REM B LVL 2 Flashcards

1
Q

ISDN is based on the concept of ______.

A. ARDIS
B. SS7
C. CDPD
D. CCS

A

D. CCS

ISDN is a complete network net framework designed around the concept of common channel signaling. While telephone users throughout the world rely on the PSTN to carry conventional voice traffic, new end-user data and signaling services can be provided with a parallel, dedicated signaling network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ISDN provides integrated end user access to only packet switched networks.

A. False
B. True
C. Partly true
D. Partly false

A

A. False

ISDN provides integrated end-user access to both circuit switched and packet switched networks with digital end-to-end connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which component of the Local Area Network (LAN) usually in the form of hardware card inside the user station, implements the non- physical protocols?

A. Protocol Stack
B. User Station
C. Physical Medium
D. Physical Interface Unit

A

A. Protocol Stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PRI interface in ISDN serves small capacity terminals.

A. False
B. True
C. Partly false
D. Partly true

A

A. False

ISDN end users may select between two different interfaces. The BRI (basic rate interface) is intended to serve small capacity terminals while the PRI (primary rate interface) is intended for large capacity terminals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Signalling component that supports traffic between the end- user and network is called:

A. Access signalling
B. Subscriber system signalling
C. Network signalling
D. Digital subscriber signalling

A

A. Access signalling

Access signalling supports traffic between the end user and the network. It defines how end users obtain access to the PSTN and the ISDN for communication or services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ISDN is based on the concept of _____.

A. SS7
B. ARDIS
C. CDPD
D. CCS

A

D. CCS

ISDN is a complete network framework designed around the concept of common channel signalling. While telephone users throughout the world rely on the PSTN to carry conventional voice traffic, new end-user data, and signalling services can be provided with a parallel, dedicated signalling network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What network is usually the size of a military base?

A. Wide area network
B. Local area network
C. Office area network
D. Campus area network

A

D. Campus area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which network is suitable for a building?

A. LAN
B. MAN
C. PAN
D. WAN

A

A. LAN

LAN network is used to connect computers in a small area such as school, office, residence, etc. It is less expensive and very secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The SSH Connection Protocol runs on top of the SSH Transport Layer Protocol and assumes that a secure authentication connection is in use.

A. Partly true
B. Partly false
C. False
D. True

A

D. True

The statement is true. The SSH Connection Protocol does run on top of the SSH Transport Layer Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ISM frequency load as infrared IEEE 802.11 legacy standard

A. 5.1 GHz
B. 2.4 GHz
C. 1.2 GHz
D. 1.5 GHz

A

B. 2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the OSI model, when data is transmitted from device A to device B, the header from A’s layer 5 is read by B’s ______ layer.

A. transport
B. session
C. physical
D. presentation

A

B. session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Under the Open System Interconnection hierarchical model, which of the 7 layers are responsible in allowing interoperability among unrelated software systems?

A. Layers 3 - 4
B. Layers 4-6
C. Layers 1-3
D. Layers 5-7

A

D. Layers 5-7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of network architecture would be the easiest to setup and maintain?

A. Wide area network
B. Local area network
C. Peer-to-peer network
D. Metropolitan network

A

C. Peer-to-peer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

As the data packet moves from the lower to the upper layers, headers are ________.

A. Rearranged
B. Added
C. Modified
D. Subtracted

A

D. Subtracted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the main function of the transport layer?

A. Updating and maintenance of routing tables
B. Synchronization
C. Process-to-process delivery
D. Node-to-node delivery

A

C. Process-to-process delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The physical layer is concerned with the transmission of ________ over the physical medium.

A. Programs
B. Bits
C. Protocols
D. Dialogs

A

B. Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The ________ protocol transmission begins with a start-of-header (SOH) character followed by a length (LEN) character, which tells how long the block of data is.

A. SDLC
B. Kermit
C. Bisync
D. Xmodem

A

B. Kermit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which layer functions as a liaison between user support layers and network support layers?

A. Physical layer
B. Transport layer
C. Application layer
D. Network layer

A

B. Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which type of bridge builds and updates its tables from address information in frames?

A. Simple
B. Transparent
C. Simple and Transparent
D. None of these choices

A

B. Transparent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which address is used on the internet for employing the TCP/IP protocols?

