To guarantee the detectionof up to 5errors in all cases, the minimum Hamming distance in a block code mustbe _______.
A)
5
B)
6
C)
11
D)
none of the above

1 Answer

Answer :

6

Related questions

Description : To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block code must be _______ A. 5 B. 6 C. 11 D. none of the above

Last Answer : B. 6

Description : To guarantee correction ofup to 5 errors in all cases, the minimum Hamming distance in a block code must be________. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 11

Description : To guarantee correction of upto t errors, the minimum Hamming distance d min in a block code must be ________. a. t+1 b. t−2 c. 2t−1 d. 2t+1

Last Answer : d. 2t+1

Description : In block coding, ifn = 5, the maximum Hamming distance between two codewords is ________. A) 2 B) 3 C) 5 D) none of the above

Last Answer : 5

Description : _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. a. Hamming Code b. CRC c. VRC d. None of the above

Last Answer : b. CRC

Description : The ________ between two words is the number ofdifferences between corresponding bits. A) Hamming code B) Hamming distance C) Hamming rule D) none of the above

Last Answer : Hamming distance

Description : The ________ between two words is the number of differences between corresponding bits A. Hamming code B. Hamming distance C. Hamming rule D. none of the above

Last Answer : B. Hamming distance

Description : Coding schemes can be divided into two broad categories…………, …… A. character coding, integer coding B. hamming coding and block coding C. Hamming coding and convolution coding D. Block Coding and Convolution Coding.

Last Answer : D. Block Coding and Convolution Coding.

Description : The Hamming distance between 100 and 001 is ________. A) 2 B) 0 C) 1 D) none of the above

Last Answer : 2

Description : The Hamming distance between equal codewords is _________. A) 1 B) n C) 0 D) none of the above

Last Answer : 0

Description : Thus hamming code for the ASCII character “a” is given as ……………… A. 10111001111 B. 10111001000 C. 10111001001 D. 10111001

Last Answer : C. 10111001001

Description : In Selective Repeat ARQ, if 5 is the number ofbits for the sequence number, then the maximum size of the receive window mustbe _____ A) 15 B) 16 C) 31 D) 1

Last Answer : 16

Description : In Go-Back-N ARQ, if 5 is the number of bits for thesequencenumber, then the maximum size of the receive window mustbe _____ A) 15 B) 16 C) 31 D) 1

Last Answer : 1

Description : In the ______ method, all dataexchanges mustbe made throughthe primarydevice even when theultimate destinationis a secondary device. A) reservation B) polling C) token passing D) none of the above

Last Answer : polling

Description : Based onthe Clos criteria, if N = 200, then k mustbe equal to or greater than____. A) 21 B) 19 C) 31 D) 41

Last Answer : 19

Description : Based onthe Clos criteria, if N = 200, then n mustbe equal to or greater than____. A) 10 B) 20 C) 30 D) 40

Last Answer : 10

Description : The sender is a router thathas receiveda datagram destinedfor a host on thesame network. The logical address that mustbe mapped to a physical address is ______. A) thedestination IP address in the datagram ... IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : thedestination IP address in the datagram header

Description : Consider a code with five valid code words of length ten : 0000000000, 0000011111, 1111100000, 1110000011, 1111111111 Hamming distance of the code is (A) 5 (B) 10 (C) 8 (D) 9

Last Answer : Answer: Marks to all

Description : The bit positionina can be numbered from 1 through 2h, a. Hamming code word b. Hamming distance word c. Both d. None of these

Last Answer : a. Hamming code word

Description : The Hamming distance between two code-words is (A) the number of places the code-words are same (B) same as the Euclidean distance between their decimal representation (C) is maximum of the either code-words (B) the number of places the code-words differ

Last Answer : The Hamming distance between two code-words is the number of places the code-words differ

Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization

Last Answer : cyclic redundancy codes

Description : . In _______ routing, the least cost routebetween any two nodes is theroute with the minimum distance. A) path vector B) distancevector C) link state D) none of the above

Last Answer : distancevector

Description : Hamming distance between 100101000110 and 110111101101 is (A) 3 (B) 4 (C) 5 (D) 6

Last Answer : (D) 6

Description : Let C be a binary linear code with minimum distance 2t + 1 then it can correct upto _____ bits of error. a. t + 1 b. t c. t - 2 d. t / 2

Last Answer : b. t

Description : MICR stands for a. Magnetic Ink Character Reader b. Magnetic Ink Code Reader c. Magnetic Ink Cases Reader d. None

Last Answer : Magnetic Ink Character Reader

Description : Is the cyclic redundancy check better than hamming code?

Last Answer : It depends on what you are doing.The cyclic redundancy check will only detect an error, while thehamming code can also correct many types of errors. However toperform this correction the extra ... channels, disk sectors).Normally hamming code is done on individual bytes or words ofcomputer memory.

