Description : To guarantee correction ofup to 5 errors in all cases, the minimum Hamming distance in a block code must be________. A) 5 B) 6 C) 11 D) none of the above
Last Answer : 11
Description : To guarantee the detectionof up to 5errors in all cases, the minimum Hamming distance in a block code mustbe _______. A) 5 B) 6 C) 11 D) none of the above
Last Answer : 6
Description : To guarantee correction of upto t errors, the minimum Hamming distance d min in a block code must be ________. a. t+1 b. t−2 c. 2t−1 d. 2t+1
Last Answer : d. 2t+1
Description : _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. a. Hamming Code b. CRC c. VRC d. None of the above
Last Answer : b. CRC
Description : In block coding, ifn = 5, the maximum Hamming distance between two codewords is ________. A) 2 B) 3 C) 5 D) none of the above
Last Answer : 5
Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization
Last Answer : cyclic redundancy codes
Description : The ________ between two words is the number ofdifferences between corresponding bits. A) Hamming code B) Hamming distance C) Hamming rule D) none of the above
Last Answer : Hamming distance
Description : The ________ between two words is the number of differences between corresponding bits A. Hamming code B. Hamming distance C. Hamming rule D. none of the above
Last Answer : B. Hamming distance
Description : Coding schemes can be divided into two broad categories…………, …… A. character coding, integer coding B. hamming coding and block coding C. Hamming coding and convolution coding D. Block Coding and Convolution Coding.
Last Answer : D. Block Coding and Convolution Coding.
Description : The Hamming distance between 100 and 001 is ________. A) 2 B) 0 C) 1 D) none of the above
Last Answer : 2
Description : The Hamming distance between equal codewords is _________. A) 1 B) n C) 0 D) none of the above
Last Answer : 0
Description : Thus hamming code for the ASCII character “a” is given as ……………… A. 10111001111 B. 10111001000 C. 10111001001 D. 10111001
Last Answer : C. 10111001001
Description : . The _____of errors is more difficult than the ______. A) correction; detection B) detection; correction C) creation; correction D) creation;detection
Last Answer : correction; detection
Description : Which of the following refers to theterms "residual error rate"? A. the number of biterrors per twenty four hours of continuous operation onanasynchronous line B. The probability that one or moreerrors ... tonoise ratio dividedby the ratio of energy perbit to noise per hertz E. None of the above
Last Answer : The probability that one or moreerrors will be undetected whenan error detection scheme is used
Description : Define Error Detection and Correction. Mention the types of errors.
Last Answer : Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. Single bit error: The only one bit of a given data unit (such as byte character/data unit or packet) is ... error: 2 or more bits in the data unit have changed from 1 to 0 from 0 to 1.
Description : Consider a code with five valid code words of length ten : 0000000000, 0000011111, 1111100000, 1110000011, 1111111111 Hamming distance of the code is (A) 5 (B) 10 (C) 8 (D) 9
Last Answer : Answer: Marks to all
Description : Block coding can help in _______at the receiver. A) Synchronization B) Error detection C) Attenuation D) (a) and (b)
Last Answer : (a) and (b)
Description : The bit positionina can be numbered from 1 through 2h, a. Hamming code word b. Hamming distance word c. Both d. None of these
Last Answer : a. Hamming code word
Description : The Hamming distance between two code-words is (A) the number of places the code-words are same (B) same as the Euclidean distance between their decimal representation (C) is maximum of the either code-words (B) the number of places the code-words differ
Last Answer : The Hamming distance between two code-words is the number of places the code-words differ
Description : . In _______ routing, the least cost routebetween any two nodes is theroute with the minimum distance. A) path vector B) distancevector C) link state D) none of the above
Last Answer : distancevector
Description : Hamming distance between 100101000110 and 110111101101 is (A) 3 (B) 4 (C) 5 (D) 6
Last Answer : (D) 6
Description : Let C be a binary linear code with minimum distance 2t + 1 then it can correct upto _____ bits of error. a. t + 1 b. t c. t - 2 d. t / 2
Last Answer : b. t
Description : A simpleparity-check code can detect__________ errors. A) an even-number of B) two C) no errors D) an odd-number of
Last Answer : an odd-number of
Description : Error rate is A. an error-detectingcode based ona summation operation performed onthebits to be checked. B. a checkbit appended to anarrayof binary digits to make thesum of all thebinary digits. C. a ... ratioof the number ofdata units in error to the total number of dataunits E. None of the above
Last Answer : the ratioof the number ofdata units in error to the total number of dataunits
Description : A simple parity-check code can detect __________ errors A. an even-number of B. two C. no errors D. an odd-number of
Last Answer : D. an odd-number of
Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above
Last Answer : All of theabove
Description : MICR stands for a. Magnetic Ink Character Reader b. Magnetic Ink Code Reader c. Magnetic Ink Cases Reader d. None
Last Answer : Magnetic Ink Character Reader
Description : State weather the following statement is true or false for Multipurpose Internet Mail Extensions 1).The general syntax for MIME header fields is not the same as that for RFC 2822. 2).MIME header field names are never ... false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true
Last Answer : A. 1. True, 2. true, 3. true
Description : Is the cyclic redundancy check better than hamming code?
