Download c. Sigma Modulation. d.Differential Modulation.

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
T305a- Finals MCQ
Final 2009 (24 Questions)
1. Which layer is immediately below the Network layer?
a. Physical
b. Network
c. Transport
d. data link layer
Page 1 of 8
Nice Hint: OSI layers
1. all-application
2. people-presentation
3. should-session
4. try-transport
5. new-network
6. Diet -data link
7. Pepsi-physical
2. The communication protocol which is used to achieve communication between agents and
managers is ___________.
a. TCP
b. FTP
c. CCNP
d. CMIP
3. For simplifying network management, the ITU standards have divided the management
domain into __________ layers.
a. Two
b. Three
c. Four
d. Five
4. ___________ is that part of a network element which provides a home within the
telecommunication system for the agent that will manage the network element.
a. Reference function block
b. Mediation function block
c. Q adaptor function block
d. Network element function block
5. The tree arrangement in the figure below shows how timing is distributed from the primary
reference clock (PRC) to a series of slave clocks. This is an example of ____________.
a. Inter-station synchronization
c. Ultra-station synchronization
b. Intra-station synchronization
d. Multi-station synchronization
6. One second period that contains 30% or more of errored blocks is called ________.
a. Highly errored second
b. Severely errored second
c. Large errored second
d. Huge errored second
7. The main role of the ____________ is to determine whether a request from the PC’s
operating system is for local or remote resource.
a. NetBIOS
b. TCP/IP protocol stack
c. Server Message Block
d. Redirector
8. In network environment, providing a reliable service is the main concern of
_____________.
a. Internet protocol
b. Transmission control protocol
c. Universal datagram protocol
d. Ethernet protocol
9. Which of the following is the error-detection and correction method?
a. Parity
b. Hamming code
c. Checksum checking d. Cyclic redundancy checking
10. Which type of error detection uses binary division?
a. Parity
b. Longitudinal redundancy checking
c. Checksum checking
d. Cyclic redundancy checking
11. The solution to the problem of scalability of the Internet is to break the network down
into manageable parts, or domains each called ____________.
a. Router
b.Autonomous system
c.Interface
d.Bridge
T305a- Finals MCQ
Page 2 of 8
12. for a CSMA/CD network, twice the propagation time between the two most distant
stations is called _________________.
a. Transfer time
b.slot time
c. Round trip delay time d.Both b and c
13. When a network interface has a failure in its circuitry, it sends a continuous stream of
frames causing the Ethernet LAN to enter a Collapse state. This condition is known as
__________.
a. Scattering
b.Jabbering
c.Blocking
d.Refreshing
14. In an object-oriented model, when different classes have operations with the same name
but different implementation, they are having the property of ___________.
a. Inheritance
b.Association
c.Polymorphism
d.Aggregation
15.
Ethernet, point to point protocols are examples of protocols that are used in
____________________.
a. Application layer of OSI reference model
b.Presentation layer of OSI reference model
c. Session layer of OSI reference model
d.Data link layer of OSI reference model
16. Session control, file and printer are three categories of messages which pass requests and
acknowledgements in a client-server platform. They are used by __________________.
a. SMB protocol
b.TCP/IP protocol
c.Ethernet protocol d.CSMA/CD protocol
17. ____________________ is a technique which transforms an analogue telephone circuit
into a digital signal, and involves three consecutive processes: sampling, quantization and
encoding.
a. Pulse Code Modulation (PCM)
b.Frequency Modulation (FM)
c.Amplitude Modulation (AM)
d.Phase Modulation (PM)
18. The frame alignment word is a sequence of bits that allows the start of each STM-1 frame
to be clearly identified within SDH network. It is contained within _________________.
a. Regenerator section overhead
b.Multiplex section overhead
c. Synchronous section overhead
d.Sequence section overhead
19. the failure density function, f (t) is used to give the probability of failure during an interval
of time. It is known as ______________.
a. Cumulative probability distribution
b.Probability density distribution
c. Cumulative density distribution
d. Normal probability distribution
20.
