_____codes arespecial linear block codes with one extraproperty. If a codeword is rotated, the result is another codeword.
A)
Non-linear
B)
Convolution
C)
Cyclic
D)
none of the above

1 Answer

Answer :

Cyclic

Related questions

Description : In a linear block code, the_______ ofany two valid codewords creates another valid codeword. A) XORing B) ORing C) ANDing D) none of the above

Last Answer : XORing

Description : We can divide coding schemes intotwobroad categories: ________ and______coding. A) block; linear B) linear; nonlinear C) block; convolution D) none of the above

Last Answer : block; convolution

Description : Coding schemes can be divided into two broad categories…………, …… A. character coding, integer coding B. hamming coding and block coding C. Hamming coding and convolution coding D. Block Coding and Convolution Coding.

Last Answer : D. Block Coding and Convolution Coding.

Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization

Last Answer : cyclic redundancy codes

Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes

Last Answer : a. Checksum

Description : Distinguish linear convolution & circular convolution.

Last Answer : linear convolution 1.If x(n)is a sequence of length L &h(n) of length M, then y(n) is of length N=L+M-1 2.Linear convolution can be used to find the response of the linear filter ... to find the response of the linear filter. 3.zero padding is necessary to find the response of a linear filter.

Description : How will you perform linear convolution using circular convolution?

Last Answer : i)Pad the sequences h(n) & x(n) with zeros so that they are of length N = N1+N2- 1. ii)Find the N-point DFT of h(n) & x(n) iii)Multiply the DFT’s to form the product Y(K) = X(k) H(k). iv)Find the inverse DFT of Y(k) that results in Y(n).

Description : In _____coding, we divideour message into blocks, each of k bits, called ___. A) block; blockwords B) linear; datawords C) block; datawords D) none of the above

Last Answer : block; datawords

Description : What is radio disney's codeword today?

Last Answer : Need Answer

Description : A simple quantization scheme would be to represent each output of the source with the ____value closest to it. a. Codeword b. Integer c. Binary sequence d. Coordinates

Last Answer : b. Integer

Description : Perspective view of an object is shown below. The object is rotated 90 degrees anticlockwise about z-axis (when viewed from a point on the positive z-axis towards the origin) and then rotated 180 ... Which one of the following perspective view options will be the result of the rotations? 

Last Answer : A

Description : The divisor in a cyclic code is normally called the _________. A) degree B) generator C) redundancy D) none of the above

Last Answer : generator

Description : . In cyclic redundancy checking, the divisor is _______the CRC. A) The same size as B) one bit less than C) one bit more than D) none of the above

Last Answer : one bit more than

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check

Last Answer : a. piggybacking

Description : CRC stands for __________ a. cyclic redundancy check b. code repeat check c. code redundancy check d. cyclic repeat check

Last Answer : a. cyclic redundancy check

Description : CRC stands for __________ A. cyclic redundancy check B. code repeat check C. code redundancy check D. cyclic repeat check

Last Answer : A. cyclic redundancy check

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check

Last Answer : A. piggybacking

Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes

Last Answer : A. Checksum 

Description : In the following figure ABCD is a cyclic quadrilateral, the sum of degree measures of ∠A and ∠D is: (SOURCE: Fig. 3.7, Exercise 3.7, Chapter 3, PAIR of LINEAR EQUATIONS in TWO VARIABLES, NCERT, Class X) (a) 120° (b) 180° (c) 230°(d) 250°

Last Answer : (c) 230°

Description : When microwave energy is passed through a piece of ferrite in a magnetic field, another effect occurs. If the frequency of the microwave energy is much greater than the electron wobble frequency, the plane of polarization of the wavefront is rotated. This is known as

Last Answer : Faraday Rotation Effect

Description : If the steering stand selector switch is allowed to remain in the 'Non-Followup' mode after testing of the steering gear, the rudder will _____________. EL-0097 A. not respond to commands from the ... actuator D. stop moving only when the helm is counter-rotated to put the pump at neutral stroke

Last Answer : Answer: A

Description : What is produced as a result of the cyclic light dependent reaction? -Biology

Last Answer : answer:

Description : Which does NOT occur in a cell stimulated by a steroid hormone? A) The steroid hormone enters the cell by crossing the plasma membrane. B) The hormone binds to a receptor molecule in the ... activates certain genes. E) DNA is transcribed, mRNA is translated, and the result is protein synthesis.

