Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONCommunication Systems and Computer Networks (1404703)

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Communication Systems and Computer Networks (1404703)

Description:
IGSR - Communication Systems and Computer Networks 2023-11-19 (c)

Author:
AVATAR
Prof.Shawkat K. Guirguis 1 (1404703) Pr
(Other tests from this author)


Creation Date:
05/01/2024

Category:
Computers

Number of questions: 281
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
Which of the following is NOT a type of transmission media covered in the physical layer? Guided Wireless Satellite Optical.
What is the purpose of twisting the wires in a twisted pair cable? a) To increase the bandwidth b) To reduce the attenuation c) To eliminate the antenna effect of parallel lines d) To increase the data rate .
Which type of cable consists of a center conductor surrounded by a dielectric insulator, a braided shield, and an outer jacket? a) Twisted pair b) Coaxial c) Fiber optic d) Ethernet .
What is the theoretical basis for data communication in the physical layer? a) Fourier analysis b) Shannon's theorem c) Nyquist's theorem d) The central limit theorem .
Can the Fourier series represent any arbitrary function? a) Yes No.
What is the primary factor for selecting a transmission media? a) Data rate b) Cost c) Length d) Color .
Which type of transmission media is known for its low cost and ease of installation? a) Fiber optics b) Twisted pair c) Coaxial cable Wireless.
What property of twisted pair cables helps reduce crosstalk and improve signal quality over long distances? Thickness Length Number of twists per centimeter Color-coding.
What is the typical designation for unshielded twisted pair cables? UTP FTP STP ETP.
Which theorem is used for determining the maximum data rate of a communication channel? Fourier's theorem Shannon's theorem Euler's theorem Gauss's theorem.
What type of signals can twisted pair cables transmit? Analog only Digital only Both analog and digital None of the above.
What is the purpose of protective shields in a bundled twisted pair cable? To increase signal strength To reduce interference To increase data rate To improve color-coding.
Which type of cable has better shielding than UTP and can span longer distances with higher speeds? Twisted pair Coaxial Fiber optic Ethernet.
What is the bandwidth of a coaxial cable? 1 MHz 10 MHz 100 MHz 1 GHz .
Which type of cable consists of a center core made of glass or plastic surrounded by a cladding layer and an outer jacket? Twisted pair b) Coaxial c) Fiber optic d) Ethernet.
What is the primary advantage of using fiber optic cables for data transmission? a) High bandwidth b) Low cost c) Easy installation d) Long range.
Which type of light source is commonly used in fiber optic cables? a) Incandescent bulbs b) Fluorescent bulbs c) Semiconductor diodes d) LEDs .
What is the purpose of Fourier analysis in data communication? a) To analyze signals and determine proper sampling for a signal b) To reduce interference in a communication channel c) To increase the data rate of a communication channel d) To improve the color-coding of cables .
What is the primary factor that limits the actual data rate of fiber optic cables? Attenuation Interference Crosstalk Leaking.
What is the theoretical maximum data rate of fiber optic cables? a) 10 Gbps b) 50 Gbps c) 100 Gbps d) 1 Tbps .
What is the purpose of the physical layer in the OSI model? a) To provide error-free data transmission b) To establish and maintain connections between devices c) To encode and decode data for transmission d) To transmit data over the communication channel .
Which type of transmission media is used for wireless communication? a) Twisted pair b) Coaxial c) Fiber optic d) Radio waves .
What is the purpose of the Nyquist theorem in data communication? a) To determine the maximum data rate of a communication channel b) To analyze signals and determine proper sampling for a signal c) To reduce interference in a communication channel d) To improve the color-coding of cables .
Which type of cable is commonly used for Ethernet networks? a) Twisted pair b) Coaxial c) Fiber optic d) Radio waves .
Which type of transmission media is most susceptible to interference? a) Twisted pair b) Coaxial c) Fiber optic d) Radio waves .
What is the primary advantage of using wireless transmission media? a) High bandwidth b) Low cost c) Easy installation d) Mobility .
Which type of cable is commonly used for cable TV? a) Twisted pair b) Coaxial c) Fiber optic d) Ethernet .
What is the purpose of the physical layer in the TCP/IP model? a) To provide error-free data transmission b) To establish and maintain connections between devices c) To encode and decode data for transmission d) To transmit data over the communication channel .
Which type of transmission media is most commonly used for long-distance communication? a) Twisted pair b) Coaxial c) Fiber optic d) Radio waves .
What is the primary disadvantage of using fiber optic cables for data transmission? a) High cost b) Low bandwidth c) Difficult installation d) Short range .
Which type of cable is commonly used for telephone networks? a) Twisted pair b) Coaxial c) Fiber optic d) Ethernet .
What is the purpose of the OSI model? a) To provide a framework for understanding how data is transmitted over a network b) To provide a standard for data communication between devices c) To provide a set of protocols for data transmission d) To provide a set of tools for network management .