Description : In a binary Hamming code the number of check digits is r then number of message digits is equal to: (A) 2r-1 (B) 2r-r-1 (C) 2r-r+1 (D) 2r+r-1

Last Answer : (B) 2r-r-1

Description : In block coding, if k =2 and n =3, we have _______ invalid codewords. A) 8 B) 4 C) 2 D) none of the above

Last Answer : 2

Description : _______ isnormally referred toas mB/nB coding; it replaceseach m-bit group with an n-bit group. A) Block coding B) Line coding C) Scrambling

Last Answer : Block coding

Description : Unipolar, bipolar, and polar encoding are typesof _______ encoding. A) line B) block C) NRZ D) Manchester

Last Answer : line

Description : The number of addresses in a class A block is _______. A) 65,534 B) 16,777,216 C) 256 D) none of the above

Last Answer : 16,777,216

Description : The number of addresses in a class B block is _______. A) 65,536 B) 16,777,216 C) 256 D) none of the above

Last Answer : 65,536

Description : The number of addresses in a class C block is _______. A) 65,534 B) 16,777,216 C) 256 D) none of the above

Last Answer : 256

Description : IEEE hasdefined the specifications fora wireless LAN, called _______, whichcovers the physical and data link layers. A) IEEE 802.3 B) IEEE 802.5 C) IEEE 802.11 D) IEEE 802.2

Last Answer : IEEE 802.11

Description : In a linear block code, the_______ ofany two valid codewords creates another valid codeword. A) XORing B) ORing C) ANDing D) none of the above

Last Answer : XORing

Description : In IEEE 802.11, when a frame is coming from an AP and going to astation, the address flag is _______. A) 00 B) 01 C) 10 D) 11

Last Answer : 01

Description : In IEEE 802.11, _______ isan optionalaccess method that can be implemented inan infrastructure network (not in an ad hocnetwork). A) DCF B) PCF C) either (a) or (b) D) neither (a) nor (b)

Last Answer : PCF

Description : Based onthe Clos criteria, if N = 200, then the minimum number of crosspoints isgreater thanor equal to _______. A) 15,200 B) 18,000 C) 42,000 D) 20,000

Last Answer : 15,200

Description : _______ is an implementation of multicast distance vector routing. It is asource-based routing protocol, based on RIP. A) MOSPF B) DVMRP C) CBT D) none of the above

Last Answer : DVMRP

Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D

Last Answer : c. C

Description : Micro Units Development Refinance Agency (MUDRA) has a corpus of _______, and credit guarantee corpus of ________ A. Rs 25,000 crore and Rs.3,000 crore B. Rs 20,000 crore and Rs.4,000 crore C. Rs 15,000 crore and Rs.4,000 crore D. Rs 20,000 crore and Rs.3,000 crore

Last Answer : D. Rs 20,000 crore and Rs.3,000 crore Explanation: The bank will have an initial corpus of Rs 20,000 crore and a credit guarantee fund of and Rs.3,000 crore. The bank will initially ... as a non-banking financial company and a subsidiary of the Small Industries Development Bank of India (SIDBI).

Description : CGTMSE stands for _______ A. Central Government Fund Trust for Medium and Small Enterprises B. Central Government Fund Transfer fund for Medium and Small Enterprises C. Central Government Fund for Medium ... D. Credit Guarantee Fund Trust for Micro and Small Enterprises E. None of the Above

Last Answer : D. Credit Guarantee Fund Trust for Micro and Small Enterprises Explanation: Government of India and SIDBI set up the Credit Guarantee Fund Trust for Micro and Small Enterprises (CGTMSE). The main ... so that the borrowers obtain both term loan and working capital facilities from a single agency.

Description : _______ is a guarantee given for the good conduct or honesty of a person employed in a particular office. a) Fidelity guarantee b) Continuing Guarantee c) Retrospective guarantee d) specific guarantee

Last Answer : a) Fidelity guarantee

Description : Reserve bank of India is a/an _______. A. statutory corporation. B. company limited by guarantee. C. company limited by shares. D. unlimited company.

Last Answer : A. statutory corporation.

Description : Sri Arvind Kejriwal has been selected for the Ramon Magsaysay Award for 2006 for his important contribution in the field. (1) Formation of Pani (water Panchayats in Rajasthan helping rural people in ... citizens to fight corruption. (4) Extending education to children of slum dwellers in Delhi. 

Last Answer : ‘Right to Information’ movement and empow7ering citizens to fight corruption.

Description : State weather the following statement is true or false for Multipurpose Internet Mail Extensions 1).The general syntax for MIME header fields is not the same as that for RFC 2822. 2).MIME header field names are never ... false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true

Description : In Go-Back-N ARQ, if frames 4,5, and 6 are received successfully, thereceiver may send an ACK _______ to thesender. A) 5 B) 6 C) 7 D) any of theabove

Last Answer : 7

Description : Hamming codes was developed in _ a 1953 b. 1950 c. 1945 d. 1956

Last Answer : b. 1950

Description : Water hamming effect is occurs in a) Surge tank b) Penstock c) Turbine d) Reservoir

Last Answer : Ans: Penstock

Description : The original IEEE 802.11,has a data rate of _____Mbps. A) 1 B) 6 C) 11 D) 22

Last Answer : 1