Last Answer : C) The second messenger cyclic AMP is stimulated by the hormone-receptor complex. D) The hormone-receptor complex binds the chromatin and activates certain genes.

Description : Structured programming codes includes ? sequencing alteration iteration multiple exit from loops only A, B and C

Last Answer : only A, B and C

Description : Instructions and memory address are represented by a. Character code b. Binary codes c. Binary word d. Parity bit

Last Answer : Binary codes

Description : In_______, the sequences aregenerated using orthogonal codes such the Walsh tables. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : CDMA

Description : In ______, the stations usedifferent codes toachieve multipleaccess. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : CDMA

Description : Codes consisting of lines of varying widths or lengths that arecomputer-readable are known as– (A) an ASCII code (B) a magnetic tape (C) an OCR scanner (D) a bar code (E) None of these

Last Answer : a bar code

Description : A linear SONET network can be __________. A) point-to-point B) multipoint C) either (a) or (b) D) neither (a) nor (b)

Last Answer : point-to-point

Description : SONET network topologies can be__________. A) linear B) ring C) mesh D) all of theabove

Last Answer : ring

Description : Let C be a binary linear code with minimum distance 2t + 1 then it can correct upto _____ bits of error. a. t + 1 b. t c. t - 2 d. t / 2

Last Answer : b. t

Description : State weather the following statement is true or false for Token Bus 1).It is a linear or tree- shaped cable onto which the stations are attached. 2). the token propagates around the logical ring, with only the token holder ... 3. false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : D. 1. true, 2. true, 3. false

Description : 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 8B/10B; NRZ

Description : 100Base-FX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ-I B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 4B/5B; NRZ-I

Description : 100Base-TX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 4B/5B; MLT-3

Description : In block coding, ifn = 5, the maximum Hamming distance between two codewords is ________. A) 2 B) 3 C) 5 D) none of the above

Last Answer : 5

Description : In block coding, if k =2 and n =3, we have _______ invalid codewords. A) 8 B) 4 C) 2 D) none of the above

Last Answer : 2

Description : To guarantee correction ofup to 5 errors in all cases, the minimum Hamming distance in a block code must be________. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 11

Description : To guarantee the detectionof up to 5errors in all cases, the minimum Hamming distance in a block code mustbe _______. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 6

Description : We addr redundant bits toeach block to make thelength n = k + r. The resultingn-bit blocksare called _________. A) datawords B) blockwords C) codewords D) none of the above

Last Answer : codewords

Description : In ________, we combine signals from different sources to fit into a larger bandwidth. A) spread spectrum B) line coding C) block coding D) none of the above

Last Answer : spread spectrum

Description : ______ provides synchronization without increasingthe number of bits. A) Scrambling B) Line coding C) Block coding D) None of the above

Last Answer : Scrambling

Description : _______ isnormally referred toas mB/nB coding; it replaceseach m-bit group with an n-bit group. A) Block coding B) Line coding C) Scrambling

Last Answer : Block coding

Description : _____ provides redundancy toensure synchronization and inherent errordetection. A) Block coding B) Line coding C) Scrambling D) None of the above

Last Answer : Block coding

Description : ________ is the process of converting digitaldata to adigital signal. A) Block coding B) Line coding C) Scrambling D) None of the above

Last Answer : Line coding

Description : __________ conversion involves three techniques: line coding,block coding, and scrambling. A) Analog-to-digital B) Digital-to-analog C) Analog-to-analog D) Digital-to-digital

Last Answer : Digital-to-digital

Description : Block coding can help in _______at the receiver. A) Synchronization B) Error detection C) Attenuation D) (a) and (b)

Last Answer : (a) and (b)

Description : Unipolar, bipolar, and polar encoding are typesof _______ encoding. A) line B) block C) NRZ D) Manchester

Last Answer : line

Description : A _______is defined as a small, fixed-size block of information. A) frame B) packet C) cell D) none of the above

Last Answer : cell

Description : In a block, the mask is 255.255.192.0; what is the prefix length? A) /20 B) /28 C) /18 D) none of the above

Last Answer : /18