_______________ is one of the Telecommunication management network (TMN)
functional blocks that will convert TMN information into a format that can be easily
understood by the user.
a. Operations system function block
b.Workstation function block
c. Reference function block
d..Network element function block
21. In Telecommunication management Network (TMN) system, the role of the manager is to
issue commands and requests to the agent. These commands and requests are known as
________________.
a. Notifications
b.Feedbacks
c.Operations
d.Acknowledgements
22. The sequence of the binary digits representing the outcomes of parity checks in Hamming
codes is known as _________________.
a. Look-up entry
b.Hamming distance
c.Radix
d.Syndrome
23. Rather than sending the absolute value of each sample, it is possible to achieve a smaller
transmission bit-rate by sending the difference between consecutive samples. This is
known as _______________.
T305a- Finals MCQ
a.Delta modulation
c.Adaptive delta modulation
Page 3 of 8
b.Delta–sigma modulation
d.Differential PCM
24. One of the compression techniques in communication uses the fact that in most pictures,
there is considerable correlation between neighboring areas that is a high degree of
redundancy in the data to compress. This type of compression is known as
_____________.
a. Temporal compression
b. Spatial compression
c. Dynamic compression
d. Random compression
Final 2008 (20 questions)
1. Fourier theorem states that any periodic signal can be thought of as a sum of a number of
______________ of different amplitudes, frequencies and phases.
a) square waves
b)sine waves
c) sawtooth waves
d)triangular waves
2. The equation that represents the cosine waveform is:
a) y = 2 cos 1000 π t
b) y = 2 cos 2000 π t
c) y = 2 cos 3000 π t
d) y = 2 cos 4000 π t
3. The routing of packets among nodes within an autonomous system is carried out by the
routers using a protocol called _______________.
a) border gateway protocol (BGP)
b)interior gateway protocol (IGP)
b) internet protocol
d )autonomous system protocol
4. In order to avoid spread data too widely across a LAN, a _________ is used in a star
topology. This device directs traffic by acting intelligently upon address information
contained within the header of every packet it receives.
a) bridge
b)hub
c)repeater
d)carrier sense
5. ___________ or block-diagram equivalent circuits are used throughout engineering to
represent the behavior and structure of systems.
a) Signal sequence diagrams
b)State transition tables
c)State transition diagrams
d)Models
6. A class is a collection of same-type objects. For example, a model of a graphical user
interface will contain several different ‘window’ objects. The individual window objects are
said to be ___________ of the window class.
a) subclasses
b)parent classes
c)super-classes
d)instances
7. An object contains a collection of data items relating to a particular component of the
system called ____________.
a) operations
b)attributes
c)services
d)methods
8. The ___________ of the OSI reference model is concerned with the transmission of the
raw bit-stream and will have to deal with all necessary interfacing to send and receive that
bit-stream over the physical medium.
a) transport layer
b)network layer
c)data link layer
d)physical layer
9. User datagram protocol (UDP) is a _____________ protocol for use with applications that
do not need sequencing and flow control.
a) simple mail transfer b)connection-oriented
c)connectionless
d)point-to-point
T305a- Finals MCQ
Page 4 of 8
10. The pulse code modulation PCM is a technique which transforms an analogue telephone
circuit into a digital signal, and involves three consecutive processes called
__________________.
a) sampling, quantization and justification
b)sampling, quantization and encoding
c) sampling, encoding and justification
d)quantization, encoding and justification
11. In PDH the variation in timing, between the tributaries, is handled by a process called
_____________ which can add extra bits to match the bit-rate of each tributary to the
aggregate bit-rate.
a) plesiochronous
b)sunchronization
c)quantization
d)justification
12. _______________ is a term used to describe the phase variation (in the time domain) of a
digital signal from its normal, or ideal, time position
a) Wander
b)Buffer
c)Jitter
d)Reference signal
13. The _______________ is the probability that a component will survive to time t.
a) failure function
b)reliability function
c)failure density function
d)reliability density function
14. In managing SDH networks, all the stages that are necessary in deciding where, when and
how a ring should be installed can be classed as _____________ process.
a) managing
b)performance
c)planning
d)configuration
15. Once in service, the responsibility falls to the ___________ to monitor network elements
to detect alarms and other performance indicators defined in the information model.
