Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following is not an application layer service?(a) Network virtual terminal(b) File transfer, access, and management(c) Mail service(d) Error controlI have been asked this question in an interview.My question is based upon Packet Switching & Circuit Switching in chapter Security & Physical Layer of Computer Network

Answer»

Correct answer is (d) Error control

To elaborate: Application layer is the topmost layer in the OSI model. Network VIRTUAL TERMINAL, mail service, FILE transfer, access and management are all services of the application layer. It uses PROTOCOLS like HTTP, FTP, and DNS etc. to provide these services.

2.

In _________ systems, resources are allocated on demand.(a) packet switching(b) circuit switching(c) line switching(d) frequency switchingI got this question in class test.My question is based upon Packet Switching & Circuit Switching in portion Security & Physical Layer of Computer Network

Answer»

Correct option is (a) PACKET switching

Explanation: In packet switching, the bits are received in out of order and need to be assembled at the receiver end, whereas in the case of CIRCUIT switching, all the bits are received in order. All TRANSMISSIONS may not OCCUR through the same path in case of packet switching.

3.

As the resources are reserved between two communicating end systems in circuit switching, ___________ is achieved.(a) authentication(b) guaranteed constant rate(c) reliability(d) store and forwardI got this question in an interview for internship.My doubt is from Packet Switching & Circuit Switching in division Security & Physical Layer of Computer Network

Answer»

The correct answer is (b) guaranteed CONSTANT rate

The best I can explain: Circuit switching is connection oriented and is always implemented in the physical LAYER. Once a path is SET, all transmission occurs through the same path. It is used SINCE the early times in telephonic systems.

4.

The required resources for communication between end systems are reserved for the duration of the session between end systems in ________ method.(a) Packet switching(b) Circuit switching(c) Line switching(d) Frequency switchingI had been asked this question in an online interview.Question is from Packet Switching & Circuit Switching topic in chapter Security & Physical Layer of Computer Network

Answer»

The correct choice is (b) Circuit switching

The best I can EXPLAIN: In circuit switching, a physical path between the sender and receiver is established. This path is maintained until the connection is needed. Circuit switching is implemented in the Physical layer and is USED in telephonic SYSTEMS.

5.

What are the Methods to move data through a network of links and switches?(a) Packet switching and Line switching(b) Circuit switching and Line switching(c) Line switching and bit switching(d) Packet switching and Circuit switchingI had been asked this question in a national level competition.My question comes from Packet Switching & Circuit Switching topic in division Security & Physical Layer of Computer Network

Answer»

The correct choice is (d) PACKET switching and Circuit switching

The best explanation: Packet switching and Circuit switching are two DIFFERENT TYPES of switching methods used to connect the MULTIPLE communicating devices with one another. Packet switching is used in conventional LAN systems and circuit switching is used in telephonic systems.

6.

If there are N routers from source to destination, the total end to end delay in sending packet P(L-> number of bits in the packet R-> transmission rate) is equal to ______________(a) N(b) (N*L)/R(c) (2N*L)/R(d) L/RThe question was posed to me in an interview for job.My question comes from Packet Switching & Circuit Switching topic in section Security & Physical Layer of Computer Network

Answer»

Right answer is (b) (N*L)/R

The best explanation: The equation to FIND the END to end delay when no. of BITS, transmission rate and no. of routers is given by (N*L)/R. The total end to end delay, that is, nodal delay is the sum of all, the PROCESSING delay, QUEUING delay, transmission delay and propagation delay.

7.

Most packet switches use this principle ____________(a) Stop and wait(b) Store and forward(c) Store and wait(d) Stop and forwardThis question was posed to me in my homework.Query is from Packet Switching & Circuit Switching topic in section Security & Physical Layer of Computer Network

Answer» RIGHT option is (b) Store and forward

Easy explanation: The packet SWITCH will not transmit the first bit to outbound link until it receives the ENTIRE packet. If the entire packet is not received and the time-out PERIOD expires, the packet switch will inform the sender to resend the part of packet or the entire packet based on the algorithm being used.
8.

