Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
104 views10 pages

Acs Quiz

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 10

ACS QUIZ

Q1. OFDM is a technique of


1. encoding digital data 2. multiple carrier frequencies
3. wide band digital communication 4. 4G mobile communication

a. 1,2 and 3 are correct


b. 2 and 3 are correct
c. 1, 2 and 4 are correct
d. All the four correct
ANSWER: d. All the four correct

Q2. Advantages of using OFDM include


1. Avoids complex equalizers
2. Low symbol rate and guard interval
3. Avoids ISI
4. Multiple users at same frequency

a. 1,2 and 3 are correct


b. 2 and 3 are correct
c. 1, 2 and 4 are correct
d. All the four correct
ANSWER: d. All the four correct

Q3. The troubles that OFDM faces over other spread spectrum techniques are
1. Sensitivity to Doppler shift 2. Frequency synchronization problems
3. Time synchronization problems 4. Low efficiency due to guard intervals

a. 1,2 and 3 are correct


b. 2 and 3 are correct
c. 1, 2 and 4 are correct
d. All the four correct
ANSWER: c. 1, 2 and 4 are correct

Q4. The guard interval is provided in OFDM


a. To eliminate the need of pulse shaping filter
b. To eliminate ISI
c. High symbol rate
d. Both a) and b)
e. Both b) and c)
ANSWER: d. Both a) and b)

Q5. CDMA is
1. Spread spectrum technology
2. Using same communication medium
3. every user stays at a certain narrowband channel at a specific time period
4. each user has unique PN code

a. 1,2 and 3 are correct


b. 2 and 3 are correct
c. 1, 2 and 4 are correct
d. All the four correct
ANSWER: c. 1, 2 and 4 are correct

Q6. Global Positioning System uses


a. CDMA
b. TDMA
c. SDMA
d. FDMA
ANSWER: a. CDMA

Q7. CDMA is advantageous over other Spread Spectrum techniques for


1. The privacy due to unique codes 2. It rejects narrow band interference
3. Resistance to multi path fading 4. Its ability to frequency reuse

a. 1,2 and 3 are correct


b. 2 and 3 are correct
c. 1, 2 and 4 are correct
d. All the four correct
ANSWER: d. All the four correct

Q8. The wide band usage in CDMA helps in


1. Increased immunity to interference
2. Increased immunity to jamming
3. Multiple user access
4. Different spectrum allocation in different time slots

a. 1,2 and 3 are correct


b. 2,3 and 4 are correct
c. 1, 2 and 4 are correct
d. All the four correct
ANSWER: a. 1,2 and 3 are correct
Q9. The advantages of using a CDMA technique over other spread spectrum techniques
are
1. Increased capacity
2. Easier handoff
3. Better measure of security
4. Multiple users occupy different spectrum at a time

a. 1,2 and 3 are correct


b. 2,3 and 4 are correct
c. 1, 2 and 4 are correct
d. All the four correct
ANSWER: a. 1,2 and 3 are correct
Q10. FHMA is
1. Spread spectrum technology
2. Using same communication medium
3. every user has assigned unique frequency slot
4. each user has unique PN code

a. 1 and 2 are correct


b. 1, 2 and 4 are correct
c. 2 and 4 are correct
d. All the four correct
ANSWER: d. All the four correct

Q11. The modulation technique used for mobile communication systems during world war
II was
a. Amplitude modulation
b. Frequency modulation
c. ASK
d. FSK

ANSWER: b. Frequency modulation


Q12. ----------- introduced Frequency Modulation for mobile communication systems in
1935.
a. Edwin Armstrong
b. Albert Einstein
c. Galileo Galilei
d. David Bohm

