In a linear block code, the_______ ofany two valid codewords creates another valid codeword.
A)
XORing
B)
ORing
C)
ANDing
D)
none of the above

1 Answer

Answer :

XORing

Related questions

Description : _____codes arespecial linear block codes with one extraproperty. If a codeword is rotated, the result is another codeword. A) Non-linear B) Convolution C) Cyclic D) none of the above

Last Answer : Cyclic

Description : In block coding, ifn = 5, the maximum Hamming distance between two codewords is ________. A) 2 B) 3 C) 5 D) none of the above

Last Answer : 5

Description : In block coding, if k =2 and n =3, we have _______ invalid codewords. A) 8 B) 4 C) 2 D) none of the above

Last Answer : 2

Description : We addr redundant bits toeach block to make thelength n = k + r. The resultingn-bit blocksare called _________. A) datawords B) blockwords C) codewords D) none of the above

Last Answer : codewords

Description : We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called _________ A. datawords B. blockwords C. codewords D. none of the above

Last Answer : C. codewords

Description : The Hamming distance between equal codewords is _________. A) 1 B) n C) 0 D) none of the above

Last Answer : 0

Description : What is the resultof ANDing 192 and 65? A) 192 B) 65 C) 64 D) none of the above

Last Answer : 64

Description : What is the resultof ANDing 254 and 15? A) 254 B) 14 C) 0 D) none of the above

Last Answer : 14

Description : What is the resultof ANDing 0 and15? A) 255 B) 15 C) 0 D) none of the above

Last Answer : 0

Description : What is the resultof ANDing 255 and 15? A) 255 B) 15 C) 0 D) none of the above

Last Answer : 15

Description : In Bluetooth, the_______ layer is roughly equivalent to thephysical layer of theInternet model. A) radio B) baseband C) L2CAP D) none of the above

Last Answer : radio

Description : Transmission media lie below the_______ layer. A) physical B) network C) transport D) application

Last Answer : physical

Description : The information tobe communicated ina data communications system is the_______. A) Medium B) Protocol C) Message D) Transmission

Last Answer : Message

Description : In _____coding, we divideour message into blocks, each of k bits, called ___. A) block; blockwords B) linear; datawords C) block; datawords D) none of the above

Last Answer : block; datawords

Description : We can divide coding schemes intotwobroad categories: ________ and______coding. A) block; linear B) linear; nonlinear C) block; convolution D) none of the above

Last Answer : block; convolution

Description : DES works by using a. permutation and substitution on 64 bit blocks of plain text b. only permutations on blocks of 128 bits c. exclusive ORing key bits with 64 bit blocks d. 4 rounds of substitution on 64 bit blocks with 56 bit keys

Last Answer : a. permutation and substitution on 64 bit blocks of plain text 

Description : Which statement is valid about interpreter? a. It translates one instruction at a time b. Object code is saved for future use c. Repeated interpretation is not necessary d. All of above

Last Answer : It translates one instruction at a time

Description : ________are employed in each division for the supervision of the runner's lines, the work of village postmen or postmen serving in villages, and when prescribed by the_______, for the conveyance or ... office, cash remittances c) Overseers , head of the Circle, cash remittances d) None of these

Last Answer : c) Overseers , head of the Circle, cash remittances

Description : Let C be a binary linear code with minimum distance 2t + 1 then it can correct upto _____ bits of error. a. t + 1 b. t c. t - 2 d. t / 2

Last Answer : b. t

Description : What is radio disney's codeword today?

Last Answer : Need Answer

Description : A simple quantization scheme would be to represent each output of the source with the ____value closest to it. a. Codeword b. Integer c. Binary sequence d. Coordinates

Last Answer : b. Integer

Description : To guarantee correction ofup to 5 errors in all cases, the minimum Hamming distance in a block code must be________. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 11

Description : To guarantee the detectionof up to 5errors in all cases, the minimum Hamming distance in a block code mustbe _______. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 6

Description : To guarantee correction of upto t errors, the minimum Hamming distance d min in a block code must be ________. a. t+1 b. t−2 c. 2t−1 d. 2t+1

Last Answer : d. 2t+1

Description : To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block code must be _______ A. 5 B. 6 C. 11 D. none of the above

Last Answer : B. 6

Description : Which TTL logic gate is used for wired ANDing (A) Open collector output (B) Totem Pole (C) Tri state output (D) ECL gates

Last Answer : Ans: A Open collector output.

Description : RPB creates a shortest path _______ tree from thesourceto each destination. A) unicast B) multicast C) broadcast D) none of the above

Last Answer : broadcast

Description : If you wanted to be part ofan onlinecommunity that creates an educational web site that allows its members to add toor change its information, what type of web site would youneed? A) Educational or .edu B) Social networkingsite C) Wiki D) Web 2.0

Last Answer : Wiki

Description : toxic substances like stimulants, depressants and hallucinogens are metabolized in the_______. -General Knowledge

Last Answer : Toxic substances like stimulants, depressants and hallucinogens are metabolized in the liver.

