Digital Communication MCQ Sanfoundry PDF
Digital Communication MCQ Sanfoundry PDF
Digital Communication MCQ Sanfoundry PDF
a) Analog circuits
b) Digital circuits
c) Amplifiers
d) A/D converters
SECTION 2:
8. Determine the periodicity and also find whether it is a power or energy signal?
e(-at)u(t)
a) Periodic and energy signal
b) Non periodic and energy signal
c) Periodic and power signal
d) Periodic and energy signal
View Answer
6. According to Parseval’s theorem the energy spectral density curve is equal to?
a) Area under magnitude of the signal
b) Area under square of the magnitude of the signal
c) Area under square root of magnitude of the signal
d) None of the mentioned
View Answer
9. Autocorrelation is a function of
a) Time
b) Frequency
c) Time difference
d) Frequency difference
View Answer
Answer: a
Explanation: The distribution function of a random variable is the probability that the value taken
by the random variable is less than or equal to the real number x.
Answer: a
Explanation: F(minus infinity) is 0 and F(infinity) is 1.
Answer: a
Explanation: The probability density function is always greater than 0. It is a non negative
function with the area of 1.
Answer: b
Explanation: Variance gives the randomness of the random variable. It is the difference between
the mean square value and square of the mean.
Answer: a
Explanation: A random process is defined to be stationary in a strict sense if its statistics varies
with a shift in time origin.
Answer: b
Explanation: Autocorrelation function depends on the time difference between t1 and t2.
Answer: a
Explanation: On substituting different values in the formula for autocorrelation function it wil be
maximum at the origin.
Answer: b
Explanation: The standard deviation of a random variable gives the rms value of an ac
component.
Answer: c
Explanation: White noise is a zero mean function with infinite average power, finite variance and
infinite bandwidth.
1. The process of data conversion along with formatting the data is called as ______
a) Formatting
b) Modulation
c) Source coding
d) Amplifying
View Answer
Answer: c
Explanation: The process of converting source information to a digital signal and also formatting
it is called as source coding.
advertisement
2. Formatting is the process which includes
a) Pulse code modulation
b) Sampling
c) Quantization
d) All of the mentioned
View Answer
Answer: d
Explanation: Formatting is the process in which the source information is converted to digital
signals using methods like sampling, pulse code modulation etc.
Answer: d
Explanation: Textual information, analog information and digital information undergoes different
processes before converting to binary or digital data. The method used for converting analog
information are the given methods.
4. The process that transforms text into binary digits is called as _______
a) Binary coding
b) Data coding
c) Character coding
d) Sampling
View Answer
Answer: c
Explanation: According to the definition the process of converting textual data to binary digits is
called as character coding.
5. For the number of bits, k=1 and number of symbols, M=2 the system is called as
a) Unary
b) Binary
c) Quarternary
d) None of the mentioned
View Answer
Answer: b
Explanation: For k number of bits, the number of symbols are M=2k. For k=1 and M=2 the system
is called as binary coding.
advertisement
6. Perform the bit stream partitioning and find the 8-ary waveform for the word ‘THINK’.
a) 1204443464
b) 4643444021
c) 1240443464
d) none of the mentioned
View Answer
Answer: a
Explanation: “THINK”
ASCII value: T-001010 ; H-000100; I-100100; N-011100; K-110100
8-ary symbols(split into 3 bits): 1 2 0 4 4 4 3 4 6 4.
Answer: a
Explanation: “THINK”
ASCII value: T-001010; H-000100; I-100100; N-011100; K-110100
32-ary symbols(split into 5 bits): 5 1 4 17 25 20.
Answer: a
Explanation: “HAPPY”
ASCII value: H-000100; A-100000; P-000010; P-000010; Y-100110
32-ary symbols: 2 8 0 8 5 6.
Answer: d
Explanation: The output from the ideal transmission line has some time delay different
amplitude but it should not have distortion it should have the same shape as the input.
advertisement
11. The point at which the output signal power has fallen to 0.707 of its peak value is called as _____
a) 3db point
b) Half power point
c) 3db & Half power point
d) None of the mentioned
View Answer
Answer: c
Explanation: The frequency at which the output signal power falls to half the peak value is called
as half power point or 3db point.
12. The ratio of the filter bandwidth at -60db and -6db amplitude response point is called as _____
a) Half point factor
b) Normalized factor
c) Shape factor
d) None of the mentioned
View Answer
Answer: c
Explanation: Shape factor is a measure of how well realizable filter approximates to ideal filter. It
is the ratio of filter bandwidths -60db and -6db amplitude points.
13. As the order of the filter increases, the cost ______ and complexity ______
a) Increases, increases
b) Increases, decreases
c) Decreases, increases
d) Decreases, decreases
View Answer
Answer: a
Explanation: According to the design of the filter as the order increases the complexity and cost
of the filter also increases.
advertisement
14. Which filter has maximum flatness?
a) Chebyshev filter
b) Butter-worth filter
c) High pass filter
d) Normalized filter
View Answer
Answer: b
Explanation: Butter-worth filter as the best approximation to ideal filter and has the maximum
flatness in the filter pass-band.
15. The measure of the width of the main lobe is called as ________
a) Null to null bandwidth
b) Half power bandwidth
c) Normalized bandwidth
d) Absolute bandwidth
View Answer
Answer: a
Explanation: The main lobe consists of the maximum signal power. The measure of the width of
the main lobe is called as null to null bandwidth.
SECTION 6: Noise 1
1. SQNR can be improved by _______ sampling rate.
a) Increasing
b) Decreasing
c) Does not depend
d) None of the mentioned
View Answer
Answer: a
Explanation: SQNR can be improved by increasing the sampling rate.
advertisement
2. Which offers better SQNR?
a) Delta modulation
b) PCM
c) Delta modulation & PCM
d) None of the mentioned
View Answer
Answer: b
Explanation: PCM offers better SQNR than delta modulation.
3. Two functions are called as orthogonal if on integrating the product we get
a) One
b) Zero
c) Infinity
d) None of the mentioned
View Answer
Answer: b
Explanation: Two functions are called as orthogonal if the integral value of integrating the
product is zero.
Answer: b
Explanation: An important property of eigen function is that they are orthogonal.
Answer: c
Explanation: Shot noise occurs due to particle like the behaviour of electron and photon.
advertisement
6. Shot noise is avoidable when current is
a) Zero
b) One
c) Infinity
d) None of the mentioned
View Answer
Answer: a
Explanation: Shot noise is avoidable only when the current is zero.
7. Shot noise is
a) Stochastic process
b) Poisson process
c) Stochastic & Poisson process
d) None of the mentioned
View Answer
Answer: b
Explanation: Shot noise is a Poisson process.
Answer: c
Explanation: Thermal noise occurs due to equilibrium fluctuations. This noise is also called as
Johnson noise.
Answer: b
Explanation: Flicker noise is called as pink noise.
advertisement
10. Which has the same power spectral density?
a) White noise
b) Brown noise
c) White & Brown noise
d) None of the mentioned
View Answer
Answer: a
Explanation: White noise has same power spectral density where as it decreases in case of
brown noise.
SETION 7: Noise – 2
Answer: c
Explanation: Brown noise is sometimes useful for dithering.
advertisement
2. Capacity of a channel can be increased by
a) Increasing channel bandwidth
b) Increasing signal power
c) Increasing channel bandwidth &signal power
d) None of the mentioned
View Answer
Answer: c
Explanation: Capacity of a channel can be increased by increasing channel bandwidth and also
by increasing signal power.
Answer: a
Explanation: Capacity of a channel can be increased by reducing the in band noise power.
4. Noise has
a) Infinite energy
b) Infinite power
c) Infinite energy & power
d) None of the mentioned
View Answer
Answer: a
Explanation: Noise has infinite energy signal.
5. Thermal noise is
a) Energy signal
b) Power signal
c) Energy & Power signal
d) None of the mentioned
View Answer
Answer: b
Explanation: Thermal noise is considered as power signal as it has infinite energy.
advertisement
6. Thermal noise is a wide sense stationary process.
a) True
b) False
View Answer
Answer: a
Explanation: Thermal noise is modeled as a wide sense stationary stochastic process.
Answer: a
Explanation: The maximum likelihood function is always positive.
8. Matched filtering operation includes
a) Spectral phase matching
b) Spectral amplitude matching
c) Spectral phase & amplitude matching
d) None of the mentioned
View Answer
Answer: c
Explanation: Matched filtering includes two operations – spectral amplitude matching and
spectral phase matching.
9. Matched filter is
a) Linear
b) Non linear
c) Linear & Non linear
d) None of the mentioned
View Answer
Answer: a
Explanation: Matched filter is a linear filter.
advertisement
10. Which consists of less ISI?
a) Nyquist filter
b) Raised cosine filter
c) Nyquist & Raised cosine filter
d) None of the mentioned
View Answer
Answer: b
Explanation: Raised cosine filter results in less ISI than Nyquist filter.
Answer: a
Explanation: Digital communication is less sensitive to environmental changes like temperature
etc.
advertisement
2. Advantages of digital communication are
a) Easy multiplexing
b) Easy processing
c) Reliable
d) All of the mentioned
View Answer
Answer: d
Explanation: Digital communication is a very reliable communication. It is easy for multiplexing,
easy for signalling and processing etc.
Answer: d
Explanation: Bit, character, frame synchronization and precision timing is necessary for digital
communication. This is considered as a disadvantage of digital communication.
Answer: c
Explanation: Digital communication needs more bandwidth, has higher complexity and little
performance degradation occurs during analog to digital conversion and vice versa.
Answer: d
Explanation: Some of the examples of digital communication systems are classical telephony,
ISDN, Modems, LANs, PCM TDM etc.
advertisement
6. Which system uses digital transmission?
a) ISDN
b) LANs
c) ISDN & LANs
d) None of the mentioned
View Answer
Answer: c
Explanation: Though the signal type is analog or digital, the transmission takes place in the digital
domain in ISDN and LANs.
