The constellation diagram of QPSK has ______ dots.
A)
2
B)
1
C)
4
D)
none of the above

1 Answer

Answer :

4

Related questions

Description : The constellation diagram of16-QAM has ______ dots. A) 4 B) 16 C) 8 D) none of the above

Last Answer : 16

Description : The constellation diagram of BPSK has ______dots. A) 2 B) 1 C) 0 D) none of the above

Last Answer : 2

Description : The constellation diagram of BASK has ______dots. A) 2 B) 1 C) 0 D) none of the above

Last Answer : 2

Description : A constellation diagram shows us the __________ of a signal element, particularly when we areusing twocarriers (one in-phase and one quadrature). A) amplitudeand phase B) amplitudeand frequency C) frequencyand phase D) none of the above

Last Answer : amplitudeand phase

Description : Inan HFC network, the upstream data are modulated using the _______ modulation technique. A) QAM B) QPSK C) PCM D) ASK

Last Answer : QPSK

Description : How many carrier frequencies are used in QPSK? A) 2 B) 1 C) 0 D) none of the above

Last Answer : 2

Description : If the baudrate is400 for a QPSK signal, thebit rate is ________ bps. A) 100 B) 400 C) 800 D) 1600

Last Answer : 800

Description : A kind of serial dot-matrix printer that forms characters with magnetically-charged ink sprayed dots is called a. Laser printer b. Ink-jet printer c. Drum printer d. Chan printer

Last Answer : Ink-jet printer

Description : The output quality of a printer is measured by a. Dot per inch b. Dot per sq. inch c. Dots printed per unit time d. All of above

Last Answer : Dot per sq. inch

Description : In an electron dot diagram of potassium There is one dot. In an electron dot diagram of silicon there are four dots. Which element would you expect to be more reactive?

Last Answer : silicon

Description : What is represented by the solid dots within components 'B' and 'C' of the diagram shown in the illustration? (See illustration EL-0081) EL-0081 A. The fact that these parts are subject to wear and ... only. C. The particular components contain a gas such as neon or argon. D. All of the above.

Last Answer : Answer: C

Last Answer : Quadrature Phase Shift Keying

Description : What modulation is normally used with digital data? A. AM B. FM C. SSB D. QPSK

Last Answer : D. QPSK

Description : What type of modulation is used on voice and video signals? A. AM B. FM C. SSB D. QPSK

Last Answer : B. FM

Description : Which modulation technique is used by GSM? a) GMSK b) BPSK c) QPSK d) GFSK

Last Answer : a) GMSK

Description : QPSK system is superior to BPSK system because  (a) its bandwidth is higher than that of BPSK System (b) interchannel interference in QPSK system is less then that in BPSK system (c) bandwidth ... is half of the bandwidth of BPSK system (d) in QPSK system inter-symbol interference is improved

Last Answer : QPSK system is superior to BPSK system because bandwidth of QPSK system is half of the bandwidth of BPSK system 

Description : In IEEE 802.11, the MAC layer framehas ______ fields. A) four B) five C) six D) none of the above

Last Answer : four

Description : In IEEE 802.11, the ______ is a timerused for collision avoidance. A) NAV B) BSS C) ESS D) none of the above

Last Answer : NAV

Description : In IEEE 802.11, the access method used in the PCF sublayer is ______. A) contention B) controlled C) polling D) none of the above

Last Answer : polling

Description : ______ is based oncoding theory and uses sequencesof numbers called chips. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : CDMA

Description : In ______, the stations usedifferent codes toachieve multipleaccess. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : CDMA

Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above

Last Answer : token passing: token

Description : In the ______ method, all dataexchanges mustbe made throughthe primarydevice even when theultimate destinationis a secondary device. A) reservation B) polling C) token passing D) none of the above

Last Answer : polling

Description : We discussed ______ popular controlled-access methods. A) two B) three C) four D) none of the above

Last Answer : three

Description : In ______, the chanceof collisioncan be reduced if a station senses the medium beforetrying touse it. A) MA B) CSMA C) FDMA D) CDMA

Last Answer : CSMA

Description : Inslotted ALOHA, the vulnerable time is ______ the frame transmissiontime. A) the sameas B) two times C) three times D) none of the above