A local telephone network is an example of a _______ network.(a) Packet switched(b) Circuit switched(c) Bit switched(d) Line switchedThe question was posed to me in an internship interview.The doubt is from Packet Switching & Circuit Switching in chapter Security & Physical Layer of Computer Network

Answer»

Right ANSWER is (B) CIRCUIT switched

Best explanation: Circuit switching is connection oriented switching technique, whereas in the case of packet switching, it is connectionless. Circuit switching is implemented in the Physical layer, whereas packet switching is implemented in the NETWORK layer. Internet too is based on the concept of circuit switching.

9.

Geostationary satellites ___________(a) Are placed at a fixed point above the earth(b) Rotate the earth about a fixed axis(c) Rotate the earth about a varying axis(d) All of the mentionedI had been asked this question in homework.This is a very interesting question from Physical Media in section Security & Physical Layer of Computer Network

Answer» CORRECT choice is (a) Are placed at a FIXED point above the earth

The BEST explanation: They are placed in orbit at 36,000km above Earth’s SURFACE.
10.

Radio channels are attractive medium because __________(a) Can penetrate walls(b) Connectivity can be given to mobile user(c) Can carry signals for long distance(d) All of the mentionedThe question was posed to me during a job interview.This interesting question is from Physical Media in section Security & Physical Layer of Computer Network

Answer»

The CORRECT choice is (d) All of the mentioned

The explanation is: RADIO CHANNELS can PENETRATE walls, can be used to provide connectivity to mobile users and can also carry signals for long DISTANCES.

11.

Terrestrial radio channels are broadly classifed into _____ groups.(a) 2(b) 3(c) 4(d) 1This question was posed to me in an online interview.My doubt is from Physical Media in chapter Security & Physical Layer of Computer Network

Answer» CORRECT choice is (B) 3

To EXPLAIN: The three types are those that OPERATE over very short distance, those that operate in local areas, those that operate in the wide AREA.
12.

If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps) __________(a) n*39.8(b) n*51.8(c) 2n*51.8(d) None of the mentionedI got this question by my school teacher while I was bunking the class.My question is taken from Physical Media topic in chapter Security & Physical Layer of Computer Network

Answer» CORRECT option is (B) N*51.8

Best explanation: The base unit of transmission rates in optical fibre is 51.8 Mbits/s. So an optical carrier represented as OC-n has n*51.8 Mbits/s transmission SPEED. For eg. OC-3 has 3*51.8 Mbits/s speed.
13.

Fiber optics posses following properties __________(a) Immune electromagnetic interference(b) Very less signal attenuation(c) Very hard to tap(d) All of the mentionedThis question was posed to me in a job interview.I want to ask this question from Physical Media topic in section Security & Physical Layer of Computer Network

Answer»

Correct option is (d) All of the MENTIONED

For EXPLANATION I would say: In fibre optics the TRANSMISSION of information is in the form of light or photons. Due to all above properties mentioned in options fibre optics can be submerged in WATER and are used at more risk environments.

14.

Coaxial cable consists of _______ concentric copper conductors.(a) 1(b) 2(c) 3(d) 4This question was addressed to me by my school teacher while I was bunking the class.This interesting question is from Physical Media in section Security & Physical Layer of Computer Network

Answer»

Right CHOICE is (b) 2

The best I can EXPLAIN: Coaxial cable has an inner conductor surrounded by a insulating layer, which is surrounded by a conducting SHIELD. Coaxial cable is used to carry high FREQUENCY signals with low LOSSES.

15.

UTP is commonly used in __________(a) DSL(b) FTTP(c) HTTP(d) None of the mentionedThis question was addressed to me by my college director while I was bunking the class.The above asked question is from Physical Media in section Security & Physical Layer of Computer Network

Answer» CORRECT choice is (a) DSL

The best explanation: UNSHIELDED twisted pair(UTP) is COMMONLY USED in home ACCESS.
16.

