1. The data link layer provides ________ delivery.
a. host-to-host
b. port-to-port
c. process-to-process
d. hop-to-hop
2. For n devices in a network and duplex mode transmission facility, the number
of cable links required for a mesh topology is –
a. n2
b. 2n
c. n(n-1)/2
d. n(n-1)
3. The layer responsible for encryption technique in OSI model is –
a. network
b. presentation
c. data link
d. session
4. Switches function in which layer(s) of OSI model?
a. physical
b. data link
c. network
d. both a and b
5. Which topology requires a multipoint connection?
a. mesh
b. star
c. ring
d. bus
6. The transport layer provides _________ delivery.
a. bit-to-signal transmission
b. bit synchronization
c. process-to-process
d. hop-to-hop
7. The topology with highest reliability is–
a. bus topology
b. star topology
c. mesh topology
d. ring topology
8. The dedicated physical layer devices are –
a. Hub & Switch
b. Hub & multiplexer
c. ATM switch & MUX
d. Repeater & Router
9. Advantage of layering includes –
a. multi-vendor integration
b. data hiding & encapsulation
c. easy testing
d. all of these
10. A network which is used for sharing data, software and hardware among small number
of users owning microcomputers is called
a. WAN
b. LAN
c. MAN
d. VAN
11. Which topology requires a central controller or hub?
a. Mesh
b. star
c. ring
d. bus
12. Flow control in OSI reference model is performed in –
a. Data link layer
b. Network layer
c. Session layer
d. Application layer
13. Open Source Interconnection is developed by _____ and has ____ layers.
a. IEEE, 7
b. ISI, 5
c. ISO, 7
d. ISI, 7
14. Method of communication in which transmission takes place in both
directions, but only in one direction at a time, is called
a. Simplex
b. full-duplex
c. four-wire circuit
d. half-duplex
15. Communication between a computer and a keyboard involves –
a. Simplex
b. Half-duplex
c. Duplex
d. Automatic
16. The key elements of a protocol are –
a. syntax
b. semantics
c. timing
d. all of these
17. Repeaters function in which layer(s)?
a. physical
b. data link
c. network
d. both a and b
18. Bridges/Switches function in which layer(s)?
a. physical
b. data link
c. network
d. both a and b
19. Routers function in which layers?
a. physical and data link
b. physical, data link and network
c. data link and network
d. network and transport
20. Gateways in OSI model can function all the way up to –
a. transport layer
b. session layer
c. presentation layer
d. application layer
21. Which of the following allows devices on one network to communicate with devices
on another network?
a. Multiplexer
b. Gateway
c. Switch
d. Modem
22. Different computers are connected to a LAN by a cable and –
a. Modem
b. interface card
c. special wires
d. telephone lines
Unit II
23. The extended ASCII is of _____ bit size and can represent up to ______ characters.
a. 7 bit, 128
b. 8 bit, 128
c. 8 bit, 256
d. 7 bit, 256
24. Manchester code is a–
a. Non-return to zero code
b. Polar code
c. Bipolar code
d. both a and c
25. Baud means –
a. number of bits transmitted per unit time
b. number of bytes transmitted per unit time
c. rate at which the signal changes
d. none of these
26. If the maximum value of a signal is 31 and minimum value is -32, how many bits are
used for coding?
a. 4
b. 5
c. 6
d. 8
27. A telephone network is an example of _______ network.
a. Packet-switched
b. Circuit-switched
c. Message-switched
d. None of the above
28. BNC connectors are used by ________ cable
a. UTP
b. STP
c. Coaxial
d. Fiber-optic
29. In an optical fiber, the inner core is _______ the cladding
a. denser than
b. less dense than
c. the same density as
d. another name for
30. The RJ45 is a connector used in case of
a. 10Base2
b. 10Base5
c. 10BaseT
d. 10BaseF
31. The number of times a signal changes value per second is called the ___________ .
a. Bit rate
b. Baud rate
c. frequency rate
d. Bit interval
32. In Ethernet when Manchester encoding is used, the bit rate is
a. Half the baud rates
b. Twice the baud rate
c. Same as the baud rated
d. none of these
33. Different computers are connected to a LAN by a cable and –
a. Modem
b. NIC
c. special wires
d. telephone lines
34. Blue-tooth uses ______ to communicate between two devices
a. Radio wave
b. Microwave
c. Infrared
d. Satellite
35. In a network with 25 computers, which topology would require the most extensive
cabling?
