In block coding, ifn = 5, the maximum Hamming distance between two codewords is ________.
A)
2
B)
3
C)
5
D)
none of the above

1 Answer

Answer :

5

Related questions

Description : The Hamming distance between equal codewords is _________. A) 1 B) n C) 0 D) none of the above

Last Answer : 0

Description : In block coding, if k =2 and n =3, we have _______ invalid codewords. A) 8 B) 4 C) 2 D) none of the above

Last Answer : 2

Description : To guarantee correction of upto t errors, the minimum Hamming distance d min in a block code must be ________. a. t+1 b. t−2 c. 2t−1 d. 2t+1

Last Answer : d. 2t+1

Description : Coding schemes can be divided into two broad categories…………, …… A. character coding, integer coding B. hamming coding and block coding C. Hamming coding and convolution coding D. Block Coding and Convolution Coding.

Last Answer : D. Block Coding and Convolution Coding.

Description : To guarantee correction ofup to 5 errors in all cases, the minimum Hamming distance in a block code must be________. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 11

Description : To guarantee the detectionof up to 5errors in all cases, the minimum Hamming distance in a block code mustbe _______. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 6

Description : To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block code must be _______ A. 5 B. 6 C. 11 D. none of the above

Last Answer : B. 6

Description : The ________ between two words is the number ofdifferences between corresponding bits. A) Hamming code B) Hamming distance C) Hamming rule D) none of the above

Last Answer : Hamming distance

Description : The ________ between two words is the number of differences between corresponding bits A. Hamming code B. Hamming distance C. Hamming rule D. none of the above

Last Answer : B. Hamming distance

Description : The Hamming distance between 100 and 001 is ________. A) 2 B) 0 C) 1 D) none of the above

Last Answer : 2

Description : In a linear block code, the_______ ofany two valid codewords creates another valid codeword. A) XORing B) ORing C) ANDing D) none of the above

Last Answer : XORing

Description : We addr redundant bits toeach block to make thelength n = k + r. The resultingn-bit blocksare called _________. A) datawords B) blockwords C) codewords D) none of the above

Last Answer : codewords

Description : We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called _________ A. datawords B. blockwords C. codewords D. none of the above

Last Answer : C. codewords

Description : 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 8B/10B; NRZ

Description : 100Base-FX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ-I B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 4B/5B; NRZ-I

Description : 100Base-TX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 4B/5B; MLT-3

Description : We can divide coding schemes intotwobroad categories: ________ and______coding. A) block; linear B) linear; nonlinear C) block; convolution D) none of the above

Last Answer : block; convolution

Description : In ________, we combine signals from different sources to fit into a larger bandwidth. A) spread spectrum B) line coding C) block coding D) none of the above

Last Answer : spread spectrum

Description : ________ is the process of converting digitaldata to adigital signal. A) Block coding B) Line coding C) Scrambling D) None of the above

Last Answer : Line coding

Description : ______ provides synchronization without increasingthe number of bits. A) Scrambling B) Line coding C) Block coding D) None of the above

Last Answer : Scrambling

Description : _______ isnormally referred toas mB/nB coding; it replaceseach m-bit group with an n-bit group. A) Block coding B) Line coding C) Scrambling

Last Answer : Block coding

Description : _____ provides redundancy toensure synchronization and inherent errordetection. A) Block coding B) Line coding C) Scrambling D) None of the above

Last Answer : Block coding

Description : __________ conversion involves three techniques: line coding,block coding, and scrambling. A) Analog-to-digital B) Digital-to-analog C) Analog-to-analog D) Digital-to-digital

Last Answer : Digital-to-digital

Description : Block coding can help in _______at the receiver. A) Synchronization B) Error detection C) Attenuation D) (a) and (b)

Last Answer : (a) and (b)

Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization

Last Answer : cyclic redundancy codes

Description : _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. a. Hamming Code b. CRC c. VRC d. None of the above

Last Answer : b. CRC

Description : Thus hamming code for the ASCII character “a” is given as ……………… A. 10111001111 B. 10111001000 C. 10111001001 D. 10111001

Last Answer : C. 10111001001

Description : Hamming distance between 100101000110 and 110111101101 is (A) 3 (B) 4 (C) 5 (D) 6