Which of this is not a guided media?(a) Fiber optical cable(b) Coaxial cable(c) Wireless LAN(d) Copper wireThe question was posed to me during an online exam.Query is from Physical Media in section Security & Physical Layer of Computer Network

Answer»

Right ANSWER is (C) WIRELESS LAN

The best explanation: Wireless LAN is unguided MEDIA.

17.

In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero?(a) Propagation delay(b) Queuing delay(c) Transmission delay(d) Processing delayThe question was asked in exam.My question comes from NetworkAttacks topic in division Security & Physical Layer of Computer Network

Answer» CORRECT option is (B) Queuing DELAY

Explanation: Since there is no other packet to be transmitted, there is no need for a queue. THEREFORE, the delay caused due to the queuing would be none i.e. 0.
18.

Firewalls are often configured to block ___________(a) UDP traffic(b) TCP traffic(c) Sensitive traffic(d) Best-effort trafficI had been asked this question during an interview.I need to ask this question from NetworkAttacks in section Security & Physical Layer of Computer Network

Answer»

The correct answer is (a) UDP TRAFFIC

Explanation: UDP is more VULNERABLE to attacks, so FIREWALLS are often configured to BLOCK suspicious UDP traffic.

19.

Sniffers can be prevented by using _______________(a) Wired environment(b) WiFi(c) Ethernet LAN(d) Switched networkThis question was posed to me during an online interview.This key question is from NetworkAttacks topic in section Security & Physical Layer of Computer Network

Answer»

Correct choice is (d) SWITCHED network

Easiest explanation: Switches make sure that the PACKET is sent to the INTENDED receiver and no one else, thus preventing Sniffers to perform their function. Intelligent switches are hence used preferably for the network.

20.

Packet sniffers involve ____________(a) Active receiver(b) Passive receiver(c) Legal receiver(d) Partially-active receiverI have been asked this question in an online quiz.My question comes from NetworkAttacks in portion Security & Physical Layer of Computer Network

Answer»

Right option is (b) Passive receiver

The best explanation: The function of PACKET sniffers is to just silently RECEIVE the packets flowing in the CHANNEL. If they inject any packets into the channel, they might alert the other USERS about the intrusion.

21.

The DoS attack, in which the attacker sends deluge of packets to the targeted host is ________(a) Vulnerability attack(b) Bandwidth flooding(c) Connection flooding(d) UDP floodingI have been asked this question in homework.I'd like to ask this question from NetworkAttacks in portion Security & Physical Layer of Computer Network

Answer»

The CORRECT choice is (b) Bandwidth flooding

Explanation: In Bandwidth flooding, the attacker FLOODS the victim machine with a DELUGE of packets to MAKE sure that no bandwidth is available. The victim then cannot utilize the complete bandwidth to perform its operation.

22.

The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is ________(a) Vulnerability attack(b) Bandwidth flooding(c) Connection flooding(d) UDP floodingI had been asked this question during an online interview.This intriguing question originated from NetworkAttacks in chapter Security & Physical Layer of Computer Network

Answer»

Right ANSWER is (c) Connection flooding

To elaborate: In Vulnerability attack, the attacker EXPLOITS the VULNERABLE control points of the network to deny access to the victims. In Bandwidth flooding, the attacker intentionally USES up all the bandwidth by flooding the victim with a deluge of packets and makes sure that the victim can’t USE any bandwidth. In UDP flooding, too many UDP packets are sent by the attacker to the victim at random ports.

23.

