Internet model or seven layers of OSI model.
A)repeater
B)bridge
C)router
D)gateway
A _____ can be used as a connecting device between two internetworks that use different models.
A)repeater
B)bridge
C)router
D)gateway
In a _____ backbone, the backbone is just one switch.
A)bus
B)ring
C)star
D)none of the above
A ________ link acts as a LAN in a remote backbone connected by remote bridges.
A)point-to-point
B)multipoint
C)multidrop
D)none of the above
VLANs create _________ domains.
A)unicast
B)multicast
C)broadcast
D)none of the above
In a(n) _______ configuration, the administrator types the port numbers, the IP addresses, or other characteristics, using
the VLAN software.
A)manual
B)automatic
C)semiautomatic
D)none of the above
In a(n) _____ configuration, the stations are automatically connected or disconnected from a VLAN using criteria defined
by the administrator.
A)manual
B)automatic
C)semiautomatic
D)none of the above
In a(n) ______ configuration, the initializing is done manually, with migrations done automatically.
A)manual
B)automatic
C)semiautomatic
D)none of the above
Out of 38 questions, you answered 14 correctly, for a final grade of 37%.Please answer all questions.
The correct answer for each question is indicated by a .
_______ is a first-generation cellular phone system.
A)AMPS
B)D-AMPS
C)GSM
D)none of the above
__________ is a second-generation cellular phone system.
A)AMPS
B)D-AMPS
C)GSM
D)none of the above
____________ is a digital version of AMPS.
A)GSM
B)D-AMPS
C)IS-95
D)none of the above
___________ is a second-generation cellular phone system used in Europe.
A)GSM
B)D-AMPS
C)IS-95
D)none of the above
________ is a second-generation cellular phone system based on CDMA and DSSS.
A)GSM
B)D-AMPS
C)IS-95
D)none of the above
The __________ cellular phone system will provide universal personal communication.
A)first-generation
B)second-generation
C)third-generation
D)none of the above
In a ______ handoff, a mobile station only communicates with one base station.
A)hard
B)soft
C)medium
D)none of the above
In a ______ handoff, a mobile station can communicate with two base stations at the same time.
A)hard
B)soft
C)medium
D)none of the above
_______ is an analog cellular phone system using FDMA.
A)AMPS
B)D-AMPS
C)GSM
D)none of the above
AMPS operates in the ISM _____ band.
A)800-MHz
B)900-MHz
C)1800-MHz
D)none of the above
In AMPS, each band is divided into ______ channels.
A)800
B)900
C)1000
D)none of the above
AMPS has a frequency reuse factor of _______.
A)1
B)3
C)5
D)7
AMPS uses ______ to divide each 25-MHz band into channels.
A)FDMA
B)TDMA
C)CDMA
D)none of the above
D-AMPS uses ______ to divide each 25-MHz band into channels.
A)FDMA
B)TDMA
C)CDMA
D)both (a) and (b)
GSM allows a reuse factor of _______.
A)1
B)3
C)5
D)7
GSM is a digital cellular phone system using ________.
A)FDMA
B)TDMA
C)CDMA
D)both (a) and (b)
IS-95 is based on ____________.
A)FDMA
B)CDMA
C)DSSS
D)all of the above
IS-95 uses the ISM _______band.
A)800-MHz
B)900-MHz
C)1900-MHz
D)either (a) or (c)
IS-95 uses the _______ satellite system for synchronization.
A)GPS
B)Teledesic
C)Iridium
D)none of the above
In an IS-95 system, the frequency-reuse factor is normally _____.
A)1
B)3
C)5
D)7
In the third generation of cellular phones, _______ uses W-CDMA.
A)IMT-DS
B)IMT-MC
C)IMT-TC
D)IMT-SC
In the third generation of cellular phones, ________ uses CDMA2000.
A)IMT-DS
B)IMT-MC
C)IMT-TC
D)IMT-SC
In the third generation of cellular phones, ______ uses a combination of W-CDMA and TDMA.
A)IMT-DS
B)IMT-MC
C)IMT-TC
D)IMT-SC
In the third generation of cellular phones, _______ uses TDMA.
A)IMT-DS
B)IMT-MC
C)IMT-TC
D)IMT-SC
The period of a satellite, the time required for a satellite to make a complete trip around the Earth, is determined by
_________ law.
A)Kepler's
B)Newton's
C)Ohm's
D)none of the above
The signal from a satellite is normally aimed at a specific area called the _________.
A)path
B)effect
C)footprint
D)none of the above
There is (are) _____ orbit(s) for a GEO satellite.
