MCQOPTIONS
Saved Bookmarks
This section includes 389 Mcqs, each offering curated multiple-choice questions to sharpen your Electronics and Telecommunication Engineering [ENT knowledge and support exam preparation. Choose a topic below to get started.
| 251. |
What is the networking device used to forward packets on a packet-switching network? |
| A. | hub |
| B. | lan switch |
| C. | nap |
| D. | router |
| Answer» E. | |
| 252. |
Which one of the following RF band is allocated to the Industrial, Scientific and Medical industry? |
| A. | 4.9 ghz to 5.825 ghz |
| B. | 824 mhz to 849 mhz |
| C. | 174 mhz to 220 mhz |
| D. | 2.4 ghz to 2.4835 ghz |
| Answer» E. | |
| 253. |
Wireless networks transmit using RF signals, which require a __________ to receive and transmit signals through the air. |
| A. | repeater |
| B. | router |
| C. | antenna |
| D. | remote |
| Answer» D. remote | |
| 254. |
Which one of the following devices rebroadcasts the signals it receives after conditioning them for increased strength and clarity? |
| A. | bridge |
| B. | repeater |
| C. | router |
| D. | gateway |
| Answer» C. router | |
| 255. |
What is the term used to identify the broadcast or generated electrical signals that can disrupt wireless communications? |
| A. | rfi |
| B. | rfid |
| C. | fcc |
| D. | ism |
| Answer» B. rfid | |
| 256. |
Which of the FCC's RF bands operates in the frequency range of 2.4 GHz to 2.4835 GHz |
| A. | ism |
| B. | rfid |
| C. | soho |
| D. | unii |
| Answer» B. rfid | |
| 257. |
A antenna which attempts to direct all its energy in a particular direction is called as a ............. |
| A. | directional antenna |
| B. | one to one antenna |
| C. | propagation antenna |
| D. | single direction antenna |
| Answer» B. one to one antenna | |
| 258. |
5. In ................ multiple access is achieved by allocating different time slots for the different users. |
| A. | tdma |
| B. | cdma |
| C. | fdma |
| D. | fgma |
| Answer» B. cdma | |
| 259. |
In .............. Frequency Spectrum is divided into smaller spectra and is allocated to each user. |
| A. | tdma |
| B. | cdma |
| C. | fdma |
| D. | fgma |
| Answer» D. fgma | |
| 260. |
Fading of the received radio signals in a mobile communication environment occurs because of ..... |
| A. | direct propagation |
| B. | multipath propagation |
| C. | bi-path propagation |
| D. | none of the above |
| Answer» C. bi-path propagation | |
| 261. |
Which is not a variant of S-MAC? |
| A. | timeout mac (tmac) |
| B. | dynamic sensor mac (dsmac) |
| C. | input-output mac (iomac) |
| D. | data gathering (dmac) |
| Answer» E. | |
| 262. |
RTS/CTS period is called ( ) |
| A. | waiting period |
| B. | contention period |
| C. | running period |
| D. | none of these |
| Answer» B. contention period | |
| 263. |
In _____, each station transmits its data in its assigned time slot. |
| A. | fdma |
| B. | tdma |
| C. | cdma |
| D. | none of the above |
| Answer» C. cdma | |
| 264. |
W-CDMA is ____. |
| A. | wireless code division multiple access |
| B. | wideband code division multiple access |
| C. | wide code division multiple access |
| D. | web band code division multiple access |
| Answer» B. wideband code division multiple access | |
| 265. |
In _____, each station is allocated a time slot during which it can send data. Each station transmits its data in its assigned time slot. |
| A. | fdma |
| B. | tdma |
| C. | cdma |
| D. | none of the above |
| Answer» C. cdma | |
| 266. |
In ______, each station is allocated a band to send its data. In other words, each band is reserved for a specific station, and it belongs to the station all the time. |
| A. | fdma |
| B. | tdma |
| C. | cdma |
| D. | none of the above |
| Answer» B. tdma | |
| 267. |
In _______, the stations share the bandwidth of the channel in time. |
| A. | fdma |
| B. | tdma |
| C. | cdma |
| D. | none of the above |
| Answer» C. cdma | |
| 268. |