Which type of cable is commonly used for high-speed internet connections? a) Twisted pair b) Coaxial c) Fiber optic d) Ethernet .
What is the primary advantage of using twisted pair cables for data transmission? a) High bandwidth b) Low cost c) Long range d) Immunity to interference .
Which type of transmission media is most commonly used for satellite communication? a) Twisted pair b) Coaxial c) Fiber optic d) Radio waves .
the purpose of the physical layer in the OSI model? a) To provide error-free data transmission b) To establish and maintain connections between devices c) To encode and decode data for transmission d) To transmit data over the communication channel .
Which type of cable is commonly used for security systems? a) Twisted pair b) Coaxial c) Fiber optic d) Ethernet .
What is the primary disadvantage of using coaxial cables for data transmission? a) High cost b) Low bandwidth c) Difficult installation d) Limited range .
Which type of transmission media is most commonly used for cellular communication? a) Twisted pair b) Coaxial c) Fiber optic d) Radio waves .
purpose of the physical layer in the TCP/IP model? a) To provide error-free data transmission b) To establish and maintain connections between devices c) To encode and decode data for transmission d) To transmit data over the communication channel .
Which type of cable is commonly used for audio and video systems? a) Twisted pair b) Coaxial c) Fiber optic d) Ethernet .
What is the primary advantage of using radio waves for data transmission? a) High bandwidth b) Low cost c) Easy installation d) Mobility .
Which type of transmission media is most commonly used for home networks? a) Twisted pair b) Coaxial c) Fiber optic d) Ethernet .
What is the purpose of the TCP/IP model? a) To provide a framework for understanding how data is transmitted over a network b) To provide a standard for data communication between devices c) To provide a set of protocols for data transmission d) To provide a set of tools for network management .
Which type of cable is commonly used for industrial control systems? a) Twisted pair b) Coaxial c) Fiber optic d) Ethernet .
What is the primary disadvantage of using radio waves for data transmission? a) High cost b) Low bandwidth c) Limited range d) Difficult installation .
Which type of transmission media is most commonly used for GPS systems? a) Twisted pair b) Coaxial c) Fiber optic d) Radio waves .
What is the main purpose of the physical layer in the OSI model? a) To provide error-free data transmission b) To establish and maintain connections between devices c) To encode and decode data for transmission d) To transmit data over the communication channel .
Which type of cable is commonly used for video conferencing systems? a) Twisted pair b) Coaxial c) Fiber optic d) Ethernet .
The primary advantage of using twisted pair cables for data transmission? a) High bandwidth b) Low cost c) Long range d) Immunity to interference .
Which of the following is NOT a function of the Data Link Layer? a) Error detection b) Error correction c) Framing d) Flow control .
What is the primary purpose of error-detecting codes in the Data Link Layer? a) To prevent unauthorized access b) To detect and correct errors in transmitted data c) To ensure data confidentiality d) To manage network congestion .
3. Burst errors are characterized by: a) Occurring randomly throughout the data stream b) Being easily correctable c) Coming in clusters or bursts d) Having a low impact on data integrity .
What type of errors are much harder to correct in communication systems? a) Single errors b) Burst errors c) Random errors d) Systematic errors .
In the context of error rates, if a block size is 1000 bits and the error rate is 0.001, how many errors may each block have? a) 1 error b) 10 errors c) 100 errors d) 1000 errors .
Which method is used for the calculation of the polynomial code checksum in error-detecting codes? a) Hamming method b) CRC method c) Parity check method d) Reed-Solomon method .
Who is the author of the document "Communication Systems and Computer Networks"? a) Prof. Shawkat K. Guirguis b) Prof. John Smith c) Dr. Emily Johnson d) Prof. Michael Brown .
In the Hamming method, which bits are used to compute the parity and which bits are used for the message itself? a) Parity bits: 1,2,4,8…; Message bits: 3,5,6,7… b) Parity bits: 3,5,6,7…; Message bits: 1,2,4,8… c) Parity bits: 1,3,5,7…; Message bits: 2,4,6,8… d) Parity bits: 2,4,6,8…; Message bits: 1,3,5,7… .
Which type of codes are used to correct burst errors in communication systems? a) Error-Detecting Codes b) Error-Correcting Codes c) Hamming Codes d) CRC Codes .
According to the document, what type of errors tend to come in bursts? a) Single errors b) Burst errors c) Random errors d) Systematic errors .
What is the primary purpose of error-detecting codes in communication systems? a) To correct errors b) To detect errors c) To compress data d) To encrypt data .
Which method is commonly used to detect errors in transmitted data by appending an extra bit to each character? a) Parity check b) Checksum c) Cyclic redundancy check (CRC) d) Hamming code .
