Explore topic-wise MCQs in Electronics and Telecommunication Engineering [ENT.

This section includes 389 Mcqs, each offering curated multiple-choice questions to sharpen your Electronics and Telecommunication Engineering [ENT knowledge and support exam preparation. Choose a topic below to get started.

251.

What is the networking device used to forward packets on a packet-switching network?

A. hub
B. lan switch
C. nap
D. router
Answer» E.
252.

Which one of the following RF band is allocated to the Industrial, Scientific and Medical industry?

A. 4.9 ghz to 5.825 ghz
B. 824 mhz to 849 mhz
C. 174 mhz to 220 mhz
D. 2.4 ghz to 2.4835 ghz
Answer» E.
253.

Wireless networks transmit using RF signals, which require a __________ to receive and transmit signals through the air.

A. repeater
B. router
C. antenna
D. remote
Answer» D. remote
254.

Which one of the following devices rebroadcasts the signals it receives after conditioning them for increased strength and clarity?

A. bridge
B. repeater
C. router
D. gateway
Answer» C. router
255.

What is the term used to identify the broadcast or generated electrical signals that can disrupt wireless communications?

A. rfi
B. rfid
C. fcc
D. ism
Answer» B. rfid
256.

Which of the FCC's RF bands operates in the frequency range of 2.4 GHz to 2.4835 GHz

A. ism
B. rfid
C. soho
D. unii
Answer» B. rfid
257.

A antenna which attempts to direct all its energy in a particular direction is called as a .............

A. directional antenna
B. one to one antenna
C. propagation antenna
D. single direction antenna
Answer» B. one to one antenna
258.

5. In ................ multiple access is achieved by allocating different time slots for the different users.

A. tdma
B. cdma
C. fdma
D. fgma
Answer» B. cdma
259.

In .............. Frequency Spectrum is divided into smaller spectra and is allocated to each user.

A. tdma
B. cdma
C. fdma
D. fgma
Answer» D. fgma
260.

Fading of the received radio signals in a mobile communication environment occurs because of .....

A. direct propagation
B. multipath propagation
C. bi-path propagation
D. none of the above
Answer» C. bi-path propagation
261.

Which is not a variant of S-MAC?

A. timeout mac (tmac)
B. dynamic sensor mac (dsmac)
C. input-output mac (iomac)
D. data gathering (dmac)
Answer» E.
262.

RTS/CTS period is called ( )

A. waiting period
B. contention period
C. running period
D. none of these
Answer» B. contention period
263.

In _____, each station transmits its data in its assigned time slot.

A. fdma
B. tdma
C. cdma
D. none of the above
Answer» C. cdma
264.

W-CDMA is ____.

A. wireless code division multiple access
B. wideband code division multiple access
C. wide code division multiple access
D. web band code division multiple access
Answer» B. wideband code division multiple access
265.

In _____, each station is allocated a time slot during which it can send data. Each station transmits its data in its assigned time slot.

A. fdma
B. tdma
C. cdma
D. none of the above
Answer» C. cdma
266.

In ______, each station is allocated a band to send its data. In other words, each band is reserved for a specific station, and it belongs to the station all the time.

A. fdma
B. tdma
C. cdma
D. none of the above
Answer» B. tdma
267.

In _______, the stations share the bandwidth of the channel in time.

A. fdma
B. tdma
C. cdma
D. none of the above
Answer» C. cdma
268.

In the _______ method, the primary device controls the link; the secondary devices follow its instructions.

A. reservation
B. polling
C. token passing
D. none of the above
Answer» C. token passing
269.

In the ______ method, all data exchanges must be made through the primary device even when the ultimate destination is a secondary device.

A. reservation
B. polling
C. token passing
D. none of the above
Answer» C. token passing
270.

In the ________ method, a station needs to make a reservation before sending data. Time is divided into intervals.

A. reservation
B. polling
C. token passing
D. none of the above
Answer» B. polling
271.

In _______ methods, a station cannot send unless it has been authorized by other stations.

A. random access
B. controlled access
C. channelization
D. none of the above
Answer» C. channelization
272.

In _______ methods, the stations consult one another to find which station has the right to send.

A. random access
B. controlled access
C. channelization
D. none of the above
Answer» C. channelization
273.

In _______, collisions are avoided through the use of three strategies: the interframe space, the contention window, and acknowledgments.

A. csma/ca
B. csma/cd
C. either (a) or (b)
D. both (a) and (b)
Answer» B. csma/cd
274.

To avoid collisions on wireless networks, ________was invented.

A. csma/ca
B. csma/cd
C. either (a) or (b)
D. both (a) and (b)
Answer» B. csma/cd
275.

In ________, a station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finished. If, however, there is a collision, the frame is sent again.

