Computer Networks And Internet Protocol - Week 12 | Assignment : Answer with Explanation
Baseband typically uses signal and Broadband uses signals.
a. Analog, Digitalb. Digital, Analog
c. Analog, Analog
d. Digital, Digital
Answer
b. Digital, Analog
A composite signal contains frequencies 300, 500, 800, 1000 and 1500 Hz. What is the bandwidth?
a.1000 Hzb. 200 Hz
c. 1200 Hz
d. 500 Hz
Answer
c. 1200 Hz
The bandwidth of a composite signal is the difference between the highest and lowest frequencies contained in the signal. In this case, the highest frequency is 1500 Hz and the lowest frequency is 300 Hz.
Therefore, the bandwidth of the composite signal is:
1500 Hz - 300 Hz = 1200 Hz
Therefore, the answer is (c) 1200 Hz.
Suppose we have a HDTV screen with screen resolution 1600 X 1200 and the screen is renewed 50 times per second. Considering a colored pixel needs 24 bits to be represented, what is the HDTV bit rate?
a. 1.3 Gbpsb. 2.3 Gbps
c. 3.3 Gbps
d. 4.3 Gbps
Answer
b. 2.3 Gbps
The bit rate of an HDTV screen can be calculated by multiplying the screen resolution (in pixels), the number of bits per pixel, and the refresh rate (in Hz). In this case, the bit rate is 1600 x 1200 x 24 x 50 = 2,30,40,00,000 = 2.3 Gbps.
Which of the following is NOT a cause of transmission impairment ?
a. Attenuationb. Noise
c. Distortion
d. Congetion
Answer
d. Congetion
Signals travel through transmission media, which are not perfect. The imperfection causes
signal impairment. This means that the signal at the beginning of the medium is not the
same as the signal at the end of the medium
For a noiseless channel with a bandwidth of 1 MHz, if we want a maximum bit 4Mbps, what is the required number of signal levels
a. 2b. 4
c. 6
d. 8
Answer
b. 4
According to the Nyquist formula for a noiseless channel, the maximum bit rate is given by the formula C = 2B * log2(L), where C is the maximum bit rate, B is the bandwidth of the channel, and L is the number of signal levels. In this case, we have C = 4 Mbps and B = 1 MHz. Solving for L, we get L = 2^(C/(2B)) = 2^(4/2) = 4.
Which of the following is/are NOT true about modulation techniques?
a. One amplitude in ASK is zero.b. BFSK is more susceptible to error than ASK.
c. In Binary PSK, presence and absence of the carrier signal represents two binary digits.
d. QAM is a combination of ASK and PSK
Answer
b. BFSK is more susceptible to error than ASK.
c. In Binary PSK, presence and absence of the carrier signal represents two binary
Which one is used in parts of the cellular telephone system and for some statellite communication ?
a. CDMb. TDM
c. FDM
d. WDM
Answer
a. CDM
The specific version of CDM used in cell phones is known as Code Division Multi-Access
(CDMA)
What does SSL stand for in SSL/TLS Protocol?
a. Secure Service Layerb. Safe Sockets Layer
c. Secure Sockets Layer
d. Standalone Security Layer
Answer
c. Secure Sockets Layer
SSL stands for Secure Socket Layer. It is a predecessor of TLS (Transport Layer Security) protocol, and both are cryptographic protocols used to establish secure communication channels between two devices over the internet. SSL was developed by Netscape Communications in the mid-1990s to provide secure communication between web browsers and servers, and it was later succeeded by TLS. Both SSL and TLS use encryption algorithms to ensure the confidentiality, integrity, and authenticity of data transmitted over the internet.
Which of the following is NOT a function of a HTTP Proxy?
a) Efficient utilization of bandwidth through cachingb) Serving as a rudimentary firewall.
c) Translating private IP address to public IP address.
d) Allow or deny access based on content and location.
Answer
c) Translating private IP address to public IP address.
HTTP proxies are used to act as intermediaries between clients and servers, allowing clients to make requests to servers without revealing their own IP addresses. They can also improve performance and security by caching frequently accessed content, serving as a rudimentary firewall by filtering traffic based on rules, and allowing or denying access based on content and location. However, translating private IP addresses to public IP addresses is typically handled by a Network Address Translator (NAT) rather than an HTTP proxy.
Which of the following statements is/are correct?
a. NAT is a proxy server.b. NAT can also act as a firewall.
c. NAT needs to recalculate both IP and TCP checksum as it modifies the IP header.
d. IP masquerading is done by NAT.
Answer
b. NAT can also act as a firewall.
c. NAT needs to recalculate both IP and TCP checksum as it modifies the IP header.
d. IP masquerading is done by NAT.
Disclaimer:
"This page contains multiple choice questions (MCQs) related to Computer Networks and Internet Protocols. The answers to these questions are provided for educational and informational purposes only.These answers are provided only for the purpose to help students to take references. This website does not claim any surety of 100% correct answers. So, this website urges you to complete your assignment yourself."
0 Comments