adplus-dvertising
frame-decoration

Question

Check sum used along with each packet computes the sum of the data, where data is treated as a sequence of

a.

Integer

b.

Character

c.

Real numbers

d.

Bits

Answer: (d).Bits

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Check sum used along with each packet computes the sum of the data, where data is treated as a sequence of

Similar Questions

Discover Related MCQs

Q. For the transmission of the signal, Bluetooth wireless technology uses

Q. What is the routing algorithm used by RIP and IGRP ?

Q. X.25 is …………… Network.

Q. Which of the following IP address class is a multicast address ?

Q. Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)?

Q. What is the size (in terms of bits) of Header length field in IPV4 header ?

Q. Radio signals generally propagate according to the following mechanisms:

Q. Match the following with link quality measurement and handoff initiation :

(a) Networked-Controlled Handoff(NCHO)            (i) MS connect to BS
(b) Mobile-Assisted Handoff(MAHO)           (ii) Process via channel the target BS
(c) Forward Handoff                            (iii) First Generation Analog Cellular System
(d) Hard Handoff                                 (iv) Second Generation Digital Cellular System

      (a)   (b)   (c)  (d)

Q. If the period of a signal is 1000 ms, then what is its frequency in kilohertz ?

Q. Hub is a term used with

Q. Which of the following network access standard disassembler is used for connection station to a packet switched network?

Q. A station in a network, forward incoming packets by placing them on its shortest output queue. What routing algorithm is being used?

Q. Start and stop bits are used in serial communications for

Q. Data security threats include

Q. The cellular frequency reuse factor for the cluster size N is

Q. Handoff is the mechanism that

Q. All of the following are examples of real security and privacy risks except

Q. Identify the incorrect statement:

Q. The number of bits required for an IPV6 address is

Q. A comparison of frequency division and time division multiplexing system shows that