A. csma/ca
B. csma/cd
C. either (a) or (b)
D. both (a) and (b)
Answer» C. either (a) or (b)
276.

In __________, each station is forced to send only at the beginning of the time slot.

A. pure aloha
B. slotted aloha
C. both (a) and (b)
D. neither (a) nor (b)
Answer» C. both (a) and (b)
277.

In pure ALOHA, the vulnerable time is ______ the frame transmission time.

A. the same as
B. two times
C. three times
D. none of the above
Answer» C. three times
278.

In ________ each station sends a frame whenever it has a frame to send.

A. pure aloha
B. slotted aloha
C. both (a) and (b)
D. neither (a) nor (b)
Answer» B. slotted aloha
279.

____________ assigns a unique number to each IP network adapter called the MAC address.

A. media access control
B. metro access control
C. metropolitan access control
D. both b and c above
Answer» B. metro access control
280.

802.11 wireless networking uses what method as the media access method?

A. csma/cd
B. cts/rts
C. csma/ca
D. cscd/ca
Answer» D. cscd/ca
281.

This describes how the Ethernet protocol regulates communication among connection points.

A. carrier sense multiple access/collision detect
B. discontinuous transmission
C. aggregator
D. wait and response
Answer» B. discontinuous transmission
282.

What is the size of MAC Address?

A. 16-bits
B. 32-bits
C. 48-bits
D. 64-bits
Answer» D. 64-bits
283.

This is what happens if two devices on the same Ethernet network determine the network is free, but attempt to transmit data at exactly the same time.

A. overlap
B. crossover
C. collision
D. none of the above
Answer» D. none of the above
284.

It may be more economical to use a smaller transmission radius for nodes in areas of high node density, w/o sacrificing adequate network connectivity. This is the issue of___________

A. topology control
B. traffic control
C. protocol control
D. link control
Answer» B. traffic control
285.

Examples of data attributes may include

A. node\s location
B. node\s type of sensors
C. certain range of values in a certain type of sensed data
D. all of above
Answer» E.
286.

The S-MAC protocol includes following major components

A. periodic listen and sleep
B. collision avoidance
C. overheating avoidance
D. all of above
Answer» E.
287.

In the S-MAC protocol, ___________is designed to reduce energy consumption during the long idle time when no sensing events happen, by turning off the radio periodically

A. message passing
B. periodic listen and sleep
C. topology control
D. link control
Answer» C. topology control
288.

The main goal of the ___________is to reduce energy waste caused by idle listening, collisions, overhearing and control overhead

A. s-mac protocol
B. ieee802.15.4 standard
C. a and b
D. none of these
Answer» B. ieee802.15.4 standard
289.

Following MAC protocols have been developed for wireless voice and data communication networks

A. tdma
B. fdma
C. cdma
D. all of above
Answer» E.
290.

Following characteristics of wireless sensor networks point to the need for a specialized MAC protocol

A. the issues of fairness of the node level are much less important than overall application performance
B. most sensor nodes are idle much of the time
C. in-network processing can greatly improve bandwidth utilization
D. all of above
Answer» E.
291.

___________sub-layer manages access to the physical network medium, and its fundamental goal is to reduce or avoid packet collisions in the medium

A. mac
B. llc
C. application
D. session
Answer» B. llc
292.

Within the coverage range, communication is done by__________

A. multicast
B. broadcast
C. unicast
D. all of the above
Answer» C. unicast
293.

To ensure the ___________of the system, the communication and computation should be localized to relevant sensors only

A. responsiveness
B. scalability
C. both a and b
D. neither a nor b
Answer» D. neither a nor b
294.

Networking allows geographical distribution of the sensor nodes and their placement close to signal sources

A. does not depend on signal source
B. statement is correct
C. irrelavant corelation
D. away from signal source
Answer» C. irrelavant corelation
295.

In wireless sensor networks, some of the information defining the objective function and constraints is available only at___________

A. compile time
B. run time
C. ideal time
D. setup time
Answer» C. ideal time
296.

A central problem for WSN is to dynamically define and form sensor groups based on__________

A. task requirements
B. resource availability
C. both a and b
D. none of these
Answer» D. none of these
297.

As the number of nodes___________, every node spends almost all of its time forwarding packets of other nodes

A. decreases
B. increases
C. constant
D. none of the above
Answer» C. constant
298.

In which network access point is not required?

A. ad hoc network
B. infrastructure network
C. both a and b
D. none of the above
Answer» B. infrastructure network
299.

Similarities between WSNs and MANETs networks is.

A. nodes are densely deployed
B. the nodes communicate each other using multi-hop communication
C. topology changes very frequently
D. have global unique identification for nodes
Answer» C. topology changes very frequently
300.

Infrastructure-based networks example is

A. wlan
B. manet
C. wlan and manet both
D. none of the above
Answer» B. manet