LAN Switching and Wireless

431. In modulo-11 arithmetic, we use only the integers in the range __________, inclusive.

  1. 1 to 10
  2. 1 to 11
  3. 0 to 10
  4. none of the above

Correct answer: (C)
0 to 10

432. In modulo-2 arithmetic, __________ give the same results.

  1. addition and multiplication
  2. addition and division
  3. addition and subtraction
  4. none of the above

Correct answer: (C)
addition and subtraction

433. In modulo-2 arithmetic, we use only __________.

  1. 1 and 2
  2. 0 and 2
  3. 0 and 1
  4. none of the above

Correct answer: (C)
0 and 1

434. In modulo-2 arithmetic, we use the __________ operation for both addition and subtraction.

  1. XOR
  2. OR
  3. AND
  4. none of the above

Correct answer: (A)
XOR

435. In one's complement arithmetic, if positive 7 is 0111, then negative 7 is __________.

  1. 1111
  2. 1101
  3. 1000
  4. none of the above

Correct answer: (C)
1000

436. In PPP, _________ is a simple authentication procedure with a two-step process:

  1. NCP
  2. LCP
  3. CHAP
  4. PAP

Correct answer: (D)
PAP

437. In PPP, _________ is a three-way hand-shaking authentication protocol in which the password is kept secret; it is never sent online.

  1. NCP
  2. LCP
  3. CHAP
  4. PAP

Correct answer: (C)
CHAP

438. In PPP, the _________ is responsible for establishing, maintaining, configuring, and terminating links.

  1. NCP
  2. LCP
  3. CHAP
  4. PAP

Correct answer: (B)
LCP

439. In pure ALOHA, the vulnerable time is _________ the frame transmission time.

  1. the same as
  2. two times
  3. three times
  4. none of the above

Correct answer: (B)
two times

440. In QAM, both _________ of a carrier frequency are varied.

  1. frequency and amplitude
  2. phase and frequency
  3. amplitude and phase
  4. none of the above

Correct answer: (C)
amplitude and phase

Page 44 of 71