Choose a topic to test your knowledge and improve your MCA skills
The sharing of a medium and its link by two or more devices is called _____
Multiplexing is used in _______
Which multiplexing technique used to transmit digital signals?
If there are n signal sources of same data rate, then the TDM link has _______ slots.
If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is ____
The state when dedicated signals are idle are called _____
Multiplexing provides ________
In TDM, the transmission rate of a multiplexed path is always _______ the sum of the transmission rates of the signal sources.
Which of the following delay is faced by the packet in travelling from one end system to another?
For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is ____________ (in microseconds)
The time required to examine the packetโs header and determine where to direct the packet is part of _______
Given L = number of bits in the packet, a = average rate and R = transmission rate. The Traffic intensity in the network is given by _________
In the transfer of file between server and client, if the transmission rates along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually ________
If end to end delay is given by dend-end = N(dproc + dtrans + dprop) is a non congested network. The number of routers between source and destination is?
The total nodal delay is given by _______
In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero?
Transmission delay does not depend on ______
Propagation delay depends on _______
________ allows LAN users to share computer programs and data.
With respect to physical media, STP cables stands for _________
A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of _______
The __________ portion of LAN management software restricts access, records user activities and audit data, etc.
What is the max length of the Shielded twisted pair cable?
What is the max data transfer rate of STP cables?
Which connector does the STP cable use?
What is the central device in star topology?
What is the max data transfer rate for optical fiber cable?
Which of the following architecture uses the CSMA/CD access method?
The attacker using a network of compromised devices is known as _______
Which of the following is a form of DoS attack?
The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is ________
The DoS attack, in which the attacker sends deluge of packets to the targeted host is ________
Packet sniffers involve _______
Sniffers can be prevented by using ________
Sniffers can be prevented by using __________
Firewalls are often configured to block _____
Which of this is not a guided media?
UTP is commonly used in _____
Coaxial cable consists of _______ concentric copper conductors.
Fiber optics posses following properties _______
If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps) ______
Terrestrial radio channels are broadly classifed into _____ groups.
Radio channels are attractive medium because ______
Geostationary satellites _______
A local telephone network is an example of a _______ network.
Most packet switches use this principle _____
If there are N routers from source to destination, the total end to end delay in sending packet P(L-> number of bits in the packet R-> transmission rate) is equal to ____
What are the Methods to move data through a network of links and switches?
The required resources for communication between end systems are reserved for the duration of the session between end systems in ________ method.
As the resources are reserved between two communicating end systems in circuit switching, ___________ is achieved.