1 Modern data interfaces

1.1 Modern data interfaces

1. USB interface is ranked among:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

2. Which interface is now the most serious competitor to USB interface?

a) | |||

b) | |||

c) | |||

d) | |||

e) | |||

f) |

Evaluate your answer

3. Bluetooth interface is ranked among:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

4. What is the maximum cable length between two USB 3.x devices?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

5. What kind of format is used for data transfer on USB interface?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

6. What type of architecture is typical for USB interface in version 3.x?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

7. Data transfers on the USB bus consist of:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

8. Which type of connector is new for the USB version 3.x?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

9. For what purpose is used a process called "bus inventory"?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

10. How the USB terminal equipments notify their properties?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

11. What type of encoding is used on the USB bus in version 3.x?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

12. What is the theoretical transfer rate on a USB 3.0?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

13. Which two interfaces are used by Thunderbolt interface in its architecture?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

14. Which medium is used for the transmission of data and power on Thunderbolt interface?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

15. What kind of frequency band is utilized by Bluetooth technology?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

16. How is called a network in Bluetooth technology?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

17. What type of encryption is used for data protection in Bluetooth technology?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

18. Such term is referred for piconets that overlap each other?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

19. How many active slave devices can be at the most managed by a master device?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

20. The processing of user data bits consists of up to 4 steps. Which one is mandatory?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer