Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
17 views7 pages

Activity 5

reviewer

Uploaded by

Andrew Alonzo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views7 pages

Activity 5

reviewer

Uploaded by

Andrew Alonzo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Activity 5

1. (a. Line, b. Block, c. Segment, d. Chunk) coding is needed for synchronization, error
detection, correction and control. Answer: Block
2. An analog to digital conversion technique that finds the change from the previous sample.
(a. PCM, b. DM, c. PAM, d. NAM)An analog to digital conversion technique that finds the
change from the previous sample. (a. PCM, b. DM, c. PAM, d. NAM). Answer: DM
3. If a symbol represents 4 bits, what is the minimum number of symbols needed. (a. 2, b. 4, c.
8, d. 16, e. 32). Answer: 16 (Solution: 2 ^ 4 = 16)
4. If the frequency spectrum of a signal has a bandwidth of 400 Hz with the
highest frequency at 500 Hz, what should be the minimum sampling rate,
according to the Nyquist theorem? (a. 400 samples/s, b. 800 samples/s, c.
500 samples/s, d. 1000 samples/s) Answer: 100 samples/s (Solution: 2 *
500 Hz = 1000 samples/s)
5. In Manchester and differential Manchester encoding, the transition at the
middle of the bit is used for: (a. bit transfer, b. baud transfer, c.
synchronization, d. none of the above). Answer: Synchronization
6. The ________ rate defines the number of bits sent in 1s; the ______ rate is
the number of signal elements sent in 1s. (a. data; baud, b. signal; data,
c. baud; bit, d. none of the above). Answer: Data; Baud
7. The first step in PCM is: (a. quantization, b. modulation, c. sampling, d.
none of the above) Answer: Sampling
8. The most common technique to convert an analog data signal to digital
data: (a. PAL, b. PCM, c. PSK, d. PMA) Answer: PCM (Pulse Code
Modulation)
9. The signal rate is sometimes called the ____ rate. (a. baud, b. bit, c. signal,
d. none of the above) Answer: Baud Rate
10. This technique sends groups of bits simultaneously, with each bit on a
separate line. (a. asynchronous, b. synchronous, c. parallel, d. serial).
Answer: Parallel
11. This transmission mode sends a start bit (0) at the beginning and 1 or
more stop bits (1s) at the end of each byte. (a. synchronous, b.
asynchronous, c. isochronous, d. none of the above) Answer:
Asynchronous
12. This transmission technique transmits bits over a single wire, one at a
time. (a. asynchronous, b. synchronous, c. parallel, d. serial) Answer:
Serial
13. Which encoding method uses assigns one digital symbol or level for
every 2 bits ? (a. NRZ-I, b. RZ, c. Manchester, d. AMI, e. 2B1Q f. 8B6T)
Answer: 2B1Q
14. Which quantization level results in a more faithful reproduction of the
signal? (a. 2, b. 8, c. 16, d. 32) Answer: 32
15. Multilevel, unipolar, bipolar, and polar encoding are types of what
encoding scheme. (a. line, b. block, c. segment, d. chunk) Answer: Line
16. A digital coding technique that represents digital data as variations in
the phase of a carrier wave. Answer: Phase Shift Keying
17. A digital coding technique that represents digital data as variations in
the number of oscillations per second of a carrier wave. Answer:
Frequency Shift Keying
18. A digital coding technique that represents digital data as variations in
the signal strength of a carrier wave. Answer: Amplitude Shift Keying
(ASK)
19. The technique that deals with the conversion digital or analog data to
digital signal. Answer: Encoding
20. The technique that deals with the conversion digital or analog data to
an analog signal. Answer: Modulation
21. A modulation technique wherein the signal strength of the carrier wave
is as a means of carrying information such as an audio signal. Answer: AM
22. A modulation technique wherein the cycles of the of the carrier wave is
varied as a means of carrying information such as an audio signal.
Answer: FM
23. A modulation technique wherein the phase of a radio or other wave is
varied as a means of carrying information such as an audio signal.
Answer: PM