Which error detection technique involves the use of a polynomial to generate a checksum, which is appended to the data and transmitted? a) Checksum b) Cyclic redundancy check (CRC) c) Hamming code d) Parity check .
What is the purpose of error-correcting codes in communication systems? a) To detect errors b) To compress data c) To correct errors d) To encrypt data .
Which error correction technique involves the use of redundant bits to correct errors in the received data? a) Checksum b) Cyclic redundancy check (CRC) c) Hamming code d) Parity check .
Which type of error is characterized by the occurrence of multiple errors within a short period of time? a) Single error b) Burst error c) Random error d) Systematic error .
In the context of error detection and correction, what is the purpose of a checksum? a) To detect and correct errors b) To compress data c) To encrypt data d) To verify the integrity of data .
Which error detection technique involves the addition of all data units and the use of the resulting sum as the error-detection code? a) Checksum b) Cyclic redundancy check (CRC) c) Hamming code d) Parity check .
What is the primary advantage of using error-correcting codes in communication systems? a) Increased data compression b) Enhanced data encryption c) Improved error detection and correction d) Reduced data transmission speed .
Which error detection technique involves the use of a polynomial to generate a checksum, which is then divided by a predetermined value and the remainder is appended to the data and transmitted? a) Checksum b) Cyclic redundancy check (CRC) c) Hamming code d) Parity check .
What is the purpose of using redundant bits in error-correcting codes? a) To increase data transmission speed b) To decrease data compression c) To improve error detection and correction d) To reduce data encryption .
Which error correction technique involves the use of parity bits to detect and correct errors in the received data? a) Checksum b) Cyclic redundancy check (CRC) c) Hamming code d) Parity check .
What is the primary disadvantage of using error-detecting codes in communication systems? a) Inability to detect errors b) Increased data transmission speed c) Reduced data compression d) Inability to correct errors .
Which error detection technique involves the use of a fixed divisor to divide the data and generate a checksum, which is then appended to the data and transmitted? a) Checksum b) Cyclic redundancy check (CRC) c) Hamming code d) Parity check .
What is the primary disadvantage of using error-correcting codes in communication systems? a) Inability to detect errors b) Increased data transmission speed c) Reduced data compression d) Increased complexity and overhead .
Which error correction technique involves the use of a fixed divisor to divide the data and generate a checksum, which is then appended to the data and transmitted? a) Checksum b) Cyclic redundancy check (CRC) c) Hamming code d) Parity check .
primary disadvantage of using error-correcting codes in communication systems? a) Inability to detect errors b) Increased data transmission speed c) Reduced data compression d) Increased complexity and overhead .
the primary disadvantage of using error-correcting codes in communication systems? a) Inability to detect errors b) Increased data transmission speed c) Reduced data compression d) Increased complexity and overhead .
Which error correction technique involves the use of a fixed divisor to divide the data and generate a checksum which is then appended to the data and transmitted? a) Checksum b) Cyclic redundancy check (CRC) c) Hamming code d) Parity check .
Part03 - Communication Systems and Computer Networks! In this document, you will learn about protocol hierarchies, layers, and interfaces in network software. The purpose of each layer is to offer service to the higher layers, and the communication between layers is facilitated by protocols and interfaces.
1. In a protocol hierarchy, each layer is: a) Dependent on the layers above and below b) Independent of the layers above and below c) Partially dependent on the layers above and below d) Unrelated to the layers above and below .
2. The purpose of protocol hierarchies is to: a) Increase the complexity of network communication b) Minimize the amount of information passed between layers c) Ensure that each layer communicates directly with all other layers d) Eliminate the need for interfaces .
3. The translators in the philosopher-translator-secretary architecture are analogous to: a) Layer 1 in the protocol hierarchy b) Layer 2 in the protocol hierarchy c) Layer 3 in the protocol hierarchy d) The entire protocol hierarchy .
4. The philosopher-translator-secretary architecture is used to explain: a) The functioning of a computer processor b) The concept of protocol hierarchies in network software c) The structure of a database management system d) The principles of artificial intelligence .
5. Each process in a protocol hierarchy may add information intended only for its: a) Superior layer b) Inferior layer c) Peer layer d) All layers .
6. The choice of language in the philosopher-translator-secretary architecture is determined by: a) The philosopher b) The translator c) The secretary d) The layer 2 protocol .
7. The philosopher in the philosopher-translator-secretary architecture corresponds to: a) Layer 1 in the protocol hierarchy b) Layer 2 in the protocol hierarchy c) Layer 3 in the protocol hierarchy d) The entire protocol hierarchy .
8. The secretary in the philosopher-translator-secretary architecture corresponds to: a) Layer 1 in the protocol hierarchy b) Layer 2 in the protocol hierarchy c) Layer 3 in the protocol hierarchy d) The entire protocol hierarchy .
9. The translators in the philosopher-translator-secretary architecture are responsible for: a) Translating messages between different languages b) Ensuring reliable communication between layers c) Establishing network connections d) Managing the physical transmission medium .