7. The interval of frequencies outside which the spectrum is zero is called as ________
a) null to null bandwidth
b) normalized bandwidth
c) absolute bandwidth
d) none of the mentioned
View Answer
Answer:c
Explanation: The measure of frequencies outside which spectrum is zero is called as absolute
bandwidth. It is usually infinite.
Answer: c
Explanation: Bounded power spectral density is the bandwidth outside which the spectrum must
have fallen to a stated level below that found at the band center.
Answer: d
Explanation: The synchronization techniques available in digital communication are symbol
synchronization, frame synchronization and carrier synchronization.
advertisement
10. Digital system includes
a) Better encryption algorithm
b) Difficult data multiplexing
c) All of the mentioned
d) None of the mentioned
View Answer
Answer: a
Explanation: Digital system has an advantage of better encryption algorithm, easier data
multiplexing and more reliability.
Answer: c
Explanation: Analog to digital conversion is a two step process which includes sampling and
quantization.
SECTION 9: Digital Communication System – 1
Answer: c
Explanation: The main features of a receiver which increases its complexity are synchronization
of carrier, phase, and timing and multiple parallel receiver chain.
advertisement
2. What conditions must be fulfilled in a good digital communication system?
a) High data rate
b) High fidelity
c) Low transmit power
d) All of the mentioned
View Answer
Answer: d
Explanation: Some of the conditions which must be satisfied in a digital communication system
are high data rate, high fidelity, low bandwidth, low transmit power and low transmitter and
receiver complexity.
Answer: a
Explanation: Wired channels are lossy channels.
Answer: a
Explanation: The equivalent temperature is the function of the receiver design and it must be
always kept low.
advertisement
6. What are the main features of a transmitter?
a) Higher clock speed
b) Linear power amplifier
c) Directional antennas
d) All of the mentioned
View Answer
Answer: d
Explanation: Some of the main features which make the transmitter complex are higher clock
speed, higher transmit power, directional antennas and need for a linear amplifier.
Answer: d
Explanation: Air, water and copper cable can be used as transmission media in low frequency
band communication.
Answer: b
Explanation: For medium frequency band communication air and copper cable can only be used
as a transmission medium.
Answer: a
Explanation: Matched filter technique is a demodulation process used to increase SNR.
advertisement
10. Matched filter can also be used as least squares estimator.
a) True
b) False
View Answer
Answer: a
Explanation: A matched filter can also be used as a least squares estimator.
Answer: d
Explanation: Digital communication system can handle signals that are analog or those that are
already digital. It can also handle 1D and 2D signals.
Answer: c
Explanation: Information source comes from a higher networking layer. It can be continuous or
packetized.
1. Which are the common transmission media used in digital communication system?
a) Coaxial cable
b) Twisted copper cable
c) Radio frequency bands
d) All of the mentioned
View Answer
Answer: d
Explanation: Some of the commonly used physical transmission media are twisted copper cable,
good quality coaxial cable and radio frequency bands.
advertisement
2. The basic transmission-reception system is a ______ system.
a) Two block system
b) Three block system
c) Four block system
d) None of the mentioned
View Answer
Answer: b
Explanation: The basic transmission-reception consists of three blocks – transmitter,
transmission medium, receiver.
Answer: c
Explanation: When information is transmitted through large distance it must be amplified.
Modulation channel consists of an amplifier and other signal processing units.
Answer: b
Explanation: Modulation channel accepts analog signal as input and delivers another version of
modulated signal as analog waveform.
Answer: b
Explanation: Larger bandwidth is available when operating frequency bands are higher.
advertisement
6. Ground wave communication occurs in
a) Low frequency band
b) Medium frequency band
c) Low & Medium frequency band
d) None of the mentioned
View Answer
Answer: c
Explanation: Ground wave communication can take place in both low frequency and medium
frequency bands.
Answer: c
Explanation: Sampling theorem is used for converting continuous time signal to discrete type
signal and vice versa.
Answer: a
Explanation: A signal can be recovered from its sampled version by using an ideal low pass filter.
Answer: a
Explanation: A train of pulses with narrow bandwidth is realizable than the impulse train.
advertisement
10. In flat top sampling scheme, ______ is kept constant after sampling.
a) Amplitude
b) Phase
c) Frequency
d) Time period
View Answer
Answer: a
Explanation: In flat top sampling scheme, the amplitude is kept constant after sampling.
Answer: a
Explanation: Loop filter is a low pass filter used to reduce noise.
Answer: b
Explanation: A stationary stochastic process is an infinite energy signal and hence its fourier
transform does not exist.
advertisement
2. The power spectral density function of the stochastic process is
a) Real
b) Odd
c) Real & odd
d) None of the mentioned
View Answer
Answer: a
Explanation: The power spectral density function of a stochastic function is real and even.
3. For a periodic function, the spectral density and auto correlation functions form
a) Fourier transform pair
b) Laplace transform pair
c) Hilbert transform pair
d) Z transform pair
View Answer
Answer: a
Explanation: For a periodic function, the spectral density and auto correlation function forms
fourier transform pair.
Answer: c
Explanation: The capacity of the channel is given by a maximum rate of information transmitted.
5. In a communication system, a process in which statistical averages and time averages are equal
is called as
a) Stationary
b) Ergodic
c) Gaussian
d) Poisson
View Answer
Answer: b
Explanation: In ergodic process statistical averages and time averages are equal.
advertisement
6. A rectangular pulse of duration T is applied to a matched filter. The output of the filter is a
a) Rectangular pulse of duration T
b) Rectangular pulse of duration 2T
c) Triangular pulse
d) Sine function
View Answer
Answer: c
Explanation: The output of the matched filter when a rectangular pulse of duration T is applied is
a triangular pulse.
7. The line code has a zero dc component for pulse transmission of random binary data is
a) NRZ
b) RZ
c) Alternate mark inversion
d) None of the mentioned
View Answer
Answer: c
Explanation: The line code has a zero dc component for pulse transmission of random binary
data is alternate mark inversion.
Answer: a
Explanation: The auto-correlation of white noise is a delta function.
Answer: a
Explanation: Ionospheric communication takes place in high frequency band.
Answer: c
Explanation: Satellite communication takes place in ultra high and super high frequency bands.
advertisement
11. The weighing matrix is
a) Positive quantity
b) Inverse of covariance matrix of the input vector
c) Positive quantity & Inverse of a covariance matrix of the input vector
d) None of the mentioned
View Answer
Answer: c
Explanation: W is a positive definite weighing matrix and it is inverse of covariance matrix of the
input vector.
Answer: a
Explanation: Non uniform tree for binary search increases the bit rate.
13. Two clock with rates T1 and T2 are incommensurate if its ratio is
a) Rational
b) Irrational
c) Equal
d) None of the mentioned
View Answer
Answer: b
Explanation: Two clock with rates T1 and T2 are incommensurate if its ratio is irrational.
Answer: c
Explanation: Methods for timing error detections are early late timing error detection and zero
crossing timing error detection method.
Answer: a
Explanation: Twisted copper wire at 1KHz have low power loss.
advertisement
16. Voltage generated by lightning is an example for
a) Energy signal
b) Power signal
c) Energy & Power signal
d) None of the mentioned
View Answer
Answer: a
Explanation: Voltage generated by lightning is an example for energy signal and it has very high
power.
Answer: a
Explanation: In digital communication system, signals from different frequency bands are
orthogonal thus interference won’t occur.
advertisement
2. Properties of impulse function are
a) Symmetry
b) Time scaling
c) Shifting
d) All of the mentioned
View Answer
Answer: d
Explanation: Some of the properties of impulse function are symmetry, time scaling and shifting.
Answer: d
Explanation: Some of the properties of Fourier transform are duality property, time scaling
property, time shifting property, modulation property and many more.
Answer: b
Explanation: A base-band signal can be up-converted to band-pass filter by applying cosine wave.
Answer: b
Explanation: For down-conversion of a band-pass signal also cosine signal is used and multiplied
with it.
advertisement
6. In down-conversion multiplication with cosine wave is followed by
a) Low pass filter
b) High pass filter
c) Bandpass filter
d) Bandstop filter
View Answer
Answer: a
Explanation: Downconversion of bandpass signal includes multiplication with sine wave followed
by low pass filtering.
Answer: b
Explanation: Asymmetric digital subscriber line has three information channels – a high speed
downstream channel, ISDN channel and medium speed duplex channel.
Answer: c
Explanation: Fourier transform of a signal give the frequency content and also determines the
bandwidth of the signal.
Answer: d
Explanation: Some of the random things in the communication system are noise in the channel,
attenuation, fading, channel filtering, device frequency, phase and timing offset.
10. Which can be used for periodic and non periodic?
a) Fourier series
b) Fourier transforms
c) Fourier series & transforms
d) None of the mentioned
View Answer
Answer: b
Explanation: Fourier series is limited to only periodic signals where as Fourier transforms and
laplace transforms can be used for both periodic and non periodic signals.
advertisement
11. A band-pass signal has a Fourier transform equal to
a) One
b) Zero
c) Infinity
d) Cannot be determined
View Answer
Answer: b
Explanation: A band-pass signal has a Fourier transform equal to zero for all value in both
frequency and time domain.
Answer: b
Explanation: A band-pass signal has no DC components and has Fourier transform equal to zero.
Outside the band it will not be exactly zero. Thus this results in presence of side lobes.
Answer: d
Explanation: Some of the common orthonormal signal representations are sine and cosine at the
same frequency, Fourier serier, sinc functions centered at sampling times, wavelets etc.
Answer: c
Explanation: Cumulative distribution function is non negative and non decreasing function.
advertisement
16. Which are non negative functions?
a) PDF
b) PMF
c) PDF & PMF
d) None of the mentioned
View Answer
Answer: c
Explanation: PDF, PMF and CDF are non negative functions.
Answer: b
Explanation: The analog data is converted to digital data through sampling. Sampling is done
using sample and hold mechanism which uses transistor, capacitor or shutter etc.
advertisement
2. The output of sampling process are called as ________
a) Pulse code modulation
b) Pulse amplitude modulation
c) Frequency modulation
d) Amplitude modulation
View Answer
Answer: b
Explanation: In sampling process, input data is split up into samples whose output samples are
called as pulse amplitude modulation as the amplitude of the samples is derived from the input
waveform.
Answer: d
Explanation: By sampling theorem the input can be derived from the output samples if Ts is
lesser than or equal to 1/2fm.
4. The fourier tranform of one impulse train is also another impulse train with a period of the
output equal to the
a) Period of the input
b) Reciprocal of the period of input signal
c) Half the period of input
d) Twice the period of the input
View Answer
Answer: b
Explanation: When we perform fourier tranform on one impulse train we will get another
impulse train with its period reciprocally related to each other.
5. The process in which the top of each pulse in the output samples retains the shape of the analog
segment is called as ________
a) Natural sampling
b) Ideal sampling
c) Aliasing
d) None of the mentioned
View Answer
Answer: a
Explanation: In the method of natural sampling, the top of each pulse in the sampled sequence
retains the same shape of the analog input signal.
advertisement
6. The effects of aliasing are ________
a) Attenuation of high frequency spectral replicates
b) Non uniform spectral gain applied to desired baseband spectrum
c) Attenuation and non uniform spectral gain
d) None of the mentioned
View Answer
Answer: c
Explanation: Aliasing is due to undersampling and its effects are attenuation and non uniform
spectral gain.
7. Aliasing can be removed using
a) Prefiltering
b) Postfiltering
c) Prefiltering & Postfiltering
d) None of the mentioned
View Answer
Answer: c
Explanation: Aliasing can be removed using both prefiltering and postfiltering but prefiltering is
most effective and preferred.
Answer: b
Explanation: Oversampling is most economic way of sampling or for converting analog
information to digital as performing signal processing using digital system is less costlier than
doing it with high performace analog system.
Answer: b
Explanation: In flat top sampling the top of the pulses are flat which in turn means that they have
the same amplitude.
advertisement
10. Multiplication of input signal with pulse train is done in ________ sampling.
a) Impulse sampling
b) Natural sampling
c) Flat top sampling
d) None of the mentioned
View Answer
Answer:b
Explanation: In impulse sampling the input signal is multiplied with impulse train and in natural
sampling it is multiplied with pulse train.
Answer: c
Explanation: The analog signal obtained from sampling quantization and transmitted pulses will
have corruption from several sources in which the two main sources are quantizing and
sampling effect and channel effect.
advertisement
2. The distortion in quantization is called as
a) Round off error
b) Truncation error
c) Round off & Truncation error
d) None of the mentioned
View Answer
Answer: c
Explanation: After sampling and quantization of input signals, the ouput sampled sequence
consists of some distortion which can be called as round off error or truncation error.
Answer: b
Explanation: The distortion introduced to approximate the analog signal is called as quantization
noise. The amount of this noise is inversely proportional to number of levels employed in
quantization process.
Answer: a
Explanation: When the difference between input and output signal increases, we say that analog
to digital converter is working in saturation. This introduces saturation noise or error. This can be
reduced by using automatic gain control.
advertisement
6. The reasons for the threshold effect are
a) Thermal noise
b) Interference from other users
c) Interference from circuit switching transients
d) All of the mentioned
View Answer
Answer: d
Explanation: The channel noise which is caused by thermal noise interference from other users
and circuit switching transients is called as threshold effect.
Answer:b
Explanation: When channel bandwidth is greater than pulse bandwidth, the signal widens and
expands exceeding the symbol duration which causes intersymbol interference.
Answer: b
Explanation: The variance corresponds to average quantization noise power. It is calculated
assuming the quantization noise and probability distribution function.
Answer: b
Explanation: On calculating the number of levels, quantization error and power and also signal to
noise ration we can find that signal to noise ratio depends directly on square of number of
quantization levels.
advertisement
10. Signal to noise ratio is infinite when
a) Quantization noise is zero
b) Number of levels are infinite
c) Quantization noise is zero & Number of levels are infinite
d) None of the mentioned
View Answer
Answer: c
Explanation: In the limit L tends to infinity and signal to quantization noise ratio tends to infinity
when quantization levels are infinite and quantization noise is zero.
Answer: a
Explanation: On calculating the signal power and the quantization noise, and on taking its ratio it
depends on the number of quantization level L and we get as 3L2.
1. The signals which are obtained by encoding each quantized signal into a digital word is called as
a) PAM signal
b) PCM signal
c) FM signal
d) Sampling and quantization
View Answer
Answer: b
Explanation: Pulse code modulation is the name for the class of signals which are obtained by
encoding the quantized signals into a digital word.
advertisement
2. The length of the code-word obtained by encoding quantized sample is equal to
a) l=log(to the base 2)L
b) l=log(to the base 10)L
c) l=2log(to the base 2)L
d) l=log(to the base 2)L/2
View Answer
Answer: a
Explanation: The quantized sample which are digitally encoded into l bit value code-word. The
length l can be calculated as l=log(to the base 2)L.
Answer: b
Explanation: In linear PCM the quantization levels are uniform. But in normal PCM encoding the
quantization level vary according to the amplitude, based of A-law of Myu-law.
Answer: c
Explanation: One of the properties of PCM signal which determines its stream fidelity is bit depth
which is the number of possible digital values that can be used to represent each sample.
advertisement
6. Choosing a discrete value that is near but not exactly at the analog signal level leads to
a) PCM error
b) Quantization error
c) PAM error
d) Sampling error
View Answer
Answer: b
Explanation: One of the limitations of PCM is quantization error which occurs when we choose a
discrete value at some near by value and not at the analog signal level.
Answer: a
Explanation: The samples depend on time,an accurate clock is required for accurate
reproduction.
Answer: b
Explanation: Differential PCM encodes the PCM value based on the difference between the
previous sample and the present sample value.
Answer: a
Explanation: Delta modulation is used for analog to digital conversion and vice versa. It is a
simple form of DPCM. Its uses 1 bit per sample. It also depends on the difference between the
current and previous sample values.
advertisement
10. Sample resolution for LPCM ____ bits per sample.
a) 8
b) 16
c) 24
d) All of the mentioned
View Answer
Answer: d
Explanation: Common sampling resolution for LPCM are 8, 16, 20, 24 bits per sample.
Answer: b
Explanation: Adaptive DPCM is used to decrease required bandwidth for the given SNR.
Answer: b
Explanation: The interval between the quantization levels is called as step size.
advertisement
2. Uniform quantization provides better quantization for
a) Weak signals
b) Strong signals
c) Weak & Strong signals
d) None of the mentioned
View Answer
Answer: b
Explanation: Signal to noise ratio is worse for weak level signals.so it provides better quantization
for high level signals.
Answer: a
Explanation: According to signal to noise level ratio non uniform quantization provides better
quantization for weak signals.
Answer: b
Explanation: In sampling and quantization, the quantization noise is directly dependent on signal
size.
5. The output SNR can be made independent of input signal level by using
a) Uniform quantizer
b) Non uniform quantizer
c) Uniform & Non uniform quantizer
d) None of the mentioned
View Answer
Answer: b
Explanation: The weak signal experiences poorer SNR compared to high level signals. So if non
uniform quantizer like logarithmic compressor is used the SNR ratio can be made independent
of input signal level.
advertisement
6. Companding is the process of
a) Compression
b) Expansion
c) Compression & Expansion
d) None of the mentioned
View Answer
Answer: c
Explanation: The given signal is first compressed using a logarithmic compressor and then it is
given as input to the uniform quantizer. Both these steps together is called as companding.
Answer: a
Explanation: In μ-law compression characteristics, we get linear amplification or uniform
quantization when μ=0.
Answer: b
Explanation: The standard value of μ in μ-law is 255.
Answer: d
Explanation: Another famous compression characteristic used is A-law. In this law, the standard
value of A is 87.6.
advertisement
10. Which type of quantization is most preferable for audio signals for a human ear?
a) Uniform quantization
b) Non uniform quantization
c) Uniform & Non uniform quantization
d) None of the mentioned
View Answer
Answer: b
Explanation: The human ear is sensitive to quantization error in small values so non uniform
quantization is more preferable than uniform quantization.
Answer: a
Explanation: When pulse modulation is applied to binary symbol we obtain pulse code
modulated waveforms. These waveforms are also called as line codes.
2. When pulse code modulation is applied to non binary symbols we obtain waveform called as
a) PCM
b) PAM
c) M-ary
d) line codes
View Answer
Answer: c
Explanation: When pulse code modulation is applied to binary symbols we get PCM waveforms
and when it is applied to non binary symbols we obtain M-ary waveforms.
Answer: d
Explanation: Some of the examples or classification of pulse code modulated signals are non
return to zero, return to zero, phase encoded, multilevel binary etc.
Answer: a
Explanation: NRZ-L is extensively used in digital logic circuits. In this method, logic 1 is
represented by one voltage level and logic 0 is represented by another voltage level.
Answer: b
Explanation: In NRZ-M, logic 1 is represented by a change in voltage level and logic 0 is
represented by no change in level. This is called as differential encoding.
6. Which method is preferred in magnetic tape recording?
a) NRZ-L
b) NRZ-M
c) NRZ-S
d) None of the mentioned
View Answer
Answer: b
Explanation: NRZ-M is also called as differential encoding and it is most preferred in magentic
tape recording.