Activity 6

1. ______ can be achieved by using multiplexing; ______ can be achieved by


using spreading.( a. Privacy and antijamming; efficiency, b. Efficiency;
privacy and antijamming, c. Privacy and efficiency; antijamming, d.
Efficiency and antijamming; privacy) Answer: Efficiency; privacy and
antijamming
2. ______ can be applied when the bandwidth of a link (in hertz) is greater
than the combined bandwidths of the signals to be transmitted. (a. TDM,
b. FDM, c. WDM, d. FHSS) Answer: FDM (Frequency Division Multiplexing)
3. A multiplexing technique that involves signals composed of light beams?
(a. FDM, b. TDM, c. WDM, d. none of the above) Answer: WDM
(Wavelength Division Multiplexing)
4. In a multiplexed system, __ line(s) share the bandwidth of ____ link(s). (a.
1; n, b. 1; 1, c. n; 1, d. n; n) Answer: n;1
5. In synchronous TDM, for n signal sources of the same data rate, each
frame contains _______ slots. (a. n, b. n + 1, c. n – 1, d. 0 to n) Answer: n
6. The sharing of a medium and its link by two or more devices:(a.
modulation, b. encoding, c. line discipline, d. multiplexing) Answer:
Multiplexing
7. This technique can be classified into: synchronous or statistical. (a. FDM,
b. TDM, c. WDM, d. none of the above) Answer: TDM (Time Division
Multiplexing)
8. This technique does not transmit analog signals? (a. FDM, b. TDM, c.
WDM, d. none of the above) Answer: none of the above
9. This technique is designed to be used in wireless applications in which
stations must be able to share the medium without interception by an
eavesdropper and without being subject to jamming from a malicious
intruder. (a. Multiplexing, b. Spreading, c. Modulating, d. Decoding.)
Answer: Spreading
10. This technique uses M different carrier frequencies that are modulated
by the source signal. At one moment, the sign modulates one carrier
frequency; at the next moment, the signal modulates/hops to another
carrier frequency. (a. FDM, b. DSSS, c. FHSS, d. TDM) Answer: FHSS
(Frequency Hopping Spread Spectrum)
11. A parabolic dish antenna is a(n) (a. omni-directional, b. bidirectional, c.
unidirectional, d. none of the above) antenna Answer: unidirectional
12. Fiber optic cable uses this kind of wave to transmit data: (a. light, b.
radio, c. infrared, d. very low frequency) Answer: light waves
13. In a fiber-optic cable, the signal is propagated along the inner core by:
(a. reflection, b. refraction, c. modulation, d. none of the above) Answer:
reflection
14. Signals with a frequency below 2 MHz use : propagation. (a. ground, b.
sky, c. line-of-sight, d. none of the above) Answer: ground propagation
15. These cables are composed of a glass or plastic inner core surrounded
by cladding, all encased in an outside jacket. (a. coaxial, b. fiber-optic, c.
twisted-pair, none of the above) Answer: fiber-optic
16. These media transport electromagnetic waves without the use of a
physical conductor: (a. cable, b. free space, c. air, d. water) Answer: Free
Space
17. This cable consists of an inner copper core and a second conducting
outer sheath. (a. Twisted-pair, b. Coaxial, c. Fiber-optic, d. Shielded
twisted-pair) Answer: Coaxial
18. This cable consists of two insulated copper wires twisted together. (a.
coaxial, b. fiber-optic, c. UTP, d. FTP) Answer: UTP (Unshielded Twisted
Pair)
19. Transmission media are usually categorized as: (a. fixed or unfixed, b.
guided or unguided, c. determinate or indeterminate, d. metallic or
nonmetallic) Answer: guided or unguided
20. Transmission media lie below the this layer: (a. physical, b. network, c.
transport, d. application) Answer: physical layer
21. When the angle of incidence is (a. more than, b. less than, c. equal to,
d. none of the above) the critical angle, the light beam bends along the
interface. Answer: more than
22. True: Refraction occurs when a wave impinges upon an object with,
causing the reflected energy to spread out in many directions. False:
Refraction occurs when a wave impinges upon an object with, causing the
reflected energy to spread out in many directions. Answer: False
23. Occurs when a wave impinges upon an object with, causing the
reflected energy to spread out in many directions. Answer: Scattering
24. Involves the bending of waves around obstacles and openings. Answer:
Diffraction
25. Involves a change in direction of waves when they bounce off a barrier.
Answer: Reflection
26. Involves a change in the direction of waves as they pass from one
medium to another. Answer: Refraction
27. Involves the transmission of radio signal in a direct path from the
source to the receiver Answer: Line-of-Sight Propagation
28. Involves the transmission of a radio signal along or near the surface of
the Earth Answer: Ground wave propagation
29. Involves either the reflection or refraction of radio signal back to the
earth from the ionosphere which is an electrically charged layer of the
upper atmosphere. Answer: Skywave propagation

