With each visit of this Data Communication and Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.ASK, PSK, FSK, and QAM are examples of ________ conversion.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.In _____ coding, we divide our message into blocks, each of k bits, called ___.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.In a ________ connection, three or more devices share a link.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.The _______ translates local characters into NVT form
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.If the ACK value is 200, then byte _______ has been received successfully
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.In SCTP, the acknowledgment number and window size are part of each ________
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.The _____ scheme uses data patterns of size 2 and encodes the 2-bit patterns as one signal element belonging to a four-level signal
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.A cookie is made by the ________ and eaten by the _________
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.Data flow between two devices can occur in a _______ way.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.In _______, the cryptographic algorithms and secrets are sent with the message.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.In asynchronous transmission, the gap time between bytes is _______
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.In block coding, if n = 5, the maximum Hamming distance between two codewords is ________
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.To make addresses more readable, IPv6 specifies ____________notation
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.In a(n) ________ cipher, the same key is used by both the sender and receiver.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.The physical, data link, and network layers are the ______ support layers.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.CBT is a ________ protocol that uses a core as the root of the tree
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.In HTTP, a _______ server is a computer that keeps copies of responses to recent requests
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20._______ data have discrete states and take discrete values.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.________ is actually a multiport repeater. It is normally used to create connections between stations in a physical star topology
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.________ means that a sender must not be able to deny sending a message that he sent.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23._______ is based on coding theory and uses sequences of numbers called chips
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.The _______ layer is responsible for delivering data units from one station to the next without errors.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25._______ data are continuous and take continuous values.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.Which of the following could be a legitimate MIB object identifier?
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.Signals can be ________
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.The _______ defines the maximum data rate of the traffic
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.IS-95 uses the _______ satellite system for synchronization
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.AMPS operates in the ISM _____ band
Your Answer:Correct
Your Answer:Incorrect