ANSWER: a. Edwin Armstrong

Q13. The early FM push-to-talk telephone systems were used in


a. Simplex mode
b. Half duplex mode
c. Full duplex mode
d. None of the above
ANSWER: b. Half duplex mode
Q14. DECT stands for
a. Digital European Cellular Telex
b. Digitized Emergency Cellular Telephone
c. Digital European Cordless Telephone
d. Digital European Cellular Telephone
ANSWER: c. Digital European Cordless Telephone
Q15. World's first cellular system was developed by
a. Nippon Telephone and Telegraph (NTT)
b. Bellcore and Motorola
c. AT&T Bell Laboratories
d. Qualcomm
ANSWER: a. Nippon Telephone and Telegraph (NTT)
Q16. TDMA is a multiple access technique that has
a. Different users in different time slots
b. Each user is assigned unique frequency slots
c. Each user is assigned a unique code sequence
d. Each signal is modulated with frequency modulation technique
ANSWER: a. Different users in different time slots
Q17. In TDMA, the user occupies the whole bandwidth during transmission.
a. True
b. False
ANSWER: a. True
Q18. TDMA allows the user to have
a. Use of same frequency channel for same time slot
b. Use of same frequency channel for different time slot
c. Use of same time slot for different frequency channel
d. Use of different time slot for different frequency channels

ANSWER: b. Use of same frequency channel for different time slot


Q19. GSM is an example of
a. TDMA cellular systems
b. FDMA cellular systems
c. CDMA cellular systems
d. SDMA cellular systems
ANSWER: a. TDMA cellular systems

Q20. TDMA is employed with a TDMA frame that has preamble. The preamble contains
Address of base station and subscribers
1. Synchronization information 2. Frequency allotted 3. Coded sequence

a. 1 and 2 are correct


b. 1, 2 and 3 are correct
c. 2 and 4 are correct
d. All the four correct
ANSWER: a. 1 and 2 are correct
Q21. FDMA is the division of
a. Time
b. Phase
c. Spectrum
d. Amplitude

ANSWER: c. Spectrum

Q22. Guard band is


a. The small unused bandwidth between the frequency channels to avoid interference
b. The bandwidth allotted to the signal
c. The channel spectrum
d. The spectrum acquired by the noise between the signal
ANSWER: a. The small unused bandwidth between the frequency channels to avoid
interference
Q23. Cable television is an example of
a. TDMA
b. FDMA
c. CDMA
d. SDMA
ANSWER: b. FDMA
Q24. In FDMA,
1. Each user is assigned unique frequency slots
2. Demand assignment is possible
3. Fixed assignment is possible
4. It is vulnerable to timing problems
a. Only 1) and 2) are correct
b. 2) and 4) are correct
c. 1), 2) and 3) are correct
d. All four are correct
ANSWER: c. 1), 2) and 3) are correct

Q25. FDMA demand assignment uses


1. Single channel per carrier
2. Multi channel per carrier
3. single transmission in one time slot
4. multi transmission in one time slot

a. 1) and 2) are correct


b. 2), 3), and 4) are correct
c. 1), 2), and 3) are correct
d. All four are correct
ANSWER: a. 1) and 2) are correct

Q26. The advantages of FDMA over TDMA includes


1. Division is simpler
2. Propagation delays are eliminated
3. Cheaper filters with less complicated logic functions
4. Linearity
a. 1), 2) and 3) are correct
b. 1) and 2) are correct
c. 1) and 4) are correct
d. All four are correct
ANSWER: b. 1) and 2) are correct

Q.27 MIMO stands for _______


a) Many input many output
b) Multiple input multiple output
c) Major input minor output
d) Minor input minor output
Answer: b

Q.28 In MIMO, which factor has the greatest influence on data rates?
a) The size of antenna
b) The height of the antenna
c) The number of transmit antennas
d) The area of receive antennas
Answer: c

Q.29 MIMO is a smart antenna technology.


a) True
b) False
Answer: a

Q.30 MIMO technology makes advantage of a natural radio wave phenomenon called
_______
a) Reflection
b) Multipath
c) Refraction
d) Diffraction
Answer: b