A. specific address
B. port address
C. all of these choices
D. physical address and logical address

A

C. all of these choices

The physical, logical, port and specific addresses are used in TCP/IP protocol. All the addressing schemes, that is physical (MAC) and logical address, port address and specific address are employed in both TCP/IP model and OSI model. In TCP/IP, the addresses are more focused on the internet implementation of these addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

According to the PPP (Point-to- Point Protocol) transition state diagram, options are negotiated in the _______ state.

A. Authenticating
B. Networking
C. Terminating
D. Establishing

A

D. Establishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

According to the PPP (Point-to- Point Protocol) transition state diagram, verification of user identification occurs in the _______ state.

A. Networking
B. Authenticating
C. Terminating
D. Establishing

A

B. Authenticating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

TCP/IP model was developed _______ the OSI model.

A. After
B. Simultaneous to
C. With no link to
D. Prior to

A

D. Prior to

Several TCP/IP prototypes were developed at multiple research centers between 1978 and 1983, whereas OSI reference model was developed in the year 1984. TCP/IP was developed with the intention to create a model for the Internet while OSI was intended to be a general network model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

“A user intending to connect to one LAN may unintentionally lock onto a wireless access point from the neighboring network.” Which type of Wireless network threat would you classify this under?

A. Accidental Association
B. Denial of Service
C. Malicious Threat
D. Network Injection

A

A. Accidental Association

This threat falls under Accidental Association.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

When several processes access the same data concurrently and the outcome of the execution depends on the particular order in which the access takes place is called ______.

A. dynamic condition
B. race condition
C. essential condition
D. critical condition

A

B. race condition

When several processes access the same data concurrently and the outcome of the execution depends on the particular order in which access takes place is called race condition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Cable modems use 64-QAM for ______.

A. Either upstream or downstream
B. Both upstream and downstream
C. Downstream
D. Upstream

A

C. Downstream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Unipolar, bipolar, and polar encoding are types of ______ encoding.

A. line
B. NRZ
C. block
D. Manchester

A

A. line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The modem will automatically adjust itself to the highest speed possible but will drop back to a lower speed or different mode if the receiving modem cannot handle the highest speed. Most modems is use today are the V.90 or V.92 type and are capable of speeds up to _____.

A. 64 kbps
B. 128 kbps
C. 24 kbps
D. 56 kbps

A

D. 56 kbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In cyclic redundancy checking, what is the CRC?

A. The quotient
B. The dividend
C. The remainder
D. The divisor

A

C. The remainder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What modular connector attaches the modem to the telephone line?

A. An N-type
B. An RJ-45
C. A BNC
D. An RJ-11

A

D. An Rj-11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Lossy techniques provide _______ when compared to lossless techniques.

A. none of the mentioned
B. lower compression ratios
C. much higher compression ratios
D. similar compression ratios

A

C. much higher compression ratios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Cryptography, a word with Greek origin, means:

A. Secret coding
B. Secret writing
C. Secret message
D. None of these choices

A

B. Secret writing

Cryptography, a word with Greek origins, means “secret writing.” However, we use the term to refer to the science and art of transforming messages to make them secure and immune to attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

In asynchronous transmission, the gap time between bytes is _______.

A. Fixed
B. A function of the data rate
C. Variable
D. Zero

A

C. Variable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

In a two-wire circuit, data transmission and reception occur:

A. Only in one direction at a time
B. Simultaneously on the same wires
C. Using separate pairs of wires
D. Without the need for wires

A

A. Only in one direction at a time

In a two-wire circuit, data transmission and reception occur in only one direction at a time, typically in half-duplex mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A walkie-talkie operates in ________.

A. full duplex
B. half duplex
C. simplex
D. semi-duplex

A

B. half duplex

A walkie-talkie operates in half duplex mode. It can only send or receive a transmission at any given time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which circuit configuration is suitable for full-duplex communication?

A. Simplex circuit
B. Two-wire circuit
C. Four-wire circuit
D. Half-duplex circuit

A

C. Four-wire circuit

Four-wire circuits support full- duplex communication, allowing devices to transmit and receive data simultaneously without interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which circuit configuration is more susceptible to signal interference and crosstalk?

A. Half-duplex circuit
B. Two-wire circuit
C. Simplex circuit
D. Four-wire circuit

A

B. Two-wire circuit

Two-wire circuits are more susceptible to signal interference and crosstalk due to the shared use of the same wires for transmission and reception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A technique of transmitting data or images or videos (information) using a continuous signal.

A. network
B. multiple
C. analog
D. direct

A

C. analog

Analog is a technique of transmitting data or images or videos (information) using a continuous signal, which varies in amplitude, phase or some other property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

It is an undesired shift or width change in digital bits of data due to circuitry action which causes bits to arrive at different times.

A. impulse
B. Jitter
C. parity
D. allas

A

B. Jitter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Telephone networks operate in this mode.

A. semi-duplex
B. simplex
C. half duplex
D. full duplex

A

D. full duplex

Telephone networks operate in full duplex mode. It can transmit data in both the directions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which type of circuit uses separate pairs of wires for transmitting and receiving data?

A. Two-wire circuit
B. Simplex circuit
C. Half-duplex circuit
D. Four-wire circuit

A

D. Four-wire circuit

A four-wire circuit uses separate pairs of wires for transmitting and receiving data, allowing for simultaneous bidirectional communication without interference.

42
Q

The technique of transmitting each data word one after another without start and stop bits, usually in multiword blocks, is referred to as ______.

A. isochronous data transmission
B. synchronous data transmission
C. plesiochronous data transmission
D. asynchronous data tr transmission

A

B. synchronous data transmission

43
Q

S-interface is a_____ bus.

A. Two wire bus
B. Single wired bus
C. Four wire bus
D. None of the mentioned

A

C. Four wire bus

44
Q

Which encoding method uses alternating positive and negative values for 1s?

A. Manchester
B. AMI
C. NRZ-I
D. RZ

A

B. AMI

45
Q

MPEG compression:

A. none of the mentioned
B. stores multiple frames’ values together
C. stores the differences between successive frames
D. stores the compression values of each frame

A

C. stores the differences between successive frames

46
Q

A subnet mask in class A can have ______ 1s with the remaining bits 0s.

A. Three
B. Four
C. Nine
D. Thirty-three

A

C. Nine

47
Q

IP addresses with subnet mask of 255.255.0.0 belongs to what class?

A. Class D
B. Class A
C. Class C
D. Class B

A

D. Class B

48
Q

Which of the following is NOT a popular asynchronous ASCII- coded data transmission between personal computers via modem?

A. Bisync
B. Xmodem
C. Kermit
D. MNP

A

A. Bisync

49
Q

A ________ sine wave is not useful in data communications; we need to send a _________ signal.

A. single-frequency; double-frequency
B. single-frequency; composite
C. none of these choices
D. composite; single-frequency

A

B. single-frequency; composite

50
Q

_________ is a client-server program that provides an IP address, subnet mask, IP address of a router, and IP address of a name server to a computer.

A. NAT
B. CIDR
C. DHCP
D. ISP

A

C. DHCP

51
Q

In message switching system, an incoming message gets ________ especially if the required route is busy.

A. stored in a queue & retransmitted
B. lost
C. recovered
F. sampled

A

A. stored in a queue & retransmitted

52
Q

In _______ routing, the full IP address of a destination is given in the routing table.

A. Host-specific
B. Default
C. Network-specific
D. Next-hop

A

A. Host-specific

53
Q

A subnet mask in class B can have _______ 1s with the remaining bits 0s.

A. Three
B. Fourteen
C. Seventeen
D. Nine

A

C. Seventeen

54
Q

The IP address of 192.192.192.192/30 belongs to what class?

A. Class C
B. Class A
C. Class less
D. Class B

A

C. Class less

55
Q

Lossy and lossless are classifications of:

A. all of the mentioned
B. files
C. compression algorithms
D. multimedia storage systems

A

C. compression algorithms

56
Q

The internet features search engines to help users find information in a systematic and organized manner. Which of the following is not a search engine?

A. Lycos
B. Netscape
C. Yahoo
D. Google

A

B. Netscape

57
Q

The IP address of 192.192.192.192/24 belongs to what class?

A. Class B
B. Class D
C. Class C
D. Class A

A

C. Class C

58
Q

If a symbol is composed of 3 bits, there are _______ data levels.

