1.
How many technical societies does IEEE have?
Correct Answer
B. 39
Explanation
IEEE, the Institute of Electrical and Electronics Engineers, has a total of 39 technical societies. These societies cover various fields such as power and energy, communications, robotics, and more. Each society focuses on advancing knowledge and innovation in its respective area, providing a platform for professionals and researchers to collaborate, share ideas, and contribute to the development of their field. With 39 technical societies, IEEE offers a wide range of opportunities for individuals interested in different aspects of electrical engineering and related disciplines.
2.
In Which year did the IEEE Computer Society start a project named 802?
Correct Answer
C. 1985
Explanation
The correct answer is 1985. This is the year in which the IEEE Computer Society started a project named 802.
3.
Which of the following organizations adopted IEEE Standards?
Correct Answer
A. ANSI
Explanation
ANSI, the American National Standards Institute, adopted IEEE Standards. ANSI is a private, non-profit organization that oversees the development of voluntary consensus standards for a wide range of industries in the United States. The Institute of Electrical and Electronics Engineers (IEEE) is a professional association that develops and publishes standards for various areas of technology, including electrical and electronic engineering. Therefore, it is logical to conclude that ANSI, being a standards organization, would adopt IEEE Standards.
4.
What is Wired Equivalent Privacy (WEP)?
Correct Answer
B. Security Algorithm for Wireless networks
Explanation
Wired Equivalent Privacy (WEP) is a security algorithm specifically designed for wireless networks. It was developed to provide security and privacy for wireless communication similar to that of a wired network. WEP encrypts data transmitted over a wireless network to prevent unauthorized access and protect the confidentiality of the information being transmitted. However, WEP has been found to have several vulnerabilities, making it less secure compared to newer encryption protocols such as WPA and WPA2.
5.
DCF stands for?
Correct Answer
D. Distributed Coordination Function
Explanation
DCF stands for Distributed Coordination Function. This function is used in wireless networks to manage the access to the shared medium. It is responsible for coordinating the transmission of data between devices, ensuring that only one device transmits at a time to avoid collisions. The DCF uses a set of rules and procedures to regulate access to the medium, such as waiting for a specific amount of time before transmitting. By using the DCF, devices can efficiently share the available bandwidth and avoid interference, resulting in better network performance.
6.
If the value of subfield type is 1100 in control frames, then it contains information of the following commands?
Correct Answer
B. Clear to send
Explanation
If the value of the subfield type is 1100 in control frames, then it indicates that the frame contains information about the "Clear to send" command. This command is typically used in communication protocols to indicate that the sender is clear to transmit data.
7.
Which of the following is IEEE 802.3 standard related to?
Correct Answer
A. Ethernet
Explanation
The correct answer is Ethernet. IEEE 802.3 is a standard that defines the physical layer and the medium access control (MAC) sublayer of Ethernet networks. This standard specifies the characteristics and requirements for Ethernet networks, including the type of cables, data transfer rates, and network topologies. Ethernet is a widely used technology for local area networks (LANs) and is commonly used for wired internet connections.
8.
What are V.42, V.22, V.42 bis?
Correct Answer
D. CCITT Standards
Explanation
V.42, V.22, and V.42 bis are all examples of CCITT (now ITU-T) standards. CCITT stands for International Telegraph and Telephone Consultative Committee, which was a predecessor to the ITU-T. These standards were developed by the CCITT to define various protocols and technologies related to telecommunications. V.42 is a standard for error correction in data communication, V.22 is a standard for 1200 bit/s full-duplex modems, and V.42 bis is an enhancement to V.42 for improved error correction. Therefore, CCITT Standards is the correct answer.
9.
In a TCP/IP network, Which of the following must be unique for each computer in the network?
Correct Answer
B. IP Address
Explanation
In a TCP/IP network, the IP address must be unique for each computer in the network. The IP address is a unique numerical identifier assigned to each device connected to the network. It allows devices to communicate with each other and ensures that data packets are sent to the correct destination. The default gateway is the IP address of the router that connects the local network to the internet, and the subnet mask is used to determine the network and host portions of the IP address. While these two parameters may vary within a network, the IP address must always be unique.
10.
Which of the following is a class A network?
Correct Answer
C. 126.0.0.0
11.
What is the maximum number of IP Addresses in a Class B network?
