# Computer Networks And Internet Protocol - Week 12 Assignment 12 | NPTEL | JAN 2023

## Baseband typically uses signal and Broadband uses signals.

a. Analog, Digital
b. Digital, Analog
c. Analog, Analog
d. Digital, Digital

b. Digital, Analog

## A composite signal contains frequencies 300, 500, 800, 1000 and 1500 Hz. What is the bandwidth?

a.1000 Hz
b. 200 Hz
c. 1200 Hz
d. 500 Hz

c. 1200 Hz

The bandwidth of a composite signal is the difference between the highest and lowest frequencies contained in the signal. In this case, the highest frequency is 1500 Hz and the lowest frequency is 300 Hz.
Therefore, the bandwidth of the composite signal is:
1500 Hz - 300 Hz = 1200 Hz
Therefore, the answer is (c) 1200 Hz.

| Computer Network MCQ Interview : Android Application Free

## Suppose we have a HDTV screen with screen resolution 1600 X 1200 and the screen is renewed 50 times per second. Considering a colored pixel needs 24 bits to be represented, what is the HDTV bit rate?

a. 1.3 Gbps
b. 2.3 Gbps
c. 3.3 Gbps
d. 4.3 Gbps

b. 2.3 Gbps

The bit rate of an HDTV screen can be calculated by multiplying the screen resolution (in pixels), the number of bits per pixel, and the refresh rate (in Hz). In this case, the bit rate is 1600 x 1200 x 24 x 50 = 2,30,40,00,000 = 2.3 Gbps.

## Which of the following is NOT a cause of transmission impairment ?

a. Attenuation
b. Noise
c. Distortion
d. Congetion

d. Congetion

Signals travel through transmission media, which are not perfect. The imperfection causes signal impairment. This means that the signal at the beginning of the medium is not the same as the signal at the end of the medium

## For a noiseless channel with a bandwidth of 1 MHz, if we want a maximum bit 4Mbps, what is the required number of signal levels

a. 2
b. 4
c. 6
d. 8

b. 4
According to the Nyquist formula for a noiseless channel, the maximum bit rate is given by the formula C = 2B * log2(L), where C is the maximum bit rate, B is the bandwidth of the channel, and L is the number of signal levels. In this case, we have C = 4 Mbps and B = 1 MHz. Solving for L, we get L = 2^(C/(2B)) = 2^(4/2) = 4.

## Which of the following is/are NOT true about modulation techniques?

a. One amplitude in ASK is zero.
b. BFSK is more susceptible to error than ASK.
c. In Binary PSK, presence and absence of the carrier signal represents two binary digits.
d. QAM is a combination of ASK and PSK

b. BFSK is more susceptible to error than ASK.

c. In Binary PSK, presence and absence of the carrier signal represents two binary

## Which one is used in parts of the cellular telephone system and for some statellite communication ?

a. CDM
b. TDM
c. FDM
d. WDM

a. CDM

The specific version of CDM used in cell phones is known as Code Division Multi-Access (CDMA)

| Computer Courses - All in One [ Free Android App ]

## What does SSL stand for in SSL/TLS Protocol?

a. Secure Service Layer
b. Safe Sockets Layer
c. Secure Sockets Layer
d. Standalone Security Layer

c. Secure Sockets Layer

SSL stands for Secure Socket Layer. It is a predecessor of TLS (Transport Layer Security) protocol, and both are cryptographic protocols used to establish secure communication channels between two devices over the internet. SSL was developed by Netscape Communications in the mid-1990s to provide secure communication between web browsers and servers, and it was later succeeded by TLS. Both SSL and TLS use encryption algorithms to ensure the confidentiality, integrity, and authenticity of data transmitted over the internet.

## Which of the following is NOT a function of a HTTP Proxy?

a) Efficient utilization of bandwidth through caching
b) Serving as a rudimentary firewall.
d) Allow or deny access based on content and location.

HTTP proxies are used to act as intermediaries between clients and servers, allowing clients to make requests to servers without revealing their own IP addresses. They can also improve performance and security by caching frequently accessed content, serving as a rudimentary firewall by filtering traffic based on rules, and allowing or denying access based on content and location. However, translating private IP addresses to public IP addresses is typically handled by a Network Address Translator (NAT) rather than an HTTP proxy.

## Which of the following statements is/are correct?

a. NAT is a proxy server.
b. NAT can also act as a firewall.
c. NAT needs to recalculate both IP and TCP checksum as it modifies the IP header.
d. IP masquerading is done by NAT.

b. NAT can also act as a firewall.
c. NAT needs to recalculate both IP and TCP checksum as it modifies the IP header.
d. IP masquerading is done by NAT.

Disclaimer:
"This page contains multiple choice questions (MCQs) related to Computer Networks and Internet Protocols. The answers to these questions are provided for educational and informational purposes only.These answers are provided only for the purpose to help students to take references. This website does not claim any surety of 100% correct answers. So, this website urges you to complete your assignment yourself."