A. 8
B. 2
C. 4
D. 16

A

A. 8

M = 2 = 2 = 8

59
Q

Data flow between two devices can occur in _______ way/s.

A. All of these choices
B. Full-duplex
C. Half-duplex
D. Simplex

A

A. All of these choices

Data flow between two devices can occur in one of three ways: simplex, half-duplex, or full-duplex

60
Q

The symbol time in FDMA systems is _______ thus intersymbol interference is _______.

A. Large, high
B. Large, low
C. Small, high
D. Small, low

A

B. Large, low

The symbol time of a narrowband signal is large as compared to the average delay spread. This implies that the amount of intersymbol interference is low and, thus, little or no equalization is required in FDMA narrowband systems.

61
Q

CT2 is analog version of first generation cordless telephones.

A. True
B. Partly true
C. False
D. Partly false

A

C. False

CT2 is a digital version of the first generation, analog, cordless telephones. When compared with analog cordless phones, CT2 offers good speech quality and is more resistant to interference.

62
Q

In layering, n layers provide service to:

A. n+1 layer
B. n-1 layer
C. n layer
D. none of these choices

A

A. n+1 layer

In layering n layer provides service to n+1 layer and use the service provided by n-1 layer.

63
Q

In DS-1, a bit is “stolen” out of each channel:

A. every other frame
B. every twelfth frame
C. every frame
D. every sixth frame

A

D. every sixth frame

64
Q

_______ ,synchronization overhead is required in TDMA due to ________ transmission.

A. Low, burst
B. High, burst
C. No, burst
D. High, continuous

A

B. High, burst

High synchronization overhead is required in TDMA systems because of burst transmissions. TDMA transmissions are slotted, and this requires the receivers to be synchronized for each data burst.

65
Q

IS-95 was not compatible with existing AMPS frequency band.

A. True
B. Partly false
C. False
D. Partly true

A

C. False

Like IS-136, IS-95 system was designed to be compatible with the existing US analog cellular system (AMPS) frequency band. Hence, mobile and base stations can be economically produced for dual mode operation.

66
Q

IS-95 uses same modulation technique for forward and reverse channel.

A. False
B. Partly true
C. Partly false
D. True

A

A. False

IS-95 uses different modulation and spreading technique for the forward and reverse links. On the forward link, the base station simultaneously transmits the user data for all mobiles in the cell by using different spreading sequence for each mobile.

67
Q

Due to _______ transmission scheme _______ bits are needed for overhead in FDMA systems.

A. Discontinuous, few
B. Discontinuous, many
C. Continuous, few
D. Continuous, many

A

C. Continuous, few

Since FDMA is a continuous transmission scheme, fewer bits are needed for overhead purposes (such as synchronization and framing bits) as compared to TDMA.

68
Q

US digital cellular system based on CDMA was standardized as:

A. IS-95
B. IS-76
C. IS-136
D. IS-54

A

A. IS-95

A US digital cellular system based on CDMA was standardized as Interim Standard 95 (IS-95). It was standardized by US Telecommunication Industry Association (TIA) and promised increased capacity.

69
Q

Which of the following is not true for TDMA?

A. No requirement of duplexers
B. Single carrier frequency for single user
C. Discontinuous data transmission
D. High transmission rates

A

B. Single carrier frequency for single user

TDMA share a single carrier frequency with several users, where each user makes use of non-overlapping time slots. The number of slots per frame depends on several factors, such as modulation technique, available bandwidth etc.

70
Q

In _______, the serial binary data is mixed with a higher-frequency pseudorandom binary code at a faster rate, and the result is used to phase-modulate a carrier.

A. direct-sequence SS (DSSS)
B. quadrature amplitude modulation (QAM)
C. frequency-hopping SS (FHSS)
D. orthogonal frequency-division multiplexing (OFDM)

A

A. direct-sequence SS (DSSS)

71
Q

In CRC there is no error if the remainder at the receiver is:

A. Zero
B. Equal to the remainder at the sender
C. Nonzero
D. The quotient at the sender

A

A. Zero

72
Q

Which error detection method can detect a single-bit error?

A. CRC
B. Two-dimensional parity check
C. Simple parity check
D. All of these choices

A

D. All of these choices

73
Q

Which of the following best describes a single-bit error?