Last Answer : (D) 6

Description : Consider a code with five valid code words of length ten : 0000000000, 0000011111, 1111100000, 1110000011, 1111111111 Hamming distance of the code is (A) 5 (B) 10 (C) 8 (D) 9

Last Answer : Answer: Marks to all

Description : Increasing evidence has implicated gram-negative bacterial lipopolysaccharide (LPS endotoxin) as the portion of the gram-negative bacterial cell membrane responsible for many, if not all the ... host, exerting deleterious effects on the host when excessive amounts reach the systemic circulation

Last Answer : Answer: a, b, d The LPS molecule exerts diverse effects on the mammalian host. Immunologic responses to LPS include nonspecific polyclonal B-cell proliferation, macrophage activation and ... deleterious effects on the host only after large amounts are secreted and reach the systemic circulation

Description : With regard to interferons: a. they are produced by B lymphocytes b. IFN-gamma is produced by cells infected with virus c. IFN-gamma increases MCH class I and II expression in antigen presenting cell d. IFN-gamma is produced by fibroblasts

Last Answer : IFN-gamma is produced by cells infected with virus

Description : The Hamming distance between two code-words is (A) the number of places the code-words are same (B) same as the Euclidean distance between their decimal representation (C) is maximum of the either code-words (B) the number of places the code-words differ

Last Answer : The Hamming distance between two code-words is the number of places the code-words differ

Description : The bit positionina can be numbered from 1 through 2h, a. Hamming code word b. Hamming distance word c. Both d. None of these

Last Answer : a. Hamming code word

Description : An organization isgranteda block;oneaddress is2.2.2.64/25. If thesubnet prefix length is /28, what is the maximum number of subnets? A) 2 B) 4 C) 8 D) none of the above

Last Answer : 8

Description : An important aspect of coding is ? Readability Productivity To use as small memory space as possible brevity

Last Answer : Readability

Description : Which is the limitation of high level language? a. Lower efficiency b. Machine dependence c. machine level coding d. None of above

Last Answer : None of above

Description : The transmission signal coding method of TI carrier is called a. Bipolar b. NRZ c. Manchester d. Binary

Last Answer : Bipolar

Description : 1000Base-T uses________line coding. A) 4D-PAM5 B) 8B6T C) MLT-3 D) Manchester

Last Answer : 4D-PAM5

Description : 100Base-T4 uses________line coding. A) NRZ B) 8B6T C) MLT-3 D) Manchester

Last Answer : 8B6T

Description : The physical layer is responsible for _____ a) line coding b) channel coding c) modulation d) all of the mentioned

Last Answer : d) all of the mentioned

Description : The maximum frame length for 10-Mbps Ethernet is ________ bytes. A) 1518 B) 1500 C) 1200 D) none of the abov

Last Answer : 1518

Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D

Last Answer : c. C

Description : As Betty Jeffries prepares the script for a radio commercial for her boutique, she is engaging in the ________ stage of the communication process. A)coding. B)sourcing. C)decoding. D)transmission.

Last Answer : A)coding

Description : The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ a) Sponsored Hackers b) Hactivists c) Script Kiddies d) Whistle Blowers

Last Answer : d) Whistle Blowers

Description : The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ a) Sponsored Hackers b) Hactivists c) Script Kiddies d) Whistle Blowers

Last Answer : c) Script Kiddies

Description : Is the cyclic redundancy check better than hamming code?

Last Answer : It depends on what you are doing.The cyclic redundancy check will only detect an error, while thehamming code can also correct many types of errors. However toperform this correction the extra ... channels, disk sectors).Normally hamming code is done on individual bytes or words ofcomputer memory.

Description : Hamming codes was developed in _ a 1953 b. 1950 c. 1945 d. 1956

Last Answer : b. 1950

Description : Water hamming effect is occurs in a) Surge tank b) Penstock c) Turbine d) Reservoir

Last Answer : Ans: Penstock

Description : In a binary Hamming code the number of check digits is r then number of message digits is equal to: (A) 2r-1 (B) 2r-r-1 (C) 2r-r+1 (D) 2r+r-1

Last Answer : (B) 2r-r-1

Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM