You are on page 1of 15

What is common between X.25 Packet switching and Fast Packet Switching 1.

. In both of them bandwidth is used only when there is something to transmit 2. Both supports high speed data (T1 speed and up) 3. Both supports sharing of the same channel to carry voice , data and video 4. In both of them transmit delays are low enough to handle voice traffic ATM is 1. a frame relay implementation 2. a cell relay implementation 3. a circuit switch implementation 4. a packet switch implementation Which one is true about ATM and Packet Switching 1. Both ATM and Packet Switching have relatively small size cells 2. Packet Switching has no windowing while ATM has 3. Both have fixed length cells 4. ATM has no error detection on data while Packet Switching has The difference between X.25 and frame relay is 1. only frame relay is connection-oriented 2. only frame relay has error control 3. only X.25 is reliable 4. only X.25 is virtual circuit The difference between ATM and frame relay is 1. only ATM is virtual circuit 2. only frame relay has error control 3. only frame relay is connection-oriented 4. only ATM is unreliable The difference between ATM and X.25 is 1. only ATM is connection-oriented 2. only X.25 has error control 3. only X.25 is virtual circuit 4. only ATM is reliable Two networks can 1. have hosts with the same host id 2. have the same net id 3. have the same prefix in their IP address 4. not have the same suffix in their hosts IP addresses In ARP 1. Both request and response are broadcast 2. The response is broadcast 3. The request is point to point 4. The request is broadcast ATM is well suited for 1. voice, interactive data and video transfer 2. interactive data transfer but not for voice transfer 3. voice and video transfer only 4. voice and interactive data transfer only Routing is the responsibility of 1. The data link layer 2. The network layer 3. The physical layer 4. The transport layer

The type of access used in GSM technology is 1. FDMA/TDMA 2. CDMA 3. OFDMA 4. None of the above Which of these is not true for TDD? 1. TDD uses different time slots for transmission and reception paths 2. Single radio frequency can be used 3. Duplexer is required 4. It increases the battery life of mobile phones The connectivity from exchange to customer prermises is termed as 1. Data network 2. Access Network or Local Loop 3. Bridge network 4. None of the above The coverage & capacity of CDMA system is more than that of GSM system 1. True 2. False 3. Equal 4. None of the above The type of Access technology which can enhance the battery life is 1. CDMA 2. TDMA 3. OFDMA 4. None of the above The core concept used in Cellular technology is 1. TDM 2. Frequency Reuse 3. Code reuse 4. None of the above The table used for calculating the no of resources is 1. Erlang B table 2. Erlang C table 3. Queing method 4. None of the above The uplink frequency of P-GSM system is 1. 1850-1910Mhz 2. 1710-1785Mhz 3. 890-915 Mhz 4. None of the above The technique adopted to increase the system capacity and reduce co-chl interference is 1. High power BTS 2. By installing the Omnidirectional antenna 3. Sectorisation 4. None of the above The remote and sparsely populated areas will be covered by 1. Microcell 2. Macro cell 3. Picocell 4. None of the above Which of these cells are used for densely populated areas 1. Macro cells 2. Micro cells 3. Selective cells 4. Umbrella cells

The cell having the same number in the adjacent cluster using the same set of RF channels are termed as 1. adjacent cell 2. Co channel cell 3. Macro cell 4. Selective Cell Higher value of Q is achievable in 1. big cluster size 2. small cluster size 3. medium cluster size 4. None of the above The terminal is under observation from the network for the possible problems. Under which list will this belong in EIR 1. White List 2. Grey List 3. Black List 4. None of the above The process of channel coding, Encryption, Multiplexing and modulation for Trans direction and reverse for reception are to be carried out by 1. BTS 2. BSC 3. MSC 4. MS

Modulation technique used in DECT is 1. GFSK 2. QPSK 3. BPSK 4. None of the above The broad spectrum of the transmitted signal gives rise to 1. Fadiing 2. Noise 3. Spread Spectrum 4. All Of the above This Handles IWF (Interworking Function) for interworking with public data network for data call service 1. BTS 2. BSC 3. MSC 4. GPS AMPS (Advanced Mobile Telephone System) is of 1. Scandinavia 2. UK 3. North America 4. France A-interface is mainly used to transmit the following information 1. BSS management information 2. Call processing 3. Mobility management information 4. All of the above Which of these are Digital Cellular Technologies 1. IS:54 / IS-136 N America 2. GSM Europe and Asia

