Polytechnic University Of The Philippines College Of Engineering Computer Engineering

  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Polytechnic University Of The Philippines College Of Engineering Computer Engineering as PDF for free.

More details

  • Words: 4,497
  • Pages: 6
Polytechnic University of the Philippines College of Engineering Computer Engineering Department NDC Cmpd., Sta. Mesa Manila

FINAL EXAMINATION CMP510 Name

Section

Score

GENERAL INSTRUCTIONS: 1. Follow all instructions carefully. Failure to do so will warrant a substantial deduction from your final score. 2. Write everything in non-red ink. No borrowing of pens, calculators, etc. 3. You are not allowed to leave your seat unless you are through with the exam. If you have any questions, just raise your hand and the instructor or proctor will attend to you. 4. Talking to or looking at your seatmate (and his/her paper) is automatically considered as cheating which is subject to very serious sanctions as stipulated in the student handbook.

GOOD LUCK ! ! !

MULTIPLE CHOICE [100pts]. Choose the letter of the BEST answer. Write your answer on the empty box below each given number. 1.

3.

It is the act of relaying message in binary form between two points. a. Transmitter d. a & b b. Receiver e. a, b & c c. Data Communication f. None of the above It refers to the physical or non-physical connection between transmitter and receiver.

a. b. c. 5.

7.

9.

It refers to the length of time of the cycle. b. c.

11.

Period Cycle Frequency

4.

6.

a.

15.

a. b. c.

17.

Fiber optics Twisted pair Wire pair the above

d. a & b e. a, b & c f. None

8.

a. b.

12.

1STSY2008-2009 of 6

1000 Mhz

d. a & b

1000 Ghz e. a, b & c c. 1000 Thz f. None of the above The frequency range of the telephone system. a. 0 hz – 3,400 hz d. a & b b. 0 hz – 12,000 hz e. a, b & c c. 300 hz – 3,400 hz f. None of the above Aperiodic signal is consists of several periodic signals. This statement is:

a.

14.

Unquestionable true. d. a & b b. False, several aperiodic. e. a, b & c c. False, it is not a signal. f. None of the above It is a classification of channel that signals are confined to the medium and do not leave it.

a. 16.

of

It is a type of twisted pair developed by the IBM for the ring network. a. UTP d. a & b b. STP e. a, b & c

Channel capacity d. a & b Electronic noise e. a, b & c Signal attenuation f. None of the above If the signal is 300,000 km/sec-velocity and 0.3 mwavelength, then its frequency: b. c.

a.

13.

Telephone system d. a & b Commercial radio e. a, b & c Computer communication f. None of the above It is a channel characteristic that refers to the quantity of information the channel can convey. b. c.

d. a & b e. a, b & c f. None of the above

Never be false. d. a & b b. False, to the velocity. e. a, b & c c. False, to the frequency. f. None of the above The frequency of the signal component is directly proportional to the amplitude of the signal. This is: a. 100 % true. d. a & b b. False, inversely proportion. e. a, b & c c. False, to the frequency. f. None of the above It is considered the expensive bounded media that can be used as transmission channel.

Resource sharing d. a & b b. High Reliability e. a, b & c c. Cost saving f. None of the above All of the following are examples of communication that uses digital channel except of:

a.

10.

The wavelength is proportional to the length of the antenna. This statement is:

It is a goal of network that allows users to access resources in the network.

a.

Communication channel d. a & b Data communication e. a, b & c Bluetooth f. None of the above

It is a channel characteristic that exhibits the fading of an electrical signal. a. Channel capacity d. a & b b. Electronic noise e. a, b & c c. Signal attenuation f. None of the above It is a term that refers to the part of the signal that repeats itself. a. Period d. a & b b. Cycle e. a, b & c c. Frequency f. None of the above

a.

2.

18.

CMP510

Bounded channel d. a & b Unbounded channel e. a, b & c Transmission channel f. None of the above the following are examples of unbounded except of: Wire pairs d. a & b b. Twisted pair e. a, b & c c. Fiber optics f. None of the above

b. c. All of media a.

It is a type of bounded media that suffers from the problem of skin effect. a. Wire pair d. a & b b. Twisted pair e. a, b & c Page 1

19.

21.

c. FTP f. None of the above It is considered the earliest and simplest type of bounded media. a. Fiber optics d. a & b b. Twisted pair e. a, b & c c. Wire pair f. None of the above It is a bounded media that exhibits the selfshielding.

20.

a. b. c. 22.

a.

