Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
T305a- Finals MCQ Final 2009 (24 Questions) 1. Which layer is immediately below the Network layer? a. Physical b. Network c. Transport d. data link layer Page 1 of 8 Nice Hint: OSI layers 1. all-application 2. people-presentation 3. should-session 4. try-transport 5. new-network 6. Diet -data link 7. Pepsi-physical 2. The communication protocol which is used to achieve communication between agents and managers is ___________. a. TCP b. FTP c. CCNP d. CMIP 3. For simplifying network management, the ITU standards have divided the management domain into __________ layers. a. Two b. Three c. Four d. Five 4. ___________ is that part of a network element which provides a home within the telecommunication system for the agent that will manage the network element. a. Reference function block b. Mediation function block c. Q adaptor function block d. Network element function block 5. The tree arrangement in the figure below shows how timing is distributed from the primary reference clock (PRC) to a series of slave clocks. This is an example of ____________. a. Inter-station synchronization c. Ultra-station synchronization b. Intra-station synchronization d. Multi-station synchronization 6. One second period that contains 30% or more of errored blocks is called ________. a. Highly errored second b. Severely errored second c. Large errored second d. Huge errored second 7. The main role of the ____________ is to determine whether a request from the PC’s operating system is for local or remote resource. a. NetBIOS b. TCP/IP protocol stack c. Server Message Block d. Redirector 8. In network environment, providing a reliable service is the main concern of _____________. a. Internet protocol b. Transmission control protocol c. Universal datagram protocol d. Ethernet protocol 9. Which of the following is the error-detection and correction method? a. Parity b. Hamming code c. Checksum checking d. Cyclic redundancy checking 10. Which type of error detection uses binary division? a. Parity b. Longitudinal redundancy checking c. Checksum checking d. Cyclic redundancy checking 11. The solution to the problem of scalability of the Internet is to break the network down into manageable parts, or domains each called ____________. a. Router b.Autonomous system c.Interface d.Bridge T305a- Finals MCQ Page 2 of 8 12. for a CSMA/CD network, twice the propagation time between the two most distant stations is called _________________. a. Transfer time b.slot time c. Round trip delay time d.Both b and c 13. When a network interface has a failure in its circuitry, it sends a continuous stream of frames causing the Ethernet LAN to enter a Collapse state. This condition is known as __________. a. Scattering b.Jabbering c.Blocking d.Refreshing 14. In an object-oriented model, when different classes have operations with the same name but different implementation, they are having the property of ___________. a. Inheritance b.Association c.Polymorphism d.Aggregation 15. Ethernet, point to point protocols are examples of protocols that are used in ____________________. a. Application layer of OSI reference model b.Presentation layer of OSI reference model c. Session layer of OSI reference model d.Data link layer of OSI reference model 16. Session control, file and printer are three categories of messages which pass requests and acknowledgements in a client-server platform. They are used by __________________. a. SMB protocol b.TCP/IP protocol c.Ethernet protocol d.CSMA/CD protocol 17. ____________________ is a technique which transforms an analogue telephone circuit into a digital signal, and involves three consecutive processes: sampling, quantization and encoding. a. Pulse Code Modulation (PCM) b.Frequency Modulation (FM) c.Amplitude Modulation (AM) d.Phase Modulation (PM) 18. The frame alignment word is a sequence of bits that allows the start of each STM-1 frame to be clearly identified within SDH network. It is contained within _________________. a. Regenerator section overhead b.Multiplex section overhead c. Synchronous section overhead d.Sequence section overhead 19. the failure density function, f (t) is used to give the probability of failure during an interval of time. It is known as ______________. a. Cumulative probability distribution b.Probability density distribution c. Cumulative density distribution d. Normal probability distribution 20. _______________ is one of the Telecommunication management network (TMN) functional blocks that will convert TMN information into a format that can be easily understood by the user. a. Operations system function block b.Workstation function