Question
a.
30,000
b.
32,700
c.
33,000
d.
None of the above
Posted under UGC NET computer science question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Ten signals, each requiring 3000 Hz, are multiplexed on to a single channel using FDM. How much minimum bandwidth is required for the multiplexed channel ? Assume that the guard...
Similar Questions
Discover Related MCQs
Q. A terminal multiplexer has six 1200 bps' terminals and 'n' 300 bps terminals connected to it. If the outgoing line is 9600 bps, what is the value of n ?
View solution
Q. Which of the following is used in the options field of IPv4 ?
View solution
Q. Which layers of the OSI reference model are host-to-host layers ?
View solution
Q. A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle ?
View solution
Q. Four bits are used for packed sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size ?
View solution
Q. A Multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate ?
View solution
Q. In a fully connected mesh network with 10 computers, total ______ number of cables are required and ____ number of ports are required for each device.
View solution
Q. In TCP/IP reference model, the job of ____ layer is to permit hosts to inject packets into any network and travel them independently to the destination.
View solution
Q. If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be:
View solution
Q. Optical fiber uses reflection to guide light through a channel, in which angle of incedence is _______ the critical angle.
View solution
Q. An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as ..............
View solution
Q. Match the following Layers and Protocols for a user browsing with SSL:
a. Application layer i. TCP
b. Transport layer ii. IP
c. Network layer iii. PPP
d. Datalink layer iv. HTTP
Codes: a b c d
View solution
Q. The maximum size of the data that the application layer can pass on to the TCP layer below is .........
View solution
Q. A packet whose destination is outside the local TCP/IP network segment is sent to ..............
View solution
Q. Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ...........
View solution
Q. In link state routing algorithm after the construction of link state packets, new routes are computed using:
View solution
Q. Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot. The probability that only one station transmits in a given slot is ..................
View solution
Q. Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is
View solution
Q. Let G(x) be generator polynomial used for CRC checking. The condition that should be satisfied by G(x) to correct odd numbered error bits, will be:
View solution
Q. In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!