Technical :: All Aptitude Test ::

Hassan
1. In a _______ topology, a dedicated link connects a device to a central controller.?
A. Ring
B. Bus
C. Mesh
D. Ring

2.A _______ topology is a variation of a star topology.?
A. Ring
B. Bus
C. Mesh
D. Ring

3.The multiplexing technique, in which each input connection has an allotment in the output even if it is not sending data is.?
A. Asynchronous TDM
B. Synchronous TDM
C. FDM
D. Asynchronous TDM

4.Techniques can make the size of the routing table manageable and also handle issues such as:
A. Flow control
B. Error reporting
C. Tunneling
D. Flow control

5.The five components that make up a data communications system are the message, sender, receiver, medium and...?
A. protocol
B. Code
C. connecting device
D. protocol

6.The mobile station moves from one cell to another during a:
A. Optimization
B. Connection
C. Conversation
D. Optimization

7.Parallel transmission is good in speed but it is very?
A. cheap
B. costly
C. time consuming
D. cheap

8.Multiplexing techniques are of:
A. 3 type
B. 4 types
C. 5 types
D. 3 type

9.A digital multiplexing technique for combining several low-rate channels into one high-rate channel is called...?
A. FDM
B. TDM
C. WDM
D. FDM

10.Channels are separated in multiplexing by unused strips of bandwidth guard bands to prevent:
A. Dispersion
B. Noise in channel
C. Overlapping
D. Dispersion

11. Time-division multiplexing multiplexes the :
A. Analog signals
B. Digital signals
C. Both A and B
D. Analog signals

12.An analog multiplexing technique named WDM combines :
A. Electromagnetic signals
B. Optical signals
C. Digital signals
D. Electromagnetic signals

13.Which of the following does not allow multiple uses or devices to share one communication line?
A. doubleplexer
B. multiplexer
C. concentrator
D. doubleplexer

14.A communications device that combines transmissions from several I/O devices into one line is a ?
A. concentrator
B. modifier
C. multiplexer
D. concentrator

15.The sharing of a medium and its link by two or more devices is called _______.?
A. modulation
B. encoding
C. line discipline
D. modulation

16.Which multiplexing technique transmits analog signals?
A. FDM
B. TDM
C. WDM
D. FDM

17.The word ______ refers to the portion of a _______ that carries a transmission.?
A. channel; link
B. link; channel
C. line; channel
D. channel; link

18.We can divide ____ into two different schemes: synchronous or statistical.
A. FDM
B. TDM
C. WDM
D. FDM

19.In ________ TDM, each input connection has an allotment in the output even if it is not sending data.?
A. synchronous
B. statistical
C. isochronous
D. synchronous

20.In ________ TDM, slots are dynamically allocated to improve bandwidth efficiency.?
A. synchronous
B. statistical
C. isochronous
D. synchronous

21.In ________, we combine signals from different sources to fit into a larger bandwidth.?
A. spread spectrum
B. line coding
C. block coding
D. spread spectrum

22._______ is designed to be used in wireless applications in which stations must be able to share the medium without interception by an eavesdropper and without being subject to jamming from a malicious
A. Spread spectrum
B. Multiplexing
C. Modulation
D. Spread spectrum

23.The ______ technique expands the bandwidth of a signal by replacing each data bit with n bits.
A. FDM
B. DSSS
C. FHSS
D. FDM

24.DMT is a modulation technique that combines elements of _______ and _______.?
A. FDM; TDM
B. QDM; QAM
C. FDM; QAM
D. FDM; TDM

25.A band is always equivalent to ...............?
A. a byte
B. a bit
C. 100 bits
D. a byte

26..................... type of multiplexing are used by transport layer to improve transmission efficiency.?
A. upward
B. downward
C. horizontal
D. upward

27.Which of the following delay is faced by the packet in travelling from one end system to another ?
A. Propagation delay
B. Queuing delay
C. Transmission delay
D. Propagation delay

28.Which of these is a standard interface for serial data transmission?
A. ASCII
B. RS232C
C. 2
D. ASCII

29."Parity bits" are used for which of the following purposes?
A. Encryption of data
B. To transmit faster
C. To detect errors
D. Encryption of data

30.Why would a hacker use a proxy server?
A. To create a stronger connection with the target.
B. To create a ghost server on the network.
C. To obtain a remote access connection.
D. To create a stronger connection with the target.


Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers