Question
a.
equal to
b.
less than
c.
greater than
d.
less than or equal to
Posted under UGC NET computer science question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Optical fiber uses reflection to guide light through a channel, in which angle of incedence is _______ the critical angle.
Similar Questions
Discover Related MCQs
Q. An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as ..............
View solution
Q. Match the following Layers and Protocols for a user browsing with SSL:
a. Application layer i. TCP
b. Transport layer ii. IP
c. Network layer iii. PPP
d. Datalink layer iv. HTTP
Codes: a b c d
View solution
Q. The maximum size of the data that the application layer can pass on to the TCP layer below is .........
View solution
Q. A packet whose destination is outside the local TCP/IP network segment is sent to ..............
View solution
Q. Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ...........
View solution
Q. In link state routing algorithm after the construction of link state packets, new routes are computed using:
View solution
Q. Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot. The probability that only one station transmits in a given slot is ..................
View solution
Q. Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is
View solution
Q. Let G(x) be generator polynomial used for CRC checking. The condition that should be satisfied by G(x) to correct odd numbered error bits, will be:
View solution
Q. In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................
View solution
Q. A node X on a 10 Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2 Mbps. Token bucket is initially filled with 16 megabits. The maximum duration taken by X to transmit at full rate of 10 Mbps is ............ secs.
View solution
Q. Which of the following statements is not true with respect to microwaves?
View solution
Q. In a fast Ethernet cabling, 100 Base-TX uses ........... cable and maximum segment size is ............
View solution
Q. A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute with each frame carrying an average of 10,000 bits. What is the throughput of this network ?
View solution
Q. Match the following:
List – I List – II
a. Session layer i. Virtual terminal software
b. Application layer ii. Semantics of the information transmitted
c. Presentation layer iii. Flow control
d. Transport layer iv. Manage dialogue control
Codes :
a b c d
View solution
Q. Which of the following protocols is used by email server to maintain a central repository that can be accessed from any machine?
View solution
Q. An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as ..............
View solution
Q. Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is ................
View solution
Q. Consider the following statements :
a. High speed Ethernet works on optic fiber.
b. A point to point protocol over Ethernet is a network protocol for encapsulating PPP frames inside Ethernet frames.
c. High speed Ethernet does not work on optic fiber.
d. A point to point protocol over Ethernet is a network protocol for encapsulating Ethernet frames inside PPP frames.
Which of the following is correct ?
View solution
Q. In CRC checksum method, assume that given frame for transmission is 1101011011 and the generator polynomial is G(x) = x^4 + x + 1.
After implementing CRC encoder, the encoded word sent from sender side is .............
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!