Description : In a linear block code, the_______ ofany two valid codewords creates another valid codeword. A) XORing B) ORing C) ANDing D) none of the above
Last Answer : XORing
Description : We can divide coding schemes intotwobroad categories: ________ and______coding. A) block; linear B) linear; nonlinear C) block; convolution D) none of the above
Last Answer : block; convolution
Description : Coding schemes can be divided into two broad categories…………, …… A. character coding, integer coding B. hamming coding and block coding C. Hamming coding and convolution coding D. Block Coding and Convolution Coding.
Last Answer : D. Block Coding and Convolution Coding.
Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization
Last Answer : cyclic redundancy codes
Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes
Last Answer : a. Checksum
Description : Distinguish linear convolution & circular convolution.
Last Answer : linear convolution 1.If x(n)is a sequence of length L &h(n) of length M, then y(n) is of length N=L+M-1 2.Linear convolution can be used to find the response of the linear filter ... to find the response of the linear filter. 3.zero padding is necessary to find the response of a linear filter.
Description : How will you perform linear convolution using circular convolution?
Last Answer : i)Pad the sequences h(n) & x(n) with zeros so that they are of length N = N1+N2- 1. ii)Find the N-point DFT of h(n) & x(n) iii)Multiply the DFT’s to form the product Y(K) = X(k) H(k). iv)Find the inverse DFT of Y(k) that results in Y(n).
Description : In _____coding, we divideour message into blocks, each of k bits, called ___. A) block; blockwords B) linear; datawords C) block; datawords D) none of the above
Last Answer : block; datawords
Description : What is radio disney's codeword today?
Last Answer : Need Answer
Description : A simple quantization scheme would be to represent each output of the source with the ____value closest to it. a. Codeword b. Integer c. Binary sequence d. Coordinates
Last Answer : b. Integer
Description : Perspective view of an object is shown below. The object is rotated 90 degrees anticlockwise about z-axis (when viewed from a point on the positive z-axis towards the origin) and then rotated 180 ... Which one of the following perspective view options will be the result of the rotations?
Last Answer : A
Description : The divisor in a cyclic code is normally called the _________. A) degree B) generator C) redundancy D) none of the above
Last Answer : generator
Description : . In cyclic redundancy checking, the divisor is _______the CRC. A) The same size as B) one bit less than C) one bit more than D) none of the above
Last Answer : one bit more than
Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check
Last Answer : a. piggybacking
Description : CRC stands for __________ a. cyclic redundancy check b. code repeat check c. code redundancy check d. cyclic repeat check
Last Answer : a. cyclic redundancy check
Description : CRC stands for __________ A. cyclic redundancy check B. code repeat check C. code redundancy check D. cyclic repeat check
Last Answer : A. cyclic redundancy check
Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check
Last Answer : A. piggybacking
Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes
Last Answer : A. Checksum
Description : In the following figure ABCD is a cyclic quadrilateral, the sum of degree measures of ∠A and ∠D is: (SOURCE: Fig. 3.7, Exercise 3.7, Chapter 3, PAIR of LINEAR EQUATIONS in TWO VARIABLES, NCERT, Class X) (a) 120° (b) 180° (c) 230°(d) 250°
Last Answer : (c) 230°
Description : When microwave energy is passed through a piece of ferrite in a magnetic field, another effect occurs. If the frequency of the microwave energy is much greater than the electron wobble frequency, the plane of polarization of the wavefront is rotated. This is known as
Last Answer : Faraday Rotation Effect
Description : If the steering stand selector switch is allowed to remain in the 'Non-Followup' mode after testing of the steering gear, the rudder will _____________. EL-0097 A. not respond to commands from the ... actuator D. stop moving only when the helm is counter-rotated to put the pump at neutral stroke
Last Answer : Answer: A
Description : What is produced as a result of the cyclic light dependent reaction? -Biology
Last Answer : answer:
Description : Which does NOT occur in a cell stimulated by a steroid hormone? A) The steroid hormone enters the cell by crossing the plasma membrane. B) The hormone binds to a receptor molecule in the ... activates certain genes. E) DNA is transcribed, mRNA is translated, and the result is protein synthesis.
Last Answer : C) The second messenger cyclic AMP is stimulated by the hormone-receptor complex. D) The hormone-receptor complex binds the chromatin and activates certain genes.