Activity 7

1. ______ control refers to methods of error detection and correction. (a.


Flow, b. Error, c. Transmission, d. none of the these) Answer: Error
2. _______ control refers to a set of procedures used to restrict the amount of
data that the sender can send before waiting for acknowledgment. (a.
Flow, b. Error, c. Transmission, d. none of the these) Answer: Flow
3. _________control in the data link layer is based on automatic repeat
request (ARQ), which is the retransmission of data. (a. Flow, b. Error, c.
Transmission, d. none of the above) Answer: Error
4. Data link control deals with the design and procedures for ______
communication. (a. node-to-node, b. end-to-end, c. process-to-process)
Answer: node to node
5. In Stop-and-Wait ARQ, we use sequence numbers to number the frames.
The sequence numbers are based on __________arithmetic. (a. modulo-2,
b. modulo-4, c. modulo-m, d. none of the above) Answer: modulo 2
6. In the _____ Protocol, the sender sends its frames one after another with
no regard to the receiver. (a. Stop-and-Wait, b. Simplest, c. Go-Back-N
ARQ, d. Selective-Repeat ARQ) Answer: Simplest
7. In the _____ Protocol, the sender sends one frame, stops until it receives
confirmation from the receiver, and then sends the next frame. (a. Stop-
and-Wait, b. Simplest, c. Go-Back-N ARQ, d. Selective-Repeat ARQ)
Answer: Stop and Wait
8. The ____ Protocol has neither flow nor error control. (a. Stop-and-Wait, b.
Simplest, c. Go-Back-N ARQ, d. Selective-Repeat ARQ) Answer: Simplest
9. The Simplest Protocol is for ______ channels. (a. noisy, b. noiseless)
Answer: noiseless
10. _________ is a multiple-access method in which the available bandwidth
of a link is shared in time, frequency, or through code, between different
stations. (a. Random access, b. Controlled access, c. Channelization, d.
none of the above) Answer: channelization
11. __________ augments the CSMA algorithm to detect collision. (a.
CSMA/CA, b. CSMA/CD, c. CSMA, d. MA, e. Aloha) Answer: CSMA/DA
12. In ________ each station sends a frame whenever it has a frame to
send. (a. CSMA/CA, b. CSMA/CD, c. CSMA, d. MA, e. Aloha) Answer: Aloha
13. In ________, the available bandwidth is divided into frequency bands. (a.
FDMA, b. TDMA, c. CDMA, d. none of the above ) Answer: FDMA
14. In _______, the stations share the bandwidth of the channel in time. (a.
FDMA, b. TDMA, c. CDMA, d. FHSS) Answer: TDMA
15. In ______, the chance of collision can be reduced if a station senses the
medium before trying to use it. (a. MA, b. CSMA, c. FDMA, d. CDMA)
Answer: CSMA
16. In the _____ method, time is divided into intervals. In each interval, a
reservation frame precedes the data frames sent in that interval. (a.
reservation, b. polling, c. token passing, d. none of the above) Answer:
reservation
17. In the _______ method, the primary device controls the link; the
secondary devices follow its instructions. (a. reservation, b. polling, c.
token passing, d. votation) Answer: polling
18. In the _______ method, the stations in a network are organized in a
logical ring. (a. reservation, b. polling, c. token passing, d. votation)
Answer: token passing
19. In the ________ method, a station needs to make a reservation before
sending data. Time is divided into intervals. (a. reservation, b. polling, c.
token passing, d. votation) Answer: reservation
20. In the _________ method, a special packet called a ______ circulates
through the ring. (a. reservation: control frame, b. polling: poll request, c.
token passing: token, d. none of the above) Answer: token passing; token
21. In the ________method, a station that has a frame to send senses the
line. If the line is idle, it sends immediately. If the line is not idle, it waits a
random amount of time and then senses the line again. (a. non-persistent,
b. 1-persistent , c. p-persistent, d. none of the above) Answer: non-
persistent
22. A ________ error means that two or more bits in the data unit have
changed. (a. double-bit, b. burst, c. single-bit, d. none of the above)
Answer: double – bit
23. A form of error control where the receiver asks the sender to send the
data again. (a. ARP, b. ARQ, c. REQ, d. SNMP ) Answer: ARQ
24. A simple parity-check code can detect __________ errors. (a. even-
number of, b. two, c. no errors, d. odd-number of, e. none of these)
Answer: odd-number of
25. Given a polynomial generator g(x) = x^5+x^2+1, in binary, this is
equal to: (a. 100110, b. 101100, c. 101101, d. 100101, e. 101111)
Answer: 100110
26. If a syndrome s(x) results to 001, an error is inferred to be detected (a.
yes, b. no) Answer: Yes
27. In _____ coding, we divide our message into blocks, each of k bits,
called ___. (a. block; blockwords, b. linear; datawords, c. block; datawords,
d. none of the above Answer: block; datawords
28. In cyclic redundancy checking, if g(x) =1011, d(x)= 0100, and the
remainder to be 111, what is the codeword c(x) (a. 1011111, b.0100111,
c. 10110100 d.01001011, e. 1011, f. 0100, g. 111) Answer: not sure sa
answer ni chatgpt and gemini
29. In cyclic redundancy checking, what is the CRC? (a. the divisor, b. the
quotient, c. the dividend, d. the remainder) Answer: the remainder
30. In modulo-2 arithmetic, __________ give the same results. (a. addition
and multiplication, b. addition and division, c. addition and subtraction, d.
none of the above) Answer: add and subtract
31. In modulo-2 arithmetic, we use the ______ operation for both addition
and subtraction. (a. XOR, b. OR, c. AND, d. none of the above) Answer:
XOR
32. The _______ of a polynomial is the highest power in the polynomial. (a.
range, b. degree, c. power, d. none of the above) Answer: Degree
33. The ________ between two words is the number of differences between
corresponding bits. (a. Hamming code, b. Hamming distance, c. Hamming
rule, d. CRC) Answer: Hamming Distance
34. The _____of errors is more difficult than the ______. (a. detection;
correction, b. correction; detection, c. creation; correction, d. creation;
detection) Answer: correction; detection
35. The receiver corrects errors without requesting retransmission. (a. CRC,
b. FAC, c. FEC, d. NTC) Answer: FEC (Forward Error Correction)
36. ______ has no setup or tear-down phases. (a. frame switching, b. circuit
switching, c. datagram switching, d. none of these) Answer: Datagram
Switching
37. Circuit switching takes place at the ________ layer. (a. data link, b.
physical, c. network, d. transport) Answer: physical
38. In __________, each packet is treated independently of all others. (a.
datagram switching, b. circuit switching, frame switching,) Answer:
Datagram Switching
39. In _________, resources are allocated on demand. (a. frame switching, b.
circuit switching, c. datagram switching, d. none of these) Answer:
Datagram Switching
40. In _________, there is no resource allocation for a communication flow.
(a. frame switching, b. circuit switching, c. datagram switching) Answer:
frame switching
41. In _______, the resources need to be reserved during the setup phase;
the resources remain dedicated for the entire duration of data transfer
phase until the tear-down phase. (a. datagram switching, b. circuit
switching, c. frame switching) Answer: circuit switching

You might also like