Networking MCQ's Set-4


 



61] How error detection and correction is done?

(A) By passing it through equalizer

(B) By passing it through filter

(C) By amplifying it

(D) By adding redundancy bits

ANSWER : D


62] Which is more efficient?

(A)  Parity check

(B) Cyclic redundancy check

(C) Parity & Cyclic redundancy check

(D) None of the mentioned

ANSWER : B


63] Which can detect two bit errors?

(A)  Parity check

(B) Cyclic redundancy check

(C) Parity & Cyclic redundancy check

(D) None of the mentioned

ANSWER : B


64] Cyclic Redundancy CheckCRC ) uses

(A)  Multiplication

(B) Binary division

(C) Multiplication & Binary division

(D) None of these

ANSWER : C


65] Hamming distance between two codes can be given by the number of elements in which 

(A) They are same

(B) They differ

(C) Which are non zero

(D) None of the mentioned

ANSWER : B


66] Code strength is characterized by its

(A) Minimum distance

(B) Maximum distance

(C) Code weight

(D) Code size

ANSWER : A


67] The distance between two code-words is equal to the _____ of the third code-word which is the sum of the first two code-words. 

(A) Size

(B) Weight

(C) Minimum distance

(D) None of the mentioned

ANSWER : B


68] The ________ between two words is the number of differences between corresponding bits 

(A) Hamming rule

(B) Hamming code

(C) Hamming distance

(D) none of the above

ANSWER : C


69] The data link layer takes the packets from _________ and encapsulates them into frames for transmission.

(A) network layer

(B) physical layer

(C) transport layer

(D) application layer

ANSWER : A


70] Which one of the following task is not done by data link layer? 

(A) framing

(B) error control

(C) flow control

(D) channel coding

ANSWER : D


71] Which sub layer of the data link layer performs data link functions that depend upon the type of medium?

(A) logical link control sublayer

(B) media access control sublayer

(C) network interface control sublayer

(D) none of the mentioned

ANSWER : B


72] Header of a frame generally contains

(A) synchronization bytes

(B) addresses

(C) frame identifier

(D) all of the mentioned

ANSWER : D


73] Automatic repeat request error management mechanism is provided by

(A) logical link control sublayer

(B) media access control sublayer

(C) network interface control sublayer

(D) none of the mentioned

ANSWER : A


74] When 2 or more bits in a data unit has been changed during the transmission, the error is called _________

(A) random error

(B) burst error

(C) inverted error

(D) none of the mentioned

ANSWER : B


75] Which one of the following is a data link protocol?

(A) ethernet

(B) point to point protocol

(C) hdlc

(D) all of the mentioned

ANSWER : D


76] Which one of the following is the multiple access protocol for channel access control?

(A) CSMA/CD

(B) CSMA/CA

(C) Both (A) & (B)

(D) None of these

ANSWER : C


77] The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called

(A) piggybacking

(B) cyclic redundancy check

(C) fletcher’s checksum

(D) none of the mentioned

ANSWER : A


78] Which error detection method uses one's complement arithmetic?

(A) Simple parity check

(B) Two-dimensional dimensional parity check

(C) CRC

(D) Checksum

ANSWER : D


79] Which error detection method consists of just one redundant bit per data unit?

(A) Simple parity check

(B) Two-dimensional dimensional parity check

(C) CRC

(D) Checksum

ANSWER : A


80] In ________ error correction, the receiver corrects errors without requesting retransmission.

(A) backward

(B) onward

(C) forward

(D) none of the above

ANSWER : C








Popular Posts