Description : To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block code must be _______ A. 5 B. 6 C. 11 D. none of the above
Last Answer : B. 6
Description : To guarantee correction of upto t errors, the minimum Hamming distance d min in a block code must be ________. a. t+1 b. t−2 c. 2t−1 d. 2t+1
Last Answer : d. 2t+1
Description : To guarantee the detectionof up to 5errors in all cases, the minimum Hamming distance in a block code mustbe _______. A) 5 B) 6 C) 11 D) none of the above
Last Answer : 6
Description : _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. a. Hamming Code b. CRC c. VRC d. None of the above
Last Answer : b. CRC
Description : In block coding, ifn = 5, the maximum Hamming distance between two codewords is ________. A) 2 B) 3 C) 5 D) none of the above
Last Answer : 5
Description : The ________ between two words is the number ofdifferences between corresponding bits. A) Hamming code B) Hamming distance C) Hamming rule D) none of the above
Last Answer : Hamming distance
Description : The ________ between two words is the number of differences between corresponding bits A. Hamming code B. Hamming distance C. Hamming rule D. none of the above
Last Answer : B. Hamming distance
Description : Coding schemes can be divided into two broad categories…………, …… A. character coding, integer coding B. hamming coding and block coding C. Hamming coding and convolution coding D. Block Coding and Convolution Coding.
Last Answer : D. Block Coding and Convolution Coding.
Description : The Hamming distance between 100 and 001 is ________. A) 2 B) 0 C) 1 D) none of the above
Last Answer : 2
Description : The Hamming distance between equal codewords is _________. A) 1 B) n C) 0 D) none of the above
Last Answer : 0
Description : . The _____of errors is more difficult than the ______. A) correction; detection B) detection; correction C) creation; correction D) creation;detection
Last Answer : correction; detection
Description : Define Error Detection and Correction. Mention the types of errors.
Last Answer : Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. Single bit error: The only one bit of a given data unit (such as byte character/data unit or packet) is ... error: 2 or more bits in the data unit have changed from 1 to 0 from 0 to 1.
Description : Thus hamming code for the ASCII character “a” is given as ……………… A. 10111001111 B. 10111001000 C. 10111001001 D. 10111001
Last Answer : C. 10111001001
Description : Consider a code with five valid code words of length ten : 0000000000, 0000011111, 1111100000, 1110000011, 1111111111 Hamming distance of the code is (A) 5 (B) 10 (C) 8 (D) 9
Last Answer : Answer: Marks to all
Description : The bit positionina can be numbered from 1 through 2h, a. Hamming code word b. Hamming distance word c. Both d. None of these
Last Answer : a. Hamming code word
Description : The Hamming distance between two code-words is (A) the number of places the code-words are same (B) same as the Euclidean distance between their decimal representation (C) is maximum of the either code-words (B) the number of places the code-words differ
Last Answer : The Hamming distance between two code-words is the number of places the code-words differ
Description : Identify the errors in the following HTML code and write the correct code with each correction underlined. -Technology
Last Answer : Error 1 The tag must be within element.Error 2 bgcolor attribute of body element supports a color like red, green or its color value.Error 3 tag needs a source attribute src to place an ... element must be closed not bgcolor attribute.The correct code is as follows:IMAGESHERE IS MY IMAGE FILE
Description : In Frame Relay, an address can be________ bytes. A) only 2 B) 2 to 3 C) 2 to 4 D) none of the above
Last Answer : 2 to 4
Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization
Last Answer : cyclic redundancy codes
Description : Hamming distance between 100101000110 and 110111101101 is (A) 3 (B) 4 (C) 5 (D) 6
Last Answer : (D) 6
Description : Let C be a binary linear code with minimum distance 2t + 1 then it can correct upto _____ bits of error. a. t + 1 b. t c. t - 2 d. t / 2
Last Answer : b. t
Description : A simpleparity-check code can detect__________ errors. A) an even-number of B) two C) no errors D) an odd-number of
Last Answer : an odd-number of
Description : Error rate is A. an error-detectingcode based ona summation operation performed onthebits to be checked. B. a checkbit appended to anarrayof binary digits to make thesum of all thebinary digits. C. a ... ratioof the number ofdata units in error to the total number of dataunits E. None of the above
Last Answer : the ratioof the number ofdata units in error to the total number of dataunits
Description : A simple parity-check code can detect __________ errors A. an even-number of B. two C. no errors D. an odd-number of
Last Answer : D. an odd-number of
Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above
Last Answer : All of theabove
Description : When a voltage of 110 VDC is applied to the circuit illustrated with a resistance of 12 ohms the current will be________. EL-0018 A. .11 amps B. 1.31 amps C. 9.17 amps D. 122m amps
Last Answer : Answer: C
Description : MICR stands for a. Magnetic Ink Character Reader b. Magnetic Ink Code Reader c. Magnetic Ink Cases Reader d. None
Last Answer : Magnetic Ink Character Reader
Description : Which of the following statements describe refractive surgery? a) Refractive surgery is an elective, cosmetic surgery performed to reshape the cornea. Refractive surgery is an elective procedure and is ... a stable refractive error. The corneal structure must be normal and refractive error stable.