block c. Reference function block d..Network element function block 21. In Telecommunication management Network (TMN) system, the role of the manager is to issue commands and requests to the agent. These commands and requests are known as ________________. a. Notifications b.Feedbacks c.Operations d.Acknowledgements 22. The sequence of the binary digits representing the outcomes of parity checks in Hamming codes is known as _________________. a. Look-up entry b.Hamming distance c.Radix d.Syndrome 23. Rather than sending the absolute value of each sample, it is possible to achieve a smaller transmission bit-rate by sending the difference between consecutive samples. This is known as _______________. T305a- Finals MCQ a.Delta modulation c.Adaptive delta modulation Page 3 of 8 b.Delta–sigma modulation d.Differential PCM 24. One of the compression techniques in communication uses the fact that in most pictures, there is considerable correlation between neighboring areas that is a high degree of redundancy in the data to compress. This type of compression is known as _____________. a. Temporal compression b. Spatial compression c. Dynamic compression d. Random compression Final 2008 (20 questions) 1. Fourier theorem states that any periodic signal can be thought of as a sum of a number of ______________ of different amplitudes, frequencies and phases. a) square waves b)sine waves c) sawtooth waves d)triangular waves 2. The equation that represents the cosine waveform is: a) y = 2 cos 1000 π t b) y = 2 cos 2000 π t c) y = 2 cos 3000 π t d) y = 2 cos 4000 π t 3. The routing of packets among nodes within an autonomous system is carried out by the routers using a protocol called _______________. a) border gateway protocol (BGP) b)interior gateway protocol (IGP) b) internet protocol d )autonomous system protocol 4. In order to avoid spread data too widely across a LAN, a _________ is used in a star topology. This device directs traffic by acting intelligently upon address information contained within the header of every packet it receives. a) bridge b)hub c)repeater d)carrier sense 5. ___________ or block-diagram equivalent circuits are used throughout engineering to represent the behavior and structure of systems. a) Signal sequence diagrams b)State transition tables c)State transition diagrams d)Models 6. A class is a collection of same-type objects. For example, a model of a graphical user interface will contain several different ‘window’ objects. The individual window objects are said to be ___________ of the window class. a) subclasses b)parent classes c)super-classes d)instances 7. An object contains a collection of data items relating to a particular component of the system called ____________. a) operations b)attributes c)services d)methods 8. The ___________ of the OSI reference model is concerned with the transmission of the raw bit-stream and will have to deal with all necessary interfacing to send and receive that bit-stream over the physical medium. a) transport layer b)network layer c)data link layer d)physical layer 9. User datagram protocol (UDP) is a _____________ protocol for use with applications that do not need sequencing and flow control. a) simple mail transfer b)connection-oriented c)connectionless d)point-to-point T305a- Finals MCQ Page 4 of 8 10. The pulse code modulation PCM is a technique which transforms an analogue telephone circuit into a digital signal, and involves three consecutive processes called __________________. a) sampling, quantization and justification b)sampling, quantization and encoding c) sampling, encoding and justification d)quantization, encoding and justification 11. In PDH the variation in timing, between the tributaries, is handled by a process called _____________ which can add extra bits to match the bit-rate of each tributary to the aggregate bit-rate. a) plesiochronous b)sunchronization c)quantization d)justification 12. _______________ is a term used to describe the phase variation (in the time domain) of a digital signal from its normal, or ideal, time position a) Wander b)Buffer c)Jitter d)Reference signal 13. The _______________ is the probability that a component will survive to time t. a) failure function b)reliability function c)failure density function d)reliability density function 14. In managing SDH networks, all the stages that are necessary in deciding where, when and how a ring should be installed can be classed as _____________ process. a) managing b)performance c)planning d)configuration 15. Once in service, the responsibility falls to the ___________ to monitor network elements to detect alarms and other performance indicators defined in the