d.) Checksum
10. Is a form of redundancy check that is applied independently to each of a parallel group of bit
streams
a.) VRC
b.) CRC
c.) LRC
d.) Checksum
11. Is an error-detecting code commonly used in digital networks and storage devices to detect
accidental changes to raw data
a.) VRC
b.) CRC
c.) LRC
d.) Checksum
12.Is typically the code used to generate or interpret digital data by terminals
and other devices
a.) NRZ-L
b.) NRZ-I
c.) Manchester
d.) AMI
13.The DC component is a serious problem for ______ encoding
a.) Unipolar
b.) Polar
c.) Bipolar
d.) Multipolar
14.The DC component problem is handled in AMI through ______.
a.) Transitions at the beginning of each bit interval
b.) Transitions at the middle of each bit interval
c.) Alternate positive and negative amplitudes for the 1 bits
d.) Alternate positive and negative amplitudes for the 0 bits
15.A bipolar violation
a.) Represents a zero bit followed by one bit
b.)Occurs when two successive pulses have the same polarity and
are separated by a zero level
c.) Occurs when two successive pulses have the same polarity and are
separated by a one level
d.) Represents as one bit followed by a zero bit
16. is a form of amplitude modulation that represents digital data as variations in
the amplitude of a carrier wave.
a.) ASK
b.) FSK
c.) PSK
d.) BPSK
17. is a digital modulation scheme that conveys data by changing (modulating) the phase of a
reference signal (the carrier wave).
a.) ASK
b.) FSK
c.) PSK
d.) PAM
18. is a frequency modulation scheme in which digital information is transmitted through discrete
frequency changes of a carrier signal.
a.) ASK
b.) FSK
c.) PSK
d.) PAM
19.Is a popular analog signaling technique that is used in the asymmetric digital
subscriber line
a.) QAM
b.) PAM
c.) QPSK
d.) PCM
20.The simplest technique for transforming analog data into digital signals
a.) QAM
b.) PAM
c.) QPSK
d.)PCM
21.The immediate result of sampling is
a.) QAM
b.)PAM
c.) QPSK
d.) PCM
22.Is the process that compresses the intensity range of a range of a signal by
imparting more gain to weak signals on input and on the output, reverse
operation is performed
a.) Companding
b.) Nonlinear Coding
c.) Linear Coding
d.) Modulation
23.Is the simplest form of modulation, and involves the multiplication of the
input signal by the carrier
a.) AM
b.) FM
c.) PM
d.) PCM
24.Sampling theorem finds application in :
a.) AM
b.) FM
c.) PM
d.)PCM
25.The quantization levels are not equally spaced
a.) Linear Coding
b.)Non Linear Coding
c.) Companding
d.) Modulation
Chapter 6
1. Data transfer method in which signals are sent in spurts, spaced by varying
time intervals
a.) Asynchronous Transmission
b.) Synchronous Transmission
c.) Error Correction
d.) Error Detection
2. Is an isolated error condition that alters one bit but does not affect nearby
bits
a.) Single bit error
b.) Burst Error
c.) Multiple Error
d.) Error Detection
3. Is a contiguous sequence of bits in which the first and last bits and any
number of intermediate bits are received in error.
a.) Single bit error
b.)Burst Error
c.) Multiple Error
d.) Error Detection
4. Is performed by calculating an error-detecting code that is a function of the
bits being transmitted.
a.) Error Correction
b.) Burst Error
c.) Multiple Error
d.)Error Detection
5. Is an error-detecting code commonly used in digital networks and storage devices to detect
accidental changes to raw data
a.) VRC
b.) CRC
c.) LRC
d.) Checksum
6. A _________________ is also called a transverse redundancy check when used in
combination with other error-controlling codes .
a.) VRC
b.) CRC
c.) LRC
d.) Checksum
7. Is a form of redundancy check that is applied independently to each of a parallel group of bit
streams
a.) VRC
b.) CRC
c.) LRC
d.) Checksum
8. is a small-size datum from a block of digital data for the purpose of detecting errors which
may have been introduced during its transmission or storage.
a.) VRC
b.) CRC
c.) LRC
d.) Checksum
9. Operates in a fashion similar to error detection but is capable of correcting
certain errors in a transmitted bit stream.