Question
a.
9
b.
18
c.
22
d.
64
Posted under UGC NET computer science question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. CDMA Cell uses …………… carriers of 1.25 MHz.
Similar Questions
Discover Related MCQs
Q. If in an error detection and correction code a message M : “You are good students” is stored as M' :
Youare areyou aregood goodare goodstudents studentsgood.
What is the space required to store M' in general? (assume that ‘n’ is the length of M)
View solution
Q. Device on one network can communicate with devices on another network via a
View solution
Q. What is the maximum window size in sliding window protocol used in a computer network?
View solution
Q. Which of the following are Data Link Layer standard?
1. Ethernet
2. HSSI
3. Frame Relay
4. 10 – Base T
5. Token Ring
View solution
Q. In case of Bus/Tree topology signal balancing issue is overcome by
View solution
Q. Match the following :
List-I
(i) Ethernet
(ii) Token Ring
(iii) Cut-through switch
(iv) Spanning tree
List-I
(a) Deterministic
(b) Utilize the full wire speed
(c) Prevent looping
(d) Checking valid address
View solution
Q. The single stage network is also called
View solution
Q. Which technology is sometime referred to as wireless cable?
View solution
Q. Another name of IEEE 802.11a is …………………
View solution
Q. The unlicensed National Information Infrastructure band operates at the …………. frequency.
View solution
Q. In order that a code is ‘t’ error correcting, the minimum Hamming distance should be:
View solution
Q. The throughput of pure ALOHA is given by:
View solution
Q. The Fiber Distributed Data Interface uses:
View solution
Q. To employ multi-access in GSM, users are given different:
View solution
Q. X.25 protocol consists of:
View solution
Q. GSM/CDMA systems:
View solution
Q. Usually information security in a network is achieved by:
View solution
Q. When compared with analog cellular systems, an advantage of digital TDMA cellular system is that:
View solution
Q. After sending a message, the sender should not be able to, at a later date, deny having sent the message, is referred to as:
View solution
Q. The device which connects dissimilar LANs of different topologies using different sets of communication protocols so that information can flow from one to another is called:
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!