Define Error Detection and Correction. Mention the types of errors.

1 Answer

Answer :

Data can be corrupted during transmission. For reliable communication, errors must be detected and  corrected.  
Single bit error: The only one bit of a given data unit (such as byte character/data unit or packet) is changed  from 1 to 0 or from 0 to 1.  
Burst error: 2 or more bits in the data unit have changed from 1 to 0 from 0 to 1.

Related questions

Description : . The _____of errors is more difficult than the ______. A) correction; detection B) detection; correction C) creation; correction D) creation;detection

Last Answer : correction; detection

Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction

Last Answer : d. Error detection and correction

Description : Which of the following refers to theterms "residual error rate"? A. the number of biterrors per twenty four hours of continuous operation onanasynchronous line B. The probability that one or moreerrors ... tonoise ratio dividedby the ratio of energy perbit to noise per hertz E. None of the above

Last Answer : The probability that one or moreerrors will be undetected whenan error detection scheme is used

Description : The start and stop bits are used in serial communication for (A) error detection (B) error correction (C) synchronization (D) slowing down the communication

Last Answer : (C) synchronization 

Description : Which of the following function is useful in system requiring error detection and correction codes ? (A) AND-OR (B) OR (C) AND (D) Exclusive -OR

Last Answer : Which of the following function is useful in system requiring error detection and correction codes ? (A) AND-OR (B) OR (C) AND (D) Exclusive -OR

Description : To guarantee correction ofup to 5 errors in all cases, the minimum Hamming distance in a block code must be________. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 11

Description : To guarantee correction of upto t errors, the minimum Hamming distance d min in a block code must be ________. a. t+1 b. t−2 c. 2t−1 d. 2t+1

Last Answer : d. 2t+1

Description : To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block code must be _______ A. 5 B. 6 C. 11 D. none of the above

Last Answer : B. 6

Description : Which of the following statements reflects an auditor's responsibility for detecting fraud and error? a. An auditor is responsible for detecting employee errors and simple fraud, but not for ... detecting errors and fraud unless the application of PSAs and PAPs would result in such detection

Last Answer : An auditor should design the audit to provide reasonable assurance of detecting errors and fraud that are material to the financial statements.

Description : This modem standard has a speed of 28.8k and has error-correction features. A. V.42 B. V.32bis C. V.90 D. V.34

Last Answer : V.42

Description : In ________ error correction, the receiver asks thesender tosend thedata again. A) backward B) retransmission C) forward D) none of the above

Last Answer : retransmission

Description : In ________ error correction, the receiver correctserrors without requestingretransmission. A) backward B) onward C) forward D) none of the above

Last Answer : forward

Description : A best-effort delivery service suchas IPv4 includes _______. A) error checking B) error correction C) datagram acknowledgment D) noneof the above

Last Answer : noneof the above

Description : Write short notes on error correction.

Last Answer : It is the mechanism to correct the errors and it can be handled in 2 ways. ∙ When an error is discovered, receiver can have the sender retransmit the entire data unit. ∙ A receiver can use an error correcting coder, which automatically corrects certain errors.

Description : In the Ethernet frame, the_______field contains error detection information. A) CRC B) preamble C) address D) none of the above

Last Answer : CRC

Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Simple parity check

Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Checksum

Description : Block coding can help in _______at the receiver. A) Synchronization B) Error detection C) Attenuation D) (a) and (b)

Last Answer : (a) and (b)

Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization

Last Answer : cyclic redundancy codes

Description : The probability thata singlebit will be inerror on a typical public telephone lineusing 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error ratefor a communicationline using 9-bit frames is ... to A. 0.003 B. 0.009 C. 0.991 D. 0.999 E. None of the above

Last Answer : 0.009

Description : The layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation

Last Answer : A) Physical

Description : Which error detection method uses one's complement arithmetic? A. Simple parity check B. Two-dimensional parity check C. CRC D. Checksum

Last Answer : D. Checksum

Description : Error rate is A. an error-detectingcode based ona summation operation performed onthebits to be checked. B. a checkbit appended to anarrayof binary digits to make thesum of all thebinary digits. C. a ... ratioof the number ofdata units in error to the total number of dataunits E. None of the above

Last Answer : the ratioof the number ofdata units in error to the total number of dataunits

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. a. Hamming Code b. CRC c. VRC d. None of the above

Last Answer : b. CRC

Description : When does the station B send a positive acknowledgement (ACK) to station A in Stop and Wait protocol? a. only when no error occurs at the transmission level b. when retransmission of old packet in a novel frame is necessary c. only when station B receives frame with errors d. all of the above

Last Answer : only when no error occurs at the transmission level

Description : Identify the errors in the following HTML code and write the correct code with each correction underlined. -Technology

Last Answer : Error 1 The tag must be within element.Error 2 bgcolor attribute of body element supports a color like red, green or its color value.Error 3 tag needs a source attribute src to place an ... element must be closed not bgcolor attribute.The correct code is as follows:IMAGESHERE IS MY IMAGE FILE

Description : Which of the following statements describe refractive surgery? a) Refractive surgery is an elective, cosmetic surgery performed to reshape the cornea. Refractive surgery is an elective procedure and is ... a stable refractive error. The corneal structure must be normal and refractive error stable.