a) configuration manager
b)accounting manager
c)Security manager
d)performance manager
16. The agent is ______________ which can handle many objects in a particular network
element. All functions carried out by the network element must be presented to the agent
using object descriptions as defined by managed objects. The capability to manage
telecommunication equipment from many different manufacturers is very important to
TMN
a) a managed object
b)an open system
c)a manager
d)a network element
17. The ___________ is a characteristic of the source, representing the average amount of
information it provides. This is independent of how symbols from the source are coded.
a) efficiency
b)memory
c)probability
d)entropy
18. A code word can be translated as soon as it arrives so we say that the code is
__________________.
a) variable length code
b)uniquely decodable
c) instantaneously decodable
d)efficient code
19. There are three main types of coding used in digital telecommunications called
________________.
a)message, channel, and error coding
b)message, error, and line coding
c)error, channel, and line coding
d)message, channel, and line coding
T305a- Finals MCQ
Page 5 of 8
Final 2007 (30 questions)
2. What does flow control determine?
a. When a device can transmit
b. Whether a device is connection oriented or connectionless
c. Both a and b
d. Neither a nor b
Nice Hint: OSI layers
1. Which layer is immediately below the data link layer?
1. all-application
a. Physical
2. people-presentation
b. Network
3. should-session
c. Transport
4. try-transport
d. Application
5. new-network
6. Diet -data link
7. Pepsi-physical
3.
Converting data into signals by transforming and encoding the information to produce
electromagnetic signals is the functionality of a ___________.
a. source
b.transmitter
c.receiver
d.destination
4. Which of the following describes stop-and-wait flow control?
a. It is simple
b. It is complex
c. It is best with small frames
d. It is best over long distances
5. What must a sender do before a receiver’s sliding windows buffer can expand?
a. Send an acknowledgment
b. Receive an acknowledgment
c. Either a or b
d. Neither a nor b
6. Controlled access line discipline is used with which type of circuit?
a. Point-to-point
b. Multipoint
c. Either a or b
d. Neither a nor b
7. Which of the following is the simplest error-detection method?
a. Parity
b. Longitudinal redundancy checking
c. Checksum checking
d. Cyclic redundancy checking
9. Which of the following is also called forward error correction?
a. Simplex
b. Retransmission
c. Detection-error coding
d. Error-correction coding
13. The IEEE 802.3 specification divides the data link layer into two sub-layers: the Logical
link control sub-layer and the medium access control sub-layer. An example of one
implementation of medium access control is _______________.
a. TCP protocol
b.CSMA/CD protocol
c.IP protocol
d.UDP protocol
15.
Telnet, FTP, SMTP, DNS, HTTP are examples of protocols that are used in
____________________.
a.application layer of OSI reference model
b. presentation layer of OSI reference model
c. session layer of OSI reference model
d. data link layer of OSI reference model
Note: here are two question repeated in 2009 + 2007 with different answer. most probably
Synchronous section overhead is correct.
18. The frame alignment word is a sequence of bits that allows the start of each STM-1 frame
to be clearly identified within SDH network. It is contained within _________________.
a.Regenerator section overhead
b.Multiplex section overhead
c.Synchronous section overhead
d.Sequence section overhead
18. The frame alignment word is a sequence of bits that allows the start of each STM-1 frame
to be clearly identified within SDH network. It is contained within _________________.
a. Regenerator section overhead
b.Multiplex section overhead
c. Synchronous section overhead
d.Sequence section overhead
T305a- Finals MCQ
Page 6 of 8
19. The Star arrangement in the figure below shows how it is used to distribute the timing
source within a telecommunication station in SDH network. This is an example of
___________________.
a. Intra-station synchronization
c. Ultra-station synchronization
20.
b.Inter-station synchronization
d.Multi-station synchronization
____________ is the standard defined by the American National Standard Authority,
ANSI T1 for synchronous operation used in North America.
a.DXC
b.STM-1
c.ADM
d.SONET
26. The electron beam in the cathode ray tube (CRT) inside the TV set is made to scan the
whole visible surface of the screen in a zigzag pattern. This is known as ____________.
a. raster
b.picture line
c.frame
d.broadcast
27.
The figure below shows an example of a modulation system used in digital
communication. What is that modulation system?
a. PCM Modulation.
c. Sigma Modulation.
b.Delta Modulation.
d.Differential Modulation.
