. The _____of errors is more difficult than the ______.
A)
correction; detection
B)
detection; correction
C)
creation; correction
D)
creation;detection

1 Answer

Answer :

correction; detection

Related questions

Description : Define Error Detection and Correction. Mention the types of errors.

Last Answer : Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. Single bit error: The only one bit of a given data unit (such as byte character/data unit or packet) is ... error: 2 or more bits in the data unit have changed from 1 to 0 from 0 to 1.

Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction

Last Answer : d. Error detection and correction

Description : To guarantee correction ofup to 5 errors in all cases, the minimum Hamming distance in a block code must be________. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 11

Description : To guarantee correction of upto t errors, the minimum Hamming distance d min in a block code must be ________. a. t+1 b. t−2 c. 2t−1 d. 2t+1

Last Answer : d. 2t+1

Description : Which of the following refers to theterms "residual error rate"? A. the number of biterrors per twenty four hours of continuous operation onanasynchronous line B. The probability that one or moreerrors ... tonoise ratio dividedby the ratio of energy perbit to noise per hertz E. None of the above

Last Answer : The probability that one or moreerrors will be undetected whenan error detection scheme is used

Description : To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block code must be _______ A. 5 B. 6 C. 11 D. none of the above

Last Answer : B. 6

Description : The _____of a composite signal is the difference between the highest and the lowest frequencies contained in that signal. A) frequency B) period C) bandwidth D) amplitude

Last Answer : frequency

Description : The start and stop bits are used in serial communication for (A) error detection (B) error correction (C) synchronization (D) slowing down the communication

Last Answer : (C) synchronization 

Description : Which of the following function is useful in system requiring error detection and correction codes ? (A) AND-OR (B) OR (C) AND (D) Exclusive -OR

Last Answer : Which of the following function is useful in system requiring error detection and correction codes ? (A) AND-OR (B) OR (C) AND (D) Exclusive -OR

Description : A text editor is used to facilitate the creation and correction of text. -Technology

Last Answer : TrueA text editor is used to create and edit the text. Text editor is a part of utility.

Description : After studying and evaluating a client's existing internal control, an auditor has concluded that the policies and procedures are well-designed and functioning as intended. Under these circumstances, the ... risk at a lower level than would be set under conditions of weak internal control.

Last Answer : Set detection risk at a higher level than would be set under conditions of weak internal control.

Description : Identify the errors in the following HTML code and write the correct code with each correction underlined. -Technology

Last Answer : Error 1 The tag must be within element.Error 2 bgcolor attribute of body element supports a color like red, green or its color value.Error 3 tag needs a source attribute src to place an ... element must be closed not bgcolor attribute.The correct code is as follows:IMAGESHERE IS MY IMAGE FILE

Description : Which of the following statements describe refractive surgery? a) Refractive surgery is an elective, cosmetic surgery performed to reshape the cornea. Refractive surgery is an elective procedure and is ... a stable refractive error. The corneal structure must be normal and refractive error stable.

Last Answer : a) Refractive surgery is an elective, cosmetic surgery performed to reshape the cornea. Refractive surgery is an elective procedure and is considered a cosmetic procedure (to achieve clear vision without ... is performed to reshape the cornea for the purpose of correction of all refractive errors.

Description : The responsibility for the detection and prevention of errors, fraud and noncompliance with laws and regulations rests with: a. Auditor b. Client's legal counsel c. Internal auditor d. Client management

Last Answer : Client management

Description : Which of the following statements reflects an auditor's responsibility for detecting fraud and error? a. An auditor is responsible for detecting employee errors and simple fraud, but not for ... detecting errors and fraud unless the application of PSAs and PAPs would result in such detection

Last Answer : An auditor should design the audit to provide reasonable assurance of detecting errors and fraud that are material to the financial statements.

Description : This modem standard has a speed of 28.8k and has error-correction features. A. V.42 B. V.32bis C. V.90 D. V.34

Last Answer : V.42

Description : In ________ error correction, the receiver asks thesender tosend thedata again. A) backward B) retransmission C) forward D) none of the above

Last Answer : retransmission

Description : In ________ error correction, the receiver correctserrors without requestingretransmission. A) backward B) onward C) forward D) none of the above

Last Answer : forward

Description : A best-effort delivery service suchas IPv4 includes _______. A) error checking B) error correction C) datagram acknowledgment D) noneof the above

Last Answer : noneof the above

Description : Write short notes on error correction.