a. Star
b. Bus
c. Ring
d. Mesh
36. All the packets of a message follow the same channels of a path in
a. packet switching
b. circuit switching
c. message switching
d. virtual circuit
37. The bit rate of a signal is 40,000 hertz. If a signal element encodes 4 bits, the baud rate
will be
a. 40000
b. 10000
c. 20000
d. 1000
38. What is the bandwidth of a signal whose lower frequency is 20 KHz and upper
frequency is 60 KHz?
a. 80 KHz
b. 3 KHz
c. 1200 KHz
d. 40 KHz
Unit III
39. Bit Stuffing inserts a 0 bit after ________ consecutive 1 bits in the message data.
a. 4
b. 5
c. 6
d. 7
40. The 1-persistent CSMA / CD is a special case of the p-persistent approach with p =
a. 0.5
b. 0.1
c. 1.0
d. 100
41. Pure ALOHA has a maximum efficiency of
a. 18%
b. 37%
c. 10%
d. None of these
42. In the _____ random-access method there is no collision
a. ALOHA
b. CSMA / CD
c. CSMA / CA
d. Token passing
43. How much channel throughput of Slotted ALOHA will be in comparison to Pure
ALOHA?
a. Same
b. Double
c. Three times
d. None of these
44. What is the Hamming distance between 11100110 and 10100011?
a. 2
b. 3
c. 4
d. 5
45. An Ethernet has 38 bytes of data. How many bytes padding should be added?
a. 12
b. 8
c. 26
d. 46
46. In Ethernet CSMA/CD, the special bit sequence transmitted by media access
management collision handling is called as
a. Preamble
b. Post amble
c. Jam
d. Flag
47. The monitor station in what standard ensures that one and only one token is
circulating?
a. 802.3
b. 802.4
c. 802.5
d. 802.11
48. Flow control is used to prevent
a. overflow of sender buffer
b. overflow of receiver
c. collision between sender and receiver
d. underflow of sender and receiver
49. If the ASCII “m” character is received as an “n” character, this is known as
a. single-bit error
b. burst error
c. character error
d. byte error
50. A single bit error is more likely in a _____ transmission while a burst error is more
likely in a ______ transmission.
a. Serial; parallel
b. Parallel; serial
c. Serial; multiplexed
d. Duplex; parallel
51. Which of the following is an error detection method?
a. Multiplexing
b. Redundancy
c. Reciprocity
d. Conditioning
52. Which type of redundancy check do the upper layers primarily use?
a. VRC
b. CRC
c. LRC
d. Checksum
CRC
Cyclic redundancy check
53. Which method can detect all single-bit error
a. CRC
b. VRC
c. LRC
d. All of the above
VRC can detect single bit errors. LRC can detect burst errors.
54. A sender has a sliding window of size 15. The first 15 frames are sent. How many
frames are in the window now?
a. 0
b. 1
c. 14
d. 15
55. A sender has a sliding window of size 15. The first 10 frames are sent. How many
frames are in the window now?
a. 4
b. 5
c. 6
d. 10
56. The receiver’s window in a sliding window protocol expands when
a. An ACK is received
b. An ACK is sent
c. A frame is sent
d. A frame is received
57. The stop-and-wait flow control method is the same as the sliding window method with
a window size of ______
a. 0
b. 1
c. 2
d. None of the above
58. Flow control is mainly a function of ________ layer
a. Application
b. Presentation
c. Session
d. Data link
59. Stop-and wait is a _______ technique
a. Line discipline
b. Flow control
c. Error control
d. Session management
60. Sliding window is a _________ technique
a. Line discipline
b. Flow control
c. Error control
d. Session management
61. In the sliding window method of flow control, the sender may send ____ at a time
a. Several frame
b. Only one frame
c. A set number of frame
d. Two frame
62. In a stop-and-wait method of flow control, after the receiver receives a data frame,
________ frame can be sent
a. An ACK
b. A NAK
c. An EOT
d. (a) or (b)
If the ACK is not received, it re-transmits the previous packet again.
63. What is the main disadvantage of stop-and-wait flow control?
a. Unreliable
b. Inefficient
c. Attenuation
d. Dropped packets
64. In the sliding window method of flow control, the sender window _____ size when
frames are sent.
a. Increases in
b. Decrease in
c. Expands in
d. Remains its original
65. In the sliding window method of flow control, the sender window _____ size when an
ACK is received
a. Increase in
b. Decrease in
c. Doubles in
d. Remains its original
66. In a LAN defined by project 802, the _________ sub layer of the data link layer is
non-architecture specific
a. CSMA
b. MAC
c. LLC
d. (a) and (b)
67. IEEE 802.1 is concerned with ________ issues in LANs and MANs
a. Error handling
b. Networking
c. Internetworking
d. Flow control
68. The _______ sub layer, as specified in Project 802, is LAN specific and deals with
contention issues.
a. CSMA
b. MAC
c. LLC
d. (a) and (b)
69. Ethernet, Token Ring and token Bus are all different types of
a. LANs
b. MANs
c. WANs
d. VANs
70. The _______ is the data unit at the LLC level
a. HDLC
b. PDU
c. SSAP
d. MAC
71. Which of the following is an IEEE Project 802 standard?
a. Ethernet
b. Token Ring
c. Token Bus
d. All of the above
72. _______ signal is digital
a. A baseband
b. A broadband
c. An Ethernet
d. None of the above
73. ________ signal is analog
a. A baseband
b. A broadband
c. An Ethernet
d. None of the above
74. Token Bus is physically configured like ______
a. Ethernet
b. Token Ring
c. FDDI
d. All of the above
75. Token Bus operates under a collision-free environment similar to ______
a. Ethernet
b. Token Ring
c. CSMA/CD
d. All of the above
76. The _____ field in a token Ring frame is equivalent to the HDLC flag field
a. SD
b. AC
c. FC
d. FS
77. A Token Ring frame can be identified as a token frame by a bit in the field
a. SD
b. AC
c. FC
d. ED
78. In Token Ring, the _______ sets the bits in the frame status field to indicate that the
frame has been copied.
a. Sender
b. Receiver
c. Monitor
d. (a) and (b)
79. The Token Ring AC field contains _______ information
a. Priority
b. Frame type
c. Reservation
d. All of the above
80. In a Token Ring LAN, a frame is _______ at each station
a. Examined
b. Regenerated
c. Encapsulated
d. (a) and (b)
81. A multistation access unit is most often used in ______ LAN
a. An Ethernet
b. A Token Ring
c. An FDDI
d. (a) and (b)
Unit IV
82. A bridge has access to which address of a station on the same network?
a. physical
b. network
c. service access point
d. all of the above
83. An IPv6 address consists of _________ bits.
a. 48
b. 16
c. 32
d. 128
84. Identify the IP address in the class B–
a. 125.123.123.2
b. 191.23.21.54
c. 192.128.32.56
d. 10.14.12.34
85. Routers function in which layer(s)?
a. physical
b. data link
c. network
d. all of these
86. IP address in the class C is given by –
a. 125.123.123.2
b. 191.23.21.54
c. 192.128.32.56
d. 10.14.12.34
87. ARP is a –
a. TCP/IP protocol used to dynamically bind a high level IP address to a low level physical
hardware address
b. TCP/IP high level protocols for transferring files from one machine to another
c. Protocol used to monitor computers
d. Protocol that handles error and control messages
88. Which of the following is NOT an IPv6 address?
a. anycast
b. multicast
c. broadcast
d. unicast
89. The network layer provides __________ delivery.
a. host-to-host
b. port-to-port
c. process-to-process
d. hop-to-hop
90. Maximum size of the data portion of the IP datagram is
a. 65515 bytes
b. 65555 bytes
c. 65535 bytes
d. none of these
91. IP address can be used to specify a broadcast and map to hardware broadcast
if available. By conversion broadcast address has hosted with bits
a. all 0
b. all 1
c. alternate 0 and 1
d. alternate 1 and 0
92. Which of the following is an interior routing protocol?
a. RIP(Routing Information Protocol)
b. OSPF(Open Shortest Path First )
c. BGP(Border Gateway Protocol)
d. both a and b
93. A station in a network forward incoming packets by placing them on its shortest output
queue. What routing algorithm is being used?
a. Hot Potato routing
b. Flooding
c. Static routing
d. Delta routing
94. Which routing algorithm requires more traffic between routers for set-up and
updating?
a. Distance vector
b. Link state
c. Dijkstra
d. Vector link
95. Identify the class of IP address 199.1.2.3.
a. A
b. B
c. C
d. D
96. A subnet mask in class A has fourteen 1s. How many subnets does it define?
a. 32
b. 8
c. 64
d. 128
97. Class _______ has the greatest number of hosts per given network address.
a. A
b. B
c. C
d. D
98. In ________ routing, the full IP address of a destination is given in the routing table.
a. Next-hop
b. Network-specific
c. Host-specific
d. Default
99. In ________ routing, the destination address is a network address in the routing table.
a. Next-hop
b. Network-specific
c. Host-specific
d. Default
100. What is the hostid of the IP address 114.34.2.8
a. 114.34
b. 114.34.2
c. 2.8
d. 34.2.8
101. You are working with a network that is 172.16.0.0 and would like to support 600 hosts
per subnet. What subnet mask should you use?
a. 255.255.192.0
b. 255.255.224.0
c. 255.255.248.0
d. 255.255.252.0
102. What is the loopback address?
a. 127.0.0.1
b. 255.255.0.0
c. 255.0.0.0
d. 255.0.0.0
103. What part of 192.168.10.51 is the Network ID, assuming a default subnet mask?
a. 192
b. 192.168.10
c. 0.0.0.5
d. 51
104. How many bits of internet address is assigned to each host on a TCP/IP internet which
is used in all communications with the host?
a. 16 - bits
b. 32 - bits
c. 48 - bits
d. 64 - bits
105. Which of the following is the address of the router?
a. The IP address
b. The TCP address
c. The subnet mask
d. The default gateway
106. What is the first octet range for a class C IP address?
a. 192 - 255
b. 192 - 223
c. 192 - 226
d. 128 - 191
107. How many class A, B, and C network IDs can exist?
a. 2,113,658
b. 16,382
c. 126
d. 128
108. What is the default subnet mask for a class A network?
a. 127.0.0.1
b. 255.0.0.0
c. 255.255.255.0.0
d. 255.255.255.0
109. With an IP address of 201.142.23.12, what is your default subnet mask?
a. 0.0.0.0
b. 255.0.0.0
c. 255.255.0.0
d. 255.255.255.0
Unit V
110. UDP is
a. reliable and connection oriented
b. unreliable and connection oriented
c. unreliable and connectionless
d. reliable and connectionless
111. The ______ layer ensures end-to-end reliable data transmission.
a. Network
b. Physical
c. Data link
d. Transport
112. ________ addresses on headers change as a packet moves from network to network
but the ________ do not.
a. Logical; port
b. Logical; network
c. Logical; physical
d. Physical; logical
113. The ______ layer lies between the network layer and the session layer
a. Physical
b. Data link
c. Transport
d. application
114. The ______ layer is responsible for source-to-destination delivery of the entire
message
a. Physical
b. Data link
c. Transport
d. Network
115. A _______ address identifies a process running on a computer
a. Logical
b. Physical
c. Network
d. Service-point
116. The header added by the transport layer to the packet coming from the upper layer
includes the _______ address
a. Logical
b. Service-point
c. Physical
d. network
117. Segmentation and reassembly are functions of the _______ layer
a. Physical
b. Data link
c. Transport
d. Network
118. In a connection-oriented exchange the first phase is _______ between the transport
layers of the source and destination
a. Connection establishment
b. Exchange of data packets
c. Connection termination
d. None of the above
119. In a connection-oriented exchange the last phase after all the data packets are
transferred is
a. Connection establishment
b. Flow control
c. Connection termination
d. None of the above
120. The assignment of sequence numbers to packets of message is a function of the
______ layer
a. Physical
b. Data link
c. Transport
d. network
121. The reassembly of packets into the original message is a function of the _______ layer
a. Physical
b. Data link
c. Transport
d. Network
122. The division of a message into packets is a function of the ______ layer
a. Physical
b. Data link
c. Transport
d. Network
*********END*****
PART -2
Which one of the following task is not done by data link layer?
a.
framing
b.
error control
c.
flow control
d.
channel coding
Answer:channel coding
The IETF standards documents are called ________ a) RFC b) RCF c) ID d) DFC => a RFC
stands for Request For Comments and they are documents that describe
methods, behaviors, research, or innovations applicable to the working
of the Internet.
Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) routing information protocol =>D
The network layer is concerned with __________ of data.
a) bits
b) frames
c) packets
d) bytes =>C
Header of a frame generally contains ______________
a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned => D
The technique of temporarily delaying outgoing acknowledgements so that
they can be hooked onto the next outgoing data frame is called
____________
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check => A
The data link layer takes the packets from _________ and encapsulates them into frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer => A
A 4 byte IP address consists of __________
a) only network address
b) only host address
c) network address & host address
d) network address & MAC address=> C
The network layer responds to request from which layer?
a) Transport layer
b) Data layer
c) Application layer
d) Session layer
A
The network layer contains which hardware device?
a) Routers, Bridges
b) Bridges only
c) Bridges and switches
d) Routers, Bridges and Switches
D
In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are ___________ a) Added b) Removed c) Rearranged d) Modified => A Each
layer adds its own header to the packet from the previous layer. For
example, in the Internet layer, the IP header is added over the TCP
header on the data packet that came from the transport layer.
The structure or format of data is called ___________ a) Syntax b) Semantics c) Struct d) Formatting => A The
structure and format of data are defined using syntax. Semantics
defines how a particular pattern to be interpreted, and what action is
to be taken based on that interpretation. In programming languages,
syntax of the instructions plays a vital role in designing of the
program.
Communication between a computer and a keyboard involves ______________ transmission. a) Automatic b) Half-duplex c) Full-duplex d) Simplex => D
The first Network was called ________ a) CNNET b) NSFNET c) ASAPNET d) ARPANET => d ARPANET
stands for Advanced Research Projects Agency Networks. It was the first
network to be implemented which used the TCP/IP protocol in the year
1969.
Layer 3
Layer 3 of the OSI Model: Network Layer
A _______ is the physical path over which a message travels. a) Path b) Medium c) Protocol d) Route => b Messages
travel from sender to receiver via a physical path called the medium
using a set of methods/rules called protocol. Mediums can be guided
(wired) or unguided (wireless).
Which organization has authority over interstate and international commerce in the communications field? a) ITU-T b) IEEE c) FCC d) ISOC => c FCC
is the abbreviation for Federal Communications Commission. FCC is
responsible for regulating all interstate communications originating or
terminating in USA. It was founded in the year 1934.
ICMP IS PRIMARILY USED FOR
addressing None of these forwardingerror and diagnostic functions(ANS)
Packets will be transferred in how many types?
a) 5 types
b) 4 types
c) 2 types
d) 3 types
=> 3
The Internet Control Message Protocol (ICMP)
Which of this is not a network edge device? a) PC b) Smartphones c) Servers d) Switch => d Network
edge devices refer to host systems, which can host applications like
web browser. A switch can’t operate as a host, but as a central device
which can be used to manage network communication.
A _________ set of rules that governs data communication. a) Protocols b) Standards c) RFCs d) Servers => a In
communications, a protocol refers to a set of rules and regulations
that allow a network of nodes to transmit and receive information. Each
layer in the network model has a protocol set, for example, the
transport layer has TCP and UDP protocols.
Three or more devices share a link in ________ connection. a) Unipoint b) Multipoint c) Point to point d) Simplex => b A
multipoint communication is established when three or many network
nodes are connected to each other. Frame relay, Ethernet and ATM are
some examples of multipoint connections.
When collection of various computers seems a single coherent system to its client, then it is called _________ a) computer network b) distributed system c) networking system d) mail system => b A Computer network is defined as a collection of interconnected computers which uses a single technology for connection. A
distributed system is also the same as computer network but the main
difference is that the whole collection of computers appears to its
users as a single coherent system. Example:- World wide web
6. Multidestination routing a) is same as broadcast routing b) contains the list of all destinations c) data is not sent by packets d) none of the mentioned View Answer
Answer: c
Two devices are in network if __________ a) a process in one device is able to exchange information with a process in another device b) a process is running on both devices c) PIDs of the processes running of different devices are same d) a process is active and another is inactive => a A
computer network, or data network, is a digital telecommunications
network which allows nodes to share resources. In computer networks,
computing devices exchange data with each other using connections
between nodes. The nodes have certain processes which enable them to
share a specific type of data using a distinct protocol.
