Computer Networks

841. The need for devising a mechanism to avoid such deadlocks, some of the important methods are listed below:

  1. CSMA/CD
  2. CSMA/CA
  3. Token passing
  4. Polling
  5. All of these

Correct answer: (E)
All of these

842. The net bit rate is also known as

  1. Pass bit rate
  2. Data bit rate
  3. Useful bit rate
  4. Network bit rate

Correct answer: (C)
Useful bit rate

843. The network architecture can be termed as a

  1. Set of layers
  2. Set of protocols
  3. Set of machines
  4. Both a & b

Correct answer: (D)
Both a & b

844. The Network element that connects individual network is known as

  1. Gateway
  2. Router
  3. TCP/IP
  4. Both a & b

Correct answer: (D)
Both a & b

845. The network layer uses which service for delivering packets across the network

  1. Connection-oriented
  2. Connectionless service
  3. Both a & b
  4. None of these

Correct answer: (C)
Both a & b

846. The networks can be broadly divided into three categories namely

  1. LAN for a single building
  2. MAN- single city
  3. WAN-country, continent and planet
  4. All of the above

Correct answer: (D)
All of the above

847. The No of bits that get affected in burst errors depends upon the

  1. Duration of the noise
  2. Transmission time of the no of bits of the transmitted packet
  3. Both a & b
  4. None of these

Correct answer: (C)
Both a & b

848. The noise generated because of electricity or atmospheric disturbances is of the order of

  1. 300kHz
  2. 300MHz
  3. 300GHz
  4. 300Hz

Correct answer: (A)
300kHz

849. The noise generated which is lower than the high frequency range of ____________ and may have more interface with the signal of information:

  1. 300MHz
  2. 300kHz
  3. 300GHz
  4. 300Hz

Correct answer: (A)
300MHz

850. The noise may be classified as ____________ based upon the sources

  1. Internal
  2. External
  3. Both a & b
  4. None of these

Correct answer: (C)
Both a & b

Page 85 of 118