A)one
B)two
C)many
D)none of the above
MEO satellites are located at altitudes between km.
A)3000 and 5000
B)5000 and 10,000
C)5000 and 15,000
D)none of the above
LEO satellites are normally below an altitude of ________ km.
A)1000
B)2000
C)3000
D)none of the above
______ is based on a principle called trilateration.
A)GPS
B)Teledesic
C)Iridium
D)none of the above
Low-Earth-orbit (LEO) satellites have _____ orbits.
A)equatorial
B)polar
C)inclined
D)none of the above
A GEO is at the ________ orbit and revolves in phase with Earth.
A)equatorial
B)polar
C)inclined
D)none of the above
GPS satellites are ________ satellites.
A)GEO
B)MEO
C)LEO
D)none of the above
________ satellites provide time and location information for vehicles and ships.
A)GPS
B)Iridium
C)Teledesic
D)none of the above
Iridium satellites are ________satellites.
A)GEO
B)MEO
C)LEO
D)none of the above
________ satellites can provide direct universal voice and data communications for handheld terminals.
A)GPS
B)Iridium
C)Teledesic
D)none of the above
Teledesic satellites are _________satellites.
A)GEO
B)MEO
C)LEO
D)none of the above
________ satellites will provide universal broadband Internet access.
A)GPS
B)Iridium
C)Teledesic
D)none of the above
Out of 39 questions, you answered 8 correctly, for a final grade of 21%.Please answer all questions.
The correct answer for each question is indicated by a .
_______ is a standard developed by ANSI for fiber-optic networks.
A)SONET
B)SDH
C)either (a) or (b)
D)neither (a) nor (b)
_______ is a standard developed by ITU-T.
A)SONET
B)SDH
C)either (a) or (b)
D)neither (a) nor (b)
SONET has defined a hierarchy of signals called ________.
A)STSs
B)STMs
C)either (a) or (b)
D)neither (a) nor (b)
SDH has defined a hierarchy of signals called ________.
A)STSs
B)STMs
C)either (a) or (b)
D)neither (a) nor (b)
An ______ signal is the optical modulation of an STS-n (or STM-n) signal.
A)OC-n
B)TDM-n
C)FDM-n
D)none of the above
.SONET defines _______ layers.
A)two
B)three
C)four
D)five
SONET is a _______ TDM system.
A)asynchronous
B)synchronous
C)statistical
D)none of the above
A SONET system can use _________.
A)STS multiplexers
B)regenerators
C)add/drop multiplexers
D)all of the above
SONET sends ________ frames per second
A)1000
B)2000
C)4000
D)8000
In SONET each frame lasts _______ microseconds.
A)20
B)64
C)128
D)none of the above
An STS-1 frame is made of ________ rows
A)1
B)9
C)90
D)none of the above
An STS-1 frame is made ______columns
A)1
B)9
C)90
D)none of the above
An STS-3 frame is made of ______ rows.
A)1
B)9
C)27
D)none of the above
An STS-3 frame is made of ________ columns.
A)9
B)90
C)270
D)none of the above
SONET network topologies can be __________.
A)linear
B)ring
C)mesh
D)all of the above
A linear SONET network can be __________.
A)point-to-point
B)multipoint
C)either (a) or (b)
D)neither (a) nor (b)
A ring SONET network can be _________.
A)unidirectional
B)bidirectional.
C)either (a) or (b)
D)neither (a) nor (b)
To make SONET backward-compatible with the current hierarchy, its frame design includes a system of.
A)OCs
B)STMs
C)STSs
D)VTs
A ________ is a repeater.
A)regenerator
B)ADM
C)STS multiplexer/demultiplexer
D)none of the above
__________ allow insertion and extraction of signals.
A)regenerators
B)ADMs
C)STS multiplexer/demultiplexers
D)none of the above
A _______ is the optical link connecting two neighbor devices.
A)section
B)line
C)path
D)none of the above
A ______ is the portion of the network between two multiplexers.
A)section
B)line
C)path
D)none of the above
A ______is the end-to-end portion of the network between two STS multiplexers.
A)section
B)line
C)path
D)none of the above
The ______ layer is responsible for the movement of a signal from its optical source to its optical destination.
A)section
B)line
C)path
D)photonic
The ____ layer is responsible for the movement of a signal across a physical line.
A)section
B)line
C)path
D)photonic
The ______ layer is responsible for the movement of a signal across a physical section.
A)section
B)line
C)path
D)photonic
The _______ layer corresponds to the physical layer of the OSI model.