Answer: b
Explanation: NRZ-S is a complement of NRZ-M. Logic 0 is represented by a change in voltage level
and logic 1 is represented as no change in voltage level.
Answer: d
Explanation: Different types of return to zero waveforms are unipolar RZ, bipolar RZ, RZ-AMI.
These are used in baseband transmission and in magnetic recording.
Answer: d
Explanation: Different types of phase encoded waveform consists of manchester coding,
bi-phase-mark, bi-phase-space, delay modulation.
10. In which waveform logic 1 is represented by half bit wide pulse and logic 0 is represented by
absence of pulse?
a) Unipolar RZ
b) Bipolar RZ
c) RZ-AMI
d) Manchester coding
View Answer
Answer: a
Explanation: In unipolar RZ waveform, logic 1 is represented by half bit wide pulse and logic 0 is
represented by the absence of a pulse.
11. In which waveform logic 1 and logic 0 are represented by opposite one half bit wide pulses?
a) Unipolar RZ
b) Bipolar RZ
c) RZ-AMI
d) Manchester coding
View Answer
Answer: b
Explanation: In bipolar return to zero waveform ones and zeroes are represented by opposite
level pulses one half bit wide pulses.
Answer: c
Explanation: In RZ-AMI logic 1 is represented by equal amplitude alternating pulses and logic 0 is
represented by the absence of a pulse.
Answer: d
Explanation: Some of the fields where phase encoded waveforms is being used are optical
communication, magnetic tape recording, satellite telemetry etc.
2. In which waveform one is represented by half bit wide pulse positioned during the first half and
zero is represented by half bit wide pulse positioned in the second half?
a) Bi-p-L
b) Bi-p-M
c) Bi-p-S
d) Delay modulation
View Answer
Answer: a
Explanation: In bi-phase-level one is represented by half bit wide pulse positioned during the first
half and zero is represented by half bit wide pulse positioned in the second half.
3. Which binary waveform uses three levels?
a) Bipolar RZ
b) RZ-AMI
c) Bipolar RZ & RZ-AMI
d) None of the mentioned
View Answer
Answer: c
Explanation: In PCM waveforms signals generally use two levels. But few signals use three levels
such as bipolar RZ, RZ-AMI, dicode, duobinary etc.
Answer: a
Explanation: In manchester coding transition occurs in the middle of every bit interval. Thus it
has a feature of clocking.
Answer: d
Explanation: Duobinary scheme does error detection without introducing any additional error
bits into the data sequence.
Answer: d
Explanation: Multilevel codes increases the bandwidth efficiency by reducing the bandwidth
utilization for the given data rate.
Answer: a
Explanation: NRZ waveforms has better error performance than RZ signal waveforms.
8. In pulse modulation, reciprocal of T(time) is
a) Bandwidth
b) Symbol rate
c) Signal voltage
d) None of the mentioned
View Answer
Answer: b
Explanation: T is the time period of the signal. In pulse modulation, the symbol rate Rs can be
given as reciprocal of T.
Answer: c
Explanation: Each analog sample is transformed into PCM word made up of a group of bits. The
PCM word size can be described by number of quantization levels allowed for each sample.
Answer: d
Explanation: When we pulse modulate non binary signals we get M-ary waveform. Some of the
examples of M-ary waveforms are PAM, PPM, PDM.
Answer: b
Explanation: The transmission bandwidth required for binary digital waveforms is large. To
reduce the bandwidth, multilevel signalling method can be used.
Answer: a
Explanation: In PPM waveform delaying or advancing of pulse is done. In PDM the pulse width is
varied. Thus in both the cases amplitude is maintained constant.
1. The method in which small amount of controlled ISI is introduced into the data stream rather
than trying to eliminate it completely is called as
a) Correlative coding
b) Duobinary signalling
c) Partial response signalling
d) All of the mentioned
View Answer
Answer: d
Explanation: The interference at the detector can be cancelled out using these methods in which
some controlled amount of ISI is introduced into the data stream.
2. From digital filter we will get the output pulse as the _______ of the current and the previous pulse.
a) Summation
b) Difference
c) Product
d) Ratio
View Answer
Answer: a
Explanation: The digital filter incorporates one digit delay and thus it adds the incoming pulse
with the value of the previous pulse.
3. In duobinary signalling method, for M-ary transmission, the number of output obtained is
a) 2M
b) 2M+1
c) 2M-1
d) M2
View Answer
Answer: c
Explanation: In duobinary coding, the number of output obtained for M-ary transmission is 2M-1.
4. The method using which the error propagation in dubinary signalling can be avoided is
a) Filtering
b) Precoding
c) Postcoding
d) None of the mentioned
View Answer
Answer: b
Explanation: In duobinary signalling method if one error occurs it repeats everywhere through
out the next steps. To avoid this precoding method can be used.
5. In precoding technique, the binary sequence is _____ with the previous precoded bit.
a) And-ed
b) Or-ed
c) EXOR-ed
d) Added
View Answer
Answer: c
Explanation: To avoid error propogation precoding method is used. In this each bit is encoded
individually without having any effect due to its prior bit or decisions.
Answer: b
Explanation: The transfer function is 2T cos(πfT) which is called as cosine filter.
Answer:b
Explanation: If more than three levels are introduced in duobinary signalling technique the
bandwidth efficiency increases This method is called as polybinary signalling.
8. In polybinary signalling method the present bit of binary sequence is algebraically added with
______ number of previous bits.
a) j
b) 2j
c) j+2
d) j-2
View Answer
Answer: d
Explanation: In polybinary signalling method the present binary digit of the sequence is formed
from the modulo-2 addition of the j-2 preceding digits of the sequence and the present digit.
Answer: c
Explanation: Each bit can be independently detected in-spite of strong correlation and this
provides redistribution of spectral density and also favors low frequencies.
Answer: d
Explanation: Source encoding includes a sampling of continuous time signals, quantization of
continuous valued signals and compression of those sources.
Answer: b
Explanation: Deterministic signals are function of time.
2. Auto-correlation function is a
a) Even function
b) Odd function
c) Even & Odd function
d) None of the mentioned
View Answer
Answer: a
Explanation: Auto-correlation function is an even function of time.
Answer: c
Explanation: Shot noise occurs in both valves and transistors.
Answer: c
Explanation: Source coding reduces both average bit rate and reduces redundancy.
Answer: a
Explanation: Delay element act as first order predictor.
Answer: c
Explanation: Compression and expansion give the feature of non uniform quantization.
Answer: b
Explanation: Larger the number of discrete amplitudes, finer will be the quantization.
Answer: b
Explanation: A transmitted pulse gradually becomes distorted due to non ideal transmission
characteristic of the channel.
Answer: b
Explanation: Mixing of digital signals are easier than that of mixing analog signals.
Answer: c
Explanation: Linear phase filter or delayed symmetric filter does not have sharp output but
sampling can be done in real time.
Answer: b
Explanation: ARMA filter gives sharp output but sampling cannot be done in real time.
3. To avoid aliasing
a) Reduce the bandwidth
b) Cut out high frequency
c) Reduce the bandwidth & Cut out high frequency
d) None of the mentioned
View Answer
Answer: c
Explanation: To avoid aliasing bandwidth should be reduced and high frequency should be cut
out.
Answer: c
Explanation: Up-sampler and D to A conversion need interpolation filtering.
Answer: c
Explanation: A to D conversion process requires both sampler and quantizer.
Answer: b
Explanation: Reconstruction filter is simpler and easy to implement in hardware.
Answer: c
Explanation: Up-sampling requires low pass filter after increasing the data rate and
down-sampling requires low pass filter before decimation.
Answer: b
Explanation: Decreasing the data rate is called as down sampling and increasing the data rate is
called as up sampling.
Answer: a
Explanation: Original signal can be obtained from its sampled version by using low pass filtering.
Answer: c
Explanation: The signal can be reconstructed from the sampled version at or above Nyquist rate
using simple low pass filtering.
Answer: c
Explanation: Equalizer followed by a low pass filter is necessary for reconstruction of a signal
from its sampled version.
Answer: d
Explanation: The main causes of error performance degradation are interference electrical noise
effect of filtering and also due to the surroundings.
Answer: b
Explanation: Thermal noise which cannot be eliminated is caused by the motion of thermal
electrons causes degradation in system.
Answer: a
Explanation: The AWGN has constant power spectral density.
Answer: b
Explanation: If error correcting codes are not present, the detector output consists of estimates
of the message symbol which is also called as hard decisions.
6. The filter which is used to recover the pulse with less ISI is called as
a) Matched filter
b) Correlator
c) Matched filter & Correlator
d) None of the mentioned
View Answer
Answer: b
Explanation: The optimum filter used to recover the pulse with best possible signal to noise ratio
and less or no ISI is called as correlator or matched filter.
Answer: a
Explanation: The functions of both receiving and equalizing filter can be performed by only the
equalizing filter alone. Thus equalizing filter is the combination of equalizing and receiving filter.
8. The sample from the demodulation process consists of sample which is _______ to energy of the
received symbol and _____ to noise.
a) Directly and inversely proportional
b) Inversely and directly proportional
c) Both directly proportional
d) Both inversely proportional
View Answer
Answer: a
Explanation: The output symbol of the sampler consists of sample which is directly proportional
to the energy of the received signal and inversely proportional to the noise.
Answer: b
Explanation: White noise is a idealized process with two sided spectral density equal to constant
N0/2 and frequencies varying from minus infinity to plus infinity. Thus the average noise power is
infinity.
Answer: c
Explanation: A channel can be modelled as a linear filter with additional noise. The noise comes
from thermal noise source and also from interference from other signals.
Answer: d
Explanation: Wireless wide-band channels display multi-path due to time delayed reflections,
diffraction and also scattering.
