Question
a.
ground
b.
sky
c.
line of sight
d.
space
Posted under UGC NET computer science question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Infrared signals can be used for short range communication in a closed area using ................... propagation.
Similar Questions
Discover Related MCQs
Q. A bridge has access to ............... address in the same network.
View solution
Q. The minimum frame length for 10 Mbps Ethernet is ............. bytes and maximum is ................ bytes.
View solution
Q. The bit rate of a signal is 3000 bps. If each signal unit carries 6 bits, the baud rate of the signal is ...............
View solution
Q. Match the following:
List – I List - II
a. Physical Layer i. Allow resources to network access
b. Datalink Layer ii. Move packets from one destination to other
c. Network Layer iii. Process to process message delivery
d. Transport Layer iv. Transmission of bit stream
e. Application Layer v. Formation of frames
Codes:
a b c d e
View solution
Q. Object Request Broker (ORB) is
I. A software program that runs on the client as well as on the application server.
II. A software program that runs on the client side only.
III. A software program that runs on the application server, where most of the components reside.
View solution
Q. A software agent is defined as
I. A software developed for accomplishing a given task.
II. A computer program which is capable of acting on behalf of the user in order to accomplish a given computational task.
III. An open source software for accomplishing a given task.
View solution
Q. A file is downloaded in a home computer using a 56 kbps MODEM connected to an Internet Service Provider. If the download of file completes in 2 minutes, what is the maximum size of data downloaded?
View solution
Q. In ................ CSMA protocol, after the station finds the line idle, it sends or refrains from sending based on the outcome of a random number generator.
View solution
Q. Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one-to-many?
View solution
Q. What is the maximum length of CAT-5 UTP cable in Fast Ethernet network?
View solution
Q. The ................ is a set of standards that defines how a dynamic web document should be written, how input data should be supplied to the program, and how the output result should be used.
View solution
Q. The count-to-infinity problem is associated with
View solution
Q. Suppose a file of 10,000 characters is to be sent over a line at 2400 bps. Assume that the data is sent in frames. Each frame consists of 1000 characters and an overhead of 48 bits per frame. Using synchronous transmission, the total overhead time is ..............
View solution
Q. Which of the following is the size of Network bits and Host bits of Class A of IP address?
View solution
Q. Which of the following field of the TCP header tells how many bytes may be sent starting at the byte acknowledged ?
View solution
Q. Which of the following is a bit rate of an 8-PSK signal having 2500 Hz bandwidth ?
View solution
Q. Match the following :
(a) UDP (i) Message Transfer Protocol
(b) OSPF (ii) Bit-oriented Protocol
(c) SMTP (iii) Interior Gateway Routing Protocol
(d) HDLC (iv) Connectionless Transport Protocol
Codes :
(a) (b) (c) (d)
View solution
Q. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224. What is the subnet address ?
View solution
Q. If the data unit is 111111 and the divisor is 1010. In CRC method, what is the dividend at the transmission before division ?
View solution
Q. If user A wants to send an encrypted message to user B. The plain text of A is encrypted with the .................
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!