With each visit of this Data Communication and Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.In a linear block code, the _______ of any two valid codewords creates another valid codeword
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.In a ________ connection, three or more devices share a link.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.Identify the class of the following IPv4 address: 191.1.2.3.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.________ means that a sender must not be able to deny sending a message that he sent.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.If the frequency spectrum of a signal has a bandwidth of 500 Hz with the highest frequency at 600 Hz, what should be the sampling rate, according to the Nyquist theorem?
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.Typically, ______ can receive application data from any application layer protocol, but the protocol is normally HTTP
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.In IEEE 802.11, communication between two stations in two different BSSs usually occurs via two ________.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.____ provides privacy, integrity, and authentication in e-mail
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9._________ is just a connector
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.A hash function must meet ________ criteria.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.Pruning and grafting are strategies used in _______
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.In ATM, _____ is for conventional packet switching (virtual-circuit approach or datagram approach).
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13._________ provides full transport layer services to applications.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.Which organization has authority over interstate and international commerce in the communications field?
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.__________ audio/video refers to the broadcasting of radio and TV programs through the Internet.
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.There are ______________ Internet service providers.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.Baseband transmission of a digital signal is possible only if we have a ____ channel
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.Which of the following could not be an Ethernet unicast destination?
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.The actual mail transfer is done through ____________
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.In Ethernet addressing, if the least significant bit of the first byte is 0, the address is _________
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.In ___________ methods, no station is superior to another station and none is assigned the control over another
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.The IEEE 802.11 wireless LANs use ________ types of frames
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.The combination of an IP address and a port number is called a ____________
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.Data flow between two devices can occur in a _______ way.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.In ________ error correction, the receiver asks the sender to send the data again.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26. What is cloud computing?
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.________ uses two fiber-optic cables.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.The network layer in the Internet is designed as a __________ network
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.Membership in a VLAN can be based on _________.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.A connection in SCTP is called an ____________
Your Answer:Correct
Your Answer:Incorrect