1. The method in which the tail of one pulse smears into adjacent symbol interval is called as
a) Intersymbol interference
b) Interbit interference
c) Interchannel interference
d) None of the mentioned
View Answer
Answer: a
Explanation: Due to the effect of system filtering the received pulse can overlap on one and
another. The tail of one pulse smears into the adjacent symbol interval thereby interfering the
detection process. This process is called as intersymbol interference.
2. If each pulse of the sequence to be detected is in _____ shape, the pulse can be detected without
ISI.
a) Sine
b) Cosine
c) Sinc
d) None of the mentioned
View Answer
Answer: c
Explanation: The sinc shaped pulse is the ideal nyquist pulse. If each pulse in the sequence to be
detected is in sinc shape the pulses can be detected without ISI.
Answer: a
Explanation: A system with bandwidth Rs/2 can support a maximum transmission rate of Rs
without ISI. Thus for ideal Nyquist filtering the maximum possible symbol transmission rate is
called as symbol rate packing and it is equal to 2 symbols/s/Hz.
4. A nyquist pulse is the one which can be represented by _____ shaped pulse multiplied by another
time function.
a) Sine
b) Cosine
c) Sinc
d) None of the mentioned
View Answer
Answer: c
Explanation: A nyquist filter is one whose frequency transfer function can be represented by a
rectangular function convolved with any real even symmetric frequency function and a nyquist
pulse is one whose shape can be represented by sinc function multiplied by another time
function.
Answer: c
Explanation: The most popular among the class of nyquist filters are raised cosine and root
raised cosine filter.
6. The minimum nyquist bandwidth for the rectangular spectrum in raised cosine filter is
a) 2T
b) 1/2T
c) T2
d) 2/T
View Answer
Answer: b
Explanation: For raised cosine spectrum the minimum nyquist bandwidth is equal to 1/2T.
Answer: b
Explanation: The roll off factor is defined by a fraction of excess bandwidth and the minimum
nyquist bandwith. It ranges from 0 to 1.
8. Which value of r (roll off factor) is considered as Nyquist minimum bandwidth case?
a) 0
b) 1
c) Infinity
d) None of the mentioned
View Answer
Answer: a
Explanation: For the roll off factor of 0 an ideal rectangular nyquist pulse is obtained. This is
called as nyquist minimum bandwidth case.
Answer: c
Explanation: A pulse shaping filter should provide the desired roll off and should be realizable,
that is the impulse response needs to be truncated to a finite length.
Answer: c
Explanation: ASK and PSK needs twice the transmission bandwidth of equivalent baseband
signals. Thus these are called as double side band signals.
Answer: a
Explanation: The likelihood ratio is given with the help of conditional probabilities.
2. According to the rule of minimizing the error probabilities, the hypothesis should be like if the
priori probabilities are ________ than the ratio of likelihoods.
a) Lesser
b) Greater
c) Equal
d) None of the mentioned
View Answer
Answer: a
Explanation: The rule of minimizing the error probabilities show that the hypothesis should be
like if the ratio of likelihoods should be greater than the priori probabilities.
Answer: a
Explanation: For the signals that are equally likely, the detector used to minimize the error
probability is called as maximum likelihood detector.
4. For a M-ary signal or symbol the number of likelihood functions are
a) M
b) M+1
c) M-1
d) 2M
View Answer
Answer: a
Explanation: For a M-ary signal there will be M likelihood functions representing M signal classes
to which a received signal might belong.
Answer: c
Explanation: An error will occur when s1(t) or s2(t) is sent and if the channel noise is greater or
lesser than the optimum threshold level.
Answer: a
Explanation: The optimum threshold level value for error probability reduction is given by
a0+a1/2.
7. The symbol of the probability under the tail of Gaussian pdf is called as
a) Complementary error function
b) Co error function
c) Complementary error & Co error function
d) None of the mentioned
View Answer
Answer: c
Explanation: The co error function or complementary error function is a commonly used symbol
for probability under the tail of Gaussian pdf.
9. The impulse response of the filter is the ________ of the mirror image of the signal waveform.
a) Delayed version
b) Same version
c) Delayed & Same version
d) None of the mentioned
View Answer
Answer: a
Explanation: The matched filter’s basic property is that the impulse response of the filter is the
delayed version of the mirror image of the signal waveform.
Answer: a
Explanation: One type of antipodal bandpass signaling is binary phase shift keying.
Answer: b
Explanation: To achieve ideal transmission characteristics, the signal’s bandwidth must be
constant and the channel’s phase response must be a linear function of frequency.
Answer: d
Explanation: When modulus of channel’s transfer function is not constant within W then
amplitude distortion occurs.
Answer: b
Explanation: When channels phase response is not a linear function of frequency within W then
phase distortion occurs.
Answer: c
Explanation: Equalization process can be divided into two major categories called as maximum
likelihood sequence estimator and equalizer with a filter.
5. The maximum likelihood sequence estimator adjusts _______ according to _____ environment.
a) Receiver, transmitter
b) Transmitter, receiver
c) Receiver, receiver
d) None of the mentioned
View Answer
Answer: a
Explanation: In maximum likelihood sequence estimator it measures the impulse response value
and adjusts the receiver environment according to that of the transmitter.
Answer: c
Explanation: The filters used with equalizers can be linear devices that contain only feed forward
elements or non linear devices with both feed forward and feed back elements.
7. Transversal equalizers are ________ and decision feedback equalizers are ______
a) Feed forward, feed back
b) Feed back, feed forward
c) Feed forward, feed forward
d) Feedback, feedback
View Answer
Answer: a
Explanation: Linear devices with only feed forward elements are called as transversal equalizers
and non linear devices with both feed forward and feed back elements are called as decision
feedback equalizers.
8. Symbol spaced has ____ sample per symbol and fractionally spaced has ___ samples per symbol.
a) One, many
b) Many, one
c) One, one
d) Many, many
View Answer
Answer: a
Explanation: Predetection samples are provided only on symbol boundaries. A condition in which
only one sample per symbol are provided is called as symbol spaced and the condition in which
multiple samples are provided per symbol is called as fractionally spaced.
9. The _______ of the opening of eye pattern indicates the time over which the sampling for
detection might be performed.
a) Length
b) Width
c) X-axis value
d) Y-axis value
View Answer
Answer: b
Explanation: An eye pattern is a display that results from measuring a system’s response to
baseband signals in a prescribed way. The width of the opening gives the time over which the
sampling for detection might be performed.
10. Range of time difference of the zero crossing gives the value of
a) Width
b) Distortion
c) Timing jitter
d) Noise margin
View Answer
Answer: c
Explanation: The time difference of the zero crossing in the eye pattern gives the value of timing
jitter.
Answer: b
Explanation: In the eye pattern, the amplitude difference gives the value of distortion caused by
ISI.
Answer: b
Explanation: As the eye closes, ISI increases and as the eye opens ISI decreases.
3. Pseudo noise signal has _______ and _______ SNR for the same peak transmitted power.
a) Larger, smaller
b) Smaller, larger
c) Larger, larger
d) Smaller, smaller
View Answer
Answer: c
Explanation: A training pulse is applied to the equalizer and corresponding impulse response is
observed. Pseudo noise is preferred as the training pulse as it has larger SNR value and larger
average power value.
Answer: c
Explanation: The index n can be used as both time offset and the filter coefficient identifier,
which is the address in the filter.
Answer: c
Explanation: The matrix x in transversal equalizer if non square with dimensions 4N+1 and 2N+1.
Such equations are called as over-determined set. This can be solved by two methods called as
zero forcing method and minimum mean square error method.
6. If the filter’s tap weight remains fixed during transmission of data, then the equalization is called
as
a) Preset equalization
b) Adaptive equalization
c) Fixed equalization
d) None of the mentioned
View Answer
Answer: a
Explanation: If the weight remains fixed during transmission of data then the equalization is
called as preset equalization. It is a simple method which consists of setting the tap weight
according to some average knowledge of the channel.
7. Equalization method which is done by tracking a slowly time varying channel response is
a) Preset equalization
b) Adaptive equalization
c) Variable equalization
d) None of the mentioned
View Answer
Answer: b
Explanation: This method is implemented to perform tap weight adjustment periodically or
continually. Equalization is done by tracking a slowly varying channel response.
Answer: d
Explanation: The receiver uses preamble for detecting the start of transmission, to set automatic
gain control, and to align internal clocks and local oscillator with the received signal.
Answer: b
Explanation: The disadvantage of preset equalization is that it requires an initial training period
that must be invoked at the start of any new transmission. Also time varying channel can
degrade system performance due to ISI, since the tap weights are fixed.
Answer: b
Explanation: The noise variance out of the correlator for AWGN is N0/2.
Answer: a
Explanation: The performance of BFSK is 3db worse than BPSK signalling, since for a given signal
power, the distance squared between orthogonal vectors is a factor of two less than the distance
squared between orthopodal signals.
12. A Gaussian distribution into the non linear envelope detector yields
a) Rayleigh distribution
b) Normal distribution
c) Poisson distribution
d) Binary distribution
View Answer
Answer: a
Explanation: The two output signals of Gaussian distribution yields Rayleigh and Rician
distribution.
13. The non coherent FSK needs ________ Eb/N0 than coherent FSK.
a) 1db more
b) 1db less
c) 3db more
d) 3db less
View Answer
Answer: a
Explanation: The non coherent receiver is easier to implement. The non coherent FSK needs 1db
more Eb/N0 than coherent FSK.
Answer: a
Explanation: The DPSK system is easier to implement than PSK and it needs 1db more Eb/N0
than BPSK.
15. Coherent PSK and non coherent orthogonal FSK have a difference of ______ in PB.
a) 1db
b) 3db
c) 4db
d) 6db
View Answer
Answer: c
Explanation: The difference of PB is approximately 4db for the best ( coherent PSK ) and the
worst (non coherent orthogonal FSK).