10. The philosopher-translator-secretary architecture is used to illustrate the concept of: a) Protocol independence b) Layered communication c) Network security d) Data encryption .
11. In a protocol hierarchy, each layer provides services to the: a) Lower layers b) Higher layers c) Adjacent layers d) All layers .
12. The purpose of the interfaces between layers in a protocol hierarchy is to: a) Ensure complete isolation between layers b) Minimize communication between layers c) Maximize communication between layers d) Eliminate the need for protocols .
13. The philosopher-translator-secretary architecture is an analogy for: a) Physical communication systems b) Software development processes c) Network protocol hierarchies d) Human language translation .
14. The concept of protocol hierarchies is primarily concerned with: a) Hardware design b) Software architecture c) Data storage techniques d) User interface design .
15. The layer 2 protocol in the philosopher-translator-secretary architecture is responsible for: a) Physical transmission of messages b) Translation of messages between languages c) Establishing end-to-end connections d) Ensuring reliable communication .
16. The layer 1 protocol in the philosopher-translator-secretary architecture is responsible for: a) Physical transmission of messages b) Translation of messages between languages c) Establishing end-to-end connections d) Ensuring reliable communication .
17. The layer 3 protocol in the philosopher-translator-secretary architecture is responsible for: a) Physical transmission of messages b) Translation of messages between languages c) Establishing end-to-end connections d) Ensuring reliable communication .
18. The philosopher-translator-secretary architecture is an example of: a) Peer-to-peer communication b) Client-server communication c) Layered communication d) Broadcast communication .
19. The philosopher-translator-secretary architecture is used to illustrate the concept of: a) Protocol independence b) Layered communication c) Network security d) Data encryption .
20. The translators in the philosopher-translator-secretary architecture correspond to: a) Layer 1 in the protocol hierarchy b) Layer 2 in the protocol hierarchy c) Layer 3 in the protocol hierarchy d) The entire protocol hierarchy .
21. The secretary in the philosopher-translator-secretary architecture corresponds to: a) Layer 1 in the protocol hierarchy b) Layer 2 in the protocol hierarchy c) Layer 3 in the protocol hierarchy d) The entire protocol hierarchy .
22. The translators in the philosopher-translator-secretary architecture are responsible for: a) Translating messages between different languages b) Ensuring reliable communication between layers c) Establishing network connections d) Managing the physical transmission medium .
23. The philosopher-translator-secretary architecture is used to illustrate the concept of: a) Protocol independence b) Layered communication c) Network security d) Data encryption .
24. In a protocol hierarchy, each layer provides services to the: a) Lower layers b) Higher layers c) Adjacent layers d) All layers .
25. The purpose of the interfaces between layers in a protocol hierarchy is to: a) Ensure complete isolation between layers b) Minimize communication between layers c) Maximize communication between layers d) Eliminate the need for protocols .
26. The philosopher-translator-secretary architecture is an analogy for: a) Physical communication systems b) Software development processes c) Network protocol hierarchies d) Human language translation .
27. The concept of protocol hierarchies is primarily concerned with: a) Hardware design b) Software architecture c) Data storage techniques d) User interface design .
28. The layer 2 protocol in the philosopher-translator-secretary architecture is responsible for: a) Physical transmission of messages b) Translation of messages between languages c) Establishing end-to-end connections d) Ensuring reliable communication .
29. The layer 1 protocol in the philosopher-translator-secretary architecture is responsible for: a) Physical transmission of messages b) Translation of messages between languages c) Establishing end-to-end connections d) Ensuring reliable communication .
30. The layer 3 protocol in the philosopher-translator-secretary architecture is responsible for: a) Physical transmission of messages b) Translation of messages between languages c) Establishing end-to-end connections d) Ensuring reliable communication .
PART 4 : Communication Systems and Computer Networks! REFERENCE MODELS The Open System Interconnection (OSI) Reference Model .
What is the purpose of the OSI reference model? a) A model for computer hardware design b) A model for computer software design c) A model for communication systems design d) A model for database design.
How many layers are there in the OSI reference model? a) 5 b) 6 c) 7 d) 8.
Which layer of the OSI model is responsible for error detection and correction? a) Physical Layer b) Data link Layer c) Network Layer d) Transport Layer.
What is the primary function of the Data link layer in a communication system? a) To provide end-to-end communication between applications b) To convert data into signals for transmission over a physical medium c) To route data packets between different networks d) To provide error detection and correction, and control the flow of data between devices.
Which model is criticized for not clearly distinguishing the concepts of service, interface, and protocol? a) OSI reference model b) TCP/IP reference model c) Bluetooth reference model d) SONET reference model.
What is one of the criticisms of the TCP/IP model? a) It is too complex for practical implementation b) It does not support wireless communication c) It is not suitable for describing any protocol stack other than TCP/IP d) It lacks support for multimedia applications.
