We can divide coding schemes intotwobroad categories: ________ and______coding.
A)
block; linear
B)
linear; nonlinear
C)
block; convolution
D)
none of the above

1 Answer

Answer :

block; convolution

Related questions

Description : Coding schemes can be divided into two broad categories…………, …… A. character coding, integer coding B. hamming coding and block coding C. Hamming coding and convolution coding D. Block Coding and Convolution Coding.

Last Answer : D. Block Coding and Convolution Coding.

Description : _____codes arespecial linear block codes with one extraproperty. If a codeword is rotated, the result is another codeword. A) Non-linear B) Convolution C) Cyclic D) none of the above

Last Answer : Cyclic

Description : In ________, we combine signals from different sources to fit into a larger bandwidth. A) spread spectrum B) line coding C) block coding D) none of the above

Last Answer : spread spectrum

Description : 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 8B/10B; NRZ

Description : 100Base-FX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ-I B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 4B/5B; NRZ-I

Description : 100Base-TX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 4B/5B; MLT-3

Description : In block coding, ifn = 5, the maximum Hamming distance between two codewords is ________. A) 2 B) 3 C) 5 D) none of the above

Last Answer : 5

Description : ________ is the process of converting digitaldata to adigital signal. A) Block coding B) Line coding C) Scrambling D) None of the above

Last Answer : Line coding

Description : Distinguish linear convolution & circular convolution.

Last Answer : linear convolution 1.If x(n)is a sequence of length L &h(n) of length M, then y(n) is of length N=L+M-1 2.Linear convolution can be used to find the response of the linear filter ... to find the response of the linear filter. 3.zero padding is necessary to find the response of a linear filter.

Description : How will you perform linear convolution using circular convolution?

Last Answer : i)Pad the sequences h(n) & x(n) with zeros so that they are of length N = N1+N2- 1. ii)Find the N-point DFT of h(n) & x(n) iii)Multiply the DFT’s to form the product Y(K) = X(k) H(k). iv)Find the inverse DFT of Y(k) that results in Y(n).

Description : In block coding, if k =2 and n =3, we have _______ invalid codewords. A) 8 B) 4 C) 2 D) none of the above

Last Answer : 2

Description : ______ provides synchronization without increasingthe number of bits. A) Scrambling B) Line coding C) Block coding D) None of the above

Last Answer : Scrambling

Description : _______ isnormally referred toas mB/nB coding; it replaceseach m-bit group with an n-bit group. A) Block coding B) Line coding C) Scrambling

Last Answer : Block coding

Description : _____ provides redundancy toensure synchronization and inherent errordetection. A) Block coding B) Line coding C) Scrambling D) None of the above

Last Answer : Block coding

Description : __________ conversion involves three techniques: line coding,block coding, and scrambling. A) Analog-to-digital B) Digital-to-analog C) Analog-to-analog D) Digital-to-digital

Last Answer : Digital-to-digital

Description : Block coding can help in _______at the receiver. A) Synchronization B) Error detection C) Attenuation D) (a) and (b)

Last Answer : (a) and (b)

Description : In _____coding, we divideour message into blocks, each of k bits, called ___. A) block; blockwords B) linear; datawords C) block; datawords D) none of the above

Last Answer : block; datawords

Description : What is is the different between a linear scale and a nonlinear scale?

Last Answer : Feel Free to Answer

Description : Is the function y8x linear or nonlinear?

Last Answer : linear

Description : Is y-83 plus x7 linear or nonlinear?

Last Answer : linear

Description : In a triple conversion superheterodyne receiver, diode mixer stages are operated A. In the linear region B. In the nonlinear region C. As class A amplifiers D. As class B amplifiers

Last Answer : B. In the nonlinear region

Description : The elastic stress strain behavior of rubber is A. Linear B. Nonlinear C. Plastic D. No fixed relationship

Last Answer : B. Nonlinear

Description : Neural Networks are complex ______________ with many parameters. a) Linear Functions b) Nonlinear Functions c) Discrete Functions d) Exponential Functions

Last Answer : a) Linear Functions

Description : Neural Networks are complex ______________with many parameters. a) Linear Functions b) Nonlinear Functions c) Discrete Functions d) Exponential Functions

Last Answer : b) Nonlinear Functions

Description : The electric flux density and electric field intensity have which of the following relation? a) Linear b) Nonlinear c) Inversely linear d) Inversely nonlinear

Last Answer : a) Linear

Description : Neural Networks are complex ———————–with many parameters. a) Linear Functions b) Nonlinear Functions c) Discrete Functions d) Exponential Functions e) Power Functions

Last Answer : b) Nonlinear Functions

Description : Neural Networks are complex ______________ with many parameters. a) Linear Functions b) Nonlinear Functions c) Discrete Functions d) Exponential Functions

Last Answer : a) Linear Functions

Description : Compare linear and nonlinear wave shaping circuits.