Last Answer : the sameas

Description : ______ uses two optical fibers and a short-wave laser source, A) 1000Base-SX B) 1000Base-LX C) 1000Base-T D) none of the above

Last Answer : 1000Base-LX

Description : ______ is the most widelyused local area networkprotocol. A) Token Ring B) Token Bus C) Ethernet D) none of the above

Last Answer : Ethernet

Description : If an Ethernet destination address is08:07:06:05:44:33, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove

Last Answer : unicast

Description : f an Ethernet destination address is07:01:02:03:04:05, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove

Last Answer : multicast

Description : A ______ has a tableused in filtering decisions. A) passive hub B) repeater C) bridge D) none of the above

Last Answer : bridge

Description : A backbone is usually a ______. A) bus B) star C) either (a)or (b) D) neither (a) nor (b)

Last Answer : either (a)or (b)

Description : In modulo-2 arithmetic, we use only ______. A) 1and 2 B) 0and 2 C) 0and 1 D) none of the above

Last Answer : 0and 1

Description : In modulo-11 arithmetic, we use only the integers inthe range ______, inclusive. A) 1to 10 B) 1to 11 C) 0to 10 D) none of the above

Last Answer : 0to 10

Description : . The _____of errors is more difficult than the ______. A) correction; detection B) detection; correction C) creation; correction D) creation;detection

Last Answer : correction; detection

Description : Touse a cable network for data transmission, we needtwo keydevices:a ______ and a _________ A) CM; CMS B) CT; CMTS C) CM; CMTS D) none of the above

Last Answer : CM; CMS

Description : Theprotocol that isused for signaling in the telephone network is called ______. A) POP B) SSS C) SS7 D) none of the above

Last Answer : SS7

Description : A traditional cable TV network transmits signals ______. A) upstream B) downstream C) upstream and downstream D) none of the above

Last Answer : downstream

Description : In a three-stage space division switch, if N = 200, the number of crosspoints is ______. A) 40,000 B) greater than 40,000 C) less than40,000 D) greater than 100,000

Last Answer : ess than40,00

Description : In a one-stage space division switch, if N = 200, the number of crosspoints is ______. A) 10,000 B) 20,000 C) 40,000 D) 30,000

Last Answer : 40,000

Description : The simplest type of switching fabric is the ______ switch. A) crosspoint B) crossbar C) TSI D) STS

Last Answer : crossbar

Description : ______ cables carry data signals in the form of light. A) Coaxial B) Fiber-optic C) Twisted-pair D) none of the above

Last Answer : Fiber-opti

Description : ______ cables arecomposed ofa glass or plastic inner core surrounded by cladding, allencasedin an outside jacket. A) Coaxial B) Fiber-optic C) Twisted-pair D) none of the above

Last Answer : Fiber-optic

Description : ______ cable is used for voice and data communications. A) Coaxial B) Fiber-optic C) Twisted-pair D) none of the above

Last Answer : Twisted-pair

Description : Signals with a frequency between 2 MHz and 30 MHz use ______ propagation. A) ground B) sky C) line-of-sight D) none of the above

Last Answer : sky

Description : ______ cable consists of an inner copper core and asecond conductingouter sheath. A) Twisted-pair B) Coaxial C) Fiber-optic D) Shielded twisted-pair

Last Answer : Coaxial

Description : The ______ technique expands the bandwidthof a signal by replacing each data bit with n bits. A) FDM B) DSSS C) FHSS D) TDM

Last Answer : DSSS

Description : ______ can be applied whenthe bandwidth of a link (in hertz) is greater than the combined bandwidths of the signals to be transmitted. A) TDM B) FDM C) Both (a)or (b) D) Neither (a) or (b)

Last Answer : FDM

Description : ________ can beachievedbyusing multiplexing; ______ canbe achieved by using spreading. A) Efficiency; privacy and antijamming B) Privacyand antijamming;efficiency C) Privacyand efficiency; antijamming D) Efficiency and antijamming; privacy

Last Answer : Efficiency; privacy and antijammin

Description : The Federal Communications Commission (FCC) allows ______ kHz for each FM station. A) 20 B) 100 C) 200 D) none of the above

Last Answer : 100