Communication Concepts and Data Transmission Quiz Questions based on PPT
125 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

In data communications, how many modes of transmission are there?

  • Simplex, half-duplex, and duplex (correct)
  • Single, double, and triple
  • Direct, indirect, and mixed
  • Primary, secondary, and tertiary
  • What are the types of media used in data communications?

  • Bluetooth, Wi-Fi, and infrared
  • Fiber optics, wireless, and satellite
  • Electrical conductors, light pipes, and electromagnetic transmission (correct)
  • Copper cables, coaxial cables, and fiber optics
  • How are data communications topologies organized?

  • Client-server or peer-to-peer
  • One-to-one, one-to-many, or many-to-many (correct)
  • Linear, circular, or random
  • Star, mesh, or bus
  • What may members of a network have in terms of relationships?

    <p>No ranking or ranked</p> Signup and view all the answers

    What is a digital signal defined as?

    <p>A signal with defined discrete states</p> Signup and view all the answers

    Which coding system is an example of text coding?

    <p>ASCII</p> Signup and view all the answers

    What did IBM design as one of the first digital communications codes?

    <p>IBM 4 of 8 Code</p> Signup and view all the answers

    How many bits does ASCII use for its code?

    <p>7 bits</p> Signup and view all the answers

    What was used for error detection in EBCDIC?

    <p>CRCC</p> Signup and view all the answers

    What is the purpose of the 84th character, the block parity character, in the data block?

    <p>To add redundancy for error detection and correction</p> Signup and view all the answers

    What is the main difference between a cyclic code and a checksum?

    <p>Cyclic codes have higher error-detection efficiency than checksums</p> Signup and view all the answers

    In Binary Synchronous Communication protocol, what does control depend on?

    <p>Certain character combinations</p> Signup and view all the answers

    What is the primary function of bit patterns in bit-oriented protocols?

    <p>To indicate the start and end of the information frame</p> Signup and view all the answers

    What does the receiver protocol do upon detection of five consecutive 1s in a bit-oriented protocol?

    <p>Remove the 0 that follows</p> Signup and view all the answers

    What was the primary focus of the first data transmission code mentioned in the text?

    <p>Error-detection scheme over data transmission efficiency</p> Signup and view all the answers

    What is an example of a character-based protocol mentioned in the text?

    <p>IBM’s Synchronous Data Link Control (SDLC)</p> Signup and view all the answers

    What is one distinguishing feature of Bi-Sync protocol?

    <p>It is one of the first proprietary protocols developed by IBM</p> Signup and view all the answers

    What is a characteristic of bit-oriented protocols?

    <p>They use binary patterns for framing and synchronization</p> Signup and view all the answers

    What distinguishes cyclic codes from linear codes?

    <p>Cyclic codes use polynomial arithmetic while linear codes do not</p> Signup and view all the answers

    What was one reason cited in the text for duplex operation in Bi-Sync protocol?

    <p>Eliminating turnaround time</p> Signup and view all the answers

    Data communications topologies are organized as ______, ______, or many-to-many

    <p>one-to-one</p> Signup and view all the answers

    In data communications, there are three modes of transmission: ______, half-duplex, and duplex

    <p>simplex</p> Signup and view all the answers

    A communications channel may consist of a communications circuit, which can be either a hardware configuration or a “virtual” ______

    <p>circuit</p> Signup and view all the answers

    In this mode, communication occurs only in one direction—never in the opposite direction; in figure 1-2 it is from Station A to ______

    <p>Station B</p> Signup and view all the answers

    An 84th character, called the block parity character, was added to the end of the transmitted block to determine if parity was met for all the characters in the block, parity was determined horizontally for the ______ row by counting the 1s in the 83 counted columns and the result was compared to the vertical parity bit for the block parity character

    <p>Parity</p> Signup and view all the answers

    Many times the CRC-16 or CRC-CCITT is called a ______; however, they are actually cyclic codes, whereas a checksum was originally designed as a linear code

    <p>checksum</p> Signup and view all the answers

    Some of these codes are cyclic, some are linear, some are quasi-cyclic, and some are ______

    <p>polynomial</p> Signup and view all the answers

    One example of a character-based protocol is Binary Synchronous Communication. The IBM Bi-Sync protocol, one of the first and most widely used of the proprietary protocols, was developed to link the IBM 3270 line of terminals to IBM computers in a synchronous manner. The Bi-Sync protocol is character-based; control depends on certain character combinations, rather than on ______

    <p>bit patterns</p> Signup and view all the answers

    Bit-oriented protocols use a concept called framing, where there are ______ before and after the information frame

    <p>bit patterns</p> Signup and view all the answers

    The protocol only allows the frame to have this pattern at its start and ______

    <p>end</p> Signup and view all the answers

    In framing, there is a binary pattern that is the start delimiter. There are also binary patterns that indicate the addressing and what type of frame it is, as well as some method of sequence numbering followed by the ______