In the _______ method, the primary device controls the link; the secondary devices follow its instructions. |
| A. | reservation |
| B. | polling |
| C. | token passing |
| D. | none of the above |
| Answer» C. token passing | |
| 269. |
In the ______ method, all data exchanges must be made through the primary device even when the ultimate destination is a secondary device. |
| A. | reservation |
| B. | polling |
| C. | token passing |
| D. | none of the above |
| Answer» C. token passing | |
| 270. |
In the ________ method, a station needs to make a reservation before sending data. Time is divided into intervals. |
| A. | reservation |
| B. | polling |
| C. | token passing |
| D. | none of the above |
| Answer» B. polling | |
| 271. |
In _______ methods, a station cannot send unless it has been authorized by other stations. |
| A. | random access |
| B. | controlled access |
| C. | channelization |
| D. | none of the above |
| Answer» C. channelization | |
| 272. |
In _______ methods, the stations consult one another to find which station has the right to send. |
| A. | random access |
| B. | controlled access |
| C. | channelization |
| D. | none of the above |
| Answer» C. channelization | |
| 273. |
In _______, collisions are avoided through the use of three strategies: the interframe space, the contention window, and acknowledgments. |
| A. | csma/ca |
| B. | csma/cd |
| C. | either (a) or (b) |
| D. | both (a) and (b) |
| Answer» B. csma/cd | |
| 274. |
To avoid collisions on wireless networks, ________was invented. |
| A. | csma/ca |
| B. | csma/cd |
| C. | either (a) or (b) |
| D. | both (a) and (b) |
| Answer» B. csma/cd | |
| 275. |
In ________, a station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finished. If, however, there is a collision, the frame is sent again. |
| A. | csma/ca |
| B. | csma/cd |
| C. | either (a) or (b) |
| D. | both (a) and (b) |
| Answer» C. either (a) or (b) | |
| 276. |
In __________, each station is forced to send only at the beginning of the time slot. |
| A. | pure aloha |
| B. | slotted aloha |
| C. | both (a) and (b) |
| D. | neither (a) nor (b) |
| Answer» C. both (a) and (b) | |
| 277. |
In pure ALOHA, the vulnerable time is ______ the frame transmission time. |
| A. | the same as |
| B. | two times |
| C. | three times |
| D. | none of the above |
| Answer» C. three times | |
| 278. |
In ________ each station sends a frame whenever it has a frame to send. |
| A. | pure aloha |
| B. | slotted aloha |
| C. | both (a) and (b) |
| D. | neither (a) nor (b) |
| Answer» B. slotted aloha | |
| 279. |
____________ assigns a unique number to each IP network adapter called the MAC address. |
| A. | media access control |
| B. | metro access control |
| C. | metropolitan access control |
| D. | both b and c above |
| Answer» B. metro access control | |
| 280. |
802.11 wireless networking uses what method as the media access method? |
| A. | csma/cd |
| B. | cts/rts |
| C. | csma/ca |
| D. | cscd/ca |
| Answer» D. cscd/ca | |
| 281. |
This describes how the Ethernet protocol regulates communication among connection points. |
| A. | carrier sense multiple access/collision detect |
| B. | discontinuous transmission |
| C. | aggregator |
| D. | wait and response |
| Answer» B. discontinuous transmission | |
| 282. |
What is the size of MAC Address? |
| A. | 16-bits |
| B. | 32-bits |
| C. | 48-bits |
| D. | 64-bits |
| Answer» D. 64-bits | |
| 283. |
This is what happens if two devices on the same Ethernet network determine the network is free, but attempt to transmit data at exactly the same time. |
| A. | overlap |
| B. | crossover |
| C. | collision |
| D. | none of the above |
| Answer» D. none of the above | |
| 284. |
It may be more economical to use a smaller transmission radius for nodes in areas of high node density, w/o sacrificing adequate network connectivity. This is the issue of___________ |
| A. | topology control |
| B. | traffic control |
| C. | protocol control |
| D. | link control |