Coaxial cable d. a & b Fiber optic e. a, b & c Wire pair f. None of the above It is a quantitative body of knowledge that has been established about information.

27.

29.

31.

33.

35.

It is a transmission of sending several bits at the same time. a. Transmission mode d. a & b b. Parallel transmission e. a, b & c c. Serial transmission f. None of the above It is a process in which the receiver looks at the digital signal at the appropriate times. a. Modulation d. a & b b. Synchronization e. a, b & c c. Decoding f. None of the above It is a term refers to the electrical energy that flows in the channel. a. Information signal d. a & b b. Signal carrier e. a, b & c c. Information carrier f. None of the above It is a line that alerts the receiver that there’s information in the data lines. Start line d. a & b Strobe line e. a, b & c c. Data line f. None of the above It is an event when the sampling of the receiver clock is slightly fast. a. Missed a bit d. a & b b. Double bits e. a, b & c c. False start bit f. None of the above It is a shift register used by the transmitter to transmit data bits into telephone lines. a. SIPO d. a & b b. PISO e. a, b & c c. PIPO f. None of the above It is a buffer used to prevent loss of information in the communication. a. Transmit buffer d. a & b b. Receive buffer e. a, b & c c. Shift buffer f. None of the above The frame to be transmitted if 101111100000message will be transmitted using bit stuffing. a. 1011111000001 d. a & b

24.

26.

41.

43.

1STSY2008-2009 of 6

Fiber optics d. a & b Twisted pair e. a, b & c Wire pair f. None of the above It is the quantity of information required to permit the correct selection of one out of equiprobable events. Bit d. a & b b. Byte e. a, b & c c. Nibble f. None of the above The number of possible choices from 6 bits of data. a.

32 choices d. a & b 64 choices e. a, b & c c. 128 choices f. None of the above It is a term that refers to the direction of data signal between two linked devices.

b.

28.

a.

Transmission mode d. a & b Synchronization e. a, b & c Propagation delay f. None of the above It is a process of varying the electrical energy in the channel. a. Conversion d. a & b b. Encryption e. a, b & c c. Modulation f. None of the above It is a term refers to the additional data appended to the information that contains no meaning. a. Header d. a & b b. Redundancy data e. a, b & c c. Overhead f. None of the above It is a term refers to the bits that may arrive at the receiver at different times. a. Transmission delay d. a & b b. Propagation delay e. a, b & c c. Bus skew f. None of the above It is a modulation that converts amplitude of the signal carrier in accordance to the amplitude of the information. b. c.

30.

32.

34.

36.

a.

b.

39.

It is a bounded media that uses beam of light.

a.

a.

37.

d. a & b e. a, b & c f. None of the above

b. c.

a. b.

25.

Information science d. a & b Information technology e. a, b & c c. Information theory f. None of the above It is the propagation used by the Microwave transmission. a. Ground waves d. a & b b. Sky waves e. a, b & c c. Line of sight f. None of the above It is a high probability of occurring and contains very little information. a. Duplicate d. a & b b. Redundant e. a, b & c c. Triplicate f. None of the above

Ground waves Sky waves Line of sight

a.

b. c.

23.

c. Coaxial cable f. None of the above It is a propagation path of radio waves that follows the curvature of the earth.

b. c. 38.

40.

ASK FSK PSK

d. a & b e. a, b & c f. None of the above

It is a synchronization wherein the transmitter and receiver clock’s work independently. a. Synchronous d. a & b b. Asynchronous e. a, b & c c. Synchronize f. None of the above It is an encoding scheme that converts logic 1/HIGH to a NO CHANGE of one-period state.

a.

42.

44.

CMP510

NRZ-S d. a & b b. NRZ-M e. a, b & c c. NRZ-L f. None of the above The total number of lines/wires to be used for a 40data bit in parallel transmission. a. 2 lines/wires d. a & b b. 40 lines/wires e. a, b & c c. 42 lines/wires f. None of the above The percentage of overhead of the transmission with one-Start bit and two-Stop bits. a. 20.00 % d. a & b Page 2

b. c. 45.

47.

49.

51.

1011111000000 10111110000001 the above

e. a, b & c f. None of

b.

It is a part of a bit-period where the receiver samples or reads the bit. a. Beginning d. a & b b. Middle e. a, b & c c. Ending f. None of the above The clock encoding and extraction transmit the information and the clock pattern. This statement is:

46.

48.

a.

a.

b. c.

b. c.

