In _____coding, we divideour message into blocks, each of k bits, called ___.
A)
block; blockwords
B)
linear; datawords
C)
block; datawords
D)
none of the above

1 Answer

Answer :

block; datawords

Related questions

Description : We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called _________ A. datawords B. blockwords C. codewords D. none of the above

Last Answer : C. codewords

Description : We addr redundant bits toeach block to make thelength n = k + r. The resultingn-bit blocksare called _________. A) datawords B) blockwords C) codewords D) none of the above

Last Answer : codewords

Description : Let C be a binary linear code with minimum distance 2t + 1 then it can correct upto _____ bits of error. a. t + 1 b. t c. t - 2 d. t / 2

Last Answer : b. t

Description : . ________ is the process in which the receiver tries to guess the message by using redundant bits A. Connection-Oriented Service B. Forward error correction C. both a and b D. Confirm

Last Answer : B. Forward error correction

Description : We can divide coding schemes intotwobroad categories: ________ and______coding. A) block; linear B) linear; nonlinear C) block; convolution D) none of the above

Last Answer : block; convolution

Description : ______ provides synchronization without increasingthe number of bits. A) Scrambling B) Line coding C) Block coding D) None of the above

Last Answer : Scrambling

Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D

Last Answer : c. C

Description : Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x) to detect odd number of bits in error? a. G(x) contains more than two terms b. G(x) does ... exceeding the frame length c. 1+x is a factor of G(x) d. G(x) has an odd number of terms

Last Answer : c. 1+x is a factor of G(x)

Description : _____codes arespecial linear block codes with one extraproperty. If a codeword is rotated, the result is another codeword. A) Non-linear B) Convolution C) Cyclic D) none of the above

Last Answer : Cyclic

Description : In a linear block code, the_______ ofany two valid codewords creates another valid codeword. A) XORing B) ORing C) ANDing D) none of the above

Last Answer : XORing

Description : In block coding, if k =2 and n =3, we have _______ invalid codewords. A) 8 B) 4 C) 2 D) none of the above

Last Answer : 2

Description : Which of the following is a characteristic of a firewall? a. Examines each message as it seeks entrance to the network b. Blocks messages without the correct markings from entering the network c. Detects computers communicating with the Internet without approval d. All of the above

Last Answer : d. All of the above

Description : The ______ technique expands the bandwidthof a signal by replacing each data bit with n bits. A) FDM B) DSSS C) FHSS D) TDM

Last Answer : DSSS

Description : In______ transmission, wesend1 start bit (0) at thebeginningand 1 or more stop bits (1s) at the end of each byte. A) synchronous B) asynchronous C) isochronous D) none of the above

Last Answer : asynchronous

Description : In_______transmission, bits aretransmittedsimultaneously,each across its own wire. A) Asynchronous serial B) Synchronous serial C) Parallel D) (a) and (b)

Last Answer : Parallel

Description : If link transmits 4000 frames per second and each slot has 8 bits, the transmission rate of circuit of this TDM is ______. a. 64 Kbps b. 32 Mbps c. 32 Kbps d. 64 MbpS

Last Answer : c. 32 Kbps

Description : Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is _____. a. 2 sec b. 3 sec c. 4 sec d. 1 sec

Last Answer : a. 2 sec

Description : A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute with each frame carrying an average of 10,000 bits. What is the throughput of this network ? a. 1 Mbps b. 2 Mbps c. 10 Mbps d. 12 Mbps

Last Answer : b. 2 Mbps

Description : A network with bandwidth of 10 Mbps can pass only an average of 15,000 frames per minute with each frame carrying an average of 8,000 bits. What is the throughput of this network? a. 2 Mbps b. 60 Mbps c. 120 Mbps

Last Answer : a. 2 Mbps

Description : Which of the following information about the UNIX file system is not correct? (A) Super block contains the number of i-nodes, the number of disk blocks, and the start of the list of free disk blocks. (B ... Each i-node is 256-bytes long. (D) All the files and directories are stored in data blocks. 

Last Answer : (C) Each i-node is 256-bytes long.