Answer: d
Explanation: The major system considerations are error probability, complexity and random
fading channel. Considering all this non coherent system is more desirable than coherent.
Answer: b
Explanation: The transmission of Em field in space is done with the help of antennas. Antenna
size depends of the wavelength. The length of the antenna is equal to λ/4.
Answer: a
Explanation: When the receiver uses carrier’s phase as major factor for detection then it is called
as coherent detection and when carrier is not given importance it is called as non coherent
detection.
Answer: a
Explanation: The two main parts of sinusoid carrier wave – real part is called as inphase and the
imaginary part is called as quadrature.
Answer: a
Explanation: In BPSK the two vectors, the signal set can be illustrated as two 180 opposing vector
which is called as antipodal signal sets.
6. The FSK signal which has a gentle shift from one frequency level to another is called as
a) Differential PSK
b) Continuous PSK
c) Differential & Continuous PSK
d) None of the mentioned
View Answer
Answer: b
Explanation: In general FSK the signal change from one frequency to another will be abrupt but
in continuous FSK the signal change from one frequency to another will be gentle and gradual.
Answer: a
Explanation: In ASK modulation scheme the signal attains either maximum amplitude or zero
point. Thus it is also called as on-off keying.
Answer: c
Explanation: The combination of ASK and PSK is called as APK. In APK each vector is separated by
45.
Answer: c
Explanation: The term heterodyning means frequency conversion and frequency mixing that
yields a spectral shift in the signal.
10. The transformation of the waveform into a single point in signal space is called as
a) Vector point
b) Predetection point
c) Preamplification point
d) Transformation point
View Answer
Answer: b
Explanation: The first step of the detection process is to reduce waveform into a single or group
of random variable. This first step in the transformation of waveform into a point in signal space.
This point is called as predetection point.
Answer: a
Explanation: Coherent detector considers phase as the most important parameter. This coherent
detector is also known as maximum likelihood detector.
Answer: c
Explanation: The phase locked loop circuitry locks on the arriving carrier wave and estimates its
phase.
Answer: a
Explanation: In this method, the data is encode deferentially that is the presence of binary zero
or one is manifested by symbol’s similarity or difference when compared to that of the previous
symbol.
Answer: b
Explanation: An envelope detector consists of a rectifier and a low pass filter. The detectors are
matched to the envelopes and not to the signal themselves.
Answer: a
Explanation: The frequency difference between the center of the spectral main lobe and the first
zero crossing is called as the minimum required spacing in non coherent detection.
Answer: b
Explanation: In non coherent detection the minimum tone separation corresponds to 1/T.
Answer: a
Explanation: Matched filter is used for coherent detection. It cannot be used for non coherent
detection because matched filter output is a function of unknown angle α.
9. In differential encoding the _________ different between two wave forms is measured.
a) Magnitude
b) Frequency
c) Phase
d) Time period
View Answer
Answer: c
Explanation: In differential encoding, the phase of the present signal waveform is compared with
the phase of the previous signal.
Answer: c
Explanation: DPSK has twice as much as noise than in PSK. The error probability in DPSK is twice
(3db) worse than PSK.
1. The limit which represents the threshold Eb/N0 value below which reliable communication
cannot be maintained is called as
a) Probability limit
b) Error limit
c) Shannon limit
d) Communication limit
View Answer
Answer: c
Explanation: Eb/N0 curve has waterfall shape. Shannon limit gives the threshold value below
which reliable communication cannot be maintained.
2. M-ary signalling produces _______ error performance with orthogonal signalling and _______ error
performance with multiple phase signalling.
a) Degraded, improved
b) Improved, degraded
c) Improved, improved
d) Degraded, degraded
View Answer
Answer: b
Explanation: In M-ary signalling as k increases, the curve moves towards the degraded error
performance. It produces improved error performance in case of orthogonal signalling and
degraded error performance in case of multiple phase signalling.
Answer: b
Explanation: The minimum energy noise vector for 4-ary system is smaller than 2-ary system. So
4-ary system is more vulnerable to noise.
4. In which system, bit stream is portioned into even and odd stream?
a) BPSK
b) MSK
c) QPSK
d) FSK
View Answer
Answer: c
Explanation: In QPSK bit stream is portioned into even and odd stream, I and Q bit streams. Each
new stream modulates as orthogonal component at half bit rate.
Answer: b
Explanation: The error performance of MPSK degrades as M or k increases.
6. In MPSK adding new signals _______ make it vulnerable to noise and in MFSK _______ make it
vulnerable.
a) Does, does not
b) Does not, does
c) Does, does
d) Does not, does not
View Answer
Answer: a
Explanation: In MPSK adding new signals that is on crowding the signals it makes it vulnerable to
noise where as in MFSK it does not.
7. In orthogonal signalling with symbols containing more number of bits we need ____ power.
a) More
b) Less
c) Double
d) None of the mentioned
View Answer
Answer: a
Explanation: In orthogonal signalling with symbols having more number of bits need more power
but requirement per bit is reduced.
Answer: b
Explanation: For FSK signalling the detection bandwidth is typically equal to symbol rate 1/T that
is WT is nearly equal to 1.
Answer: a
Explanation: In M-ary PSK signalling, the energy per symbol is given as Es=Eb(log2M).
10. The relation between the probability of bit error and probability of symbol error in M-ary
orthogonal signalling is
a) M/M-1
b) 2M/M-1
c) (M/2)/M-1
d) M/M+1
View Answer
Answer: c
Explanation: The relationship between the probability of bit error and probability of symbol error
is (M/2)/M-1 in M-ary orthogonal signalling.
Answer: a
Answer: c
Explanation: The link analysis and its output, the link budget consists of calculations and
tabulations of useful signal power and interfering noise power at the receiver.
Answer: d
Explanation: Link budget can help to predict equipment weight, size, prime power requirements,
technical risk and cost. Link budget is one of the system manager’s useful document.
Answer: c
Explanation: There are two primary causes for the degradation of error performance. They are
loss in signal to noise ratio and the second is signal distortion caused by intersymbol
interference.
Answer: c
Explanation: Antennas are used as transducer that converts electronic signals to electromagnetic
fields and vice versa. They are also used to focus the electromagnetic energy in the desired
direction.
Answer: d
Explanation: Mechanism contributing to a reduction in efficiency is called as amplitude tapering,
spillover, edge diffraction, blockage, scattering, re-radiation and dissipative loss.
Answer: a
Explanation: Due to the decrease in electric field strength there will be a decrease in signal
strength as a function of distance. This is called as space loss.
Answer: a
Explanation: The larger the antenna aperture the larger is the resulting signal power density in
the desired direction. The ratio of effective aperture to physical aperture is the antenna’s
efficiency.
Answer: c
Explanation: An effective radiated power with respect to an isotropic radiator EIRP can be
defined as the product of transmitted power and the gain of the transmitting antenna.
Answer: b
Explanation: The reciprocity theorem states that for a given antenna and carrier wavelength the
transmitting and receiving gain are identical.
Answer: b
Explanation: The antenna field of view is the measure of a solid angle in which most of the field
power is concentrated. It is inversely related to antenna gain.
Answer: a
Explanation: Antenna gain increases with a decrease in wavelength increase in frequency and
increase in effective area.
Answer: c
Explanation: The path loss is wavelength(frequency) dependent.
Answer: a
Explanation: Thermal noise occurs due to the thermal motion of electrons in all conductors. It
occurs due to lossy coupling between an antenna and the receiver.
Answer: b
Explanation: With analog receivers, noise bandwidth seen by the demodulator is usually greater
than the signal bandwidth.
7. The link availability measures the percentage of time the link can be ______
a) Open
b) Closed
c) Used
d) None of the mentioned
View Answer
Answer: b
Explanation: Link availability is the measure of long term link utility stated on an average annual
basis for a given geographical location, the link availability measures the percentage of time the
link can be closed.
Answer: b
Explanation: For a fixed link margin, visibility is inversely proportional to the required availability,
and for a fixed availability visibility increases monotonically with margin.
Answer: a
Explanation: The stop and wait ARQ needs half duplex system since the transmitter needs ACK
for each transmission.
Answer: b
Explanation: The ARQ procedure called continuous ARQ with pullback requires full duplex
connection.
Answer: a
Explanation: Error detection requires much simpler decoding equipment and much less
redundancy than error correction.
Answer: a
Explanation: An alternate approach for error control is a hybrid automatic repeat request
method which is a combination of ARQ and error correction code.
13. Automatic repeat request is also called as
a) Forward error correction
b) Backward error correction
c) Forward & Backward error correction
d) None of the mentioned
View Answer
Answer: b
Explanation: Automatic repeat request is also referred to as backward error correction method.
Answer: b
Explanation: Error detection is commonly realized using a suitable hash function or check-sum
algorithm.
Answer: d
Explanation: Check-sum scheme includes parity bits, longitudinal redundancy bits and check bits.
Answer: d
Explanation: Some examples of block codes are repetition codes, hamming codes, parity check
bit codes, reed-solomon codes, turbo codes etc.
Answer: a
Explanation: Noise figure is a parameter that represents the noisiness of a two port network or
device such as an amplifier, compared with a reference noise.
3. When two networks are connected in series, its composite noise figure can be given as
a) F1+(F2-1)/G1
b) F1-(F2-1)/G1
c) F2+(F1-1)/G1
d) F1G1+(F2-1)
View Answer
Answer: a
Explanation: When two networks are connected in series, the composite noise figure can be
written as F1+(F2-1)/G1.
Answer: a
Explanation: There is a region between 1GHz and 10GHz where the temperature will be lowest.
This region is called as microwave window or space window.
Answer: c
Explanation: The region between 1GHz and 10GHz is called as space window or atmospheric
window. Here the temperature will be the lowest. This region is used for satellite communication
and deep-space communication.