Last Answer : It depends on what you are doing.The cyclic redundancy check will only detect an error, while thehamming code can also correct many types of errors. However toperform this correction the extra ... channels, disk sectors).Normally hamming code is done on individual bytes or words ofcomputer memory.
Description : In a binary Hamming code the number of check digits is r then number of message digits is equal to: (A) 2r-1 (B) 2r-r-1 (C) 2r-r+1 (D) 2r+r-1
Last Answer : (B) 2r-r-1
Description : In block coding, if k =2 and n =3, we have _______ invalid codewords. A) 8 B) 4 C) 2 D) none of the above
Description : _______ isnormally referred toas mB/nB coding; it replaceseach m-bit group with an n-bit group. A) Block coding B) Line coding C) Scrambling
Last Answer : Block coding
Description : Unipolar, bipolar, and polar encoding are typesof _______ encoding. A) line B) block C) NRZ D) Manchester
Last Answer : line
Description : The number of addresses in a class A block is _______. A) 65,534 B) 16,777,216 C) 256 D) none of the above
Last Answer : 16,777,216
Description : The number of addresses in a class B block is _______. A) 65,536 B) 16,777,216 C) 256 D) none of the above
Last Answer : 65,536
Description : The number of addresses in a class C block is _______. A) 65,534 B) 16,777,216 C) 256 D) none of the above
Last Answer : 256
Description : Which of the following statements best describes the auditor's responsibility regarding the detection of material errors and frauds? a. The auditor is responsible for the failure to detect material ... unrecorded transactions even if there is no evidence that material errors and frauds may exist
Last Answer : The audit should be designed to provide reasonable assurance that material errors and frauds are detected
Description : After studying and evaluating a client's existing internal control, an auditor has concluded that the policies and procedures are well-designed and functioning as intended. Under these circumstances, the ... risk at a lower level than would be set under conditions of weak internal control.
Last Answer : Set detection risk at a higher level than would be set under conditions of weak internal control.
Description : Which of the following statements reflects an auditor's responsibility for detecting misstatements due to errors and fraud? a. An auditor is responsible for detecting employee errors and simple fraud, ... due to errors and fraud unless the application of GAAS would result in such detection.
Last Answer : An auditor should design the audit to provide reasonable assurance of detecting misstatements due to errors and fraud that are material to the financial statements.
Description : The following statements relate to the auditor's responsibility for the detection of errors and fraud. Which of the statement is correct? I. Due to the inherent limitations of the audit, there is a possibility that ... . a. I only b. II only c. Both statements are true d. Both statements are false
Last Answer : Both statements are true
Description : The responsibility for the detection and prevention of errors, fraud and noncompliance with laws and regulations rests with: a. Auditor b. Client's legal counsel c. Internal auditor d. Client management
Last Answer : Client management
Description : Which of the following statements reflects an auditor's responsibility for detecting fraud and error? a. An auditor is responsible for detecting employee errors and simple fraud, but not for ... detecting errors and fraud unless the application of PSAs and PAPs would result in such detection
Last Answer : An auditor should design the audit to provide reasonable assurance of detecting errors and fraud that are material to the financial statements.
Description : IEEE hasdefined the specifications fora wireless LAN, called _______, whichcovers the physical and data link layers. A) IEEE 802.3 B) IEEE 802.5 C) IEEE 802.11 D) IEEE 802.2
Last Answer : IEEE 802.11
Description : In a linear block code, the_______ ofany two valid codewords creates another valid codeword. A) XORing B) ORing C) ANDing D) none of the above
Last Answer : XORing
Description : In IEEE 802.11, when a frame is coming from an AP and going to astation, the address flag is _______. A) 00 B) 01 C) 10 D) 11
Last Answer : 01
Description : In IEEE 802.11, _______ isan optionalaccess method that can be implemented inan infrastructure network (not in an ad hocnetwork). A) DCF B) PCF C) either (a) or (b) D) neither (a) nor (b)
Last Answer : PCF
Description : In the Ethernet frame, the_______field contains error detection information. A) CRC B) preamble C) address D) none of the above
Last Answer : CRC
Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum
Last Answer : Simple parity check
Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum
Last Answer : Checksum
Description : The probability thata singlebit will be inerror on a typical public telephone lineusing 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error ratefor a communicationline using 9-bit frames is ... to A. 0.003 B. 0.009 C. 0.991 D. 0.999 E. None of the above
Last Answer : 0.009