information model. a) configuration manager b)accounting manager c)Security manager d)performance manager 16. The agent is ______________ which can handle many objects in a particular network element. All functions carried out by the network element must be presented to the agent using object descriptions as defined by managed objects. The capability to manage telecommunication equipment from many different manufacturers is very important to TMN a) a managed object b)an open system c)a manager d)a network element 17. The ___________ is a characteristic of the source, representing the average amount of information it provides. This is independent of how symbols from the source are coded. a) efficiency b)memory c)probability d)entropy 18. A code word can be translated as soon as it arrives so we say that the code is __________________. a) variable length code b)uniquely decodable c) instantaneously decodable d)efficient code 19. There are three main types of coding used in digital telecommunications called ________________. a)message, channel, and error coding b)message, error, and line coding c)error, channel, and line coding d)message, channel, and line coding T305a- Finals MCQ Page 5 of 8 Final 2007 (30 questions) 2. What does flow control determine? a. When a device can transmit b. Whether a device is connection oriented or connectionless c. Both a and b d. Neither a nor b Nice Hint: OSI layers 1. Which layer is immediately below the data link layer? 1. all-application a. Physical 2. people-presentation b. Network 3. should-session c. Transport 4. try-transport d. Application 5. new-network 6. Diet -data link 7. Pepsi-physical 3. Converting data into signals by transforming and encoding the information to produce electromagnetic signals is the functionality of a ___________. a. source b.transmitter c.receiver d.destination 4. Which of the following describes stop-and-wait flow control? a. It is simple b. It is complex c. It is best with small frames d. It is best over long distances 5. What must a sender do before a receiver’s sliding windows buffer can expand? a. Send an acknowledgment b. Receive an acknowledgment c. Either a or b d. Neither a nor b 6. Controlled access line discipline is used with which type of circuit? a. Point-to-point b. Multipoint c. Either a or b d. Neither a nor b 7. Which of the following is the simplest error-detection method? a. Parity b. Longitudinal redundancy checking c. Checksum checking d. Cyclic redundancy checking 9. Which of the following is also called forward error correction? a. Simplex b. Retransmission c. Detection-error coding d. Error-correction coding 13. The IEEE 802.3 specification divides the data link layer into two sub-layers: the Logical link control sub-layer and the medium access control sub-layer. An example of one implementation of medium access control is _______________. a. TCP protocol b.CSMA/CD protocol c.IP protocol d.UDP protocol 15. Telnet, FTP, SMTP, DNS, HTTP are examples of protocols that are used in ____________________. a.application layer of OSI reference model b. presentation layer of OSI reference model c. session layer of OSI reference model d. data link layer of OSI reference model Note: here are two question repeated in 2009 + 2007 with different answer. most probably Synchronous section overhead is correct. 18. The frame alignment word is a sequence of bits that allows the start of each STM-1 frame to be clearly identified within SDH network. It is contained within _________________. a.Regenerator section overhead b.Multiplex section overhead c.Synchronous section overhead d.Sequence section overhead 18. The frame alignment word is a sequence of bits that allows the start of each STM-1 frame to be clearly identified within SDH network. It is contained within _________________. a. Regenerator section overhead b.Multiplex section overhead c. Synchronous section overhead d.Sequence section overhead T305a- Finals MCQ Page 6 of 8 19. The Star arrangement in the figure below shows how it is used to distribute the timing source within a telecommunication station in SDH network. This is an example of ___________________. a. Intra-station synchronization c. Ultra-station synchronization 20. b.Inter-station synchronization d.Multi-station synchronization ____________ is the standard defined by the American National Standard Authority, ANSI T1 for synchronous operation used in North America. a.DXC b.STM-1 c.ADM d.SONET 26. The electron beam in the cathode ray tube (CRT) inside the TV set is made to scan the whole visible surface of the screen in a zigzag pattern. This is known as ____________. a. raster b.picture line c.frame d.broadcast 27. The figure below shows an example of a modulation system used in digital communication. What is that modulation system? a. PCM Modulation. c. Sigma Modulation. b.Delta Modulation. d.Differential Modulation. 