______ is based oncoding theory and uses sequencesof numbers called chips.
A)
FDMA
B)
TDMA
C)
CDMA
D)
none of the above

1 Answer

Answer :

CDMA

Related questions

Description : In ______, the stations usedifferent codes toachieve multipleaccess. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : CDMA

Description : The access method in Bluetooth is________. A) FDMA B) TDD-TDMA C) CDMA D) none of the above

Last Answer : TDD-TDMA

Description : In_______, the sequences aregenerated using orthogonal codes such the Walsh tables. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : CDMA

Description : In_____, each station transmits its data in itsassignedtime slot. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : TDMA

Description : In_____, each station is allocateda time slotduring which it can send data. Each stationtransmits its data in itsassigned time slot. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : TDMA

Description : In_______, the stations share thebandwidth of the channel in time. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : TDMA

Description : In________, the available bandwidth is divided into frequency bands. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : TDMA

Description : A method of multiple accessing where a given RF channel bandwidth is divided inot smaller frequency band. A. CDMA B. ANIK-D C. TDMA D. FDMA

Last Answer : D. FDMA

Description : A multiple access technique used in GSM cellular system A. TACS B. FDMA C. TDMA D. CDMA

Last Answer : C. TDMA

Description : Which of the following multiple access techniques are used by second generation cellular systems? a) FDMA/FDD and TDMA/FDD c c) FDMA/FDD and CDMA/FDD d) FDMA/FDD only

Last Answer : b) TDMA/FDD and CDMA/FDD

Description : UMTS use which multiple access technique? a) CDMA b) TDMA c) FDMA d) SDMA

Last Answer : a) CDMA

Description : In ______, the chanceof collisioncan be reduced if a station senses the medium beforetrying touse it. A) MA B) CSMA C) FDMA D) CDMA

Last Answer : CSMA

Description : In______, each station is allocated a band to send its data. In other words, each band is reservedfor a specific station,and it belongs to the station all the time. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : FDMA

Description : ________ requires that each station first listento the medium before sending. A) MA B) CSMA C) FDMA D) CDMA

Last Answer : CSMA

Description : State advantages of TDMA over FDMA

Last Answer : 1. In TDMA since only one station is present at any given time so the crosstalk will avoided this is present in FDMA. 2. The entire channel band which can be allocated to signal channel at ... secure than FDMA. 8. Intermodulation products are absent as there is one carrier only in all time slots.

Description : Bluetooth uses ______method in thephysical layer to avoid interference from other devicesor othernetworks. A) DSSS B) FHSS C) FDMA D) none of the above

Last Answer : FHSS

Description : Compare TDMA and CDMA on the basis of sharing of time and B.W. Synchronization, code word ,guard band and guard time.

Last Answer : Sr. No Parameters TDMA CDMA 1 Sharing of time & B.W Sharing of time of satellite Transponder using entire BW Sharing of time and bandwidth both. 2 ... guard times and guard bands are required if it uses along with TDMA & FDMA. Otherwise not required.

Description : Distinguish between TDMA and CDMA

Last Answer : Sr. No. Parameter TDMA CDMA 1 Definition Entire bandwidth is shared among different subscribers at Fixed predetermined or dynamically assigned time intervals/slots. Entire bandwidth is ... phone, system(AMPS), Cordless telephone IS95 Wide band, CDMA 2000,2.5G and 3G

Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above

Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments

Description : ______ uses two optical fibers and a short-wave laser source, A) 1000Base-SX B) 1000Base-LX C) 1000Base-T D) none of the above

Last Answer : 1000Base-LX

Description : The ______ scheme uses three levels (+V, 0, and-V) andthree transition rules to move betweenthe levels. A) 4B5B B) 2B1Q C) MLT-3 D) none of the above

Last Answer : MLT-3

Description : IMB launched its first personal computer called IBM-PC in 1981. It had chips from Intel, disk drives from Tandon, operating system from Microsoft, the printer from Epson and the application software from ... the country which contributed the video display? a. India b. China c. Germany d. Taiwan

Last Answer : Taiwan

Description : ______ includes GSM and CDMA. A. 2G B. 3G C. 4G D. None of above

Last Answer : A. 2G 

Description : which chips using special external equipment can reprogram a. ROM b. PROM c. SAM d. RAM

Last Answer : PROM

Description : The two major types of computer chips are a. External memory chip b. Primary memory chip c. Microprocessor chip d. Both b and c

Last Answer : Both b and c

Description : Which is used for manufacturing chips? a. Bus b. Control unit c. Semiconductors d. A and b only