Description : Haulage and weighment statement. will be submit on or before the ______in each year, the ______should submit a statement [MS.60(a)] to the ______showing the regular accommodation provided on each railway in ... 1st August, Superintendent, Head of the Circle, 21st Jan and 21st Jul d) None of these

Last Answer : c) 1st February and 1st August, Superintendent, Head of the Circle, 21st Jan and 21st Jul

Description : The_______ of an office will ordinarily be a sum equal to the average _________multiplied by the number of days in which funds can be obtained, plus a percentage of the average ___________(if ... payments, daily payments a) Minimum cash balance , daily payments, daily receipts a) None of these

Last Answer : a) Minimum cash balance , daily payments, daily payments

Description : Blades of disc harrow are sharpened from the_______ side penetrate more readily than blades sharpened from the__________ side a) convex, concave c) concave, convex b) Front, rear d) Rear, front

Last Answer : c) concave, convex

Description : Visually impaired people can read and write by using special touch system called the_______. a)Braille b)cassettes c)audio books d)CDs

Last Answer : a)Braille

Description : Seema desires for friendship, love, and a sense of belonging, we can say that she fulfils the_______ (a) Physical need ; (b) Self Actualization ; (c) Social need ; (d) Esteem

Last Answer :  (c) Social need ;

Description : A collection of HTML pages makes up the_______. (1) Hyperlinks (2) Hypertext (3) World Wide Web (4) Hypermedia

Last Answer : World Wide Web

Description : Which statement is valid about computer program? a. It is understood by a computer b. It is understood by programmer c. It is understood user d. Both of above

Last Answer : Both of above

Description : Which statement is valid? a. 1KB = 1024 bytes b. 1 MB=2048 bytes c. 1 MB = 1000 kilobytes d. 1 KB = 1000 bytes

Last Answer : 1KB = 1024 bytes

Description : Which statement is valid about magnetic tape? a. It is a plastic ribbon b. It is coated on both sides with iron oxide c. It can be erased and reused d. All of above

Last Answer : It is a plastic ribbon

Description : Which of the following isnot a valid version of MS Office? A. Office 4 B. Office97 C. Office 98 D. Office2000

Last Answer : Office 98

Description : Consider the given network implementation scenario. For the given classful NID 199.10.20.0/24, the requirement is to create 13 subnets. With given details, find the range of first and last valid IP in 15th subnet. a. ... .20.225 to 199.10.20.238 c. 199.10.20.193 to 199.10.20.206 d. Not of these

Last Answer : a. A Only

Description : The importance of the correlation co-efficient lies in the fact that: (A) There is a linear relationship between the correlated variables. (B) It is one of the most valid measure of statistics. ... of the association be tween two variables. (D) It is a non-parametric method of statistical analysis.

Last Answer : (C) It allows one to determine the degree or strength of the association be tween two variables.

Description : The Brewster angle is valid for which type of polarisation? a) S polarised b) P polarised c) Elliptical d) Linear

Last Answer : b) P polarised

Description : A linear SONET network can be __________. A) point-to-point B) multipoint C) either (a) or (b) D) neither (a) nor (b)

Last Answer : point-to-point

Description : SONET network topologies can be__________. A) linear B) ring C) mesh D) all of theabove

Last Answer : ring

Description : State weather the following statement is true or false for Token Bus 1).It is a linear or tree- shaped cable onto which the stations are attached. 2). the token propagates around the logical ring, with only the token holder ... 3. false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : D. 1. true, 2. true, 3. false

Description : Which one of the following statements regarding section 34 and section 149 of  Indian Penal Code is correct? a) Common intention and common object are same b) Both are distinct offences in ... section 149 creates a specific offence. d) Section 34 and 149 are mutually halping sections.

Last Answer : c) Section 34 enunciates a mere principle of liability and creates no offence while  section 149 creates a specific offence.

Description : In second pass, assembler creates _ in binary format for every instruction in program and then refers to the symbol table to giving every symbol an_ _ relating the segment. a. Code and program b. Program and instruction c. Code and offset d. All of these

Last Answer : c. Code and offset

Description : Coding schemes can be divided into two broad categories…………, …… A. character coding, integer coding B. hamming coding and block coding C. Hamming coding and convolution coding D. Block Coding and Convolution Coding.

Last Answer : D. Block Coding and Convolution Coding.

Description : 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 8B/10B; NRZ

Description : 100Base-FX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ-I B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 4B/5B; NRZ-I