Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

What is the networking device used to forward packets on a packet-switching network?

A. hub
B. lan switch
C. nap
D. router
Answer» E.
2.

Which one of the following RF band is allocated to the Industrial, Scientific and Medical industry?

A. 4.9 ghz to 5.825 ghz
B. 824 mhz to 849 mhz
C. 174 mhz to 220 mhz
D. 2.4 ghz to 2.4835 ghz
Answer» E.
3.

Wireless networks transmit using RF signals, which require a __________ to receive and transmit signals through the air.

A. repeater
B. router
C. antenna
D. remote
Answer» D. remote
4.

Which one of the following devices rebroadcasts the signals it receives after conditioning them for increased strength and clarity?

A. bridge
B. repeater
C. router
D. gateway
Answer» C. router
5.

What is the term used to identify the broadcast or generated electrical signals that can disrupt wireless communications?

A. rfi
B. rfid
C. fcc
D. ism
Answer» B. rfid
6.

Which of the FCC's RF bands operates in the frequency range of 2.4 GHz to 2.4835 GHz

A. ism
B. rfid
C. soho
D. unii
Answer» B. rfid
7.

A antenna which attempts to direct all its energy in a particular direction is called as a .............

A. directional antenna
B. one to one antenna
C. propagation antenna
D. single direction antenna
Answer» B. one to one antenna
8.

5. In ................ multiple access is achieved by allocating different time slots for the different users.

A. tdma
B. cdma
C. fdma
D. fgma
Answer» B. cdma
9.

In .............. Frequency Spectrum is divided into smaller spectra and is allocated to each user.

A. tdma
B. cdma
C. fdma
D. fgma
Answer» D. fgma
10.

Fading of the received radio signals in a mobile communication environment occurs because of .....

A. direct propagation
B. multipath propagation
C. bi-path propagation
D. none of the above
Answer» C. bi-path propagation
11.

Which is not a variant of S-MAC?

A. timeout mac (tmac)
B. dynamic sensor mac (dsmac)
C. input-output mac (iomac)
D. data gathering (dmac)
Answer» E.
12.

RTS/CTS period is called ( )

A. waiting period
B. contention period
C. running period
D. none of these
Answer» B. contention period
13.

In _____, each station transmits its data in its assigned time slot.

A. fdma
B. tdma
C. cdma
D. none of the above
Answer» C. cdma
14.

W-CDMA is ____.

A. wireless code division multiple access
B. wideband code division multiple access
C. wide code division multiple access
D. web band code division multiple access
Answer» B. wideband code division multiple access
15.

In _____, each station is allocated a time slot during which it can send data. Each station transmits its data in its assigned time slot.

A. fdma
B. tdma
C. cdma
D. none of the above
Answer» C. cdma
16.

In ______, each station is allocated a band to send its data. In other words, each band is reserved for a specific station, and it belongs to the station all the time.

A. fdma
B. tdma
C. cdma
D. none of the above
Answer» B. tdma
17.

In _______, the stations share the bandwidth of the channel in time.

A. fdma
B. tdma
C. cdma
D. none of the above
Answer» C. cdma
18.

In the _______ method, the primary device controls the link; the secondary devices follow its instructions.

A. reservation
B. polling
C. token passing
D. none of the above
Answer» C. token passing
19.

In the ______ method, all data exchanges must be made through the primary device even when the ultimate destination is a secondary device.

A. reservation
B. polling
C. token passing
D. none of the above
Answer» C. token passing
20.

In the ________ method, a station needs to make a reservation before sending data. Time is divided into intervals.

A. reservation
B. polling
C. token passing
D. none of the above
Answer» B. polling
21.

In _______ methods, a station cannot send unless it has been authorized by other stations.

A. random access
B. controlled access
C. channelization
D. none of the above
Answer» C. channelization
22.

In _______ methods, the stations consult one another to find which station has the right to send.

A. random access
B. controlled access
C. channelization
D. none of the above
Answer» C. channelization
23.

In _______, collisions are avoided through the use of three strategies: the interframe space, the contention window, and acknowledgments.

A. csma/ca
B. csma/cd
C. either (a) or (b)
D. both (a) and (b)
Answer» B. csma/cd
24.

To avoid collisions on wireless networks, ________was invented.

A. csma/ca
B. csma/cd
C. either (a) or (b)
D. both (a) and (b)
Answer» B. csma/cd
25.

In ________, a station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finished. If, however, there is a collision, the frame is sent again.

A. csma/ca
B. csma/cd
C. either (a) or (b)
D. both (a) and (b)
Answer» C. either (a) or (b)
26.

In __________, each station is forced to send only at the beginning of the time slot.