Last Answer : . Semiconductors

Description : Which is used for manufacturing chips? a. Bus b. Control unit c. Semiconductors d. A and b only

Last Answer : Semiconductors

Description : Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards? a. Daughter board b. Motherboard c. Father board d. Breadboard

Last Answer : Motherboard

Description : The ______ protocol is based on end-to-end delivery. A. SCTP B. TCP C. SMTP D. SCTP

Last Answer : C. SMTP

Description : A switchin a datagram network uses arouting tablethat is based on the ______address. A) source B) destination C) local D) none of the above

Last Answer : destination

Description : The Multicast Open Shortest Path First (MOSPF)protocol is an extension of the OSPF protocol that uses multicast routing to create source-based trees. The protocol is basedon _______ routing. A) distancevector B) link state C) path vector D) none of the above

Last Answer : link state

Description : Multicast link state routing uses the _______ tree approach. A) source-based B) group-shared C) a or b D) none of the above

Last Answer : source-based

Description : A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of 01111110. If the output bit-string after stuffing is 01111100101, then the input bit-string is a. 0111110100 b. 0111110101 c. 0111111101 d. 0111111111

Last Answer : b. 0111110101

Description : Membership in a VLAN can be based on _________. A) port numbers B) MAC addresses C) IP addresses D) all of theabove

Last Answer : all of theabove

Description : In Stop-and-Wait ARQ, we use sequence numbers to number the frames. The sequence numbers are based on __________arithmetic. A) modulo-2 B) modulo-4 C) modulo-m D) none of the above

Last Answer : modulo-2

Description : What is 3GPP2? a) Project based on W-CDMA b) Project based on cdma2000 c) Project based on 2G standards d) Project based on 2.5G standards

Last Answer : b) Project based on cdma2000

Description : hat is 3GPP? a) Project based on W-CDMA b) Project based on cdma2000 c) Project based on 2G standards d) Project based on 2.5G standards

Last Answer : a) Project based on W-CDMA

Description : Components that provide internal storage to the CPU are ______ a) Registers b) Program Counters c) Controllers d) Internal chips

Last Answer : Answer: a Explanation: The Registers are the fast storage units. They are responsible for storing intermediate computational results in the CPU. The registers can be user accessible or inaccessible

Description : A Personal Computer uses a number of chips mounted on a circuit board called (A) Microprocessor (B) System Board (C) Daughter Board (D) Mother Board 

Last Answer : (D) Mother Board

Description : What is the full form of 'TDMA' ? -How To ?

Last Answer : The full form of 'TDMA' is Time Division Multiple Access

Description : Enter the full name of TDMA. ?

Last Answer : TDMA Full Name Time Division Multiple Access.

Description : Which body in the state of Tripura can declare emergency in case of state level disaster? a. TDMA b. SEC c. Department of Public works d. Department of minister

Last Answer : a. TDMA

Description : Which one is not a TDMA standard of second generation networks? a) GSM b) IS-136 c) AMPS d) PDC

Last Answer : c) AMPS

Description : Draw the block diagram of TDMA system and explain its working.

Last Answer : Block diagram of TDMA system:- OR Explanation:- In TDMA, each user has all the bandwidth, all the power and part of the time. It is frequently used with data and ... receives the bursts from all other earth stations and must select from them the traffic destined only for itself.

Description : A teacher uses a text and some pictures of fruits and vegetables and holds a discussion with her students. The students link the details with their previous knowledge and learn the concept of ... of learning B) Theory of reinforcement C) Operant conditioning of learning D) Construction of knowledge

Last Answer : D) Construction of knowledge 

Description : What exposure: AMD is developing ARM-based chips to benchmark Apple M1?

Last Answer : iBee Parts - Professional Factory Supplier For iPhone Samsung Huawei LCD Screen & Battery Repair Parts Replacement. However, for now, many programs and applications are not suitable for ARM architecture chips, and X86 processors will ... Nova 5 6 7Xiaomi 3 4 5 6 7 8 9 10 Redmi Note 4 5 6 7 8

Description : The Second Generation Computer was based on . A) Vacuum Tube B) Silicon Chips C) Transistor D) Bio Chips

Last Answer : Answer : C

Description : The Second Generation computer was based on: a) Vacuum Chips b) Silicon Chips c) Transistor d) Bio Chips d) None of The Above

Last Answer : c) Transistor

Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above

Last Answer : token passing: token

Description : Theprotocol that isused for signaling in the telephone network is called ______. A) POP B) SSS C) SS7 D) none of the above

Last Answer : SS7