Correct Answer
A. 65536
Explanation
A Class B network has a subnet mask of 255.255.0.0, which means it has 16 bits available for host addresses. With 16 bits, there are 2^16 possible combinations, which equals 65536. Therefore, the maximum number of IP addresses in a Class B network is 65536.
12.
What is the IEEE 802.5 standard related to?
Correct Answer
D. Token Ring
Explanation
The IEEE 802.5 standard is related to Token Ring. Token Ring is a local area network (LAN) technology in which computers are connected in a ring topology. The standard defines the physical and data link layer specifications for Token Ring networks, including the token passing mechanism used for accessing the network. This standard was widely used in the past but has been largely replaced by Ethernet technology.
13.
In the TCP/IP network, Which layers are basically absent?
Correct Answer
B. Session, Presentation
Explanation
In the TCP/IP network, the layers that are basically absent are Session and Presentation. The TCP/IP model combines the Session and Presentation layers into the Application layer. The Session layer is responsible for establishing, managing, and terminating connections between applications, while the Presentation layer is responsible for data formatting and encryption. In the TCP/IP model, these functions are handled directly by the Application layer, making the Session and Presentation layers unnecessary.
14.
Which protocol is connection-oriented?
Correct Answer
C. TCP
Explanation
TCP (Transmission Control Protocol) is a connection-oriented protocol. It establishes a reliable and ordered connection between two devices before data transmission, ensuring that all packets are received in the correct order. TCP provides error checking, flow control, and congestion control mechanisms, making it suitable for applications that require reliable and accurate data delivery, such as web browsing, email, and file transfer. In contrast, UDP (User Datagram Protocol) is a connectionless protocol that does not establish a connection before data transmission and does not provide reliability mechanisms. IP (Internet Protocol) is a network layer protocol responsible for addressing and routing packets, while ICPM is a network layer protocol used for network diagnostics and troubleshooting.
15.
Which of the following are International Standard Organizations?
Correct Answer
D. All of the above
Explanation
ISO, IEC, and ITU are all international standard organizations. ISO (International Organization for Standardization) is an independent, non-governmental organization that develops and publishes international standards. IEC (International Electrotechnical Commission) is a global organization that prepares and publishes international standards for all electrical, electronic, and related technologies. ITU (International Telecommunication Union) is a specialized agency of the United Nations that focuses on information and communication technologies and establishes international standards in this field. Therefore, the correct answer is "All of the above" as all three organizations mentioned are international standard organizations.
16.
Wireless network interface controller can work in ...........
Correct Answer
C. Both Infrastructure Mode and ad-hoc Mode
Explanation
A wireless network interface controller can work in both Infrastructure Mode and ad-hoc Mode. In Infrastructure Mode, the controller connects to a central access point, such as a router, to access the network. This mode is commonly used in home and office networks. In ad-hoc Mode, the controller can directly connect to other devices without the need for a central access point. This mode is useful for creating temporary or peer-to-peer networks, such as in a conference or a file-sharing scenario. Therefore, the controller's ability to work in both modes provides flexibility in different networking environments.
17.
In wireless ad-hoc network ...........
Correct Answer
D. Nodes are required
Explanation
In a wireless ad-hoc network, nodes are required because this type of network is decentralized and does not rely on a central access point. Each node in the network acts as both a transmitter and receiver, allowing for direct communication between nodes without the need for an access point. This allows for greater flexibility and scalability in the network, as nodes can easily join or leave the network without affecting its overall functionality.
18.
What is IEEE 802.2 standard related to?
Correct Answer
C. LLC
Explanation
The IEEE 802.2 standard is related to LLC (Logical Link Control). LLC is a sublayer of the Data Link Layer in the OSI model. It provides a reliable and logical link between network devices. It is responsible for managing communication between different network protocols and ensuring error-free data transmission. The LLC sublayer is used in various networking technologies, including Ethernet and Token Bus. However, it is not specifically related to Bluetooth, which is a wireless communication technology.
19.
Which multiple access technique is used by the IEEE 802.11 standard for wireless LAN?
Correct Answer
B. CSMA/CA
Explanation
The IEEE 802.11 standard for wireless LAN uses the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) multiple access technique. In CSMA/CA, devices listen to the wireless medium to check if it is busy before transmitting data. If the medium is busy, they wait for a random amount of time before attempting to transmit again. This technique helps to reduce collisions and improve the overall efficiency of the wireless network.