Last Answer : Sr. No. Linear Wave shaping Circuit Non Linear Wave shaping Circuits 1 The circuit which makes use of only linear circuit elements is known as linear wave shaping circuits. The circuit which ... for the circuits 4 E.g. Integrator, Differentiator E.g. Clipper, Clamper

Description : For a body moving with non-uniform velocity and uniform acceleration (1) Displacement – Time graph is linear (2) Displacement – Time graph is non-linear (3) Velocity – Time graph is nonlinear (4) Velocity – Time graph is linear

Last Answer : Displacement – Time graph is non-linear

Description : We candivide ____ into two different schemes: synchronousor statistical. A) FDM B) TDM C) WDM D) none of the above

Last Answer : TDM

Description : In a linear block code, the_______ ofany two valid codewords creates another valid codeword. A) XORing B) ORing C) ANDing D) none of the above

Last Answer : XORing

Description : In______ schemes, the voltagesare on the both sidesof the time axis. Forexample, thevoltage level for 0 can bepositive and thevoltage level for 1 can be negative. A) polar B) bipolar C) unipolar D) all of theabove

Last Answer : polar

Description : To guarantee correction of upto t errors, the minimum Hamming distance d min in a block code must be ________. a. t+1 b. t−2 c. 2t−1 d. 2t+1

Last Answer : d. 2t+1

Description : We candivide today's networks into ____ broad categories. A) four B) three C) five D) two

Last Answer : three

Description : In how many categories did Megasthenes divide the Indian Society?

Last Answer : Seven

Description : ICMP messagesare divided into two broad categories: _____________. A) query and error reporting messages B) request and response messages C) request and reply messages D) noneof the above

Last Answer : query and error reporting messages

Description : What is meant by quality of service? What are the two categories of it?

Last Answer : The quality of service defines a set of attributes related to the performance of the connection. For each connection, the user can request a particular attribute each service class is associated with a set of attributes. The two main categories are, ∙ User Oriented ∙ Network Oriented

Description : Define flowcontrol. Mention the categories of it.

Last Answer : Flowcontrol refers to a set of procedures usedtorestrict the amount ofdata.Thesender cansenddata before waiting for acknowledgment.

Description : An important aspect of coding is ? Readability Productivity To use as small memory space as possible brevity

Last Answer : Readability

Description : Which is the limitation of high level language? a. Lower efficiency b. Machine dependence c. machine level coding d. None of above

Last Answer : None of above

Description : The transmission signal coding method of TI carrier is called a. Bipolar b. NRZ c. Manchester d. Binary

Last Answer : Bipolar

Description : 1000Base-T uses________line coding. A) 4D-PAM5 B) 8B6T C) MLT-3 D) Manchester

Last Answer : 4D-PAM5

Description : 100Base-T4 uses________line coding. A) NRZ B) 8B6T C) MLT-3 D) Manchester

Last Answer : 8B6T

Description : The physical layer is responsible for _____ a) line coding b) channel coding c) modulation d) all of the mentioned

Last Answer : d) all of the mentioned

Description : If we multiply or divide both sides of a linear equation with a non-zero number, then the solution of the linear equation. -Maths 9th

Last Answer : (b) By property, if we multiply or divide both sides of a linear equation with a non-zero number, then the solution of the linear equation remains the same i.e., the solution of the linear equation is remains unchanged.

Description : If we multiply or divide both sides of a linear equation with a non-zero number, then the solution of the linear equation. -Maths 9th

Last Answer : (b) By property, if we multiply or divide both sides of a linear equation with a non-zero number, then the solution of the linear equation remains the same i.e., the solution of the linear equation is remains unchanged.

Description : Involves compression in the transmitter after the input sample has been converted to a linear PCM code and then expansion in the receiver prior to PCM coding:

Last Answer : Digital companding

Description : Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x) to detect odd number of bits in error? a. G(x) contains more than two terms b. G(x) does ... exceeding the frame length c. 1+x is a factor of G(x) d. G(x) has an odd number of terms

Last Answer : c. 1+x is a factor of G(x)

Description : A _____ should be considered as a means to divide the world into two or more networks: one or more secure networks and one or more non-secure networks. A. firewall B. ESP C. SSL D. both a and b

Last Answer : A. firewall

Description : We addr redundant bits toeach block to make thelength n = k + r. The resultingn-bit blocksare called _________. A) datawords B) blockwords C) codewords D) none of the above

Last Answer : codewords