A)section
B)line
C)path
D)photonic
An STS multiplexer is a ______ device.
A)one-layer
B)two-layer
C)three-layer
D)four-layer
An add/drop multiplexer is a ______ device.
A)one-layer
B)two-layer
C)three-layer
D)four-layer
A regenerator is a ________ device.
A)one-layer
B)two-layer
C)three-layer
D)four-layer
In SONET, for each frame, the bytes are transmitted __________.
A)from left to the right, top to bottom
B)from right to the left, bottom to top
C)from left to the right, bottom to top
D)from right to the left, top to bottom
In SONET, for each byte, the bits are transmitted ____________.
A)from least significant to the most significant
B)from most significant to the least significant
C)two at a time
D)three at a time
Each ________in a SONET frame can carry a digitized voice channel.
A)bit
B)byte
C)frame
D)none of the above
The section overhead consists of ______octets.
A)1
B)6
C)9
D)18
Line overhead consists of ________ bytes.
A)1
B)6
C)9
D)18
The path overhead consists of ______ bytes.
A)1
B)6
C)9
D)18
In ________ APS, there are normally two lines: one working line and one protection line. Both lines are active all the
time.
A)one-plus-one
B)one-to-one
C)one-to-many
D)none of the above
In ______ APS, there is one working line and one protection line. The data are normally sent on the working line until it
fails.
A)one-plus-one
B)one-to-one
C)one-to-many
D)none of the above
In ________APS, there is only one protection line for many working lines. When a failure occurs in one of the working
lines, the protection line takes control until the failed line is repaired.
A)one-plus-one
B)one-to-one
C)one-to-many
D)none of the above
Out of 34 questions, you answered 8 correctly, for a final grade of 24%.Please answer all questions.
The correct answer for each question is indicated by a .
________ is a virtual-circuit wide-area network that was designed in response to demands for a new type of WAN in the
late 1980s and early 1990s.
A)X.25
B)Frame Relay
C)ATM
D)none of the above
Frame Relay provides ________.
A)PVCs
B)SVCs
C)either (a) or (b)
D)neither (a) nor (b)
VCIs in Frame Relay are called ______.
A)PVC
B)SVC
C)DLCIs
D)none of the above
In Frame Relay, when a _____ is selected, the corresponding table entry is recorded for all switches by the administrator
A)PVC
B)SVC
C)either (a) or (b)
D)neither (a) nor (b)
In Frame Relay, when. ______ is selected, it requires establishing and terminating phases
A)a PVC
B)an SVC
C)either (a) or (b)
D)neither (a) nor (b)
Frame Relay has _______.
A)only the physical layer
B)only the data link
C)the physical and data link layers
D)the physical, data link, and network layers
At the data link layer, Frame Relay uses a protocol that supports _____control.
A)flow
B)error
C)either (a) or (b)
D)neither (a) nor (b)
In Frame Relay, an address can be ________ bytes.
A)only 2
B)2 to 3
C)2 to 4
D)none of the above
In Frame Relay, the EA field defines the number of bytes; it is _____ in the last byte of the address.
A)0
B)1
C)2
D)3
To handle frames arriving from other protocols, Frame Relay uses a device called a _________.
A)VOFR
B)FRAD
C)MUX
D)none of the above
Frame Relay networks offer an option called ______________ that sends voice through the network.
A)VOFR
B)FRAD
C)MUX
D)none of the above
________ is the cell relay protocol designed by the corresponding Forum and adopted by the ITU-T.
A)X.25
B)Frame Relay
C)ATM
D)none of the above
A _______ is defined as a small, fixed-size block of information.
A)frame
B)packet
C)cell
D)none of the above
In ATM, a virtual connection is defined by _________.
A)VPI
B)VCI
C)DLCI
D)a combination of (a) and (b)
The ATM standard defines ______ layers.
A)two
B)three
C)four
D)five
The VPI of a UNI is _______ bits in length.
A)8
B)12
C)16
D)24
The VPI of an NNI is _______ bits in length.
A)8
B)12
C)16
D)24
The ATM data packet is a cell composed of ______ bytes.
A)40
B)50
C)52
D)53
______ eliminates the varying delay times associated with different-size packets.
A)X.25
B)Frame Relay
C)ATM
D)all of the above
A(n) ______ is the interface between a user and an ATM switch.
A)UNI
B)NNI
C)NNN
D)None of the above
_________ is the interface between two ATM switches.
A)UNI
B)NNI
C)NNN
D)none of the above
In ATM, connection between two endpoints is accomplished through _______.