Undoubtedly true d. a & b False, information only e. a, b & c False, clock only f. None of the above Synchronous is ideal for high overhead transmission. This statement is: a. Unquestionably true d. a & b b. False, it is for high-speed e. a, b & c c. False, it is for low-speed f. None of the above Binary Synchronous Control uses error checking to detect if there’s error. This statement is: 100 % true d. a & b b. False, it is SDLC e. a, b & c c. False, it is SIPO f. None of the above It is the process of combining several signals and transmitting them through the same channel.

55.

57.

59.

52.

It is a bit used in transmission to make sure that the transmission line will go back to default logic. a. Start bit d. a & b b. Stop bit e. a, b & c c. Default bit f. None of the above It is a line that used as a reference to determine the potential difference of a certain line. a. Data line d. a & b b. Ground line e. a, b & c c. Strobe line f. None of the above It is an encoding scheme known as Manchester.

54.

56.

a. b. c. 58.

b.

c. 60.

b. c.

61.

a. b. c.

63.

65.

67.

62.

d. a & b

a.

False, positive value

e. a, b & c

b. c. 64.

a.

b. c.

b. c.

It is a technique that allows the receiver to verify the message if there’s undesirable changes in the bit pattern.

a.

Error detection

1STSY2008-2009 of 6

66.

Aliasing filter Quantization Encoding

d. a & b e. a, b & c f. None of the above

Never be false d. a & b False, negative voltage e. a, b & c False, positive voltage f. None of the above

It is a quantization that translates the value into nearest quantized level.

a.

True true true d. a & b False, negative value e. a, b & c False, zero value f. None of the above It is undesirable changes in the bit pattern of data that occur after the data goes from the computer. a. Noise d. a & b b. Data communication error e. a, b & c c. Start and Stop bits f. None of the above

d. a & b e. a, b & c f. None of the above

It is a term referring to spaces between adjacent signals. a. Dead space d. a & b b. Guard band e. a, b & c c. Step-size f. None of the above In unipolar, zero voltage is the lowest value that can be represented. This statement is:

100% true

False, zero value f. None of the above If MSB is zero in unipolar, it indicates, a positive value. This statement is:

Biphase-L NRZ-L RZ-L

It is responsible for removing unwanted frequencies or noise in the signal.

a.

a.

Local loop line d. a & b Trunk line e. a, b & c Loop line f. None of the above If MSB is one in unipolar, it indicates, a negative value. This statement is:

d. a & b e. a, b & c f. None of the above

Analog signal needs large amount of voltage to corrupt its information signal. This statement is: a. Definitely true d. a & b b. False, it is digital signal e. a, b & c c. False, it is signal carrier f. None of the above

a.

Multiplexing d. a & b b. TDM e. a, b & c c. FDM f. None of the above The modem conversion at the receiver-part. a. Digital-to-digital d. a & b b. Digital-to-analog e. a, b & c c. Analog-to-digital f. None of the above It is a term referring to the time interval wherein there’s no information being transmitted. a. Guard band d. a & b b. Dead space e. a, b & c c. Step-size f. None of the above It is the line that connects telephone set and central office.

Start bit STX Stop bit

50.

a.

53.

27.27 % e. a, b & c 37.50 % f. None of the above The effective data rate of the 64Kbps-transmission line with one-Start bit and one-Stop bit. a. 64,000 bps d. a & b b. 12,800 bps e. a, b & c c. 51,200 bps f. None of the above It is a bit that alerts the receiver that the next bits are information. c.

Rounding Truncation Amplification

d. a & b e. a, b & c f. None of the above

It is the place where the undesirable changes in the bit pattern occur.

a.

Channel d. a & b Transmitter e. a, b & c Receiver f. None of the above It is a technique that allows the receiver to correct the message if there’s undesirable change in the bit pattern. b. c.

68.

a.

d. a & b CMP510

Error detection

d. a & b Page 3

b. c. 69.

b. c.

73.

75.

c.

81.

83.

d. a & b

False, always 12.5 % False, at least 12.5 %

e. a, b & c f. None of the above

Block Sum Checking

70.

Parity Bit Polynomial Code the above

72.

74.

c. 89.

d. a & b

b1

e. a, b & c

b0

f. None of the above

76.

a. b.

Odd parity

d. a & b

Even parity Block parity

e. a, b & c f. None of the above

d. a & b

Polynomial Codes e. a, b & c c. Hamming Code f. None of the above If there’s no error in the message received 10100111, what parity-bit checking was used?

Parity bit checking can only determine if there’s an error when number of bit corrupted is odd. This statement is:

a. b. c.

Never be false

d. a & b

False, when even

e. a, b & c

False, depend on bit used the above

f.

None

of

78.

It is an error-detection that does not use parity bit for checking errors. a. Parity bit checking d. a & b b. Block sum checking e. a, b & c c. Polynomial code f. None of the above

80.

What is the information percentage of transmitting 100 characters using Block Sum Checking?

a. b. c. 82.

86.63 % 13.37 % 12.5 %

d. a & b e. a, b & c f. None of the above

If the message received is 110011001110 with no errors using polynomial code and generator of 11000, what is the original data?

a.

84.

11001100 d. a & b b. 1100110 e. a, b & c c. 110011001 f. None of the above It is the bit that holds the weight of powers of 2.

If 3 characters will be transmitted using Block sum checking, how many total characters will be transmitted? a. 3 characters d. a & b

Check/Control bit d. a & b Start bit e. a, b & c Data bit f. None of the above The degree of the generator polynomial CRC-32. b. c.

86.

a. b. c. 88.

0 d. a & b 1 e. a, b & c Cannot be determined f. None of the above

1STSY2008-2009 of 6

Block Sum Checking

a.

bN

MSB d. a & b b. LSB e. a, b & c c. DSB f. None of the above If M(x)=1010 will be transmitted using hamming code-even parity, what is the value of the b1?

b.

a. b.

c.

e. a, b & c f. None of

It is the where the parity bit placed for error detection.

a.

Cyclic Redundancy Check d. a & b Overhead e. a, b & c c. Header Data f. None of the above All of the following are examples of error-correction technique except of: b.

a.

87.

Error correction e. a, b & c c. Error Control f. None of the above This is additional information that allows the receiver to verify if there’s undesirable changed in the message.

a.

d. a & b

What is the overhead percentage of transmitting 40 characters using Block Sum Checking? a. 12.5 % d. a & b b. 12.81 % e. a, b & c c. 14.63 % f. None of the above If the message to be transmitted is 10100111 with generator of 10011, how many number of bits to be transmitted? a. 13 bits d. a & b b. 12 bits e. a, b & c c. 11 bits f. None of the above It is treated the most significant bit in the hamming code.

a. b. c. 85.

Always true

It is an error-detection technique that verifies the errors per column and row.

a. b.

b.

d. a & b e. a, b & c f. None of the above

c. Hamming Code f. None of the above It is the simplest error-detection technique that verifies the undesirable changed per character. a. Block Sum Checking d. a & b b. Parity Bit e. a, b & c c. Polynomial Code f. None of the above The overhead percentage of parity bit checking is always 20%. This statement is:

c.

79.

Error detection Error correction Error Control

All of the following are examples of error-detection technique except of: a. Block Sum Checking d. a & b b. Polynomial Codes e. a, b & c

a. b.

77.

e. a, b & c f. None of the above

It is a technique that allows receiver to verify only the message if there’s undesirable changes in the bit pattern.

a. 71.

Error correction Error Control

CMP510

d. a & b e. a, b & c f. None of the above

If M(x)=1110 will be transmitted using polynomial code and generator of G(x)=10, what is the remainder?

a. b.

90.

30 31 32

0

d. a & b

1 e. a, b & c c. Cannot be determined f. None of the above If M(x)=1100110 will be transmitted using oddparity bit, what will be the message to be transmitted? a. 11001101 d. a & b Page 4

b. c.

b.

91.

93.

95.

97.

99.

101 .

103 .

4 characters e. a, b & c c. 5 characters f. None of the above What is the maximum data rate of a system with 2levels per signaling element and to be transmitted using 3000-Hz channel? a. 3,000 Hz d. a & b b. 6,000 Hz e. a, b & c c. 9,000 Hz f. None of the above It is a transmission mode that allows data flow in one direction only. a. Half-duplex d. a & b b. Full-duplex e. a, b & c c. Simplex f. None of the above It is a transmission mode that does not suffer from the turn-around delay. a. Half-duplex d. a & b b. Full-duplex e. a, b & c c. Simplex f. None of the above Wire channel requires a proper termination to prevent data loss. This statement is: a. 100% true d. a & b b. False, signal reflection e. a, b & c c. False, signal distortion f. None of the above

What is the propagation delay if the distance between two machines is 10 Km and velocity of propagation is 200,000Km/second? a. 50 microsecond d. a & b b. 50 millisecond e. a, b & c c. 50 second f. None of the above

94.