Which layer is not really a layer at all in the normal sense of the term as used in the context of layered protocols in the TCP/IP model? a) Network layer b) Transport layer c) Host-to-network layer d) Application layer.
What does the TCP/IP model not distinguish or mention? a) The physical and data link layers b) The network and transport layers c) The session and presentation layers d) The application and data link layers.
What is the primary focus of the book based on the summary provided in the PDF? a) OSI protocols b) TCP/IP model c) SONET protocols d) Bluetooth model.
What is the hybrid reference model? a) A combination of the OSI and TCP/IP reference models b) A model for hybrid cars c) A model for hybrid cloud computing d) A model for hybrid renewable energy systems.
the layer is not really a layer at all in the normal sense of the term as used in the context of layered protocols in the TCP/IP model? a) Network layer b) Transport layer c) Host-to-network layer d) Application layer.
What does the TCP/IP model not distinguish or mention? a) The physical and data link layers b) The network and transport layers c) The session and presentation layers d) The application and data link layers.
primary focus of the book based on the summary provided in the PDF? a) OSI protocols b) TCP/IP model c) SONET protocols d) Bluetooth model.
hybrid reference model? a) A combination of the OSI and TCP/IP reference models b) A model for hybrid cars c) A model for hybrid cloud computing d) A model for hybrid renewable energy systems.
Which model is criticized for not clearly distinguishing the concepts of service, interface, and protocol? a) OSI reference model b) TCP/IP reference model c) Bluetooth reference model d) SONET reference model.
The TCP/IP model not distinguish or mention? a) The physical and data link layers b) The network and transport layers c) The session and presentation layers d) The application and data link layers.
is the primary focus of the book based on the summary provided in the PDF? a) OSI protocols b) TCP/IP model c) SONET protocols d) Bluetooth model.
The hybrid reference model? a) A combination of the OSI and TCP/IP reference models b) A model for hybrid cars c) A model for hybrid cloud computing d) A model for hybrid renewable energy systems.
What is the purpose of a router in a computer network? a) To connect multiple devices to the internet b) To filter and forward data packets between networks c) To provide power to network devices d) To encrypt data transmissions.
Which of the following is a characteristic of a peer-to-peer network? a) Centralized control b) High security c) Decentralized control d) High reliability.
Which of the following is a type of network topology? a) Bus b) Router c) Switch d) Modem.
Which of the following is a protocol used for email communication? a) HTTP b) FTP c) SMTP d) DNS.
Which of the following is a type of wireless network security? a) WPA b) SSL c) SSH d) HTTPS.
Which of the following is a type of network cable? a) HDMI b) USB c) Ethernet d) VGA.
Which of the following is a type of network address? a) IP address b) MAC address c) DNS address d) URL address.
Which of the following is a type of network device? Printer Scanner Router Keyboard.
Which of the following is a type of network protocol? a) TCP b) USB c) HDMI d) VGA .
Which of the following is a type of network architecture? a) Client-server b) Peer-to-peer c) Hybrid d) All of the above.
Which of the following is a type of network top-level domain? a) .com b) .org c) .edu d) All of the above.
Which of the following is a type of network authentication? a) WPA2 b) SSL c) SSH d) HTTPS.
Which of the following is a type of network operating system? a) Windows b) Linux c) MacOS d) All of the above.
Which of the following is a type of network architecture used in cloud computing? a) Client-server b) Peer-to-peer c) Hybrid d) None of the above.
Which of the following is a type of network security threat? a) Malware b) Firewall c) Router d) Switch.
PART 5 : Communication Systems and Computer Networks! prepared by Prof. Shawkat K. Guirguis, covering topics such as Internet history, ARPANET, connection-oriented networks, and more. Whether you are a student, professional.
1. Which of the following is an example of a connection-oriented network? a) Ethernet b) Internet c) ATM d) IEEE 802.11.
What is the standard for wireless LANs? a) Ethernet b) IEEE 802.11 c) X.25 d) Frame Relay.
What is the size of an ATM cell? a) 48 bytes b) 53 bytes c) 64 bytes d) 128 bytes .
What is the purpose of the header in an ATM cell? a) To identify the connection b) To identify the payload c) To identify the router d) To identify the host .
How is cell routing done in ATM networks? a) In software b) In hardware c) In firmware d) In middleware .
Which of the following is a reason why telephone companies like ATM networks? a) Quality of service b) Cost-effectiveness c) Speed d) Security .
What is the main advantage of connection-oriented networks? a) Low latency b) High throughput c) Guaranteed delivery d) Low cost .
Which of the following is an example of a connectionless network? a) ATM b) Frame Relay c) X.25 d) Internet .
What is the main disadvantage of connectionless networks? a) High latency b) Low throughput c) Unreliable delivery d) High cost .