    <p>user data</p> Signup and view all the answers

    The receiver protocol, upon detection of five consecutive 1s, knows to remove the 0 that ______

    <p>follows</p> Signup and view all the answers

    The first data transmission code devoted more overhead to the error-detection scheme than to the data ______

    <p>transmitted</p> Signup and view all the answers

    The efficiency of a checksum in detecting errors is not as high as with a cyclic code, yet the circuitry to produce the checksum is less ______

    <p>complex</p> Signup and view all the answers

    The IBM Bi-Sync protocol, one of the first and most widely used of the proprietary protocols, was developed to link the IBM 3270 line of terminals to IBM computers in a synchronous manner. The Bi-Sync protocol is character-based; control depends on certain character combinations, rather than on ______

    <p>bit patterns</p> Signup and view all the answers

    The Bi-Sync protocol is character-based; control depends on certain character combinations, rather than on ______

    <p>bit patterns</p> Signup and view all the answers

    ASCII is a ______ code

    <p>7-bit</p> Signup and view all the answers

    IBM 4 of 8 Code allowed error detection on a ______ basis

    <p>character-by-character</p> Signup and view all the answers

    The International Telegraphic Alphabet #5 is also known as ______

    <p>ASCII</p> Signup and view all the answers

    The International Telegraphic Alphabet #5 does not make use of letter frequencies, as did the Morse code, the ITA2 Telegraph Code, and the IBM 4 of 8 Code. It does, however, use a numerically arranged code, in which the alphabet is in ascending order, which permits sorting operations and the like. ASCII is a ______ code.

    <p>7-bit</p> Signup and view all the answers

    The parity bit was used for a number of years; however, the technological advantages to using an 8-bit data byte eliminated the need to use the B7 bit for parity. Today when parity is used, another bit is added to the 8 bits as the parity bit, making the signal 9 bits in ______.

    <p>length</p> Signup and view all the answers

    Using 7 bits of an 8-bit structure, as ASCII does, will leave 1 bit extra and the parity bit is added to the 8-bit character, making it ______ bits.

    <p>9</p> Signup and view all the answers

    The coding begins at U+0000 with standard ASCII characters, and then continues with Greek, Cyrillic, Hebrew, Arabic, Indic, and other ______.

    <p>scripts</p> Signup and view all the answers

    Parity means to count the number of 1s in a ______.

    <p>character</p> Signup and view all the answers

    The vertical character format mentioned previously is based on the punched cards used in early data entry and programming Because punched cards contained 80 columns and historically most data was on these cards, transmissions were in an 80-character ______.

    <p>block</p> Signup and view all the answers

    Fixed-length character representations, of which ASCII and EBCDIC are examples, came about in the early 1960s and are still in wide use today. However ASCII was designed for English and, as communications are now global, there are many languages that require a larger number than 128 ______.

    <p>patterns</p> Signup and view all the answers

    Because punched cards contained 80 columns and historically most data was on these cards, transmissions were in an 80-character ______.

    <p>block</p> Signup and view all the answers

    Most computers using ASCII transmit 8 bits and use a ninth bit for parity, if ______ is used.

    <p>parity</p> Signup and view all the answers

    Data communications topologies are organized as ______, ______, or many-to-many

    <p>one-to-one, one-to-many</p> Signup and view all the answers

    Members of a network may have defined relationships: they may have no ranking or they may be ______

    <p>ranked</p> Signup and view all the answers

    There are three modes of transmission: ______, half-duplex, and duplex

    <p>simplex</p> Signup and view all the answers

    A communications channel may consist of a communications circuit, which can be either a hardware configuration or a “virtual” ______

    <p>circuit</p> Signup and view all the answers

    ASCII is a 7-bit code. Its arrangement is well thought out; particularly in light of the technology available at the time it was designed. It was usually transmitted as an ______-bit signal with the “Most Significant Bit” reserved for parity—an error detection scheme

    <p>8</p> Signup and view all the answers

    The difference between uppercase and lowercase is ______

    <p>bit</p> Signup and view all the answers

    ASCII was designed for English and, as communications are now global, there are many languages that require a larger number than 128 ______

    <p>patterns</p> Signup and view all the answers

    An 84th character, called the block parity character, was added to the end of the transmitted block to determine if parity was met for all the characters in the block, parity was determined horizontally for the ______ row by counting the 1s in the 83 counted columns and the result was compared to the vertical parity bit for the block parity character

    <p>83rd</p> Signup and view all the answers

    In framing, there is a binary pattern that is the start delimiter. There are also binary patterns that indicate the addressing and what type of frame it is, as well as some method of sequence numbering followed by the ______

    <p>information frame</p> Signup and view all the answers

    The International Telegraphic Alphabet #5 does not make use of letter frequencies, as did the Morse code, the ITA2 Telegraph Code, and the IBM 4 of 8 Code. It does, however, use a numerically arranged code, in which the alphabet is in ascending order, which permits sorting operations and the like. ASCII is a ______ code

    <p>7-bit</p> Signup and view all the answers

    How are data communications topologies organized?