It is a transmission mode that allows data to flow in both directions simultaneously. a. Half-duplex d. a & b b. Full-duplex e. a, b & c c. Simplex f. None of the above It is an electronic device that varies the signal carrier to reflect or represent the information in original signal. a. Modulator d. a & b b. Codec e. a, b & c c. RF Modem f. None of the above

96.

98.

What is the highest voltage of an ADC-unipolar system with 4V-FSV using 8 bits? a. 3.999999 V d. a & b b. 3.984375 V e. a, b & c c. 3.988888 V f. None of the above

100 .

What is the subnetwork number of a host with an IP address of 172.16.210.0/22? A. 172.16.42.0 B. 172.16.107.0 C. 172.16.208.0 D. 172.16.252.0 E. 172.16.254.0 The network address of 172.16.0.0/19 provides how many subnets and hosts?

102 .

107 .

What is the subnetwork number of a host with an IP address of 172.16.66.0/21? A. 172.16.36.0 B. 172.16.48.0 C. 172.16.64.0 D. 172.16.0.0 You need to configure a server that is on the subnet 192.168.19.24/29. The router has the first available host address. Which of the following should you assign to the server?

It is an electronic device that regenerates the distorted digital signal. a. Codec d. a & b b. RF Modem e. a, b & c c. Repeater f. None of the above What is the quantization error in volts of an ADCbipolar system with 8V-FSV using 4 bits?

a. b.

0.500 V

d. a & b

0.250 V e. a, b & c c. 0.125 V f. None of the above What is the subnetwork address for a host with the IP address 200.10.5.68/28? A. 200.10.5.56 B. 200.10.5.32 C. 200.10.5.64 D. 200.10.5.0

104 .

You need 500 subnets, each with about 100 usable host addresses per subnet. What mask will you assign using a Class B network address? A. 255.255.255.252 B. 255.255.255.128 C. 255.255.255.0 D. 255.255.254.0

106 .

What mask would you assign to the network ID of 172.16.0.0 if you needed about 100 subnets with about 500 hosts each? A. 255.255.255.0 B. 255.255.254.0 C. 255.255.252.0 D. 255.255.0.0 You have the network shown in the following graphic. Which subnet mask do you need in order to design and implement this network in a classful manner?

108 .

A. 192.168.19.0 255.255.255.0 B. 192.168.19.33 255.255.255.240 1STSY2008-2009 of 6

e. a, b & c f. None of the above

92.

A. 7 subnets, 30 hosts each B. 7 subnets, 2046 hosts each C. 7 subnets, 8190 hosts each D. 8 subnets, 30 hosts each E. 8 subnets, 2046 hosts each F. 8 subnets, 8190 hosts each 105 .

11100110 10100111

A. 255.255.255.192 B. 255.255.255.224 CMP510

Page 5

109 .

111 .

C. 192.168.19.26 255.255.255.248 D. 192.168.19.31 255.255.255.248 E. 192.168.19.34 255.255.255.240 You need a minimum of 300 subnets with a maximum of 50 hosts per subnet. Which of the following masks will support the business requirements? A. 255.255.255.0 B. 255.255.255.128 C. 255.255.252.0 D. 255.25.255.224 You have a network as shown in the following graphic. Why can’t the host talk to the remote network?

C. 255.255.255.240 D. 255.255.255.248 110 .

112 .

A. 172.16.112.0 B. 172.16.0.0 C. 172.16.96.0 D. 172.16.255.0 E. 172.16.128.0 You have a network with a subnet 172.16.17.0/22. Which are valid host addresses?

114 .

A. 172.16.17.1 255.255.255.252 B. 172.16.0.1 255.255.240.0 C. 172.16.20.1 255.255.254.0 D. 172.16.16.1 255.255.255.240 E. 172.16.18.255 255.255.252.0 F. 172.16.0.1 255.255.255.0 You have a /27 subnet mask. Which of the following are valid hosts?

A. The default gateway is on another subnet. B. The host has the wrong IP address for the subnet. C. The host has an invalid default gateway address. D. The router and the host have different subnet masks. 113 . C

115 .

Your router has the following IP address on Ethernet0: 172.16.112.1/20. How many hosts can be accommodated on the Ethernet segment? A. 1024 B. 2046 C. 4094 D. 4096 E. 8190 Which class of IP address provides a maximum of only 254 host addresses per network ID? A. Class A B. Class B C. Class C D. Class D E. Class E

If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host?

of

A. 11.244.18.63 B. 90.10.170.93 C. 200.45.115.159 D. 216.66.11.192

GOOD LUCK!!!!

1STSY2008-2009 of 6

CMP510

Page 6

Related Documents