What is the main advantage of Ethernet networks? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
Which of the following is a disadvantage of Ethernet networks? a) Limited scalability b) High cost c) Unreliable delivery d) High latency .
What is the maximum data rate of IEEE 802.11 networks? a) 1 Mbps b) 10 Mbps c) 100 Mbps d) 1 Gbps .
Which of the following is a disadvantage of IEEE 802.11 networks? a) Limited range b) High cost c) Unreliable delivery d) High latency .
What is the main advantage of X.25 networks? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
Which of the following is a disadvantage of X.25 networks? a) Limited scalability b) High cost c) Unreliable delivery d) High latency .
What is the main advantage of Frame Relay networks? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
Which of the following is a disadvantage of Frame Relay networks? a) Limited scalability b) High cost c) Unreliable delivery d) High latency .
What is the main advantage of the Internet? a) Low cost b) High throughput c) Guaranteed delivery d) Global connectivity .
Which of the following is a disadvantage of the Internet? a) Limited scalability b) High cost c) Unreliable delivery d) Security concerns .
What is the main advantage of ATM virtual circuits? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
Which of the following is a disadvantage of ATM virtual circuits? a) Limited scalability b) High cost c) Unreliable delivery d) High latency .
What is the main advantage of ATM cells? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
Which of the following is a disadvantage of ATM cells? a) Limited scalability b) High cost c) Unreliable delivery d) Security concerns .
What is the main advantage of connection-oriented subnets? a) Low latency b) High throughput c) Guaranteed delivery d) Low cost .
Which of the following is a disadvantage of connection-oriented subnets? a) Limited scalability b) High cost c) Unreliable delivery d) High latency .
What is the main advantage of connectionless subnets? a) Low latency b) High throughput c) Guaranteed delivery d) Low cost .
Which of the following is a disadvantage of connectionless subnets? a) Limited scalability b) High cost c) Unreliable delivery d) Security concerns .
What is the main advantage of Ethernet LANs? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
Which of the following is a disadvantage of Ethernet LANs? a) Limited scalability b) High cost c) Unreliable delivery d) High latency .
What is the main advantage of IEEE 802.11 wireless LANs? a) Low cost b) High throughput c) Guaranteed delivery d) Mobility .
Which of the following is a disadvantage of IEEE 802.11 wireless LANs? a) Limited range b) High cost c) Unreliable delivery d) High latency .
What is the main advantage of X.25 networks? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
Which of the following is a disadvantage of X.25 networks? a) Limited scalability b) High cost c) Unreliable delivery d) High latency .
What is the main advantage of Frame Relay networks? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
Which of the following is a disadvantage of Frame Relay networks? a) Limited scalability b) High cost c) Unreliable delivery d) High latency .
What does ATM stand for in the context of networking? a) Asynchronous Transfer Mode b) Automated Teller Machine c) Advanced Technological Modulation d) Asynchronous Transmission Mechanism .
When was ATM designed? a) 1970s b) 1980s c) 1990s d) 2000s .
What was the main goal of ATM when it was designed? a) To merge voice and data only b) To solve all networking and telecommunications problems c) To replace traditional WANs d) To create a faster version of Ethernet .
Which of the following is a common speed for ATM networks? a) 10 Mbps b) 100 Mbps c) 155 Mbps d) 1 Gbps .
ATM was designed in? a) 1970s b) 1980s c) 1990s d) 2000s .
Why was the 155 Mbps speed chosen for ATM networks? a) To transmit standard definition television b) For compatibility with AT&T’s SONET transmission system c) To support wireless communication d) To compete with Ethernet speeds .
What is the significance of the 622 Mbps speed in ATM networks? a) It is the standard speed for home internet connections b) It is used for voice communication only c) It allows four 155-Mbps channels to be sent over it d) It is the minimum speed required for video streaming .
Which of the following is an example of a connection-oriented network? a) Ethernet b) Internet c) ATM d) Bluetooth .
What is the size of an ATM cell? a) 48 bytes b) 53 bytes c) 64 bytes d) 128 bytes .
What is the main advantage of connection-oriented networks? a) Low latency b) High throughput c) Guaranteed delivery d) Low cost .
What is the main advantage of ATM virtual circuits? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
What is the main advantage of ATM cells? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
The main advantage of Ethernet LANs? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
What is the main advantage of IEEE 802.11 wireless LANs? a) Low cost b) High throughput c) Guaranteed delivery d) Mobility .
What is the main advantage of X.25 networks? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
The main advantage of Frame Relay networks? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
What is the main advantage of the Internet? a) Low cost b) High throughput c) Guaranteed delivery d) Global connectivity .
The main advantage of connectionless subnets? a) Low latency b) High throughput c) Guaranteed delivery d) Low cost .
What is the main advantage of connection-oriented subnets? a) Low latency b) High throughput c) Guaranteed delivery d) Low cost.