A. A single bit is inverted.
B. A single bit is inverted per data unit.
C. A single bit is inverted per transmission
D. Any of these choices

A

B. A single bit is inverted per data unit

74
Q

In CRC the quotient at the sender ______?

A. Is discarded
B. Is the remainder
C. Becomes the divisor at the receiver
D. Becomes the dividend at the receiver

A

A. Is discarded

75
Q

Using the Shannon formula to calculate the data rate for a given channel, if C = B, then _________.

A. Not enough information is given to answer the question
B. The signal is greater than the noise
C. The signal is less than the noise
D. The signal is equal to the noise

A

D. The signal is equal to the noise

76
Q

The most common hamming codes are a generalized version of?

A. Hamming(7, 4) code
B. Hamming(5, 7) code
C. Hamming (8, 4) code
D. Hamming(6, 3) code

A

A. Hamming(7,4) code

The most common hamming codes generalize to form hamming(7, 4) code. It encodes four bits of data into seven bits by adding three parity bits.

77
Q

Eight level FSK and binary PSK yields an equivalent sensitivity.

A. Partly false
B. Partly true
C. True
D.False

A

C. True

Binary PSK and 8-level FSK provides an equivalent sensitivity. The main drawback of 8-level FSK is that it yields al equivalent sensitivity to binary PSK at the expense of a greater receiver bandwidth requirement.

78
Q

A special digital modulation technique that achieves high data rates in limited-bandwidth channels is called

A. Quadrature amplitude modulation (QAM)
B. Delta modulation
C. Pulse-coded modulation (PCM)
D. Pulse amplitude modulation (PAM)

A

A. Quadrature amplitude modulation (QAM)

79
Q

BPSK uses non-coherent demodulator.

A. Partly true
B. True
C. Partly False
D. False

A

D. False

BPSK uses coherent or synchronous demodulation. It requires the information about the phase and frequency of the carrier be available at the receiver.

80
Q

______ offers the potential for improving the coherent optical receiver sensitivity by increasing the choice of signaling frequencies.

A. MFSK
B. MPSK
C. MDSK
D. MASK

A

A. MFSK

Multilevel FSK includes 4-level or 8-level FSK. It improves the receiver sensitivity by reducing the deviation and increasing the usage of signaling frequencies.

81
Q

QPSK provides twice the bandwidth efficiency and ______ energy efficiency as compared to BPSK.

A. Same
B. Four times
C. Twice
D. Half

A

A. Same

The bit error probability of OPSK is identical to BPSK but twice as much data can be sent in the same bandwidth. Thus, when compared to BPSK, QPSK provides twice the spectral efficiency with exactly the same efficiency.

82
Q

The bandwidth of OQPSK is _to QPSK.

A. Identical
B. Four times
C. Half
D. Twice

A

A. Identical

The spectrum of an OQPSK signal is identical to that of QPSK signal. Hence, both signals occupy the same bandwidth. The staggered alignment of the even and odd bit streams in OQPSK signal does not change the nature of spectrum.

83
Q

External modulation for _______
modulation format allows the most sensitive coherent detection mechanism.

A. PSK
B. DSK
C. FSK
D. ASK

A

A. PSK

External modulation for PSK is usually straightforward. It is therefore utilized to provide the modulation format which allows the most sensitive coherent detection mechanism.

84
Q

Which modulation technique involves tribits, four different phase shifts, and two amplitudes?

A. 8PSK
B. 8QAM
C. 16PSK
D. QPSK

A

B. 8QAM

85
Q

_______can potentially provide spectral conservation through the use of multilevel signaling.

A. MFSK
B. DFSK
C. ASK
D. M-ary PSK

A

D. M-ary PSK

In M-ary schemes, the spectral efficiency is increased by the factor log M. this is purely for M-level schemes which can provide multilevel signaling patterns.

86
Q

In 16-QAM, there are 16_______

A. Amplitudes
B. Bps
C. Combination of phase and amplitude
D. Phases

A

C. Combination of phase and amplitude

87
Q

By applying cos(2pieft), BPSK signal is equivalent to_____

A. Double sideband suppressed carrier amplitude modulated waveform
B. Single sideband suppressed carrier amplitude modulated waveform
C. SSB amplitude waveform
D. Frequency modulated waveform

A

A. Double sideband suppressed carrier amplitude modulated waveform

The BPSK signal is equivalent to a double sideband suppressed carrier amplitude modulated waveform, where cos(2ft) is applied as the carrier. Hence, a BPSK signal can be generated using a balanced modulator.

