Online Exam Preparation
MCQs Library
Browse subject-wise multiple choice questions, review answers quickly, and start a test from the same section.
Questions
| Code | Question | Option A | Option B | Option C | Option D | Answer |
|---|---|---|---|---|---|---|
| CS601 |
A Wireless Lan Uses Frames For Acknowledgment
|
Management
|
Data
|
Control
|
None Of The Above
|
C |
| CS601 |
A Wireless Lan Uses Frames For The Initial Communication Between Stations And The Access Points
|
Control
|
Data
|
Management
|
None Of The Above
|
C |
| CS601 |
A Wireless Lan Using Dsss With A 4-Bit Chip Code Needs 10 Mhz For Sending Data That Originally Required A -Mhz Bandwidth
|
20
|
25
|
40
|
2.5
|
D |
| CS601 |
A Wireless Lan Using Dsss With An 8-Bit Chip Code Needs Mhz For Sending Data That Originally Required A 10-Mhz
Bandwidth
|
2
|
8
|
20
|
80
|
D |
| CS601 |
A Wireless Lan Using Dsss With -Bit Chip Code Needs 320 Mhz For Sending Data That Originally Required A 20-Mhz Bandwidth
|
A 2
|
A 16
|
A 32
|
An 8
|
B |
| CS601 |
A Wireless Lan Using Fhss Hops 10 Times Per Cycle. If The Bandwidth Of The Original Signal Is 10 Mhz And 2 Ghz Is The Lowest Frequency The Highest Frequency Of The System Is Ghz
|
1.0
|
2.0
|
2.1
|
3.0
|
C |
| CS601 |
A Wireless Lan Using Fhss Hops 10 Times Per Cycle. If The Bandwidth Of The Original Signal Is 10 Mhz The Spread Spectrum Is Mhz
|
1000
|
10 000
|
10
|
100
|
D |
| CS601 |
According To The Ppp Transition State Diagram Exchange Of User Control And Data Packets Occurs In The State
|
Networking
|
Terminating
|
Establishing
|
Authenticating
|
A |
| CS601 |
According To The Ppp Transition State Diagram Options Are Negotiated In The State
|
Networking
|
Terminating
|
Establishing
|
Authenticating
|
C |
| CS601 |
According To The Ppp Transition State Diagram The Link Is Disconnected In The State
|
Networking
|
Terminating
|
Establishing
|
Authenticating
|
B |
| CS601 |
According To The Ppp Transition State Diagram Verification Of User Identification Occurs In The State
|
Networking
|
Terminating
|
Establishing
|
Authenticating
|
D |
| CS601 |
After A Message Is Decrypted It Is Called
|
Ciphertext
|
Cryptotext
|
Cryptonite
|
Plaintext
|
D |
| CS601 |
Am And Fm Are Examples Of __________ Modulation
|
Analog-To-Analog
|
Analog-To-Digital
|
Digital-To-Digital
|
Digital-To-Analog
|
A |
| CS601 |
Amps Uses For Modulation
|
Fm
|
Fsk
|
Pm
|
(A) And (B)
|
D |
| CS601 |
An 80-Station Traditional Ethernet Is Divided Into Four Collision Domains. This Means That A Maximum Of Stations Contend For Medium Access At Any One Time
|
20
|
76
|
80
|
320
|
A |
| CS601 |
An Ack Number Of 1000 Always Means That
|
999 Bytes Has Been Successfully Received
|
1000 Bytes Has Been Successfully Received
|
1001 Bytes Has Been Successfully Received
|
None Of The Above
|
D |
| CS601 |
An Applet Is A Small Application Program Written In
|
Shell Script
|
Java
|
C
|
C++
|
B |
| CS601 |
An Applet Is Document Application Program
|
An Active
|
A Passive
|
A Static
|
A Dynamic
|
A |
| CS601 |
An Area Border Router Can Be Connected To
|
Only Another Router
|
Only Another Network
|
Only Another Area Border Router
|
Another Router Or Another Network
|
D |
| CS601 |
An Area Is
|
Composed Of At Least Two Ass
|
Another Term For An Internet
|
Part Of An As
|
A Collection Of Stub Areas
|
C |