A)TPs
B)VPs
C)VCs
D)all of the above
In ATM, the _______layer accepts transmissions from upper-layer services and maps them into ATM cells.
A)physical
B)ATM
C)AAL
D)none of the above
In ATM, the ______ layer provides routing, traffic management, switching, and multiplexing services.
A)physical
B)ATM
C)AAL
D)none of the above
In ATM, the _____ layer defines the transmission medium, bit transmission, encoding, and electrical-to-optical
transformation.
A)physical
B)ATM layer
C)AAL
D)none of the above
The AAL is divided into _______ sublayers.
A)two
B)three
C)four
D)none of the above
In ATM, ______ is for constant-bit-rate data.
A)AAL1
B)AAL2
C)AAL3/4
D)AAL5
In ATM, _______is for short packets.
A)AAL1
B)AAL2
C)AAL3/4
D)AAL5
In ATM, _____ is for conventional packet switching (virtual-circuit approach or datagram approach).
A)AAL1
B)AAL2
C)AAL3/4
D)AAL5
In ATM, ______ is for packets requiring no sequencing and no error control mechanism.
A)AAL1
B)AAL2
C)AAL3/4
D)AAL5
________ technology can be adapted for use in a LAN (ATM LAN).
A)X.25
B)Frame Relay
C)ATM
D)none of the above
In a _____ ATM LAN, an ATM switch connects stations.
A)pure
B)legacy
C)mixed architecture
D)none of the above
In a _______ ATM LAN, the backbone that connects traditional LANs uses ATM technology.
A)pure
B)legacy
C)mixed architecture
D)none of the above
A _______ ATM LAN combines features of a pure ATM LAN and a legacy ATM LAN.
A)pure
B)legacy
C)mixed architecture
D)none of the above
Out of 54 questions, you answered 13 correctly, for a final grade of 24%.Please answer all questions.
The correct answer for each question is indicated by a .
An IPv4 address consists of _______ bits.
A)4
B)8
C)32
D)64
In IPv4, class _______ has the greatest number of addresses in each block.
A)A
B)B
C)C
D)D
Identify the class of the following IPv4 address: 4.5.6.7.
A)A
B)B
C)C
D)none of the above
Identify the class of the following IPv4 address: 229.1.2.3.
A)A
B)B
C)D
D)none of the above
Identify the class of the following IPv4 address: 191.1.2.3.
A)A
B)B
C)C
D)none of the above
What is the result of ANDing 255 and 15?
A)255
B)15
C)0
D)none of the above
What is the result of ANDing 0 and 15?
A)255
B)15
C)0
D)none of the above
What is the result of ANDing 254 and 15?
A)254
B)14
C)0
D)none of the above
What is the result of ANDing 192 and 65?
A)192
B)65
C)64
D)none of the above
Which one is not a contiguous mask?
A)255.255.255.254
B)255.255.224.0
C)255.148.0.0
D)all are
The number of addresses in a class C block is _______.
A)65,534
B)16,777,216
C)256
D)none of the above
The number of addresses in a class B block is _______.
A)65,536
B)16,777,216
C)256
D)none of the above
The number of addresses in a class A block is _______.
A)65,534
B)16,777,216
C)256
D)none of the above
The number of addresses assigned to an organization in classless addressing _______.
A)can be any number
B)must be a multiple of 256
C)must be a power of 2
D)none of the above
The first address assigned to an organization in classless addressing _______.
A)must be a power of 4
B)must be evenly divisible by the number of addresses
C)must belong to one of the A, B, or C classes
D)none of the above
Which address could be the beginning address of a block of 32 classless addresses?
A)2.4.6.5
B)2.4.6.16
C)2.4.6.64
D)none of the above
Which address could be the beginning address of a block of 16 classless addresses?
A)2.4.6.5
B)2.4.6.15
C)2.4.6.62
D)none of the above
Which address could be the beginning address of a block of 256 classless addresses?
A)2.4.6.5
B)2.4.6.15
C)2.4.6.0
D)none of the above
What is the first address of a block of classless addresses if one of the addresses is 12.2.2.76/27?
A)12.2.2.0
B)12.2.2.32
C)12.2.2.64
D)none of the above
What is the first address of a block of classless addresses if one of the addresses is 12.2.2.76/10?
A)12.0.0.0
B)12.2.0.0
C)12.2.2.2
D)none of the above
What is the first address of a block of classless addresses if one of the addresses is 12.2.2.127/28?
A)12.2.2.0
B)12.2.2.96
C)12.2.2.112
D)none of the above
Find the number of addresses in a block of classless addresses if one of the addresses is 12.2.2.7/24.