    <p>star, bus, or many-to-many</p> Signup and view all the answers

    What is a characteristic of bit-oriented protocols?

    <p>framing with start and stop delimiters</p> Signup and view all the answers

    In data communications, there are three modes of transmission: ______, half-duplex, and duplex

    <p>simplex</p> Signup and view all the answers

    The coding begins at U+0000 with standard ASCII characters, and then continues with Greek, Cyrillic, Hebrew, Arabic, Indic, and other ______ scripts

    <p>languages</p> Signup and view all the answers

    What is a digital signal defined as?

    <p>one with defined discrete states; no other state can exist</p> Signup and view all the answers

    Parity means to count the number of 1s in a ______.

    <p>character</p> Signup and view all the answers

    An 84th character, called the block parity character, was added to the end of the transmitted block to determine if parity was met for all the characters in the block, parity was determined horizontally for the ______ row by counting the 1s in the 83 counted columns and the result was compared to the vertical parity bit for the block parity character

    <p>Parity</p> Signup and view all the answers

    The efficiency of a checksum in detecting errors is not as high as with a cyclic code, yet the circuitry to produce the checksum is less ______

    <p>complex</p> Signup and view all the answers

    In framing, there is a binary pattern that is the start delimiter. There are also binary patterns that indicate the addressing and what type of frame it is, as well as some method of sequence numbering followed by the ______

    <p>user data</p> Signup and view all the answers

    Bit-oriented protocols use a concept called framing, where there are ______ before and after the information frame

    <p>bit patterns</p> Signup and view all the answers

    The protocol only allows the frame to have this pattern at its start and ______

    <p>end</p> Signup and view all the answers

    The receiver protocol, upon detection of five consecutive 1s, knows to remove the 0 that ______

    <p>follows</p> Signup and view all the answers

    The IBM Bi-Sync protocol, one of the first and most widely used of the proprietary protocols, was developed to link the IBM 3270 line of terminals to IBM computers in a synchronous manner. The Bi-Sync protocol is character-based; control depends on certain character combinations, rather than on ______

    <p>bit patterns</p> Signup and view all the answers

    In data communications, there are three modes of transmission: ______, half-duplex, and duplex

    <p>simplex</p> Signup and view all the answers

    The first data transmission code devoted more overhead to the error-detection scheme than to the data ______

    <p>transmitted</p> Signup and view all the answers

    The Bi-Sync protocol is character-based; control depends on certain character combinations, rather than on ______

    <p>bit patterns</p> Signup and view all the answers

    The protocol only allows the frame to have this pattern at its start and ______

    <p>end</p> Signup and view all the answers

    The efficiency of a checksum in detecting errors is not as high as with a cyclic code, yet the circuitry to produce the checksum is less ______

    <p>complex</p> Signup and view all the answers

    What does the receiver protocol do upon detection of five consecutive 1s in a bit-oriented protocol?

    <p>remove the 0 that follows</p> Signup and view all the answers

    In data communications, how many modes of transmission are there?

    <p>Three modes</p> Signup and view all the answers

    What types of media are used in data communications?

    <p>Fiber optics, copper wires, and wireless transmission</p> Signup and view all the answers

    What are the organized topologies in data communications?

    <p>Point-to-point, point-to-multipoint, and multipoint-to-multipoint</p> Signup and view all the answers

    What does the Bi-Sync protocol control depend on?

    <p>Character combinations</p> Signup and view all the answers

    What type of error-detection code may be called a checksum?

    <p>Any of the above</p> Signup and view all the answers

    How is the efficiency of a checksum in detecting errors compared to a cyclic code?

    <p>Cyclic code is more efficient</p> Signup and view all the answers

    What distinguishes CRC-16 or CRC-CCITT from a checksum?

    <p>They are linear codes</p> Signup and view all the answers

    What is one distinguishing feature of Bi-Sync protocol?

    <p>It allows duplex transmission</p> Signup and view all the answers

    What does the receiver protocol do upon detection of five consecutive 1s in a bit-oriented protocol?

    <p>It removes the 0 that follows</p> Signup and view all the answers

    What is the purpose of the 84th character, the block parity character, in the data block?

    <p>It ensures even parity</p> Signup and view all the answers

    What is the International Telegraphic Alphabet #5 also known as?

    <p>ITA2 Telegraph Code</p> Signup and view all the answers

    How many bits does ASCII use for its code?