Last Answer : a) Refractive surgery is an elective, cosmetic surgery performed to reshape the cornea. Refractive surgery is an elective procedure and is considered a cosmetic procedure (to achieve clear vision without ... is performed to reshape the cornea for the purpose of correction of all refractive errors.
Description : State weather the following statement is true or false for Multipurpose Internet Mail Extensions 1).The general syntax for MIME header fields is not the same as that for RFC 2822. 2).MIME header field names are never ... false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true
Last Answer : A. 1. True, 2. true, 3. true
Description : Is the cyclic redundancy check better than hamming code?
Last Answer : It depends on what you are doing.The cyclic redundancy check will only detect an error, while thehamming code can also correct many types of errors. However toperform this correction the extra ... channels, disk sectors).Normally hamming code is done on individual bytes or words ofcomputer memory.
Description : In a binary Hamming code the number of check digits is r then number of message digits is equal to: (A) 2r-1 (B) 2r-r-1 (C) 2r-r+1 (D) 2r+r-1
Last Answer : (B) 2r-r-1
Description : If one premise is negative the conclusion must be________. A) Negative B) Positive C) Both negative and positive D) Neither negative nor positive.
Last Answer : A) Negative
Description : This modem standard has a speed of 28.8k and has error-correction features. A. V.42 B. V.32bis C. V.90 D. V.34
Last Answer : V.42
Description : In ________ error correction, the receiver asks thesender tosend thedata again. A) backward B) retransmission C) forward D) none of the above
Last Answer : retransmission
Description : In ________ error correction, the receiver correctserrors without requestingretransmission. A) backward B) onward C) forward D) none of the above
Last Answer : forward
Description : A best-effort delivery service suchas IPv4 includes _______. A) error checking B) error correction C) datagram acknowledgment D) noneof the above
Last Answer : noneof the above
Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction
Last Answer : d. Error detection and correction
Description : Write short notes on error correction.
Last Answer : It is the mechanism to correct the errors and it can be handled in 2 ways. ∙ When an error is discovered, receiver can have the sender retransmit the entire data unit. ∙ A receiver can use an error correcting coder, which automatically corrects certain errors.
Description : In a linear block code, the_______ ofany two valid codewords creates another valid codeword. A) XORing B) ORing C) ANDing D) none of the above
Last Answer : XORing
Description : When a voltage of 112 VDC is applied to the circuit illustrated with a resistance of 17.8 ohms the current will be________. EL-0018 A. .158 amps B. 5.82 amps C. 6.29 amps D. 129.8m amps
Description : . In _______ routing, the least cost routebetween any two nodes is theroute with the minimum distance. A) path vector B) distancevector C) link state D) none of the above
Last Answer : distancevector
Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D
Last Answer : c. C
Description : When a voltage of 110 VDC is applied to the illustrated circuit with a resistance of 17.8 ohms the current will be________. EL-0018 A. 2.88 amps B. 6.18 amps C. 127.8m amps D. 161 amps
Last Answer : Answer: B
Description : The objective of testing is ? Debugging To uncover errors To gain modularity To analyze system
Last Answer : To uncover errors
Description : The primary advantage of key-to-tape data entry system is a. A large percentage of editing can be performed at the time of data entry b. Key verification is easily performed c. The tape is reusable d. Keying errors can be detected as they occur
Last Answer : The tape is reusable
Description : Which of the following refers to theterms "residual error rate"? A. the number of biterrors per twenty four hours of continuous operation onanasynchronous line B. The probability that one or moreerrors ... tonoise ratio dividedby the ratio of energy perbit to noise per hertz E. None of the above
Last Answer : The probability that one or moreerrors will be undetected whenan error detection scheme is used
Description : The message 11001001 is to be transmitted using the CRC polynomial x^3 + 1 to protect it from errors. The message that should be transmitted is: a. 11001001000 b. 11001001011 c. 11001010 d. 110010010011
Last Answer : b. 11001001011
Description : When does the station B send a positive acknowledgement (ACK) to station A in Stop and Wait protocol? a. only when no error occurs at the transmission level b. when retransmission of old packet in a novel frame is necessary c. only when station B receives frame with errors d. all of the above
Last Answer : only when no error occurs at the transmission level
Description : State weather the following statement is true or false for Exception Reporting 1). If the user runs into trouble, this trouble can be reported to the peer using a S-U-EXCEPTION-REPORT. request primitive. 2). Exception ... . false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true
Description : The slope correction for a 3° slope for a length of 100 m, is (A) -0.11 m (B) -0.12 m (C) -1.87 m (D) -0.137 m
Last Answer : (D) -0.137 m