Description : DES works by using a. permutation and substitution on 64 bit blocks of plain text b. only permutations on blocks of 128 bits c. exclusive ORing key bits with 64 bit blocks d. 4 rounds of substitution on 64 bit blocks with 56 bit keys

Last Answer : a. permutation and substitution on 64 bit blocks of plain text 

Description : In_________ transmission, we send bits oneafter another without startor stop bits or gaps. It is the responsibilityof the receiver togroup the bits. A) synchronous B) asynchronous C) isochronous D) none of the abov

Last Answer : synchronous

Description : The _______ layer provides a well defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames A. Data Link B. Physical C. Network D. Session

Last Answer : A. Data Link

Description : The network layer encapsulates the data into _______of data. A. bits B. frames C. packets D. bytes

Last Answer : C. packets

Description : When we move from the outermost track to the innermost track in a magnetic disk, then density (bits per linear inch)  (1) decreases (2) increases (3) remains the same (4) either remains constant or decreases

Last Answer : increases

Description : ___ cable can carry signals ofhigher frequency ranges than_____ cable. A) Twisted-pair; fiber-optic B) Coaxial; fiber-optic C) Coaxial; twisted-pair D) none of the abov

Last Answer : Coaxial; twisted-pair

Description : The data rate is sometimes calledthe ___ rate. A) baud B) bit C) signal D) none of the above

Last Answer : bit

Description : MSOffice2000 included a full-fledged Web designingsoftwarecalled ___ A. MS Word B. Front Page Express C. FrontPage 2000 D. None of these

Last Answer : FrontPage 2000

Description : The Dialup connections to access the internet uses ___ protocol. a. PPP (Point to Point protocol) b. X.25 protocol c. PLIP protocol d. None

Last Answer : a. PPP (Point to Point protocol)

Description : The modes of a MAC to share a transmission medium are ___. A. Round Robin B. Reservation C. Contention D. All the above

Last Answer : A. Round Robin

Description : The functions of a Logical Link Layer (LLC) are ___. A. Error control B. Flow control C. Creating and managing the communication link between two devices with the help of the Transport layer. D. All the above

Last Answer : D. All the above

Description : Which of the following is true about ICMP messages? A) An ICMP error message may be generated for an ICMP error message. B) An ICMP error message may be generated for each fragment. C) An ICMP error message may be generated for a multicast datagram. D) noneis true

Last Answer : noneis true

Description : When 2 or more bits in a data unit has been changed during the transmission, the error is called _____ a. random error b. burst error c. inverted error d. double error

Last Answer : b. burst error

Description : When 2 or more bits in a data unit has been changed during the transmission, the error is called ____________ A. random error B. burst error C. inverted error D. double error

Last Answer : B. burst error

Description : In ________, we combine signals from different sources to fit into a larger bandwidth. A) spread spectrum B) line coding C) block coding D) none of the above

Last Answer : spread spectrum

Description : the storage capacity of a disk system depends on the bits per inch of track and the tracks per inch of a. Cylinder b. Hum c. Cluster d. Surface

Last Answer : Surface

Description : If in a computer, 16 bits are used to specify address in a RAM, the number of addresses will be a. 216 b. 65,536 c. 64K d. Any of the above

Last Answer : 65,536

Description : A byte consists of a. One bit b. Four bits c. Eight bits d. Sixteen bits

Last Answer : Eight bits

Description : a computer which CPU speed around 100 million instruction per second and with the word length of around 64 bits is known as a. Super computer b. Mini computer c. Micro computer d. Macro computer

Last Answer : Super computer

Description : A byte consists of a. One bit b. Four bits c. Eight bits d. Sixteen bits

Last Answer : Eight bits

Description : a computer which CPU speed around 100 million instruction per second and with the word length of around 64 bits is known as a. Super computer b. Mini computer c. Micro computer d. Macro computer

Last Answer : Super computer

Description : Storage capacity of magnetic disk depends on a. tracks per inch of surface b. bits per inch of tracks c. disk pack in disk surface d. All of above

Last Answer : All of above

Description : Number of bits per symbol used in Baudot code is a. 7 b. 5 c. 8 d. 9

Last Answer : 5

Description : Avalanche photodiode receivers can detect bits of transmitted data by receiving a. 100 photons b. 200 photons c. 2000 photons d. 300 photons

Last Answer : 200 photons

Description : A band is always equivalent to a. a byte b. a bit c. 100 bits d. none of above

Last Answer : none of above

Description : The synchronous modems are more costly than the asynchronous modems because a. they produce large volume of data b. they contain clock recovery circuits c. they transmit the data with stop and start bits d. they operate with a larger bandwidth e. none of above

Last Answer : they contain clock recovery circuits

Description : In Ethernet addressing, ifall the bits are 1s, the address is _________. A) unicast B) multicast C) broadcast D) none of the above

Last Answer : broadcast

Description : In Go-Back-N ARQ, if 5 is the number of bits for thesequencenumber, then the maximum size of the receive window mustbe _____ A) 15 B) 16 C) 31 D) 1

Last Answer : 1

Description : In Go-Back-N ARQ, if 5 is the number of bits for thesequencenumber, then the maximum size of the send window must be _____ A) 15 B) 16 C) 31 D) 1

Last Answer : 31