| Answer» B. traffic control | |
| 285. |
Examples of data attributes may include |
| A. | node\s location |
| B. | node\s type of sensors |
| C. | certain range of values in a certain type of sensed data |
| D. | all of above |
| Answer» E. | |
| 286. |
The S-MAC protocol includes following major components |
| A. | periodic listen and sleep |
| B. | collision avoidance |
| C. | overheating avoidance |
| D. | all of above |
| Answer» E. | |
| 287. |
In the S-MAC protocol, ___________is designed to reduce energy consumption during the long idle time when no sensing events happen, by turning off the radio periodically |
| A. | message passing |
| B. | periodic listen and sleep |
| C. | topology control |
| D. | link control |
| Answer» C. topology control | |
| 288. |
The main goal of the ___________is to reduce energy waste caused by idle listening, collisions, overhearing and control overhead |
| A. | s-mac protocol |
| B. | ieee802.15.4 standard |
| C. | a and b |
| D. | none of these |
| Answer» B. ieee802.15.4 standard | |
| 289. |
Following MAC protocols have been developed for wireless voice and data communication networks |
| A. | tdma |
| B. | fdma |
| C. | cdma |
| D. | all of above |
| Answer» E. | |
| 290. |
Following characteristics of wireless sensor networks point to the need for a specialized MAC protocol |
| A. | the issues of fairness of the node level are much less important than overall application performance |
| B. | most sensor nodes are idle much of the time |
| C. | in-network processing can greatly improve bandwidth utilization |
| D. | all of above |
| Answer» E. | |
| 291. |
___________sub-layer manages access to the physical network medium, and its fundamental goal is to reduce or avoid packet collisions in the medium |
| A. | mac |
| B. | llc |
| C. | application |
| D. | session |
| Answer» B. llc | |
| 292. |
Within the coverage range, communication is done by__________ |
| A. | multicast |
| B. | broadcast |
| C. | unicast |
| D. | all of the above |
| Answer» C. unicast | |
| 293. |
To ensure the ___________of the system, the communication and computation should be localized to relevant sensors only |
| A. | responsiveness |
| B. | scalability |
| C. | both a and b |
| D. | neither a nor b |
| Answer» D. neither a nor b | |
| 294. |
Networking allows geographical distribution of the sensor nodes and their placement close to signal sources |
| A. | does not depend on signal source |
| B. | statement is correct |
| C. | irrelavant corelation |
| D. | away from signal source |
| Answer» C. irrelavant corelation | |
| 295. |
In wireless sensor networks, some of the information defining the objective function and constraints is available only at___________ |
| A. | compile time |
| B. | run time |
| C. | ideal time |
| D. | setup time |
| Answer» C. ideal time | |
| 296. |
A central problem for WSN is to dynamically define and form sensor groups based on__________ |
| A. | task requirements |
| B. | resource availability |
| C. | both a and b |
| D. | none of these |
| Answer» D. none of these | |
| 297. |
As the number of nodes___________, every node spends almost all of its time forwarding packets of other nodes |
| A. | decreases |
| B. | increases |
| C. | constant |
| D. | none of the above |
| Answer» C. constant | |
| 298. |
In which network access point is not required? |
| A. | ad hoc network |
| B. | infrastructure network |
| C. | both a and b |
| D. | none of the above |
| Answer» B. infrastructure network | |
| 299. |
Similarities between WSNs and MANETs networks is. |
| A. | nodes are densely deployed |
| B. | the nodes communicate each other using multi-hop communication |
| C. | topology changes very frequently |
| D. | have global unique identification for nodes |
| Answer» C. topology changes very frequently | |
| 300. |
Infrastructure-based networks example is |
| A. | wlan |
| B. | manet |
| C. | wlan and manet both |
| D. | none of the above |
| Answer» B. manet | |