3. IS-95 N America 4. All of the above Which of these Controls call processing and status management of the BTS, as the highest-level processor within the BTS. BSPA TFPA TFBB GPS-R Which of these block processes CDMA channels, and performs digital and analogue signal processing for IS-95A calls of each channel and interface with the RF block. 1. BHI 2. CCB 3. TCP 4. None of teh above

CCB (CDMA CHANNEL BANK) BLOCK _________ occurs if the cross talk power in the disturbed channel propagates in the direction opposite to the propagation of useful power in the disturbing channel. 1. NEXT 2. FEXT 3. Intelligible cross-talk 4. None of the above ___________ occurs if the cross talk power in the disturbed channel propagates in the direction of the propagation of the useful power in the disturbing channel. 1. NEXT 2. FEXT 3. Intelligible cross-talk 4. None of the above Unintelligible cross talk occurs in 1. Between carrier channels having different frequency allocations. 2. Between carrier channels having virtual carrier frequencies essentially differing from each other 3. In consequence of non-linear distortion 4. All of the above PCM systems use ______ technique to provide a number of circuits on the same transmission medium 1. TDM 2. FDM 3. CDM 4. VDM In a PCM, a frame of _________microseconds duration has 32 time slots. 1. 3.9 2. 25 3. 125 4. None of the above

Which of these is disadvantages of Digital Communication 1. Economies in certain applications 2. Compatibility of different traffic 3.Reliability and power consumption 4. Easy repeatability of design Question was not answered Which of these are methods of demodulation of FSK. - - . 1. Coherent detection 2. Incoherent detection

3. Both 4. None Of the above

Question was not answered Unwanted phase modulation is termed as 1. Jitter 2. Swim 3. BER 4. Distortion Question was not answered The 16 QAM (Quadrature Amplitude Modulation) system carriers . 1. four times as much information as the QPSK system 2. twice as much information as the QPSK system 3. 16 times as much information as the QPSK system 4. thrice as much information as the QPSK system Question was not answered The 16 QAM (Quadrature Amplitude Modulation) system carriers . 1. four times as much information as the QPSK system 2. twice as much information as the QPSK system 3. 16 times as much information as the QPSK system 4. thrice as much information as the QPSK system

In order to send data/message from one point to another, which of the following are required? Source Medium Receiver All of the above Which of the following is a DTE Teleprinter Computer with a key board DTA Both 1&2 In data communication, source and receiver data equipment is called Data Terminal Equipment (DTE), Which of these is characteristics of Simplex Transmission? 1. An O/P Terminal can only transmit and never receive. 2. An input Terminal can only receive and transmit. 3. Message always flows in both direction . 4. None Of the above Baudot Code is 1. 7 bit code 2. 5 bit code 3. 4 bit code 4. 6 bit code Parity checking method 1. can detect single error. 2. can detect multiple errors. 3. Both

4. None Of the above Keyboard of computer is encoded in 1. Baudot code 2. ASCII code 3. BCDIC code 4. EBCDIC Code EBCDIC gives how much no. of combination 1. 128 2. 256 3. 64 4. 32 In telegraph terminology,1 is characterised as 1 1 or 0 None Of the above Information carrying capacity of a transmission channel is determined by the following characteristics Bandwidth (BW). Signal-to-noise (S/N) Ratio. Both None Of the above Nyquist Theorem states that Sample rate > 2 * highest frequency component Sample rate < 2 * highest frequency component Sample rate = 2 * highest frequency component None Of the above Calculate the number of level required for transmission if the B.W. of a channel is 300-3400 Hz and S/N ratio is 20 dB. 8 16 32 64 Which of the following is not RZ CODES? Manchester Coding Biphase-M Coding Biphase-S Coding Baudot Coding

OSI is short for 1. Open Sided Interface 2. Open System Interface 3. Open System Interconnection 4. None Of the above The Network layer converts 1. DATA to SEGMENTS 2. SEGMENTS to PACKETS 3. PACKETS to FRAMES 4. FRAMES to BITS 1.The Application, Presentation and Session layers create DATA from users' input. 2.The Transport layer converts the DATA to SEGMENTS 3.The Network layer converts the SEGMENTS to PACKETS 4.The Data Link layer converts the PACKETS to FRAMES 5.The Physical layer converts the FRAMES to BITS. Which of the following are the examples of Application layer protocols: 1. Telnet 2. SMB 3. NCP

4. All of the above Which of the following is not example of Presentation Layer 1. SMTP 2. MPEG 3. ASCII 4. GIF The layer which establishes, manages, maintains and terminates communication channels between software programs on network nodes is 1. Presentation Layer 2. Session Layer 3. Transport Layer 4. Network layer Examples of Transport layer protocols are: 1. TCP 2. SMTP 3. FTP 4. NCP Star , Bus and Ring are examples of 1. Transport Layer 2. Data Link Layer 3. Application Layer 4. Network layer This is the layer that actually interacts with the operating system or application whenever the user chooses to transfer files, read messages or perform other network-related activities. 1. Application layer 2. Presentation layer 3. Session layer 4. Network layer In which layer, the appropriate physical protocol is assigned to the data 1. Data Layer 2. Session Layer 3. Transport Layer 4. Physical Layer Which of these are characteristics of LAN? 1. Speed 4, 10, 16 up to 100MBPS 2. Distance Few KMs 3. Shared access to medium 4. All of the above Which of these are advantages of bus topology: 1. Fault diagnostics 2. Least amount of media is used 3. Fault isolation 4. None Of the above Advantages of star topology are 1. Control/fault diagnostics is centralized. 2. Ease of service 3. One device per connection 4. All of the above Data Rate of Twisted Pair (Shielded) for Bus Topology is 1. 10 mbps 2. 2mbps 3. 1 mbps 4. None Of the above

What is the full form of ARP? 1. Address Resolution Part 2. Address Resolution Protocol

3. Administartive Resolution Protocol 4. None of the above _________resolves the IP address to the physical address (which is often referred to as the data link layer address or MAC address 1. ARP 2. BGP 3. OSPF 4. RIP What is the full form of BGP? 1. Border gateway Protocol 2. Broadband gateway Protocol 3. Broadband gateway Part 4. None of the above An IP address is a _________ layer protocol address for a host in a TCP/IP network. 1. network 2. session 3. transport 4. physical The size of an IP address is __ bits 1. 12 2. 16 3. 32 4. 64 What is the full form of DHCP? 1. Dynamic Host Configuration Part 2. Dynamic Host Configuration Protocol 3. Dynamic Handshake Configuration Protocol 4. Dynamic Handshake Control Protocol The size of each byte of ip address is 8 bits and the value of each byte can be from __________. 1. 1 to 255 2. 0 to 255 3. 0 to 256 4. 1 to 256 A router analyses __________ part of an IP address for datagram forwarding. 1. whole 2. last byte 3. only the network ID 4. None of the above DHCP supports which of these mechanisms for IP address allocation? 1. Automatic allocation 2. Dynamic allocation 3. Manual allocation 4. All of the above Two hosts in two different networks _____ have the same host ID, and 2 hosts in the same network ______ have the same host ID at the same time. 1. can, cannot 2. cannot, can 3. can, can 4. cannot, cannot, In the IP address 192.9.205.21, the host ID is ______ 1. 205 2. 21 3. 2^21 4. 192.9 ________ is an exterior routing protocol related to EGP, but it operates with more capability and greater flexibility. 1. ARP 2. DHCP 3. BGP

4. RIP A _________ IP address is an IP address uniquely identifying a single host in a network. 1. unicast 2. multicast 3. unilateral 4. None of the above A __________address is an IP address identifying a particular group of hosts in network. 1. unicast 2. multicast 3. unilateral 4. None of the above A _________address is an IP address denoting the entire network. 1. unicast 2. multicast 3. broadcast 4. unilateral

ADSL provides 1. higher data rates in the downstream direction 2. lower data rates in the downstream direction 3. equal data rates in both direction 4. None of the above The maximum theoretical downstream data rate of an ADSL system is 1. 2Mbps 2. 10Mbps 3. 15.24Mbps 4. 100Mbps What is full form of ADSL? 1. Asymmetric Digital Subscriber Line 2. Asynchronous Digital Subscriber Line 3. Asynchronous Data Service Line 4. Asymmetrical Dynamic Subscriber Link Currently, most ADSL communication is 1. simplex 2. half duplex 3. full duplex 4. None of the above If the distance between the DSLAM and the Tier2 switch is less than 10 Kms, 1. then STM medium can be used for connectivity 2. then SDH equipment could be used for connectivity 3. then Dark Fibre could be used for connectivity 4. None of the above If the distance exceeds 10 kms, then we can use the STM medium with electrical to optical converters at both the ends, as both DSLAM as well as Tier2 switch has optical interface whereas the output from STM is electrical. Which of these is not a characterisic of ADSL 1. symmetric 2. Digital 3. twisted pair copper loop to the subscriber premises 4. faster downstream & slower upstream The ADSL modem at the customer premises, that is called 1. ATU-R 2. ATU-C 3. ATU-T 4. None of the above

ADSL transceiver unit-remote (ATU-R) The modem of the central office that is called an 1. ATU-R 2. ATU-C 3. ATU-T 4. None of the above ADSL Transmission Unit- central office (ATU-C) DSLAM unit can connect through 1. ATM 2. Ethernet 3. Both 1 & 2 4. None of the above What is the modulation technique(s) that can be used for ADSL? 1. CAP/QAM 2. DMT 3. Both 1 & 2 4. None of the above In ADSL modems, creating multiple channels is done by dividing the available bandwidth of a telephone line by 1. FDM 2. TDM 3. FDD 4. None of the above The data of the ADSL transport is organized into frames and superframes. One superframe is built of 1. 32 ADSL frames and one sync frame 2. 64 ADSL frames and one sync frame 3. 68 ADSL frames and one sync frame 4. None of the above Specific ADSL Reference Model for ATM Mode consists of 1. Access Node (AN) 2. Broadband Network Termination (B-NT) 3. Both 1 & 2 4. None of the above What is the ATU-C? 1. Low pass filter 2. DSL access multiplexer 3. The transceiver at the central office 4. The transceiver at the costumer premises How many splitters do we use in the ADSL architecture and where? 1. Two. Both in the central office. 2. One. In the central office 3. One. In the subscriber premises. 4. Two. One in the central office and the other in the subscriber premises.

If a router with IP addresses 203.168.27.14 and 198.20.30.15 (and default masks) and physical addresses xxxxx and yyyyy receives the message with IP destination address 128.20.30.15 and physical address xxxxx, what should the router do? 1. Discard the message 2. Pass the message to its next higher layer 3. Pass the message to another router 4. Pass the message to the ultimate destination When a station receives a message, it checks the destination physical address. If the physical destination address is different from the station's physical address, then the message is discarded. If

addresses are the same, the station checks the destination IP address. If it is the station's address, then the message is passed to the next higher layer; otherwise the message is not for the station. If the station is a router, it passes the message to another router or to the ultimate destination (if the destination is its neighbor). If the station is a host, the message is discarded (since a host does not route messages). In this case, the destination is not a neighbor (because the IP address is not on one of the router's networks). If a router with IP addresses 203.168.27.14 and 198.168.27.15 (and default masks) and physical addresses xxxxx and yyyyy receives a message with IP destination address 203.168.27.15 and physical address xxxxx, what should the router do? 1. Discard the message 2. Pass the message to its next higher layer 3. Pass the message to another router 4. Pass the message to the ultimate destination Explanation: When a station receives a message, it checks the destination physical address. If the physical destination address is different from the station's physical address, then the message is discarded. If addresses are the same, the station checks the destination IP address. If it is the station's address, then the message is passed to the next higher layer; otherwise the message is not for the station. If the station is a router, it passes the message to another router or to the ultimate destination (if the destination is its neighbor). If the station is a host the message is discarded ( since a host does not route messages). In this case, the destination is a neighbor (because the IP address is on one of the router's networks). If a router with IP addresses 203.168.27.14 and 198.20.30.15 (and default masks) and physical addresses xxxxx and yyyyy receives a message with IP destination address 198.20.30.15 and physical address zzzzz, what should the router do? 1. Discard the message 2. Pass the message to its next higher layer 3. Pass the message to another router 4. Pass the message to the ultimate destination When a station receives a message, it checks the destination physical address. If the physical destination address is different from the station's physical address, then the message is discarded. If a host with IP address 203.168.27.14 and physical address xxxxx receives a message with IP destination address 203.168.27.15 and physical address xxxxx, what should the host do? 1. Discard the message 2. Pass the message to its next higher layer 3. Pass the message to its default router 4. Pass the message to the ultimate When a station receives a message, it checks the destination physical address. If the physical destination address is different from the station's physical address then the message is discarded. A host with IP address 128.127.13.14 wants to send a message to a station with IP address 203.13.14.127. What should the host do? 1. Send the message to a default router 2. Send the message directly to the station 3. The host can send message to the station only if the station is a router 4. Send the message to a router according to the routing table The host can not directly reach the station (they are not IP neighbors). Therefore it should consult its routing table. The router that it chooses might be the host's default router, but the host must consult its routing table to determine which router to use.

A router with IP addresses 203.168.27.14 and 198.20.30.15 and physical addresses xxxxx and yyyyy receives a message with IP destination address: 198.20.30.15 and physical address: yyyyy. What should the router do? 1. Discard the message 2. Pass the message to its next higher layer 3. Pass the message to another router 4. Pass the message to the ultimate destination Explanation: When a station receives a message, it checks the destination physical address. If the physical destination address is different from the station's physical address then the message is discarded. If addresses are the same, the station checks the destination IP address. If it is the station's address, then the message is passed to the next higher layer. In this case, the destination IP address is the router itself. Which address is different? 1. 198.168.27.11 2. 192.186.11.27 3. 172.16.27.11 4. 172.14.72.11 Explanation: 172.16.27.11 is the only address in the list that is from the private address space. What is the default subnet mask of IP address 223.14.68.7? 1. 255.0.0.0 2. 255.255.0.0 3. 255.255.255.0 4. It is not a legal unicast address 223 in binary presentation: 11011111. The prefix 110 indicates a class C address, which has default mask 255.255.255.0. What is the default subnet mask of IP address 224.41.68.7 1. 255.0.0.0 2. 255.255.0.0 3. 255.255.255.0 4. It is not a legal unicast address 224 in binary presentation: 11100000 The prefix 111 indicates a multicast address, which is not a legal unicast address. Given the IP network address 112.172.13.15. Assuming the default mask, what is its network-id and host-id? 1. Network-id 112 and host-id 172.13.15 2. Network-id 112.172 and host-id 13.15 3. Network-id 112.172.13 and host-id 15 4. It is not a legal unicast address The given address is a class A address, and thus the first octet is the network-id. Given a host with IP address 192.14.64.93 and the mask 255.255.255.224. To which subnet does it belong? 1. 192.14.64.0 2. 192.14.64.64 3. 192.14.64.96 4. 192.14.64.224

224 in binary presentation is 11100000. Therefore, 3 bits represent the subnet and 5 bits represent the host. A bitwise "and" of the host address and the mask will result in the subnet address. Given the IP network address 203.14.68.0 and the mask 255.255.255.224. Which subnet can you have with the given address and mask? 1. 203.14.68.0 2. 203.14.68.48 3. 203.14.68.128 4. 203.14.68.16 224 in binary presentation is 11100000. Therefore, 3 bits represent the subnet and 5 bits represent the host. The possible subnets (last octet) are: 000 00000 - that is the network itself, 001 00000 203.14.68.32, 010 00000 - 203.14.68.64, 011 00000 - 203.14.68.96, 100 00000 - 203.14.68.128, 101 00000 - 203.14.68.160, 110 00000 - 203.14.68.192, 111 00000 - 203.14.68.224 Given the IP network address 192.48.5.0/24. What CIDR prefix should you use if you want to divide it into at least 3 subnets and the maximum number of hosts per network? 1. /17 2. /18 3. /26 4. /27 If we add two bits to the given prefix, we can define the subnets 192.48.5.128/26, 192.48.5.64/26, and 192.48.5.192/26. /27 would certainly work, but you would have fewer hosts per subnet. /17 and /18 are not possible given a /24 allocation. You are given the IP network address 196.58.27.0/24. If you use prefix /28, how many subnets and hosts can you have? 1. 16 subnets and 14 hosts on each subnet 2. 14 subnets and 14 hosts on each subnet 3. 30 subnets and 30 hosts on each subnet 4. 16 subnets and 16 hosts on each subnet The /28 prefix indicates that you will use 4 bits to define the subnets and 4 bits to define the hosts on each subnet. Number of subnets: 2^4 = 16. Number of hosts: 2^4-2 = 14 (the all zeros host defines the subnet; the all ones host is for directed broadcast.) You are given the IP network address 203.127.14.0/24. If you use the prefix /26, how much of the address space (expressed in number of hosts) is wasted due to the subnetting? 1. 0 2. 74 3. 130 4. 6 With two bits defining the subnets, you will have 4 subnets. Each one will be able to use 2^6-2=62 hosts, for a total of 4x62=248 hosts. Without subnetting, we have 2^8-2=254 hosts. How is the finite-state automata defined ? 1. by events, actions and state transitions 2. by actions and state transitions only 3. by events and state transitions only 4. None of the above What attempt is made in the Request-Sent state ? 1. to close a connection 2. to configure a connection 3. to open a connection 4. None of the above

When does an event occur ? 1. when a lower layer indicates that it's ready to carry packets 2. when a link layer indicates that it's ready to carry packets 3. when a lower layer indicates that it's busy 4. All of the above Actions typically indicate __________ and/or the starting or stopping of the Restart Timer. 1. the transmission 2. the connection 3. the configuration 4. None of the above For what is the Restart Timer used ? 1. to time transmissions of Configure-Request and Configure-Ack 2. to time transmissions of Configure-Request and Terminate-Request 3. both 1 & 2 4. None of the above How many classes of LCP packets exist ? 1. 2 2. 3 3. 4 4. 5 At this phase protocols such as IP,AppleTalk must be separately configured by the appropriate Network Control Protocol (NCP) 1. link termination phase 2. authentication phase 3. network-layer protocol phase 4. None of the above What does the Close event indicate ? 1. the link is not available 2. the network administrator (human or program) has indicated that the link 3. both 1 & 2 4. None of the above What are the fields of LCP packet ? 1. Code, Identifier, Data 2. Type, Identifier, Length, Options 3. Type, Length, Data 4. Code, Identifier, Length, Data What happens if a packet is received with an unknown Code field ? 1. the connection is immediatly closed 2. a Code-Reject packet is transmitted 3. a Terminate-Request packet is transmitted 4. None of the above

Say the customer from the previous question got older, and decided to move to the country side 18,000ft from the CO. He doesn't need HDTV anymore, he has already seen it all, but he just can't do without his daily websites. What would be the best line configuration for him? 1. ADSL 2. VDSL 3. ADSL2/2+ 4. RE-ADSL2 What is SRA? 1. Sound Rack Audio 2. Seamless Rate Adaptation 3. Seek And Rescue 4. Its an organization who standardize ADSL "Seamless Rate Adaptation" - an ADSL2 mechanism to adapt a new rate in an existing connection without restarting and invisibly from the end systems.

How can ADSL2+ reduce crosstalk? 1. By masking downstream frequencies below 1.1Mhz to 1.1-2.2Mhz 2. By using rate adaptation 3. By using special binders 4. It can't reduce crosstalk, only AM radio band interferences The difference(s) between VDSL and ADSL are 1. VDSL can be both symmetric and asymmetric 2. ADSL operates over regular POTS, while VDSL can't 3. VDSL provide faster data transmission over shorter distances then ADSL 4. 1 and 3 are correct What makes the ADSL asymmetric? 1. Different data rates - Downstream is bigger than Upstream 2. Different data rates - Upstream is bigger than Downstream 3. Download and Upload can't occur simultaneously 4. None of the above A version of multicarrier modulation in which incoming data is collected and then distributed over a large number of small individual carriers is 1. DMT 2. CAP 3. Both 1 & 2 4. None of the above QAM ( Quadrature Amplitude M odulation) also known as I&Q modulation, is a combination of ___________ 1. AM & Phase shift keying 2. FM & Phase shift keying 3. AM & Binary shift keying 4. FM & Binary shift keying __________ is a version of multicarrier modulation in which the data is distributed over a large number of subcarriers, or channels, each of which uses a form of QAM modulation. 1. DMT 2. QAM 3. PDSN 4. FMT FMT ( Filtered MultiTone) is a multicarrier modulation scheme which can be viewed as a combination __________ 1. AM & Phase shift keying 2. FM & Phase shift keying 3. QAM & DMT 4. FM & Binary shift keying DSL Lite (or G.Lite) can go upto ___________ feet on 24 gauge wire 1. 5,000 2. 9,000 3. 18,000 4. 36,000

You might also like