Last Answer : a) Refractive surgery is an elective, cosmetic surgery performed to reshape the cornea. Refractive surgery is an elective procedure and is considered a cosmetic procedure (to achieve clear vision without ... is performed to reshape the cornea for the purpose of correction of all refractive errors.

Description : Define topology and mention the types of topologies

Last Answer : Topology defines the physical or logical arrangement of links in a network. Types of topology : - Mesh - Star - Tree - Bus - Ring

Description : After studying and evaluating a client's existing internal control, an auditor has concluded that the policies and procedures are well-designed and functioning as intended. Under these circumstances, the ... risk at a lower level than would be set under conditions of weak internal control.

Last Answer : Set detection risk at a higher level than would be set under conditions of weak internal control.

Description : The responsibility for the detection and prevention of errors, fraud and noncompliance with laws and regulations rests with: a. Auditor b. Client's legal counsel c. Internal auditor d. Client management

Last Answer : Client management

Description : In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it reaches a threshold A. slow-start B. congestion avoidance C. congestion detection D. none of the above

Last Answer : A. slow-start

Description : The mammalian DNA polymerase involved in error correction is (A) DNA polymerase α (B) DNA polymerase β (C) DNA polymerase γ (D) DNA polymerase δ

Last Answer : Answer : B

Description : ECE Board Exam March 1996 Passive crossover components cause some frequencies to be delayed with respect to the other frequencies at the crossover point. A. Phase shift B. Phase correction C. Phase-error correction D. Time alignment

Last Answer : A. Phase shift

Description : The instances in which the MO receipt is treated as spoiled are when a) There is an error in any of the entries requiring correction b) When the receipt is disfigured due to spilling of ink etc c) A receipt is inadvertently passed over and left blank and noticed at close of the day d) All the above

Last Answer : d) All the above

Description : Pick up the correct statement from the following: (A) The apparent error on reversal is twice the actual error (B) The correction may be made equal to half the observed discrepancy (C) The ... a defective instrument by reversing and taking the mean of two erroneous results (D) All the above

Last Answer : (D) All the above

Description : If is the perimete D is the closing error in departure, the correction for the departure of a traverse side of length , according to Bowditch rule, is (A) D × L/l (B) D × l²/L (C) L × l D (D) D × l/L

Last Answer : (D) D × l/L

Description : Network Layer is used for (A) Breaking up the data in frames for transmission (B) Deal with Error correction (C) Automatic Recovery of Procedure (D) Physical Architecture

Last Answer : (D) Physical Architecture

Description : The term “CORRECTION” is used when: a. The readback of a message is incorrect b. The readback of a message is correct c. The message has to be deleted d. An error has been made in the transmission and the correct version isH..

Last Answer : d. An error has been made in the transmission and the correct version isH..

Description : The term “CORRECTION” is used when: a. The readback of a message is incorrect b. The readback of a message is correct c. The message has to be deleted d. An error has been made in the transmission and the correct version isH..

Last Answer : d. An error has been made in the transmission and the correct version isH..

Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes

Last Answer : A. Checksum 

Description : Perceptron learning, Delta learning and LMS learning are learning methods which falls under the category of (A) Error correction learning – learning with a teacher (B) Reinforcement learning – learning with a critic (C) Hebbian learning (D) Competitive learning – learning without a teacher

Last Answer : (A) Error correction learning – learning with a teacher

Description : Which of the following services is not provided by wireless access point in 802.11 WLAN? (A) Association (B) Disassociation (C) Error Correction (D) Integration

Last Answer : Answer: C Explanation: IEEE 802.11 Services

Description : Write the name of layers that perform the following functions in OSI : I. Data Encryption II. Error Correction III. File Transfer IV. Data Encoding

Last Answer : 1. Data Encryption-Presentation Layer 2. Error Correction-Data link layer and Transport layer 3. File Transfer-Application layer 4. Data Encoding-Presentation layer

Description : An induction type energy meter is found to run fast. Correction for this error can be made by  (A) Over-load compensation. (B) Voltage compensation. (C) Moving the brake magnet away from the centre of the disc. (D) Moving the brake magnet towards the centre of the disc.

Last Answer : An induction type energy meter is found to run fast. Correction for this error can be made by Moving the brake magnet away from the centre of the disc.

Description : Define flowcontrol. Mention the categories of it.

Last Answer : Flowcontrol refers to a set of procedures usedtorestrict the amount ofdata.Thesender cansenddata before waiting for acknowledgment.

Description : The probability that an auditor's procedures leading to the conclusion that a material error does not exist in an account balance when, in fact, such error does exist is referred to as a. Prevention risk. b. Detection risk. c. Inherent risk. d. Control risk

Last Answer : Detection risk.