_______ isnormally referred toas mB/nB coding; it replaceseach m-bit group with an n-bit group.
A)
Block coding
B)
Line coding
C)
Scrambling

1 Answer

Answer :

Block coding

Related questions

Description : ______ provides synchronization without increasingthe number of bits. A) Scrambling B) Line coding C) Block coding D) None of the above

Last Answer : Scrambling

Description : _____ provides redundancy toensure synchronization and inherent errordetection. A) Block coding B) Line coding C) Scrambling D) None of the above

Last Answer : Block coding

Description : ________ is the process of converting digitaldata to adigital signal. A) Block coding B) Line coding C) Scrambling D) None of the above

Last Answer : Line coding

Description : __________ conversion involves three techniques: line coding,block coding, and scrambling. A) Analog-to-digital B) Digital-to-analog C) Analog-to-analog D) Digital-to-digital

Last Answer : Digital-to-digital

Description : In IEEE 802.11, a BSS with an AP is sometimes referred toas ____________. A) an ad hocarchitecture B) an infrastructurenetwork C) either (a) or (b) D) neither (a) nor (b)

Last Answer : an infrastructurenetwork

Description : In block coding, if k =2 and n =3, we have _______ invalid codewords. A) 8 B) 4 C) 2 D) none of the above

Last Answer : 2

Description : 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 8B/10B; NRZ

Description : In ________, we combine signals from different sources to fit into a larger bandwidth. A) spread spectrum B) line coding C) block coding D) none of the above

Last Answer : spread spectrum

Description : We addr redundant bits toeach block to make thelength n = k + r. The resultingn-bit blocksare called _________. A) datawords B) blockwords C) codewords D) none of the above

Last Answer : codewords

Description : We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called _________ A. datawords B. blockwords C. codewords D. none of the above

Last Answer : C. codewords

Description : 100Base-FX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ-I B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 4B/5B; NRZ-I

Description : 100Base-TX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 4B/5B; MLT-3

Description : In block coding, ifn = 5, the maximum Hamming distance between two codewords is ________. A) 2 B) 3 C) 5 D) none of the above

Last Answer : 5

Description : We can divide coding schemes intotwobroad categories: ________ and______coding. A) block; linear B) linear; nonlinear C) block; convolution D) none of the above

Last Answer : block; convolution

Description : Block coding can help in _______at the receiver. A) Synchronization B) Error detection C) Attenuation D) (a) and (b)

Last Answer : (a) and (b)

Description : Coding schemes can be divided into two broad categories…………, …… A. character coding, integer coding B. hamming coding and block coding C. Hamming coding and convolution coding D. Block Coding and Convolution Coding.

Last Answer : D. Block Coding and Convolution Coding.

Description : A local telephone network is an example of a _______ network. a) Packet switched b) Circuit switched c) Bit switched d) Line switched

Last Answer : b) Circuit switched

Description : Unipolar, bipolar, and polar encoding are typesof _______ encoding. A) line B) block C) NRZ D) Manchester

Last Answer : line

Description : Images tend to be very large collection of data. The size of memory required for a 1024 by 1024 image in which the colour of each pixel is represented by a n-bit number, (in an 8 bit machines) is (A) n × 8 MB (B) n / 8 MB (C) (1024 × 1024) / 8 MB (D) 1024 MB

Last Answer : (B) n / 8 MB

Description : The computer abbreviation KB usually means– (A) Key Block (B) Kernel Boot (C) Key Byte (D) Kit Bit (E) Kilo Byte

Last Answer : Kilo Byte

Description : The physical layer is responsible for _____ a) line coding b) channel coding c) modulation d) all of the mentioned

Last Answer : d) all of the mentioned

Description : Electric field strength on a dust particle having charge equal to 8 × 10- 19 when plates are separated by distance of 2 cm and have a potential difference of 5 kV is A. 2.0 × 10-13 N B. 3 N C. 5 N D. 20 N

Last Answer : 2.0 × 10-13 N

Description : Each station on an Ethernet network has a unique _______ address imprinted onits network interface card (NIC). A) 5-byte B) 32-bit C) 48-bit D) none of the above

Last Answer : 48-b

Description : High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-pointand multipoint links. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above

Last Answer : bit-oriented

Description : In hexadecimal colon notation, a 128-bit address isdivided into _______ sections, each _____hexadecimal digits in length. A) 8: 2 B) 8: 3 C) 8: 4 D) none of the above

Last Answer : 8: 4

Description : IPv6 has _______ -bit addresses. A. 32 B. 64 C. 128 D. Variable

Last Answer : C. 128

Description : To guarantee the detectionof up to 5errors in all cases, the minimum Hamming distance in a block code mustbe _______. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 6