Q.31 Which statement is true regarding classless routing protocols?


a) The use of discontinuous networks is not allowed
b) The use of variable length subnet masks is permitted
c) RIPv1 is a classless routing protocol
d) RIPv2 supports classless routing
Answer: b

Q.32 What is route poisoning?


a) It sends back the protocol received from a router as a poison pill, which stops the regular
updates. The use of variable length subnet masks is permitted
b) It is information received from a router that can’t be sent back to the originating router.RIPv2
supports classless routing
c) It prevents regular update messages from reinstating a route that has just come up
d) It describes when a router sets the metric for a downed link to infinity
Answer: d

Q.33 Which of the situations might not require multiple routing protocols in a network?
a) When a new Layer 2-only switch is added to the network
b) When you are migrating from one routing protocol to another
c) When you are using routers from multiple vendors
d) When there are host-based routers from multiple vendors
Answer: a

Q.34 Which is a reason for avoiding doing route redistribution on two routers between the
same two routing domains?
a) Higher cost of two routers
b) Routing feedback
c) Cisco IOS incompatibility
d) Not possible to use two routers
Answer: b

Q.35 What does administrative distance rank?


a) Metrics
b) Sources of routing information
c) Router reliability
d) Best paths
Answer: b
Q.36 In cryptography, what is cipher?
a) algorithm for performing encryption and decryption
b) encrypted message
c) both algorithm for performing encryption and decryption and encrypted message
d) decrypted message
Answer: a

Q.37 In asymmetric key cryptography, the private key is kept by __________


a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network
Answer: b

Q.38 What is data encryption standard (DES)?


a) block cipher
b) stream cipher
c) bit cipher
d) byte cipher
Answer: a

Q.39 In the network HTTP resources are located by __________


a) Uniform resource identifier
b) Unique resource locator
c) Unique resource identifier
d) Union resource locator
Answer: a

Q.40 The File Transfer Protocol is built on __________


a) data centric architecture
b) service oriented architecture
c) client server architecture
d) connection oriented architecture
Answer: c
Q.41 Which type of Ethernet framing is used for TCP/IP and DEC net?
a) Ethernet 802.3
b) Ethernet 802.2
c) Ethernet II
d) Ethernet SNAP
Answer: c

Q.42 The transmission bandwidth of spread spectrum techniques is equal to the minimum
required signal bandwidth.
a) True
b) False
Answer: b

Q.43 Why spread spectrum technique is inefficient for a single user?


a) Large transmission bandwidth
b) Small transmission bandwidth
c) Fixed transmission bandwidth
d) Fixed null bandwidth
Answer: a

Q.44 Which of the following is not a property of spread spectrum techniques?


a) Interference rejection capability
b) Multipath fading
c) Frequency planning elimination
d) Multiple user, multiple access interface
Answer: b

Q.45 Which of the following is not a characteristic of PN sequence?


a) Nearly equal number of 0s and1s
b) Low correlation between shifted version of sequence
c) Non deterministic
d) Low cross-correlation between any two sequences
Answer: c

Q.46 PN sequence can be generated using sequential logic circuits.


a) True
b) False
Answer: True
Q.47 DSSS system spreads the baseband signal by ________ the baseband pulses with a
pseudo noise sequence.
a) Adding
b) Subtracting
c) Multiplying
d) Dividing
Answer: c

Q.48 Frequency hopping involves a periodic change of transmission _______


a) Signal
b) Frequency
c) Phase
d) Amplitude
Answer: b

Q.49 What is the set of possible carrier frequencies in FH-SS?


a) Hopset
b) Hop
c) Chips
d) Symbols
Answer: a

Q.50 The bandwidth of the channel used in the hopset is called _________
a) Hopping bandwidth
b) Total hopping bandwidth
c) Instantaneous bandwidth
d) 3 dB bandwidth
Answer: c

You might also like