20.
Which of the following is IEEE 1003 standard related to?
Correct Answer
A. POSIX
Explanation
The correct answer is POSIX. IEEE 1003 is a standard related to POSIX (Portable Operating System Interface), which is a family of standards that define the application programming interface (API) for compatibility between different operating systems. POSIX standards specify how operating systems should behave in terms of file handling, process management, input/output, and other system services, allowing software developers to write code that can run on multiple platforms without needing to be rewritten for each specific operating system.
21.
What is the IEEE Standard for “ZigBee”?
Correct Answer
B. IEEE 802.15.4
Explanation
The correct answer is IEEE 802.15.4. This standard refers to the IEEE standard for "ZigBee", which is a low-power wireless communication technology commonly used in Internet of Things (IoT) applications. The IEEE 802.15.4 standard defines the physical and media access control (MAC) layers for ZigBee networks, providing specifications for the network's operation, data rates, and frequency bands.
22.
When was the IEEE Standard about Prefixes for Binary Multiples(IEEE 1541) issued?
Correct Answer
D. 2002
Explanation
The IEEE Standard about Prefixes for Binary Multiples (IEEE 1541) was issued in 2002.
23.
The IEEE standard for ‘Unified Power Format’ is:
Correct Answer
B. IEEE 1801
Explanation
The correct answer is IEEE 1801. IEEE 1801 is the standard for Unified Power Format (UPF) in the field of electronic design automation. UPF is a standardized format used to describe power intent in digital electronic designs. It allows designers to specify power management techniques such as power domains, power states, and power control signals. IEEE 1801 provides a common language for design and verification tools to understand and implement power management features in electronic designs.
24.
The IEEE Standard issued for Parallel Port Communications is:
Correct Answer
A. IEEE 1284
Explanation
The correct answer is IEEE 1284. This standard was issued for parallel port communications. It specifies the electrical and mechanical requirements for parallel ports, which are used to connect devices such as printers to computers. The IEEE 1284 standard defines the communication protocols, signaling, and data transfer modes for parallel ports, ensuring compatibility and efficient data transfer between devices.
25.
The IEEE Standard IEEE 802.8 is for?
Correct Answer
B. Fiber-optic connections.
Explanation
The correct answer is "Fiber-optic connections." The IEEE Standard IEEE 802.8 specifically focuses on the standardization and specifications for fiber-optic connections. This standard ensures that fiber-optic networks are compatible and can effectively transmit data at high speeds over long distances. It covers various aspects of fiber-optic technology, including the physical layer, media access control, and signaling protocols. By adhering to this standard, organizations can ensure the reliability, performance, and interoperability of their fiber-optic networks.
26.
What is IEEE P1363 Standard related to?
Correct Answer
C. Public Key cryptograpHy
Explanation
The IEEE P1363 Standard is related to Public Key cryptography. This standard provides specifications for algorithms, protocols, and data formats used in public key cryptography. It covers various aspects such as key establishment, digital signatures, encryption, and key management. Public key cryptography is a cryptographic method that uses a pair of keys, a public key for encryption and a private key for decryption, ensuring secure communication and data protection.
27.
Which one of the following events is not possible in a wireless LAN?
Correct Answer
A. Collision detection
Explanation
Collision detection is not possible in a wireless LAN. In a wired LAN, collision detection is used to detect if two or more devices transmit data simultaneously, causing a collision. However, in a wireless LAN, devices cannot detect collisions because they cannot "listen" to the medium while transmitting data. Instead, wireless LANs use a different mechanism called "collision avoidance" to prevent collisions from occurring in the first place.
28.
The IEEE Standard related to ‘Medical/Health device communication’ is
Correct Answer
B. IEEE 11073
Explanation
The correct answer is IEEE 11073. IEEE 11073 is the standard related to medical/health device communication. This standard defines a common framework for the exchange of information between medical devices and computer systems, ensuring interoperability and compatibility in healthcare settings. It covers various aspects such as device connectivity, data exchange formats, and security protocols, aiming to enhance the communication and integration of medical devices for improved patient care.
29.
The Standard associated with VHDL ( Hardware Description Language) is
Correct Answer
C. IEEE 1076