Description : The number of addresses in a class A block is _______. A) 65,534 B) 16,777,216 C) 256 D) none of the above

Last Answer : 16,777,216

Description : The number of addresses in a class B block is _______. A) 65,536 B) 16,777,216 C) 256 D) none of the above

Last Answer : 65,536

Description : The number of addresses in a class C block is _______. A) 65,534 B) 16,777,216 C) 256 D) none of the above

Last Answer : 256

Description : To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block code must be _______ A. 5 B. 6 C. 11 D. none of the above

Last Answer : B. 6

Description : Which statement is valid? a. 1KB = 1024 bytes b. 1 MB=2048 bytes c. 1 MB = 1000 kilobytes d. 1 KB = 1000 bytes

Last Answer : 1KB = 1024 bytes

Description : The capacity of 3.5 inch floppy disk is a. 1.40 MB b. 1.44 GB c. 1.40 GB d. 1.44 MB

Last Answer : 1.44 MB

Description : The ______ technique expands the bandwidthof a signal by replacing each data bit with n bits. A) FDM B) DSSS C) FHSS D) TDM

Last Answer : DSSS

Description : the maximum window size for data transmission using the selective reject protocol with n-bit frame sequence numbers is: a. 2^n b. 2^(n-1) c. 2^n – 1 d. 2^(n-2)

Last Answer : b. 2^(n-1)

Description : The least significant 23 bits in a 48-bit Ethernet address identify a ________. A) multicast router B) host C) multicast group D) noneof the above

Last Answer : multicast group

Description : In an IPv4 datagram, the M bit is 0, the value of HLEN is 10, the value of total length is 400 and the fragment offset value is 300. The position of the datagram, the sequence numbers of the ... 2789 b. First fragment, 2400 and 2759 c. Last fragment, 2400 and 2759 d. Middle fragment, 300 and 689

Last Answer : c. Last fragment, 2400 and 2759

Description : In an IPv4 datagram, the M bit is 0, the value of HLEN is 10, the value of total length is 400 and the fragment offset value is 300. The position of the datagram, the sequence numbers of the ... 2789 b. First fragment, 2400 and 2759 c. Last fragment, 2400 and 2759 d. Middle fragment, 300 and 689

Last Answer : c. Last fragment, 2400 and 2759

Description : What is the relationship between Bit, Byte, KB, MB, GB and TB ?

Last Answer : The capacity of a computer's memory can be determined by the number of bits , bytes, or words that it holds. Bytes are usually used to express memory. However, the bit is the smallest unit of the computer ... Kilobyte = 1 Megabyte (MB) 1024 Megabyte = 1 Gigabyte (GB) 1024 Gigabyte = 1 Terabyte (TB)

Description : Which processor provided 1 MB memory: a. 16-bit 8086 and 8088 b. 32-bit 8086 and 8088 c. 64-bit 8086 and 8088 d. 8-bit 8086 and 8088

Last Answer : a. 16-bit 8086 and 8088

Description : A 32-bit address bus allows access to a memory of capacity(a) 64 Mb (b) 16 Mb (c) 1Gb (d) 4 Gb 2.Which processor structure is pipelined? a) all x80 processors b) all x85 processors c) all x86 processors

Last Answer : c) all x86 processors

Description : GFS makes checksums on every _________ block in each chunk. a) 64 MB b) 64 KB c) 4MB d) 4KB

Last Answer : 64 KB

Description : GFS makes checksums on every _________ block in each chunk. a) 64 MB b) 64 KB c) 4MB d) 4KB

Last Answer : 64 KB

Description : An important aspect of coding is ? Readability Productivity To use as small memory space as possible brevity

Last Answer : Readability

Description : Which is the limitation of high level language? a. Lower efficiency b. Machine dependence c. machine level coding d. None of above

Last Answer : None of above

Description : The transmission signal coding method of TI carrier is called a. Bipolar b. NRZ c. Manchester d. Binary

Last Answer : Bipolar

Description : 1000Base-T uses________line coding. A) 4D-PAM5 B) 8B6T C) MLT-3 D) Manchester

Last Answer : 4D-PAM5

Description : 100Base-T4 uses________line coding. A) NRZ B) 8B6T C) MLT-3 D) Manchester

Last Answer : 8B6T

Description : If delaysare recorded as 10 bit numbers in a 50 router network, and delay vectorsare exchanged twicea second,how muchbandwidth per fill duplex line is occupied by the distributedrouting algorithm? A. 500 bps B. 1500 bps C. 5 bps D. 1000 bps

Last Answer : 1000 bps

Description : BSNL land line telephone network is an example of a network. A. Packet switched B. Circuit switched C. Bit switched D. Line switched

Last Answer : B. Circuit switched