    <p>7</p> Signup and view all the answers

    What is the purpose of the 84th character, the block parity character, in the data block?

    <p>Error detection</p> Signup and view all the answers

    What distinguishes cyclic codes from linear codes?

    <p>Error-detection scheme</p> Signup and view all the answers

    What is the primary function of bit patterns in bit-oriented protocols?

    <p>Error detection</p> Signup and view all the answers

    What is a characteristic of bit-oriented protocols?

    <p>They use framing for data transmission</p> Signup and view all the answers

    What does the receiver protocol do upon detection of five consecutive 1s in a bit-oriented protocol?

    <p>It removes a 0 that follows</p> Signup and view all the answers

    What is a digital signal defined as?

    <p>A signal with discrete states</p> Signup and view all the answers

    What was one reason cited in the text for duplex operation in Bi-Sync protocol?

    <p>Simultaneous bidirectional communication</p> Signup and view all the answers

    The difference between uppercase and lowercase is ______.

    <p>Indicated by a specific bit pattern</p> Signup and view all the answers

    Data communications topologies are organized as one-to-one, one-to-many, or many-to-many

    <p>True</p> Signup and view all the answers

    The differences between a 'mode' and a 'circuit' are rather arbitrary

    <p>True</p> Signup and view all the answers

    The efficiency of a checksum in detecting errors is not as high as with a cyclic code, yet the circuitry to produce the checksum is less

    <p>True</p> Signup and view all the answers

    The purpose of communication is to transmit data from the source to the destination

    <p>True</p> Signup and view all the answers

    ASCII was designed for English and is not suitable for global communications.

    <p>True</p> Signup and view all the answers

    The International Telegraphic Alphabet #5 uses a numerically arranged code, allowing for sorting operations.

    <p>True</p> Signup and view all the answers

    The IBM 4 of 8 Code and EBCDIC are both examples of text coding.

    <p>True</p> Signup and view all the answers

    The parity bit in ASCII is used for error detection.

    <p>False</p> Signup and view all the answers

    The 8-bit ASCII code is transmitted with an additional parity bit, making the signal 9 bits in length.

    <p>True</p> Signup and view all the answers

    Unicode includes scripts such as Greek, Cyrillic, Hebrew, and Arabic.

    <p>True</p> Signup and view all the answers

    The Bi-Sync protocol was developed for asynchronous communication.

    <p>False</p> Signup and view all the answers

    The IBM 4 of 8 Code allowed error detection on a character-by-character basis.

    <p>True</p> Signup and view all the answers

    EBCDIC requires a parity bit for error detection.

    <p>False</p> Signup and view all the answers

    ASCII and EBCDIC are examples of fixed-length character representations.

    <p>True</p> Signup and view all the answers

    The IBM Bi-Sync protocol was developed to link the IBM 3270 line of terminals to IBM computers in a synchronous manner.

    <p>True</p> Signup and view all the answers

    The IBM 4 of 8 Code is an example of a digital communication code that used letter frequencies for efficiency.

    <p>False</p> Signup and view all the answers

    Binary Synchronous Communication uses bit-oriented protocol

    <p>True</p> Signup and view all the answers

    The Bi-Sync protocol is an example of a character-based protocol

    <p>True</p> Signup and view all the answers

    The efficiency of a checksum in detecting errors is higher than with a cyclic code

    <p>False</p> Signup and view all the answers

    The IBM Bi-Sync protocol was developed to link the IBM 3270 line of terminals to IBM computers in an asynchronous manner

    <p>False</p> Signup and view all the answers

    The block parity character is used to determine if parity was met for all the characters in the block

    <p>True</p> Signup and view all the answers

    The receiver protocol, upon detection of five consecutive 1s, knows to remove the 0 that follows

    <p>True</p> Signup and view all the answers

    The first data transmission code devoted more overhead to the data transmitted than to the error-detection scheme

    <p>False</p> Signup and view all the answers

    High Level Data Link Control is an example of a bit-oriented protocol

    <p>True</p> Signup and view all the answers

    The International Telegraphic Alphabet #5 makes use of letter frequencies for error detection

    <p>False</p> Signup and view all the answers

    ASCII uses 8 bits for its code

    <p>False</p> Signup and view all the answers

    The Bi-Sync protocol uses duplex transmission

    <p>True</p> Signup and view all the answers

    The receiver protocol, upon detection of five consecutive 1s, knows to remove the 1 that follows

    <p>False</p> Signup and view all the answers

    More Like This

    Module 4-7 Partie 3
    30 questions

    Module 4-7 Partie 3

    FirmerSelenite avatar
    FirmerSelenite
    Internal IMP Questions C2 Quiz
    11 questions
    Computer Networks C2 Internal Questions
    11 questions
    Use Quizgecko on...
    Browser
    Browser