29. Reversible or lossless coding is a type of coding for which the exact data can be recovered
after decoding. This type of coding is used by _________________.
a. PCM encoding
b.Huffman encoding
c.Run-length encoding
d.Both b and c
30. The error represented by the difference between the original and quantized signals set a
fundamental limitation to the performance of PCM systems known as
__________________.
a. dynamic range
b. quantization noise
c. detection-error d. correction-error
Final 2006 (30 questions)
1) The solution to the problem of of the Internet is to break the network down into
manageable parts, or domains each called Autonomous System.
T305a- Finals MCQ
a) high cost
Page 7 of 8
b) scalability
c)
interfaces
d)
different protocols
2) The routing of packets among nodes within Autonomous System is carried out by the
routers using a protocol called
.
a)IGP
b)BGP
c)EGP
d)PGP
3) Routing between Autonomous Systems uses a different protocol called a
_.
a)IGP
b) BGP
c)EGP
d)PGP
4) In an object-oriented model, one special type of relationship that exists between
objects is when one object is part of another. This is called .
a) multiplicity
b)aggregation
c) containment
d) both b and c
6) Source and destination port numbers, and sequence and acknowledge numbers are
main fields that are defined inside
.
a) a TCP segment
b) an IP segment c) an Ethernet segment
d)a MAC segment
7) In an attempt to improve the email service, a new protocol has been proposed as an
extension for SMTP. This protocol is known as
.
a) ESMTP
b) MIME
c) MOME
d) MITP
8) In network environment, providing a reliable service is the main concern of
a) internet protocol
b) transmission control protocol
c) universal datagram protocol
D)Ethernet protocol
10) A key principle for digital transmission is
a) serial synchronization
c) frame synchronization
_.
_.
b)
d)
frequency synchronization
multiplexing synchronization
11) The figure below is an example of a time division multiplexing process that is based on .
a) bit-interleaving
b)
byte-interleaving c)octet-interleaving d)
word-interleaving
15) The reliability function, R (t), and failure function, Q (t) that give the probability of
something happening up to specified time are known as .
a) probability density distribution
b) cumulative probability distribution
c) cumulative density distribution
d) normal probability distribution
16)
is that part of a network element which provides a home within the
telecommunication system for the agent that will manage the network element.
a) Q adaptor function block
b) Mediation function block
c) Reference function block
d) Network element function block
18) In telecommunication management network (TMN) system, the agent replies to
the manager commands are known as
_.
a) operations
b) feedbacks
c) notifications
d) acknowledges
20) For a communication system, the number of symbols used in the code alphabet is known as
a) radix
b) dot
c) dash
d) code word
T305a- Finals MCQ
21) The Shannon’s noiseless coding theorem is based on _.
a) Shannon’s first theorem
b) Shannon’s second theorem
c) Shannon’s third theorem
d) Shannon’s fourth theorem
Page 8 of 8
22) In a communication system, the failure of the reconstructed signal to follow the original
one is known as
.
a) falling construction
b)falling slope
c)overload failure
d) slope overload
23) The main reason for adding headers in each layer of OSI model is .
a) to identify which application is used
b) to identify performance and speed
c) to provide control information on how to handle data/packets
d) to show the user the order of responsibility of each layer
24)
a)
is used to ensure that the sender does not overwhelm the receiver.
Data control
b) Send control
c) Receive control d) Flow control
25) For a message of 50 frames using stop-and-wait flow control,
would be returned to the sender.
a) none
b) 1
c) 50
d)
medium dependable
27)
data link protocol uses start and stop bits.
a) Asynchronous
b) Synchronous
c) Full duplex
Simplex
28) A point-to-point circuit can be
a)
half-duplex
b)
.
full-duplex
c) either a or b
29) At
layer, physical addressing occur.
a)
b) data link
physical
c)
d)
acknowledgments
network
d)
d)
neither a nor b
application
30) A sender must
before a sender’s sliding windows buffer can expand.
a) send an acknowledgment
b) receive an acknowledgment
c) either a or b
d) neither a nor
‫اللهم علمنا ما جهلنا وذكرنا ما نسينا و بارك لنا فيما علمتنا يا أكرم األكرمين‬
With my best wishes, Designsecrets