Which of the following is a form of DoS attack?(a) Vulnerability attack(b) Bandwidth flooding(c) Connection flooding(d) All of the mentionedThe question was posed to me in semester exam.Question is taken from NetworkAttacks in chapter Security & Physical Layer of Computer Network

Answer»

The correct option is (d) All of the mentioned

Easiest explanation: In a DoS attack, the attacker won’t let the victims access the network by using a CERTAIN method that ensures that an essential network resource is unavailable to the victim. In vulnerability attack, the attacker exploits any OBVIOUS vulnerable entity in the network to deny the victim access into the network. In BANDWIDTH flooding, the attacker floods the victim with a huge flow of packets and uses up all the bandwidth. In connection flooding, the attacker floods the victim network with a huge number of connections, so that, no other machine can CONNECT to it.

24.

The attacker using a network of compromised devices is known as _____________(a) Internet(b) Botnet(c) Telnet(d) D-netI have been asked this question during an internship interview.My question is taken from NetworkAttacks topic in division Security & Physical Layer of Computer Network

Answer»

Correct choice is (b) Botnet

The best I can explain: Botnet is a NETWORK of COMPROMISED devices used by the attacker without the owner’s knowledge to PERFORM unethical activities such as spamming. The attacker usually uses the least SECURE devices to create the botnet.

25.

Which of the following architecture uses the CSMA/CD access method?(a) ARC net(b) Ethernet(c) Router(d) STP serverI have been asked this question during an interview for a job.The question is from STP Cables topic in section Security & Physical Layer of Computer Network

Answer»

Right option is (B) ETHERNET

For EXPLANATION: Collision detection is not possible in Ethernet without extensions. Collision detection TECHNIQUES for multiple access like CSMA/CD are used to detect collisions in the Ethernet architecture.

26.

What is the max data transfer rate for optical fiber cable?(a) 10 Mbps(b) 100 Mbps(c) 1000 Mbps(d) 10000 MbpsThe question was asked in homework.The origin of the question is STP Cables topic in section Security & Physical Layer of Computer Network

Answer»

Correct option is (d) 10000 Mbps

For explanation: Fiber channel speeds have been increasing over the years. 10000 Mbps is the max data TRANSFER RATE for optical fiber cables. It is said to be the fastest among the other kinds of cables like STP cables and co-axial cables. PEOPLE are now using optical fiber cables instead of STP cables for LANs due to their fast data transfer CAPABILITY.

27.

What is the central device in star topology?(a) STP server(b) Hub/switch(c) PDC(d) RouterI have been asked this question in an international level competition.Question is from STP Cables in portion Security & Physical Layer of Computer Network

Answer»

The CORRECT answer is (b) Hub/switch

For explanation I would say: In STAR topology, no computer is connected to ANOTHER computer directly but all the computers are connected to a central switch or hub. EVERY message sent from a source computer goes through the switch or hub and the switch or hub then forwards the message only to the INTENDED destination computer.

28.

Which connector does the STP cable use?(a) BNC(b) RJ-11(c) RJ-45(d) RJ-69I had been asked this question in an interview.This interesting question is from STP Cables topic in division Security & Physical Layer of Computer Network

Answer»

Right answer is (C) RJ-45

For explanation: RJ-45 is used for STP CABLE. 100 Mbps is the max data transfer RATE that can be handled by STP. RJ-45 is popularly used to connect to modern-day routers, computer network cards, and other network devices.

29.

What is the max data transfer rate of STP cables?(a) 10 Mbps(b) 100 Mbps(c) 1000 Mbps(d) 10000 MbpsThis question was addressed to me by my college professor while I was bunking the class.I would like to ask this question from STP Cables in chapter Security & Physical Layer of Computer Network

Answer»

The correct answer is (b) 100 MBPS

The best explanation: 100 Mbps is the MAX DATA transfer rate that can be handled by STP cables, and its default connector is RJ-45. 100 Mbps is a feasible data transfer rate for small networks LIKE LANs.

30.

What is the max length of the Shielded twisted pair cable?(a) 100 ft(b) 200 ft(c) 100 m(d) 200 mI had been asked this question during an interview.My doubt is from STP Cables topic in chapter Security & Physical Layer of Computer Network

Answer»

Correct choice is (c) 100 m

Explanation: The MAX the Shielded TWISTED PAIR cable is 100 METERS. If the length exceeds 100 meters, the loss of signals flowing through the cable would be really high. Thus, STP cable is more suitable for smaller networks like LANs.

31.

The __________ portion of LAN management software restricts access, records user activities and audit data, etc.(a) Configuration management(b) Security management(c) Performance management(d) Recovery managementThe question was posed to me in a job interview.This interesting question is from STP Cables in chapter Security & Physical Layer of Computer Network

Answer»

The correct choice is (b) Security management

To explain: The Security management portion of LAN management SOFTWARE RESTRICTS access, RECORDS user ACTIVITIES, and audit data. It is responsible for controlling access to the network based on predefined policy. The security management ENSURES authentication, confidentiality, and integrity in the LAN.

32.

A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of ___________(a) LAN intrinsic software(b) LAN aware software(c) Groupware(d) LAN ignorant softwareThe question was asked in a job interview.I would like to ask this question from STP Cables in chapter Security & Physical Layer of Computer Network

Answer»

Correct answer is (a) LAN intrinsic software

To explain: A standalone program that has been modified to work on a LAN by including CONCURRENCY controls such as file and record LOCKING is an EXAMPLE of LAN intrinsic software. They are used to GIVE better FUNCTIONALITY of the program and the applications working over it to the users of the LAN.

33.

With respect to physical media, STP cables stands for _________(a) Shielded Twisted Pair Cable(b) Spanning Tree Protocol Cable(c) Static Transport Protocol Cable(d) Shielded Two Power CableI have been asked this question in semester exam.I would like to ask this question from STP Cables in division Security & Physical Layer of Computer Network

Answer»

Correct answer is (a) SHIELDED Twisted Pair Cable

The best explanation: For physical media, STP cable stands for Shielded twisted pair cable. 100 MBPS is the max data capacity of STP cable and its default connector is RJ45. It is popularly USED in LANs due to its ease of maintenance and installation.

34.

_____________ allows LAN users to share computer programs and data.(a) Communication server(b) Print server(c) File server(d) NetworkI had been asked this question by my school teacher while I was bunking the class.The origin of the question is STP Cables topic in chapter Security & Physical Layer of Computer Network

Answer»

The correct answer is (c) FILE server

The explanation is: A file server allows LAN users to share computer PROGRAMS and data. It uses the File Transfer PROTOCOL to provide this feature on ports 20 and 21. The file server works as a medium for the transfer.

35.

Propagation delay depends on ___________(a) Packet length(b) Transmission rate(c) Distance between the routers(d) Speed of the CPUI got this question in an internship interview.This interesting question is from Delays and Loss topic in portion Security & Physical Layer of Computer Network

Answer»

The correct answer is (c) Distance between the routers

To explain: Propagation delay is caused when the packet is in its electric signal form and is travelling through a MEDIUM (a wire or a electromagnetic WAVE). Propagation delay is the time it takes a bit to propagate from one router to the NEXT. If the distance between the routers is increased, it will take LONGER time to propagate, that is, there would be more propagation delay.

36.

Transmission delay does not depend on _____________(a) Packet length(b) Distance between the routers(c) Transmission rate(d) Bandwidth of mediumThe question was posed to me during an interview.Enquiry is from Delays and Loss topic in chapter Security & Physical Layer of Computer Network

Answer»

Right CHOICE is (B) Distance between the routers

Easiest EXPLANATION: TRANSMISSION delay = packet length / transmission rate. The transmission rate DEPENDS upon the bandwidth of the medium.

37.

In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero?(a) Propagation delay(b) Queuing delay(c) Transmission delay(d) Processing delayThis question was addressed to me in a job interview.I'm obligated to ask this question of Delays and Loss topic in portion Security & Physical Layer of Computer Network

Answer»

Right option is (B) QUEUING DELAY

The BEST I can explain: Since there is no other packet to be transmitted, there is no NEED for a queue. Therefore, the delay caused due to the queuing would be none i.e. 0.

38.

The total nodal delay is given by ____________(a) dnodal = dproc – dqueue + dtrans + dprop(b) dnodal = dproc + dtrans – dqueue(c) dnodal = dproc + dqueue + dtrans + dprop(d) dnodal = dproc + dqueue – dtrans – dpropI got this question during an interview.Asked question is from Delays and Loss in portion Security & Physical Layer of Computer Network

Answer»

The correct choice is (C) dnodal = dproc + dqueue + DTRANS + dprop

For explanation I would say: The total node-to-node delay, that is, nodal delay is the sum of all, the processing delay, queuing delay, transmission delay and PROPAGATION delay. Ideally, the nodal delay must be LOW as possible for a BETTER Quality of Service of the network.

39.

If end to end delay is given by dend-end = N(dproc + dtrans + dprop) is a non congested network. The number of routers between source and destination is?(a) N/2(b) N(c) N-1(d) 2NI got this question in exam.My question is based upon Delays and Loss topic in division Security & Physical Layer of Computer Network

Answer»

Right option is (c) N-1

The best I can explain: In the equation N (dproc + dtrans + dprop), N is the NUMBER of checkpoints/stops that the packet makes as it REACHES the destination. The stops are made at each router and the final destination NODE. Now, since N = number of routers + final node, then number of routers = N – final node. As we know, there is only 1 final node in a PATH, thus, number of routers = N – 1. Suppose, There is a path A->R1->R2->B for a packet where A is the SOURCE node, B is the final node and R1 and R2 are routers. The total delay would be given by N (dproc + dtrans + dprop) where N = 3, since the packet would stop at R1, R2 and B. The number of routers here are 2, and (N – 1) is also 2.

40.

In the transfer of file between server and client, if the transmission rates along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually ___________(a) 20Mbps(b) 10Mbps(c) 40Mbps(d) 50MbpsI got this question by my college professor while I was bunking the class.My doubt stems from Delays and Loss topic in division Security & Physical Layer of Computer Network

Answer»

The correct answer is (b) 10Mbps

To ELABORATE: The THROUGHPUT is generally the transmission RATE of BOTTLENECK LINK.

41.

Given L = number of bits in the packet, a = average rate and R = transmission rate. The Traffic intensity in the network is given by ____________(a) La/R(b) LR/a(c) R/La(d) Ra/LI had been asked this question in a national level competition.This interesting question is from Delays and Loss in division Security & Physical Layer of Computer Network

Answer» RIGHT CHOICE is (a) La/R

Explanation: Traffic INTENSITY = (Number of bits in PACKET * Average Transmission RATE)/Current Transmission rate.
42.

The time required to examine the packet’s header and determine where to direct the packet is part of __________(a) Processing delay(b) Queuing delay(c) Transmission delay(d) Propagation delayThis question was addressed to me in examination.Question is taken from Delays and Loss topic in division Security & Physical Layer of Computer Network

Answer»

The correct choice is (a) PROCESSING delay

The best I can explain: Processing delay is INDUCED at a ROUTER’s or other network processor’s end in the path of the PACKET and is caused by the TIME taken by the processor to examine the packet’s header to decide the further path of the packet.

43.

For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is ____________ (in microseconds)(a) 3.2(b) 32(c) 0.32(d) 320I have been asked this question during an interview.This question is from Delays and Loss topic in portion Security & Physical Layer of Computer Network

Answer» CORRECT CHOICE is (a) 3.2

To elaborate: TRANSMISSION rate = LENGTH / transmission rate = 32/10 = 3.2 MICROSECONDS.
44.

Which of the following delay is faced by the packet in travelling from one end system to another?(a) Propagation delay(b) Queuing delay(c) Transmission delay(d) All of the mentionedI had been asked this question in an online interview.My doubt is from Delays and Loss in division Security & Physical Layer of Computer Network

Answer»

The correct option is (d) All of the mentioned

Explanation: When a packet has to TRAVEL from ONE end system to another, it first FACES the queuing delay when there are multiple PACKETS which are to be sent, then it faces the transmission delay to convert the packet into bits to be transmitted, and then it faces the propagation delay to propagate the bits through the PHYSICAL medium.

45.

In TDM, slots are further divided into _________(a) Seconds(b) Frames(c) Packets(d) BitsThe question was asked by my college professor while I was bunking the class.Query is from Multiplexing in section Security & Physical Layer of Computer Network

Answer»

Correct CHOICE is (b) Frames

The best I can explain: TDM is the abbreviation for Time division multiplexing. It is technique for combining several low rate CHANNELS to a single high rate channel. For a certain time slot, the several channels COULD use the MAXIMUM bandwidth. Each channel is inactive for a period of time too. Some other multiplexing techniques are FREQUENCY division multiplexing and Phase division multiplexing.

46.

In TDM, the transmission rate of a multiplexed path is always _______ the sum of the transmission rates of the signal sources.(a) Greater than(b) Lesser than(c) Equal to(d) Equal to or greater thanThis question was posed to me during an internship interview.My doubt stems from Multiplexing in portion Security & Physical Layer of Computer Network

Answer»

Right option is (a) Greater than

Explanation: In TDM the transmission rate provided by the path that is multiplexed will always be greater than the SUM of transmission rates of the single SOURCES. This happens because the transmission rate is provided to each source only for a small period of TIME.

47.

Multiplexing provides _________(a) Efficiency(b) Privacy(c) Anti jamming(d) Both Efficiency & PrivacyThis question was posed to me in exam.This intriguing question comes from Multiplexing in portion Security & Physical Layer of Computer Network

Answer»

Right answer is (d) Both Efficiency & Privacy

The best explanation: Multiplexing helps US to TRANSFER our messages over a shared channel. This brings up the issue of privacy and efficiency. Fortunately, Multiplexing has HIGH efficiency and high privacy when implemented because in the implementation, the transport layer of the OSI network model handles the function of multiplexing through interfaces called ports which provide the required efficiency and privacy.

48.

The state when dedicated signals are idle are called __________(a) Death period(b) Poison period(c) Silent period(d) Stop periodThis question was posed to me during an online exam.My query is from Multiplexing in portion Security & Physical Layer of Computer Network

Answer»

Correct option is (c) Silent period

For explanation: There are instances when connection between two endpoints has been established, but no communication or TRANSFER of messages OCCURS. This period of time is called silent period. The silent period ends when EITHER of the two endpoints STARTS the communication.

49.

If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is _________(a) 32kbps(b) 500bps(c) 500kbps(d) 32bpsThe question was asked in a national level competition.My question is based upon Multiplexing topic in division Security & Physical Layer of Computer Network

Answer»

Correct answer is (a) 32kbps

For explanation I would SAY: TRANSMISSION rate= frame rate * NUMBER of bits in a SLOT.

Given: Frame rate = 4000/sec and number of bits in slot = 8

Thus, Transmission rate = (4000 * 8) BPS

= 32000bps

= 32kbps

50.

If there are n signal sources of same data rate, then the TDM link has _______ slots.(a) n(b) n/2(c) n*2(d) 2^nI had been asked this question at a job interview.This question is from Multiplexing topic in chapter Security & Physical Layer of Computer Network

Answer»

The correct CHOICE is (a) n

Explanation: In TDM, the total unit of time is DIVIDED equally among all the signal sources and each and every SOURCE has ACCESS to the complete channel bandwidth during its allotted time slot. When the time slot of the source is not active, it remains idle and waits for its slot to begin.