Networking MCQ's Set-4
61] How error detection and correction is done?
(A) By passing it through equalizer
(B) By passing it through filter
(C) By amplifying it
(D) By adding redundancy bits
ANSWER : D
62] Which is more efficient?
(A) Parity check
(B) Cyclic redundancy check
(C) Parity & Cyclic redundancy check
(D) None of the mentioned
ANSWER : B
63] Which can detect two bit errors?
(A) Parity check
(B) Cyclic redundancy check
(C) Parity & Cyclic redundancy check
(D) None of the mentioned
ANSWER : B
64] Cyclic Redundancy Check ( CRC ) uses
(A) Multiplication
(B) Binary division
(C) Multiplication & Binary division
(D) None of these
ANSWER : C
65] Hamming distance between two codes can be given by the number of elements in which
(A) They are same
(B) They differ
(C) Which are non zero
(D) None of the mentioned
ANSWER : B
66] Code strength is characterized by its
(A) Minimum distance
(B) Maximum distance
(C) Code weight
(D) Code size
ANSWER : A
67] The distance between two code-words is equal to the _____ of the third code-word which is the sum of the first two code-words.
(A) Size
(B) Weight
(C) Minimum distance
(D) None of the mentioned
ANSWER : B
68] The ________ between two words is the number of differences between corresponding bits
(A) Hamming rule
(B) Hamming code
(C) Hamming distance
(D) none of the above
ANSWER : C
69] The data link layer takes the packets from _________ and encapsulates them into frames for transmission.
(A) network layer
(B) physical layer
(C) transport layer
(D) application layer
ANSWER : A
70] Which one of the following task is not done by data link layer?
(A) framing
(B) error control
(C) flow control
(D) channel coding
ANSWER : D
71] Which sub layer of the data link layer performs data link functions that depend upon the type of medium?
(A) logical link control sublayer
(B) media access control sublayer
(C) network interface control sublayer
(D) none of the mentioned
ANSWER : B
72] Header of a frame generally contains
(A) synchronization bytes
(B) addresses
(C) frame identifier
(D) all of the mentioned
ANSWER : D
73] Automatic repeat request error management mechanism is provided by
(A) logical link control sublayer
(B) media access control sublayer
(C) network interface control sublayer
(D) none of the mentioned
ANSWER : A
74] When 2 or more bits in a data unit has been changed during the transmission, the error is called _________
(A) random error
(B) burst error
(C) inverted error
(D) none of the mentioned
ANSWER : B
75] Which one of the following is a data link protocol?
(A) ethernet
(B) point to point protocol
(C) hdlc
(D) all of the mentioned
ANSWER : D
76] Which one of the following is the multiple access protocol for channel access control?
(A) CSMA/CD
(B) CSMA/CA
(C) Both (A) & (B)
(D) None of these
ANSWER : C
77] The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called
(A) piggybacking
(B) cyclic redundancy check
(C) fletcher’s checksum
(D) none of the mentioned
ANSWER : A
78] Which error detection method uses one's complement arithmetic?
(A) Simple parity check
(B) Two-dimensional dimensional parity check
(C) CRC
(D) Checksum
ANSWER : D
79] Which error detection method consists of just one redundant bit per data unit?
(A) Simple parity check
(B) Two-dimensional dimensional parity check
(C) CRC
(D) Checksum
ANSWER : A
80] In ________ error correction, the receiver corrects errors without requesting retransmission.
(A) backward
(B) onward
(C) forward
(D) none of the above
ANSWER : C