88
Q

What encoding method is identified where binary 1 is transmitted first as a positive pulse, for one half of the bit interval, and then as a negative pulse for the remaining part of the bit interval?

A. Manchester encoding
B. nonreturn to zero (NRZ)
C. Alternate Mark Inversion (AMI)
D. return to zero (RZ)

A

A. Manchester encoding

89
Q

Lempel-Ziv-Welch (LZW) is a universal lossless data compression algorithm. Who created LZW?

A. Terry Welch
B. Jacob Ziv
C. All of these choices
D. Abraham Lempel

A

C. All of these choices

90
Q

Which of the following is false with respect to pulse position modulation?

A. Modulates a high frequency carrier
B. Pulse is narrow
C. Pulse width changes in accordance with the amplitude of modulating signal
D. Can be transmitted in broadband

A

C. Pulse width changes in accordance with the amplitude of modulating signal

In PPM, the pulses change position according to the amplitude of the analog signal. The pulses are very narrow. These pulse signals may be transmitted in a baseband form, but in most applications, they modulate a high-frequency radio carrier.

91
Q

Which of the following data compression scheme replaces repeated characters or bit patterns with a code indicating the character or pattern and the number of repetitions?

A. Channel Coding
B. Huffman Coding
C. Shannon-Fano Coding
D. Run-Length Encoding

A

D. Run-Length Encoding

92
Q

The_______
corresponds to average quantization noise power.

A. Variance
B. Mean
C. Probability density function
D. None of these choices

A

A. Variance

The variance corresponds to average quantization noise power. It is calculated assuming the quantization noise and probability distribution function.

93
Q

The self-information of random variable is

A. 1
B. 0
C. Cannot be determined
D. Infinite

A

D. Infinite

94
Q

The length of the code-word obtained by encoding quantized sample is equal to

A. I=2loq(to the base 2)L
B. I=log(to the base 2)L
C. I=log(to the base 2)L/2
D. I=log (to the base 10)L

A

B. I=log(to the base 2)L

The quantized samples which are digitally encoded into I bit value code-word. The length I can be calculated as I=log(to the base 2)L.

95
Q

In a TDD one channel is sufficient for transmission.

A. True
B. Partly true
C. Partly false
D. False

A

A. True

Time-division duplexing (TDD) means that signals are transmitted simultaneously on a single channel by interleaving them in different time slots. Each time slot may contain one data word, such as 1 byte from an A/D converter or a D/A converter.
As long as the serial data rate is high enough, a user will never know the difference. The primary benefit of TDD is that only one channel is needed. It saves spectrum space and cost.

96
Q

All local and long-distance connections are digital.

A. True
B. Partly true
C. Partly false
D. False

A

A. True

All modern telephone systems use digital transmission via PCM and TDM. The only place where analog signals are still used is in the local loop-the connection between a telephone company’s central office (CO) and the subscriber’s telephone, known as the customer premises equipment (CPE). All local and long-distance connections are digital.

97
Q

ASCIl code is a

A. Fixed Length Code
B. None of these choices
C. Fixed & Variable length code
D. Variable length code

A

A. Fixed Length Code

ASCII code is a fixed length code. It has a fixed length of 7 bits.

98
Q

Which system uses digital transmission?

A. ISDN
B. ISDN & LANs
C. None of the mentioned
D. LANs

A

B. ISDN & LANs

Though the signal type is analog or digital, the transmission takes place in the digital domain in ISDN and LANs.

99
Q

While recovering signal, which gets attenuated more?

A. None of these choices
B. Low & High frequency component
C. High frequency component
D. Low frequency component

A

C. High frequency component

High frequency components are attenuated more when compared to low frequency components while recovering the signals.

100
Q

Synchronization available in digital communication are

A. Carrier synchronization
B. All of the mentioned
C. Symbol synchronization
D. Frame synchronization

A

B. All of the mentioned

The synchronization techniques available in digital communication are symbol synchronization, frame synchronization and carrier synchronization.