What is the main advantage of ATM networks? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
What is the main advantage of X.25 networks? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
What is the main advantage of Frame Relay networks? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
The main advantage of the Internet? a) Low cost b) High throughput c) Guaranteed delivery d) Global connectivity .
What is the main advantage of Ethernet LANs? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
What is the main advantage of IEEE 802.11 wireless LANs? a) Low cost b) High throughput c) Guaranteed delivery d) Mobility .
What is the main advantage of connectionless subnets? a) Low latency b) High throughput c) Guaranteed delivery d) Low cost .
What is the main advantage of connection-oriented subnets? a) Low latency b) High throughput c) Guaranteed delivery d) Low cost .
ATM networks? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
What is the main advantage of X.25 networks? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
What is the main advantage of Frame Relay networks? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
What is the main advantage of ATM cells? a) Low cost b) High throughput c) Guaranteed delivery d) Low latency .
The main advantage of connection-oriented subnets? a) Low latency b) High throughput c) Guaranteed delivery d) Low cost .
The main advantage of connection-oriented subnets? a) Low latency b) High throughput c) Guaranteed delivery d) Low cost .
EXAMS Alexandria University Institute of Graduate Studies & Research Department of Information Technology Communication Systems and Computer Networks [2004703].
The data rate of a channel depends on: a.Bandwidth b.Signal to noise ratio c.Both of them d.None of them A B C D.
2 Network with a single communication channel is called: a.Broadcast b.Point-to-point c.WAN d.None of them A B C D.
3 Peer layers are communicating through: a.Services b.Interfaces c.Protocols d.Other A B C D.
Frame relay is a connection-oriented network with: a. Error control b. Flow control c. Error control and flow control d. No error control and no flow control A B C D.
Frame relay is a connection-oriented network with: a. Error control b. Flow control c. Error control and flow control d. No error control and no flow control A B C D.
Which of the following networks have HARDWARE routing? a. ARPANET b. ETHERNET c. ATM d. Bus topology A B C D.
In the ETHERNET routing is done through: a. Fixed routing b. Adaptive routing c. Both fixed and adaptive routing d. None of them A B C D.
The layer responsible for congestion control is: a.Application layer b.Transport layer c.Network layer d.Data link layer A B C D.
The data link layer is NOT responsible for: a.Error detection b.Quality of service c.Error correction d.Flow control A B C D.
Acknowledgement packet is essential in a.Query-response b.Voice transmission c.Video transmission d.File Transfer A B C D.
One of the following is NOT the cause of the errors in a transmission channel: a.Low Cutoff frequency b.Increased number of harmonics c.Increased noise d.Increased signal to noise ratio A B C D.
Negotiation between sender and receiver to decide on maximum message size and quality of service is required in: a. Connection-oriented b. Connectionless c. Both of them d. None of them A B C D.
.
.
University of Alexandria Institute of Graduate Studies & Research Department of Information Technology Communication Systems and Computer Networks[2004603] .
In fiber optics it is essential to have: a. Only Error detection b. Only Error correctio c. Both Error detection and correction d. None of the above A B C D.
In Wireless transmission it is essential to have: a. Only Error detection b. Only Error correction c. Both Error detection and correction d. None of the above .
The device that converts a digital signal to analog is called: a. DSL b. ADSL c. MODEM d. Multiplexer .
One the following statements is NOT a true property of Bit stuffing framing: a. Have start/stop flags b. Variable length messages c. Fixed length messages d. An error affects the rest of the message.
In error detection a frame (1101011011) & generator (10011) gives remainder: a. 1010 b. 0111 c. 1110 d. 1111 .
Service primitives are typically: a. Protocol stack b. System calls c. Interfaces .
Hamming code can: a. Only detect errors b. Correct single errors c. Correct multiple errors d. Detect multiple errors .
Burst errors of expected length (k) can be corrected by sending blocks in columnar form of length: a. Must be exactly (k) b. Less than (k) c. Greater than (k) d. independent of (k) .
Suppose an error rate of (0.001) is expected, what packet length would you suggest? a. (10 bits) b. (100 bits) c. (1000 bits) d. (10000 bits) .
If a protocol at layer (n) is changed and needs to add internal information for its use it must inform: a. Layer (n+1) b. Layer (n-1) c. Both layers (n+1) & (n-1) d. None of them.
The main purpose of multiplexing is to: a. increase speed b. decrease speed c. increase communication channels d. decrease communication channels.
Negotiation between sender and receiver to decide on maximum message size and quality of service is required in: a. Connection-oriented b. Connectionless c. Both of them d. None of them .
The operations (LISTEN, CONNECT and DISCONNECT ) must exist in: a. Connection-oriented b. Connectionless c. Both of them d. None of them .
The layer responsible for congestion control is: a. Data link layer b. Network layer c. Transport layer d. Presentation layer .
Computers with different internal data formats can communicate through: a. Data link layer b. Session layer c. Transport layer d. Presentation layeR.
The data link layer is NOT responsible for: a. Error detection b. Quality of service c. Error correction d. Flow control .
Stacked layers are exchanging information through: a. Services b. Interfaces c. Protocols d. Primitives .
In connectionless service packets arrive: a. Same route but different order b. Different order c. Same order d. Different routes but same order.
Acknowledgement packet is essential in a. Voice transmission b. Video transmission c. File Transfer d. VOIP.
Protocol stack is located in: a. Operating system b. Network card c. Application layer d. Physical layer.
A technique used for sampling and modulation of signals in Time Division Multiplexing is: a. PCM b. FDM c. WDM d. ADSL .
TELNET, and FTP belong to: a. Data link layer b. Network layer c. Transport layer d. Application layer.
ISO model had to add a sub-layer for broadcast networks called: a. Network layer b. Broadcast layer c. Medium Access Control d. Session laye.
One of the following is NOT the cause of the errors in a transmission channel: a. Low Cutoff frequency b. Increased number of harmonics c. Increased noise d. Increased signal to noise ratio .
In the VLF, LF, and MF bands, radio waves a. Need a twisted pair as a guided media b. Need a coaxial cable as a guided media c. Follow the curvature of the earth . d. Bounce off the ionosphere.
One of the following does NOT apply to radio signals a. travel long distances b. Penetrate buildings c. Transmitter and receiver need to be aligned d. They are subject to interference from motors and other electrical equipment.
One of the following does NOT apply to microwave signals a. Waves travel in nearly straight lines b. They do not penetrate buildings c. Are not affected by the atmosphere d. At 4Ghz water absorbs wave .
In satellite transmission one of the following statements is NOT true a. Latency reaches 270ms b. Waves can be sometimes absorbed by rain c. Being a broadcast media it is simple to send to many stations d. Cost of making phone calls is affected by distance .
One of the following statements is NOT true in Medium earth orbiting satellites a. They take about 6 hours to circle the earth b. Tracking is required c. They have a large footprint than geostationary satellites d. They require less powerful transmitters to earth. .
Framing of variable length bit streams can be best done using: a. Character counts b. Flag bytes with byte stuffing c. Starting and ending flags, with bit stuffing d. Physical layer coding violations.
Q2. Compare between the (Bus/Ring/Star/Token ring/Fully connected) network topologies [10 Marks] .
Q3. Compare between: Circuit/Message/Packet switching [10 Marks] .
Q4. Compare between Geostationary and Polar Orbiting Satellites [10 Marks] .
University of Alexandria Institute of Graduate Studies & Research Department of Information Technology June 2012 - Communication Systems and Computer Networks[2004703].
Burst errors of expected length (L) bits can be corrected by sending blocks in columnar form of length: a. Must be exactly (L) b. Less than (L) c. Greater than (L) d. Independent of (L) .
Suppose an error rate of (0.005) is expected, what packet length would you suggest? a. (5000 bits) b. (1000 bits) c. (500 bits) d. (200 bits) .
The data rate of a channel is proportional to: a. Bandwidth b. Signal to noise ratio c. Both of them d. None of them .
In satellite transmission one of the following statements is NOT true a. Latency reaches 270ms b. Waves can be sometimes absorbed by rain c. Being a broadcast media it is simple to send to many stations d. Cost of making phone calls is affected by distance .
One of the following is NOT the cause of the errors in a transmission channel: a. Low Cutoff frequency b. Increased number of harmonics c. Increased noise d. Increased signal to noise ratio .
The data link layer is NOT responsible for: a. Error detection b. Quality of service c. Error correction d. Flow control .
One the following statements is NOT a true property of Bit stuffing framing: a. Have start/stop flags b. Variable length messages c. Fixed length messages d. An error affects the rest of the message .
Acknowledgement packet is essential in a. Query-response b. Voice transmission c. Video transmission d. File Transfer .
Negotiation between sender and receiver to decide on maximum message size and quality of service is required in: a. Connection-oriented b. Connectionless c. Both of them d. None of them .
Framing of variable length bit streams can be best done using: a. Character counts b. Flag bytes with byte stuffing c. Starting and ending flags, with bit stuffing d. Physical layer coding violations .
Q2. In TABULAR FORMAT compare between: a. Connection oriented and connectionless services? .
b. The ISO/OSI and TCP/IP models? .
c. X.25, Frame Relay, and ATM? .
d. Radio, microwave, infrared, and laser transmission? .
e. Geostationary and polar orbiting satellites? .
f. Time, frequency and wavelength division multiplexing? .
Q3. What are the major design issues to be addressed for network layers? [10 Marks] .
Q4. Discuss the major research problems that need to be addressed in wireless communication? .
Report abuse Consent Terms of use