Description : Structured programming codes includes ? sequencing alteration iteration multiple exit from loops only A, B and C
Last Answer : only A, B and C
Description : Instructions and memory address are represented by a. Character code b. Binary codes c. Binary word d. Parity bit
Last Answer : Binary codes
Description : In_______, the sequences aregenerated using orthogonal codes such the Walsh tables. A) FDMA B) TDMA C) CDMA D) none of the above
Last Answer : CDMA
Description : In ______, the stations usedifferent codes toachieve multipleaccess. A) FDMA B) TDMA C) CDMA D) none of the above
Description : Codes consisting of lines of varying widths or lengths that arecomputer-readable are known as– (A) an ASCII code (B) a magnetic tape (C) an OCR scanner (D) a bar code (E) None of these
Last Answer : a bar code
Description : A linear SONET network can be __________. A) point-to-point B) multipoint C) either (a) or (b) D) neither (a) nor (b)
Last Answer : point-to-point
Description : SONET network topologies can be__________. A) linear B) ring C) mesh D) all of theabove
Last Answer : ring
Description : Let C be a binary linear code with minimum distance 2t + 1 then it can correct upto _____ bits of error. a. t + 1 b. t c. t - 2 d. t / 2
Last Answer : b. t
Description : State weather the following statement is true or false for Token Bus 1).It is a linear or tree- shaped cable onto which the stations are attached. 2). the token propagates around the logical ring, with only the token holder ... 3. false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : D. 1. true, 2. true, 3. false
Description : 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ
Last Answer : 8B/10B; NRZ
Description : 100Base-FX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ-I B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ
Last Answer : 4B/5B; NRZ-I
Description : 100Base-TX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ
Last Answer : 4B/5B; MLT-3
Description : In block coding, ifn = 5, the maximum Hamming distance between two codewords is ________. A) 2 B) 3 C) 5 D) none of the above
Last Answer : 5
Description : In block coding, if k =2 and n =3, we have _______ invalid codewords. A) 8 B) 4 C) 2 D) none of the above
Last Answer : 2
Description : To guarantee correction ofup to 5 errors in all cases, the minimum Hamming distance in a block code must be________. A) 5 B) 6 C) 11 D) none of the above
Last Answer : 11
Description : To guarantee the detectionof up to 5errors in all cases, the minimum Hamming distance in a block code mustbe _______. A) 5 B) 6 C) 11 D) none of the above
Last Answer : 6
Description : We addr redundant bits toeach block to make thelength n = k + r. The resultingn-bit blocksare called _________. A) datawords B) blockwords C) codewords D) none of the above
Last Answer : codewords
Description : In ________, we combine signals from different sources to fit into a larger bandwidth. A) spread spectrum B) line coding C) block coding D) none of the above
Last Answer : spread spectrum
Description : ______ provides synchronization without increasingthe number of bits. A) Scrambling B) Line coding C) Block coding D) None of the above
Last Answer : Scrambling
Description : _______ isnormally referred toas mB/nB coding; it replaceseach m-bit group with an n-bit group. A) Block coding B) Line coding C) Scrambling
Last Answer : Block coding
Description : _____ provides redundancy toensure synchronization and inherent errordetection. A) Block coding B) Line coding C) Scrambling D) None of the above
Description : ________ is the process of converting digitaldata to adigital signal. A) Block coding B) Line coding C) Scrambling D) None of the above
Last Answer : Line coding
Description : __________ conversion involves three techniques: line coding,block coding, and scrambling. A) Analog-to-digital B) Digital-to-analog C) Analog-to-analog D) Digital-to-digital
Last Answer : Digital-to-digital
Description : Block coding can help in _______at the receiver. A) Synchronization B) Error detection C) Attenuation D) (a) and (b)
Last Answer : (a) and (b)
Description : Unipolar, bipolar, and polar encoding are typesof _______ encoding. A) line B) block C) NRZ D) Manchester
Last Answer : line
Description : A _______is defined as a small, fixed-size block of information. A) frame B) packet C) cell D) none of the above
Last Answer : cell
Description : In a block, the mask is 255.255.192.0; what is the prefix length? A) /20 B) /28 C) /18 D) none of the above
Last Answer : /18