A)32
B)64
C)256
D)none of the above
Find the number of addresses in a block of classless addresses if one of the addresses is 12.2.2.7/30.
A)2
B)4
C)8
D)none of the above
What is the last address of a block of classless addresses if one of the addresses is 12.2.2.127/28?
A)12.2.2.16
B)12.2.2.112
C)12.2.2.127
D)none of the above
What is the last address of a block of classless addresses if one of the addresses is 12.2.2.6/30?
A)12.2.2.2
B)12.2.2.6
C)12.2.2.7
D)none of the above
An organization is granted a block; one address is 2.2.2.64/20. The organization needs 10 subnets. What is the subnet
prefix length?
A)/20
B)/24
C)/25
D)none of the above
An organization is granted a block; one address is 2.2.2.64/25. If the subnet prefix length is /28, what is the maximum
number of subnets?
A)2
B)4
C)8
D)none of the above
An organization is granted a block of classless addresses with the starting address 199.34.76.64/28. How many
addresses are granted?
A)8
B)16
C)32
D)none of the above
An organization is granted a block of classless addresses with the starting address 199.34.76.128/29. How many
addresses are granted?
A)8
B)16
C)32
D)none of the above
An organization is granted a block of classless addresses with the starting address 199.34.32.0/27. How many addresses
are granted?
A)8
B)16
C)32
D)none of the above
What is the default mask for class A in CIDR notation?
A)/9
B)/8
C)/16
D)none of the above
What is the default mask for class B in CIDR notation?
A)/9
B)/8
C)/16
D)none of the above
What is the default mask for class C in CIDR notation?
A)/24
B)/8
C)/16
D)none of the above
In classless addressing, the ______ is another name for the common part of the address range.
A)suffix
B)prefix
C)netid
D)none of the above
In classless addressing, the _______ is the varying part (similar to the hostid).
A)suffix
B)prefix
C)hostid
D)none of the above
In classless addressing, the prefix length defines the _____________.
A)netid
B)hostid
C)mask
D)none of the above
In a block, the prefix length is /24; what is the mask?
A)255.255.255.0
B)255.255.242.0
C)255.255.0.0
D)none of the above
In a block, the prefix length is /15; what is the mask?
A)255.254.0.0
B)255.255.255.0
C)255.255.255.128
D)none of the above
In a block, the mask is 255.255.192.0; what is the prefix length?
A)/20
B)/28
C)/18
D)none of the above
An IPv6 address is _________ bits long.
A)32
B)64
C)128
D)none of the above
An IPv6 address consists of ________ bytes (octets);
A)4
B)8
C)16
D)none of the above
To make addresses more readable, IPv6 specifies ____________notation.
A)dotted decimal
B)hexadecimal colon
C)both a and b
D)none of the above
In hexadecimal colon notation, a 128-bit address is divided into _______ sections, each _____ hexadecimal digits in
length.
A)8: 2
B)8: 3
C)8: 4
D)none of the above
An IPv6 address can have up to __________ colons.
A)8
B)7
C)4
D)none of the above
An IPv6 address can have up to __________ hexadecimal digits.
A)16
B)32
C)8
D)none of the above
In IPv6, _______ address defines a single computer.
A)a unicast
B)a multicast
C)an anycast
D)none of the above
In IPv6, ____ address defines a group of computers with addresses that have the same prefix.
A)a unicast
B)a multicast
C)an anycast
D)none of the above
In IPv6, _________ address defines a group of computers.
A)a unicast
B)a multicast
C)an anycast
D)none of the above
In IPv6, the ________ prefix defines the purpose of the address.
A)type
B)purpose
C)both a and b
D)none of the above
In IPv6, the___________ address is generally used by a normal host as a unicast address.
A)provider-based unicast
B)link local
C)site local
D)none of the above
In IPv6, a _________address comprises 80 bits of zero, followed by 16 bits of one, followed by the 32-bit IPv4 address.
A)link local
B)site local
C)mapped
D)none of the above
In IPv6, a ___________ address is an address of 96 bits of zero followed by 32 bits of IPv4 address.
A)link local
B)site local
C)mapped
D)none of the above
In IPv6, a _______ address is used if a LAN uses the Internet protocols but is not connected to the Internet for security
reasons.
A)link local
B)site local
C)mapped
D)none of the above
In IPv6, a ______address is used if a site with several networks uses the Internet protocols but is not connected to the
Internet for security reasons.
A)link local
B)site local
C)mapped
D)none of the above

Vous aimerez peut-être aussi