Which of the following computer networks is built on the top of another network? a) prior network b) chief network c) prime network d) overlay network => d An
overlay network is a computer network that is built on top of another
network. Some examples of an overlay network are Virtual Private
Networks (VPN) and Peer-to-Peer Networks (P2P).
In computer network nodes are _________ a) the computer that originates the data b) the computer that routes the data c) the computer that terminates the data d) all of the mentioned =>In
a computer network, a node can be anything that is capable of sending
data or receiving data or even routing the data to its destination.
Routers, Computers and Smartphones are some examples of network nodes.
Communication channel is shared by all the machines on the network in ________ a) broadcast network b) unicast network c) multicast network d) anycast network => a In
a broadcast network, information is sent to all stations in a network
whereas in a multicast network the data or information is sent to a
group of stations in the network. In unicast network, information is
sent to only one specific station. The broadcast address of the network
is the last assigned address of the network.
Bluetooth is an example of __________ a) personal area network b) local area network c) virtual private network d) wide area network => a Bluetooth
is a wireless technology used to create a wireless personal area
network for data transfer up to a distance of 10 meters. It operates on
2.45 GHz frequency band for transmission.
A __________ is a device that forwards packets between networks by processing the routing information included in the packet. a) bridge b) firewall c) router d) hub => c A
router is a networking device that forwards data packets between
computer networks. Routers perform the traffic directing functions on
the Internet. They make use of routing protocols like RIP to find the
cheapest path to the destination.
. A list of protocols used by a system, one protocol per layer, is called ________ a) protocol architecture b) protocol stack c) protocol suite d) protocol system => b A
protocol stack refers to a group of protocols that are running
concurrently that are employed for the implementation of network
protocol suite. Each layer in the network model has to use one specific
protocol from the protocol stack.
Network congestion occurs _________ a) in case of traffic overloading b) when a system terminates c) when connection between two nodes terminates d) in case of transfer failure => a Network
congestion occurs when traffic in the network is more than the network
could handle. To avoid network congestion, the network management uses
various open-loop and closed-loop congestion control techniques.
Which of the following networks extends a private network across public networks? a) local area network b) virtual private network c) enterprise private network d) storage area network => b A
virtual private network extends a private network across a public
network, and enables users to send and receive data across shared or
public networks as if their computing devices were directly connected to
the private network.VPN provides enhanced security and online anonymity
to users on the internet. It is also used to unblock websites which are
unavailable in certain regions.
DIGITAL TRANSMISSION * Data transmission and data reception is the transfer and reception of data over a point-to-point or point-to-multipoint communication channel. Examples of such channels are copper wires, optical fibers, wireless communication channels, storage media and computer buses. * Digital transmission is employed in order to achieve high reliability and because the cost of digital switching systems is much lower than the cost of analog systems. * For a computer to use the data, it must be in discrete digital form. Similar to data, signals can also be in analog and digital form. To transmit data digitally, it needs to be first converted to digital form. * Digital Transmission is the transmission of signals that vary discretely with time between two values of some physical quantity, one value representing the binary number 0 and the other representing 1. * There are two methods used to transmit data bet
Discussion on: Bit Rate and Baud Rate, DIFFERENCES BETWEEN BIT RATE AND BAUD RATE Both Bit rate and Baud rate are used in data communication. Bit rate and Baud rate are related using this formula. Bit Rate = Baud rate x the number of bit per baud. It is "packing" 8 bits into each baud: 9600 bps = 1200 baud * 8 bits per baud Bit rate is transmission of number of bits per second. It can be defined as per second travel number of bits. Baud rate is number of signal units per second. It can be defined as per second number of changes. Bit rate focusses on computer efficiency. Baud rate focusses on data transmission. Bit Rate = Baud rate x the number of bit per baud Baud Rate = Bit rate / the number of bit per baud The bit rate is expressed in the unit bit per second unit (symbol: bit/s), often in conjunction with an SI prefix such as kilo (1 kbit/s = 1,000 bit/s), mega (1 Mbit/s = 1,000 kbit/s), giga (1 Gbit/s = 1,000 Mbit/s) or tera (1 Tbit/s =
Comments
Post a Comment