adplus-dvertising
frame-decoration

Question

If the ASCII character H is sent and the character I is received, what type of error is this?

a.

burst

b.

single-bit

c.

multiple-bit

d.

recoverable

Answer: (b).single-bit

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. If the ASCII character H is sent and the character I is received, what type of error is this?

Similar Questions

Discover Related MCQs

Q. The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide?

Q. Error detecting code is

Q. If odd parity is used for ASCII error detection, the number of 0s per eight-bit symbol is _____.

Q. In cyclic redundancy checking, the divisor is _____ the CRC.

Q. In cyclic redundancy checking what is the CRC?

Q. In CRC the quotient at the sender

Q. Which layer of international standard organization's OSI model is responsible for creating and recognizing frame boundaries?

Q. The data-link layer, in reference to the OSI model, specifies

Q. What function does a serial interface perform in data communication?

Q. Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error?

Q. Piggybacking protocol is a technique used for

Q. The frame type that refers to High-level Data Link Control error detection field is

Q. In Asynchronous Balanced Mode (ABM), the link is

Q. In byte stuffing, a special byte is added to the data section of the frame when there is a character with the same pattern as the

Q. In the transition phase, the term that refers to start of the communication is

Q. Internet users use the

Q. The term that refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment is

Q. The sequence numbers of the Stop-and-Wait Automatic Repeat Request are based on

Q. In the Password Authentication Protocol (PAP), the value of the protocol field is

Q. The Link Control Protocol packet that refers to accept the shut down request is used the code of