A. pure aloha
B. slotted aloha
C. both (a) and (b)
D. neither (a) nor (b)
Answer» C. both (a) and (b)
27.

In pure ALOHA, the vulnerable time is ______ the frame transmission time.

A. the same as
B. two times
C. three times
D. none of the above
Answer» C. three times
28.

In ________ each station sends a frame whenever it has a frame to send.

A. pure aloha
B. slotted aloha
C. both (a) and (b)
D. neither (a) nor (b)
Answer» B. slotted aloha
29.

____________ assigns a unique number to each IP network adapter called the MAC address.

A. media access control
B. metro access control
C. metropolitan access control
D. both b and c above
Answer» B. metro access control
30.

802.11 wireless networking uses what method as the media access method?

A. csma/cd
B. cts/rts
C. csma/ca
D. cscd/ca
Answer» D. cscd/ca
31.

This describes how the Ethernet protocol regulates communication among connection points.

A. carrier sense multiple access/collision detect
B. discontinuous transmission
C. aggregator
D. wait and response
Answer» B. discontinuous transmission
32.

What is the size of MAC Address?

A. 16-bits
B. 32-bits
C. 48-bits
D. 64-bits
Answer» D. 64-bits
33.

This is what happens if two devices on the same Ethernet network determine the network is free, but attempt to transmit data at exactly the same time.

A. overlap
B. crossover
C. collision
D. none of the above
Answer» D. none of the above
34.

It may be more economical to use a smaller transmission radius for nodes in areas of high node density, w/o sacrificing adequate network connectivity. This is the issue of___________

A. topology control
B. traffic control
C. protocol control
D. link control
Answer» B. traffic control
35.

Examples of data attributes may include

A. node\s location
B. node\s type of sensors
C. certain range of values in a certain type of sensed data
D. all of above
Answer» E.
36.

The S-MAC protocol includes following major components

A. periodic listen and sleep
B. collision avoidance
C. overheating avoidance
D. all of above
Answer» E.
37.

In the S-MAC protocol, ___________is designed to reduce energy consumption during the long idle time when no sensing events happen, by turning off the radio periodically

A. message passing
B. periodic listen and sleep
C. topology control
D. link control
Answer» C. topology control
38.

The main goal of the ___________is to reduce energy waste caused by idle listening, collisions, overhearing and control overhead

A. s-mac protocol
B. ieee802.15.4 standard
C. a and b
D. none of these
Answer» B. ieee802.15.4 standard
39.

Following MAC protocols have been developed for wireless voice and data communication networks

A. tdma
B. fdma
C. cdma
D. all of above
Answer» E.
40.

Following characteristics of wireless sensor networks point to the need for a specialized MAC protocol

A. the issues of fairness of the node level are much less important than overall application performance
B. most sensor nodes are idle much of the time
C. in-network processing can greatly improve bandwidth utilization
D. all of above
Answer» E.
41.

___________sub-layer manages access to the physical network medium, and its fundamental goal is to reduce or avoid packet collisions in the medium

A. mac
B. llc
C. application
D. session
Answer» B. llc
42.

Within the coverage range, communication is done by__________

A. multicast
B. broadcast
C. unicast
D. all of the above
Answer» C. unicast
43.

To ensure the ___________of the system, the communication and computation should be localized to relevant sensors only

A. responsiveness
B. scalability
C. both a and b
D. neither a nor b
Answer» D. neither a nor b
44.

Networking allows geographical distribution of the sensor nodes and their placement close to signal sources

A. does not depend on signal source
B. statement is correct
C. irrelavant corelation
D. away from signal source
Answer» C. irrelavant corelation
45.

In wireless sensor networks, some of the information defining the objective function and constraints is available only at___________

A. compile time
B. run time
C. ideal time
D. setup time
Answer» C. ideal time
46.

A central problem for WSN is to dynamically define and form sensor groups based on__________

A. task requirements
B. resource availability
C. both a and b
D. none of these
Answer» D. none of these
47.

As the number of nodes___________, every node spends almost all of its time forwarding packets of other nodes

A. decreases
B. increases
C. constant
D. none of the above
Answer» C. constant
48.

In which network access point is not required?

A. ad hoc network
B. infrastructure network
C. both a and b
D. none of the above
Answer» B. infrastructure network
49.

Similarities between WSNs and MANETs networks is.

A. nodes are densely deployed
B. the nodes communicate each other using multi-hop communication
C. topology changes very frequently
D. have global unique identification for nodes
Answer» C. topology changes very frequently
50.

Infrastructure-based networks example is

A. wlan
B. manet
C. wlan and manet both
D. none of the above
Answer» B. manet