29. Reversible or lossless coding is a type of coding for which the exact data can be recovered after decoding. This type of coding is used by _________________. a. PCM encoding b.Huffman encoding c.Run-length encoding d.Both b and c 30. The error represented by the difference between the original and quantized signals set a fundamental limitation to the performance of PCM systems known as __________________. a. dynamic range b. quantization noise c. detection-error d. correction-error Final 2006 (30 questions) 1) The solution to the problem of of the Internet is to break the network down into manageable parts, or domains each called Autonomous System. T305a- Finals MCQ a) high cost Page 7 of 8 b) scalability c) interfaces d) different protocols 2) The routing of packets among nodes within Autonomous System is carried out by the routers using a protocol called . a)IGP b)BGP c)EGP d)PGP 3) Routing between Autonomous Systems uses a different protocol called a _. a)IGP b) BGP c)EGP d)PGP 4) In an object-oriented model, one special type of relationship that exists between objects is when one object is part of another. This is called . a) multiplicity b)aggregation c) containment d) both b and c 6) Source and destination port numbers, and sequence and acknowledge numbers are main fields that are defined inside . a) a TCP segment b) an IP segment c) an Ethernet segment d)a MAC segment 7) In an attempt to improve the email service, a new protocol has been proposed as an extension for SMTP. This protocol is known as . a) ESMTP b) MIME c) MOME d) MITP 8) In network environment, providing a reliable service is the main concern of a) internet protocol b) transmission control protocol c) universal datagram protocol D)Ethernet protocol 10) A key principle for digital transmission is a) serial synchronization c) frame synchronization _. _. b) d) frequency synchronization multiplexing synchronization 11) The figure below is an example of a time division multiplexing process that is based on . a) bit-interleaving b) byte-interleaving c)octet-interleaving d) word-interleaving 15) The reliability function, R (t), and failure function, Q (t) that give the probability of something happening up to specified time are known as . a) probability density distribution b) cumulative probability distribution c) cumulative density distribution d) normal probability distribution 16) is that part of a network element which provides a home within the telecommunication system for the agent that will manage the network element. a) Q adaptor function block b) Mediation function block c) Reference function block d) Network element function block 18) In telecommunication management network (TMN) system, the agent replies to the manager commands are known as _. a) operations b) feedbacks c) notifications d) acknowledges 20) For a communication system, the number of symbols used in the code alphabet is known as a) radix b) dot c) dash d) code word T305a- Finals MCQ 21) The Shannon’s noiseless coding theorem is based on _. a) Shannon’s first theorem b) Shannon’s second theorem c) Shannon’s third theorem d) Shannon’s fourth theorem Page 8 of 8 22) In a communication system, the failure of the reconstructed signal to follow the original one is known as . a) falling construction b)falling slope c)overload failure d) slope overload 23) The main reason for adding headers in each layer of OSI model is . a) to identify which application is used b) to identify performance and speed c) to provide control information on how to handle data/packets d) to show the user the order of responsibility of each layer 24) a) is used to ensure that the sender does not overwhelm the receiver. Data control b) Send control c) Receive control d) Flow control 25) For a message of 50 frames using stop-and-wait flow control, would be returned to the sender. a) none b) 1 c) 50 d) medium dependable 27) data link protocol uses start and stop bits. a) Asynchronous b) Synchronous c) Full duplex Simplex 28) A point-to-point circuit can be a) half-duplex b) . full-duplex c) either a or b 29) At layer, physical addressing occur. a) b) data link physical c) d) acknowledgments network d) d) neither a nor b application 30) A sender must before a sender’s sliding windows buffer can expand. a) send an acknowledgment b) receive an acknowledgment c) either a or b d) neither a nor اللهم علمنا ما جهلنا وذكرنا ما نسينا و بارك لنا فيما علمتنا يا أكرم األكرمين With my best wishes, Designsecrets