Question
a.
Integer
b.
Character
c.
Real numbers
d.
Bits
Posted under UGC NET computer science question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Check sum used along with each packet computes the sum of the data, where data is treated as a sequence of
Similar Questions
Discover Related MCQs
Q. For the transmission of the signal, Bluetooth wireless technology uses
View solution
Q. What is the routing algorithm used by RIP and IGRP ?
View solution
Q. X.25 is …………… Network.
View solution
Q. Which of the following IP address class is a multicast address ?
View solution
Q. Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)?
View solution
Q. What is the size (in terms of bits) of Header length field in IPV4 header ?
View solution
Q. Radio signals generally propagate according to the following mechanisms:
View solution
Q. Match the following with link quality measurement and handoff initiation :
(a) Networked-Controlled Handoff(NCHO) (i) MS connect to BS
(b) Mobile-Assisted Handoff(MAHO) (ii) Process via channel the target BS
(c) Forward Handoff (iii) First Generation Analog Cellular System
(d) Hard Handoff (iv) Second Generation Digital Cellular System
(a) (b) (c) (d)
View solution
Q. If the period of a signal is 1000 ms, then what is its frequency in kilohertz ?
View solution
Q. Hub is a term used with
View solution
Q. Which of the following network access standard disassembler is used for connection station to a packet switched network?
View solution
Q. A station in a network, forward incoming packets by placing them on its shortest output queue. What routing algorithm is being used?
View solution
Q. Start and stop bits are used in serial communications for
View solution
Q. Data security threats include
View solution
Q. The cellular frequency reuse factor for the cluster size N is
View solution
Q. Handoff is the mechanism that
View solution
Q. All of the following are examples of real security and privacy risks except
View solution
Q. Identify the incorrect statement:
View solution
Q. The number of bits required for an IPV6 address is
View solution
Q. A comparison of frequency division and time division multiplexing system shows that
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!