Last Answer : It is the mechanism to correct the errors and it can be handled in 2 ways. ∙ When an error is discovered, receiver can have the sender retransmit the entire data unit. ∙ A receiver can use an error correcting coder, which automatically corrects certain errors.

Description : In the Ethernet frame, the_______field contains error detection information. A) CRC B) preamble C) address D) none of the above

Last Answer : CRC

Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Simple parity check

Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Checksum

Description : Block coding can help in _______at the receiver. A) Synchronization B) Error detection C) Attenuation D) (a) and (b)

Last Answer : (a) and (b)

Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization

Last Answer : cyclic redundancy codes

Description : The probability thata singlebit will be inerror on a typical public telephone lineusing 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error ratefor a communicationline using 9-bit frames is ... to A. 0.003 B. 0.009 C. 0.991 D. 0.999 E. None of the above

Last Answer : 0.009

Description : The layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation

Last Answer : A) Physical

Description : In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it reaches a threshold A. slow-start B. congestion avoidance C. congestion detection D. none of the above

Last Answer : A. slow-start

Description : Which error detection method uses one's complement arithmetic? A. Simple parity check B. Two-dimensional parity check C. CRC D. Checksum

Last Answer : D. Checksum

Description : _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. a. Hamming Code b. CRC c. VRC d. None of the above

Last Answer : b. CRC

Description : Offence defined in sec _____of IPC (a) Section 39 (b) Section 38 (c) Section 37 (d) Section 40.

Last Answer : (d) Section 40.

Description : Gift defined defined in _____of CCS Conducts rules a) Sec 11 b) Sec 12 c) Sec 10 d) Sec 13

Last Answer : d) Sec 13

Description : Evidence before committee defined in _____of CCS Conducts rules a) Sec 8 b) Sec 7 c) Sec 9 d) Sec 10

Last Answer : d) Sec 10

Description : Criticism of Government defined in _____of CCS Conducts rules a) Sec 8 b) Sec 7 c) Sec 9 d) Sec 10

Last Answer : c) Sec 9

Description : Connection with press or other media defined in _____of CCS Conducts rules a) Sec 8 b) Sec 7 c) Sec 9 d) Sec 10

Last Answer : a) Sec 8

Description : Demonstration and Strikes defined in _____of CCS Conducts rules a) Sec 7 b) Sec 4 c) Sec 5 d) Sec 6

Last Answer : a) Sec 7

Description : Joining of Associations by Government servants defined in _____of CCS Conducts rules a) Sec 3 b) Sec 4 c) Sec 5 d) Sec 6

Last Answer : d) Sec 6

Description : Elections defined in _____of CCS Conduct rules a) Sec 3 b) Sec 4 c) Sec 5 d) Sec 6

Last Answer : c) Sec 5

Description : The objective of testing is ? Debugging To uncover errors To gain modularity To analyze system

Last Answer : To uncover errors

Description : The primary advantage of key-to-tape data entry system is a. A large percentage of editing can be performed at the time of data entry b. Key verification is easily performed c. The tape is reusable d. Keying errors can be detected as they occur

Last Answer : The tape is reusable

Description : A simpleparity-check code can detect__________ errors. A) an even-number of B) two C) no errors D) an odd-number of

Last Answer : an odd-number of

Description : Error rate is A. an error-detectingcode based ona summation operation performed onthebits to be checked. B. a checkbit appended to anarrayof binary digits to make thesum of all thebinary digits. C. a ... ratioof the number ofdata units in error to the total number of dataunits E. None of the above

Last Answer : the ratioof the number ofdata units in error to the total number of dataunits

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : The message 11001001 is to be transmitted using the CRC polynomial x^3 + 1 to protect it from errors. The message that should be transmitted is: a. 11001001000 b. 11001001011 c. 11001010 d. 110010010011

Last Answer : b. 11001001011

Description : When does the station B send a positive acknowledgement (ACK) to station A in Stop and Wait protocol? a. only when no error occurs at the transmission level b. when retransmission of old packet in a novel frame is necessary c. only when station B receives frame with errors d. all of the above

Last Answer : only when no error occurs at the transmission level

Description : A simple parity-check code can detect __________ errors A. an even-number of B. two C. no errors D. an odd-number of

Last Answer : D. an odd-number of