Anda di halaman 1dari 6

Chapter 5

1. This type of encoding uses three levels to represent a symbol


a.) Unipolar
b.) Polar
c.) Bipolar
d.) Multipolar
2. Which of the following has a serious problem on the presence of dc
components?
a.) NRZ-L
b.) AMI
c.) Pseudoternary
d.) Differential Manchester
3. In this encoding, a symbol is represented by 1.58 bits
a.) NRZ-L
b.) NRZ-I
c.) Manchester
d.)AMI
4. Which of the following codes is an example of differential encoding?
a.) NRZ-L
b.)NRZ-I
c.) Differential Manchester
d.) AMI
5. The scrambling techniques, HDB3 and B8ZS, were based on the rules of
a.) NRZ-L
b.) NRZ-I
c.) Differential Manchester
d.)AMI
6. Rate at which the signal level changes
a.) Modulation rate
b.) Data rate
c.) Bit rate
d.) Duration rate
7. Need for synchronizing transmitter and receiver either with an external clock
or with a sync mechanism based on signal
a.) Signal Spectrum
b.)Clocking
c.) Noise
d.) Error
8. Techniques that add extra parity bits to data to determine when errors
have occurred
a.) Error correction
b.)Error detection
c.) Clocking
d.) Checksum
9. A _________________ is also called a transverse redundancy check when used in
combination with other error-controlling codes .
a.) VRC
b.) CRC
c.) LRC

d.) Checksum
10. Is a form of redundancy check that is applied independently to each of a parallel group of bit
streams
a.) VRC
b.) CRC
c.) LRC
d.) Checksum
11. Is an error-detecting code commonly used in digital networks and storage devices to detect
accidental changes to raw data
a.) VRC
b.) CRC
c.) LRC
d.) Checksum
12.Is typically the code used to generate or interpret digital data by terminals
and other devices
a.) NRZ-L
b.) NRZ-I
c.) Manchester
d.) AMI
13.The DC component is a serious problem for ______ encoding
a.) Unipolar
b.) Polar
c.) Bipolar
d.) Multipolar
14.The DC component problem is handled in AMI through ______.
a.) Transitions at the beginning of each bit interval
b.) Transitions at the middle of each bit interval
c.) Alternate positive and negative amplitudes for the 1 bits
d.) Alternate positive and negative amplitudes for the 0 bits
15.A bipolar violation
a.) Represents a zero bit followed by one bit
b.)Occurs when two successive pulses have the same polarity and
are separated by a zero level
c.) Occurs when two successive pulses have the same polarity and are
separated by a one level
d.) Represents as one bit followed by a zero bit
16. is a form of amplitude modulation that represents digital data as variations in
the amplitude of a carrier wave.
a.) ASK
b.) FSK
c.) PSK
d.) BPSK
17. is a digital modulation scheme that conveys data by changing (modulating) the phase of a
reference signal (the carrier wave).
a.) ASK
b.) FSK
c.) PSK
d.) PAM
18. is a frequency modulation scheme in which digital information is transmitted through discrete
frequency changes of a carrier signal.

a.) ASK
b.) FSK
c.) PSK
d.) PAM
19.Is a popular analog signaling technique that is used in the asymmetric digital
subscriber line
a.) QAM
b.) PAM
c.) QPSK
d.) PCM
20.The simplest technique for transforming analog data into digital signals
a.) QAM
b.) PAM
c.) QPSK
d.)PCM
21.The immediate result of sampling is
a.) QAM
b.)PAM
c.) QPSK
d.) PCM
22.Is the process that compresses the intensity range of a range of a signal by
imparting more gain to weak signals on input and on the output, reverse
operation is performed
a.) Companding
b.) Nonlinear Coding
c.) Linear Coding
d.) Modulation
23.Is the simplest form of modulation, and involves the multiplication of the
input signal by the carrier
a.) AM
b.) FM
c.) PM
d.) PCM
24.Sampling theorem finds application in :
a.) AM
b.) FM
c.) PM
d.)PCM
25.The quantization levels are not equally spaced
a.) Linear Coding
b.)Non Linear Coding
c.) Companding
d.) Modulation

Chapter 6

1. Data transfer method in which signals are sent in spurts, spaced by varying
time intervals
a.) Asynchronous Transmission
b.) Synchronous Transmission
c.) Error Correction
d.) Error Detection
2. Is an isolated error condition that alters one bit but does not affect nearby
bits
a.) Single bit error
b.) Burst Error
c.) Multiple Error
d.) Error Detection
3. Is a contiguous sequence of bits in which the first and last bits and any
number of intermediate bits are received in error.
a.) Single bit error
b.)Burst Error
c.) Multiple Error
d.) Error Detection
4. Is performed by calculating an error-detecting code that is a function of the
bits being transmitted.
a.) Error Correction
b.) Burst Error
c.) Multiple Error
d.)Error Detection
5. Is an error-detecting code commonly used in digital networks and storage devices to detect
accidental changes to raw data
a.) VRC
b.) CRC
c.) LRC
d.) Checksum
6. A _________________ is also called a transverse redundancy check when used in
combination with other error-controlling codes .
a.) VRC
b.) CRC
c.) LRC
d.) Checksum
7. Is a form of redundancy check that is applied independently to each of a parallel group of bit
streams
a.) VRC
b.) CRC
c.) LRC
d.) Checksum
8. is a small-size datum from a block of digital data for the purpose of detecting errors which
may have been introduced during its transmission or storage.
a.) VRC
b.) CRC
c.) LRC
d.) Checksum
9. Operates in a fashion similar to error detection but is capable of correcting
certain errors in a transmitted bit stream.

a.) Error Correction


b.) Burst Error
c.) Multiple Error
d.) Error Detection
10.The ratio of redundant bits to data bits
a.) Error
b.)Redundancy
c.) Data rate
d.) Modulation rate
11.The ratio of data bits to total bits
a.) Code rate
b.)Redundancy
c.) Data rate
d.) Modulation rate
12.Only one of two stations on a point-to-point link may transmit at a time.
a.) Point to point
b.) Multipoint
c.) Half Duplex
d.) Full Duplex
13.Two stations can simultaneously send and receive data from each other.
a.) Point to point
b.) Multipoint
c.) Half Duplex
d.)Full Duplex
14. Connection refers to a communications connection between two nodes or endpoints
a.) Point to point
b.) Multipoint
c.) Half Duplex
d.) Full Duplex
15. Communication refers to communication that is accomplished through a distinct and specific
form of one-to-many connections
a.) Point to point
b.)Multipoint
c.) Half Duplex
d.) Full Duplex

Anda mungkin juga menyukai