Answer: b
Explanation: The figure of parameter G/T0 is called as receiver sensitivity.
Answer: d
Explanation: Satellite repeaters re transmit the message received. It regenerates, demodulates
and reconstitutes the digital information embedded in the received waveform.
Answer: c
Explanation: A non regenerative repeaters can be used with many different modulation formats.
It only amplifies and re transmits the message received.
Answer: a
Explanation: The principal advantage of regenerative repeaters over non regenerative repeaters
is that the uplink is decoupled from the downlink so that the uplink noise is not transmitted on
the downlink.
Answer: a
Explanation: AM-to-AM conversion is a phenomenon common to non linear devices and it
undergoes a non linear transformation and results in amplitude variation.
11. AM-to-PM conversion brings about
a) Amplitude variation
b) Phase variation
c) Frequency variation
d) None of the mentioned
View Answer
Answer: b
Explanation: AM-to-PM conversion is another common phenomenon in non linear devices. It
brings about phase variation that can effect the error performance.
Answer: c
Explanation: Channel coding can be partitioned into two area of studies, one is waveform coding
or signal design and the other is a structured sequence or structured redundancy.
Answer: d
Explanation: Some examples of structured sequence or structured redundancy codes are block
codes, convolutional codes and turbo codes.
Answer: d
Explanation: Antipodal signals are mirror images, one is negative of the other and they are 1800
apart.
Answer: d
Explanation: Orthogonal signals are perpendicular to each other, the inner or dot product
between those two signals must equal zero, one vector has zero projection over the other
because they do not share same signal space.
Answer: a
Explanation: In orthogonal signalling as k increases there is improved error performance or a
reduction in required Eb/N0 at the expense of bandwidth.
Answer: d
Explanation: Non orthogonal signalling manifests improved bandwidth efficiency at the expense
of degraded error performance and increases in required Eb/N0.
Answer: b
Explanation: In orthogonal set all cross correlation coefficients can be made zero.
8. The smaller the cross correlation, the ______ is the distance between the signal vectors.
a) More
b) Less
c) Double
d) Half
View Answer
Answer: a
Explanation: The cross correlation is the measure of distance between two vectors. The smaller
the cross correlation value the greater the distance between the two vectors.
9. Hadamard matrix is given as
a)
H2 = H1 H1
H1 H1
b)
H2 = H1 H1
H1'H1
c)
H2 = H1 H1
H1 H1'
d)
H2 = H1'H1
H1 H1
View Answer
Answer: c
Explanation: We can construct a code-word set Hk of dimension 2k*2k called a Hadamard
matrix.
Answer: c
Explanation: The biorthogonal set consists of a combination of both orthogonal and antipodal
signals.
Answer: b
Explanation: Since the antipodal vector has a better distance property than the orthogonal
signals, biorthogonal codes perform better than the orthogonal codes.
12. Biorthogonal codes needs ________ bandwidth as orthogonal codes.
a) Equal
b) Double
c) Half
d) Triple
View Answer
Answer: c
Explanation: Biorthogonal codes perform better than the orthogonal codes and it needs only half
the bandwidth as orthogonal codes.
Answer: b
Explanation: A code generated from an orthogonal set by deleting the first digit of each
codeword is called as transorthogonal code or simplex code.
Answer: c
Explanation: A simplex code represents the minimum energy equivalent and it requires
minimum Eb/N0 for a specified symbol error rate.
Answer: d
Explanation: Structured sequences are those which add structured redundancy to the source
code. Examples are turbo codes, block codes, and convolutional codes.
Answer: b
Explanation: In Gaussian channel demodulator consists of continuous alphabet or quantized
approximation thus soft decision is made.
Answer: b
Explanation: The design of a soft decision decoder is more complex than the design of hard
decision decoder.
Answer: b
Explanation: The ratio of redundant bits to data bits is called as redundancy of the code and the
ratio of data bits to total bits is called as code rate.
6. If the parity bit takes value one then the summation of code-word gives
a) Even result
b) Odd result
c) Even & Odd result
d) None of the mentioned
View Answer
Answer: a
Explanation: The parity bit takes on the value of one or zero to ensure that the summation of all
the bits in the code-word yields even or odd result.
Answer: a
Explanation: The summation operation is performed using modulo 2 arithmetic or exclusive OR
operation.
Answer: c
Explanation: We can write the probability of message error also called as block error or word
error.
Answer: c
Explanation: In a real time communication system the addition of redundant bits dictates a faster
transmission rate and which means more bandwidth.
Answer: a
Explanation: For a given bit error probability coding gain can be defined as reduction in Eb/N0
that can be realized through the use of code.
Answer: b
Explanation: The capacity that is the number of users per cell is inversely proportional to Eb/N0.
Answer: b
Explanation: Hamming distance between two code words can be given by the number of
elements in which they differ.
Answer: a
Explanation: The smallest number of the set given the minimum distance of the code. This
minimum distance characterizes the strength of the code.
3. The distance between two code-words is equal to the _____ of the third code-word which is the
sum of the first two code-words.
a) Size
b) Weight
c) Minimum distance
d) None of the mentioned
View Answer
Answer: b
Explanation: The sum of two code words gives a third code which is also a linear code. The
distance between two code words is equal to the weight of the third code word.
Answer: b
Explanation: The error detecting capability is given as e = Dmin – 1, where Dmin is the minimum
distance of the code word.
Answer: d
Explanation: If a code has a minimum distance dmin then dmin-1 erasures can be reconstituted.
The number of errors that can be corrected without erasure information is (dmin-1)/2.
Answer: b
Explanation: For real world codes, n should be minimum for better efficiency and simplicity.
Answer: c
Explanation: Nyquist frequency is given as fs/2 where fs is the sampling frequency.
Answer: d
Explanation: Various types of distortion are aliasing, jitters, aperture error, noise, error due to
non linear effects, error due to quantization etc.
Answer: a
Explanation: Oversampling can completely eliminate aperture error and aliasing but can only
reduce quantization error and non linearity to some extent.
Answer: d
Explanation: Sampling can be used in audio sampling, speech sampling and also in video
sampling.
Answer: d
Explanation: Audio is recorded at 8 bit, 16 bit, and also 24 bit depth which yield theoretically
maximum SNR.
14. Which factors are measured using the units of lines per picture height?
a) Resolution
b) Sampling rate
c) Resolution & Sampling rate
d) None of the mentioned
View Answer
Answer: c
Explanation: Sampling rate and resolution in spatial directions can be measured in units of lines
per picture height.
Answer: b
Explanation: Complex sampling is the process of simultaneously sampling two different but
related signals.
Answer: c
Explanation: Sampling can be done for functions varying in time, frequency, space or any other
dimension.
Answer: b
Explanation: Reconstruction of signals from the samples is done using interpolation algorithm.
Answer: a
Explanation: The cyclic codes are a subclass of linear codes. It is designed using feedback shift
registers.
Answer: a
Explanation: A cyclic code can be generated using generator polynomial and block codes can be
generated using generator matrix.
3. The feedback shift register circuit is called as
a) Multiplying circuit
b) Dividing circuit
c) Feedback circuit
d) Shifting circuit
View Answer
Answer: b
Explanation: The cyclic shift of a code-word polynomial and encoding involves division of one
polynomial by another. Thus this feedback shift register is also called as dividing circuit.
Answer: b
Explanation: The parity polynomial is the remainder after diving by the generator polynomial it is
available in the register after n shifts through the n-k stage feedback registers.
Answer: b
Explanation: If the syndrome is an all zero vector then the received code-word is a valid code. If
the syndrome is a non zero vector then the received code has errors.
Answer: b
Explanation: Block codes are generated using generator matrix and cyclic codes are generated
using generator polynomial.
Answer: a
Explanation: The block length n is the number of elements in the code word.
Answer: b
Explanation: The rate of a block code is the ratio between its message length and the block
length, R=k/n.
Answer: a
Explanation: Linear codes are used in forward error correction. It allows for more efficient
encoding and decoding procedures.
11. The k-bit message forms ____ distinct messages which is referred to as k-tuples.
a) 2k
b) K2
c) 2k
d) 21/k
View Answer
Answer: c
Explanation: The k bit messages for 2k distinct message sequences which are referred to as
k-tuples or sequence of k digits.
12. The sum of any two vectors in subset S is also in S. This is called as
a) Addition property
b) Subset property
c) Closure property
d) Similarity property
View Answer
Answer: c
Explanation: The closure property states that the sum of any two vectors in subset S is also in S.
Answer: b
Explanation: The code-words should be far apart from one and another as possible so even
when the vectors experience some corruption they may still be correctly decoded.
Answer: c
Explanation: Each n-tuple appears in only one location none are missing and none are replicated.
There are 2n-k cosets.
Answer: b
Explanation: The syndrome is calculated using S=rHT.
16. The _____ of the code-word is the number of non zero elements.
a) Size
b) Weight
c) Distance
d) Subspace
View Answer
Answer: b
Explanation: The size of the code-word is the number of code words. The weight of the code
word can be given as the number of non zero elements and the distance between two code
words is the hamming distance between them.
Answer: c
Explanation: The rate of the code gives the measure of the amount of redundancy. The rate is
given by the ratio of number of data bits that form an input to a block encoder to the total
number of bits.
2. The number of k bit shift over which a single information bit influences the encoder output is
given by
a) Code rate
b) Constraint length
c) Code length
d) Code weight
View Answer
Answer: b
Explanation: The constraint length represents the number of k bit shifts over which a single
information bit influences the encoder output.
Answer: d
Explanation: Several methods are used for representing convolution encoder such as connection
pictorial, connection vector or polynomials, state diagram, tree diagram and trellis diagram.
Answer: a
Explanation: Convolution code are forced into a block structure by periodic truncation which is
done by appending zero to the end of the input data sequence, for the purpose of clearing or
flushing the encoding shift register of the data bits.
5. Finite state machines have
a) Past memories also
b) Only present and future memories
c) Only future memories
d) Only present memories
View Answer
Answer: a
Explanation: A convolution encoder belongs to a class of device called as finite state machines
which are those machines that have a memory of past signals.
Answer: b
Explanation: An a consequence of shifting-in-one bit at a time there are only two possible
transitions that the register can make at each bit time.
Answer: b
Explanation: As per the algorithm, in the trellis diagram at successive branching the number of
nodes doubles.
Answer: c
Explanation: Tree diagram and trellis diagram are both examples for convolution encoding state
diagram.
Answer: c
Explanation: If all input messages are equally likely a decoder that achieves the minimum
probability of error is that which compares the conditional probabilities also called the likelihood
function.
Answer: b
Explanation: The maximum likelihood detector is an optimal detector which minimizes the error
probability.
11. For a binary code, the maximum number of possible sequence made up of L branch words is
a) L2
b) 2L
c) 2L
d) L/2
View Answer
Answer: b
Explanation: In a binary code, all possible different code word sequences that can be made up of
L branch words are 2L.
12. If the quantization level of a demodulator output is ________ then it is called as soft decision
decoding.
a) Equal to 2
b) More than 2
c) Less than 2
d) None of the mentioned
View Answer
Answer: b
Explanation: If the quantization level of a demodulator output is 2 it is called as hard decision
decoding and if it is greater than 2 it is called as soft decision decoding.
Answer: b
Explanation: The price paid for soft decision decoding is an increase in required memory size at
the decoder.
Answer: a
Explanation: A binary symmetric channel is a discrete memoryless channel that has binary input
and output alphabets and symmetric transition probabilities.
Answer: a
Explanation: A binary symmetric channel is an example for hard decision channel which means
that even though continuous values may be received by the demodulator the BSC only allows
firm decisions.
Answer: b
Explanation: The quantized Gaussian channel is referred to as the soft decision channel.
Answer: a
Explanation: Branch word synchronization is the process of determining the beginning of a
branch word in the received sequence. Such synchronization can take place without adding new
information to the transmitted symbols.
Answer: b
Explanation: Minimum distance between all pair of code words is related to the error correcting
capability of the code.
2. A catastrophic error is an event whereby ______ number of code symbol error causes _______
number of decoded data error bits.
a) Finite, finite
b) Finite, infinite
c) Infinite, finite
d) Infinite, infinite
View Answer
Answer: b
Explanation: A catastrophic error is defined as an event whereby a finite number of code
symbols error causes an infinite number of decoded data bit errors.
Answer: a
Explanation: Generally code’s are selected based on the free distance property. The criteria for
selecting code is that it should not have catastrophic error propagation and it should have
maximum free distance.
Answer: d
Explanation: The error correcting capability of a code scheme increases as the number of
channel symbols n per information bit k increases or the rate k/n decreases. As n increases
bandwidth and complexity also increases.
Answer: b
Explanation: The soft decision algorithm has limited resolution than hard decision algorithm and
thus it cannot use hamming distance metric.
Answer: b
Explanation: While using Euclidean distance squared metric, maximum correlation is desirable
rather than minimum distance.
Answer: a
Explanation: Soft decisions require more storage and it also increases the complexity. For this
reason soft decisions are preferred less when compared to hard decisions.
Answer: a
Explanation: The feedback decoder makes hard decision on data bits.
Answer: a
Explanation: Look ahead length L is given by m+1 where m is the preselected positive integer.
11. On increasing L
a) Coding gain increases
b) Complexity increases
c) Coding gain & Complexity increases
d) None of the mentioned
View Answer
Answer: c
Explanation: On increasing the look ahead length the coding gain increases and also increases
the decoder implementation complexity.
Answer: c
Explanation: Reed Solomon codes are non binary cyclic codes with symbols made up of m bit
sequences where m is any positive integer with value greater than 2.
Answer: b
Explanation: Reed Solomon code achieves the largest possible code minimum distance for any
linear code and it is given by n-k+1.
Answer: c
Explanation: Reed Solomon codes have high code rate and low redundancy. The complexity of a
high speed implementation increases with redundancy.
15. Greater the redundancy greater will be the error correcting capability.
a) True
b) False
View Answer
Answer: a
Explanation: In coding, the improving mechanism, the greater the redundancy the greater will be
the error correcting capability of the code.
16. A primitive element are those which yield ______ when raised to higher order exponents.
a) All zero elements
b) Non zero elements
c) Unity elements
d) None of the mentioned
View Answer
Answer: b
Explanation: In a primitive polynomial at least one of its roots will be primitive element. A
primitive elements are those which yield non zero elements when raised to a higher order
exponent.
17. If the inversion was performed correctly, then the multiplication of the original matrix with the
inverted matrix should yield identity matrix. This is known as
a) Identity theorem
b) Safety theorem
c) Multiplication theorem
d) Inversion theorem
View Answer
Answer: b
Explanation: According to safety theorem, if the inversion is performed correctly, the
multiplication of original matrix by inverted matrix will yield identity matrix.
Answer: c
Explanation: Compact disc digital audio system is used for both digital storage and reproduction
of audio signals.
Answer: d
Explanation: Some of the sources of channel errors are some unwanted particles, air bubbles,
finger prints, scratches etc.
Answer: c
Explanation: The cross interleave reed Solomon error control scheme in the CD system involves
both correction and concealment of errors.
4. Decoding step consists of
a) De-interleaving
b) Decoding
c) De-interleaving & Decoding
d) None of the mentioned
View Answer
Answer: c
Explanation: The decoder step consists of both De-interleaving and decoding which are
performed in the reverse order of encoding steps.
5. The ______ the error correcting capability used, the _____ will be the erasure correcting capability.
a) Larger, smaller
b) Smaller, larger
c) Smaller, smaller
d) Larger, larger
View Answer
Answer: a
Explanation: There is a trade off between error correction and erasure correction, the larger the
error correcting capability used the smaller will be the erasure correcting capability.
6. In interpolation
a) New samples are added
b) Unreliable samples are removed
c) New samples are added & Unreliable samples are removed
d) None of the mentioned
View Answer
Answer: c
Explanation: The function of the interpolation function is to add new samples estimated from the
reliable ones in place of unreliable ones.
Answer: d
Explanation: A channel that exhibits multi-path fading where the signal arrives at the receiver
over two or more different paths. This channel has memory, exhibits mutually dependent signal
transmission impairment.
Answer: a
Explanation: Separating the symbols in time effectively changes a channel with memory into a
memory-less one.
9. The minimum end to end delay in block interleaving is
a) 2MN+2M+2
b) 2MN-2M+2
c) 2MN-2M-2
d) 2MN+2M-2
View Answer
Answer: b
Explanation: The inter leaver or De-inter leaver delay is 2MN symbol times. M(N-1)+1 memory
cells needs to be filled before transmission can begin. Thus the minimum end to end delay is
2MN-2M+2 symbol times, not including any channel propagation delay.
Answer: b
Explanation: A concatenated code is the one that uses two levels of coding, inner code and outer
code to achieve desired error performance.
Answer: a
Explanation: A concatenated code has low error rate with an overall implementation complexity
which is less than that would be required for single level coding.
Answer: b
Explanation: The performance of non binary code like reed-Solomon code which is also an
example for concatenated code depends only on the number of symbol errors in the block.
Answer: b
Explanation: Turbo codes implemented a parallel concatenation of two convolution codes with
an inter leaver and an iterative decoder.
1. The minimum nyquist bandwidth needed for baseband transmission of Rs symbols per second is
a) Rs
b) 2Rs
c) Rs/2
d) Rs2
View Answer
Answer: c
Explanation: Theoretical minimum nyquist bandwidth needed for the baseband transmission of
Rs symbols per second without ISI is Rs/2.
Answer: a
Explanation: The capacity relationship from Shannon-hartley capacity theorem is given by C = W
log2 ( 1+S/N ).
Answer: b
Explanation: There exists a limiting value for EB/N0 below which they can be no error free
communication at any information rate. This EB/N0 is called as Shannon limit.
Answer: a
Explanation: Entropy is defined as the average amount of information per source output.
5. Equivocation is the
a) Conditional entropy
b) Joint entropy
c) Individual entropy
d) None of the mentioned
View Answer
Answer: a
Explanation: Shannon uses a correction factor called equivocation to account for uncertainty in
the received signal. It is defined as the conditional entropy of the message X given Y.
Answer: a
Explanation: For a error free channel conditional probability should be zero, because having
received Y there is complete certainty about the message X.
Answer: a
Explanation: According to Shannon the average effective information is obtained by subtracting
the equivocation from the entropy of the source.
Answer: a
Explanation: Turbo codes are a class of high performance forward error correction codes.
Answer: c
Explanation: There are many instances of turbo codes, using different component encoders,
input/output ratios, inter leavers, punching patterns.
Answer: a
Explanation: Two elementary decoders are connected in serial connection for decoding the turbo
codes.
11. The inter leaver connected between the two decoders is used to
a) Remove error bursts
b) Scatter error bursts
c) Add error bursts
d) None of the mentioned
View Answer
Answer: b
Explanation: An inter leaver installed between the two decoders connected in series is used to
scatter error bursts.
Answer: b
Explanation: The decoder front end produces an integer for each bit in the data stream. This
integer is the measure of how likely it is that the bit 0 or 1 and is called as soft bit. It ranges from
-127 to 127. Here -127 represents certainly zero.
Answer: d
Explanation: The decoder front end produces an integer for each bit in the data stream. This
integer is the measure of how likely it is that the bit 0 or 1 and is called as soft bit. It ranges from
-127 to 127. Here 100 represents very likely one.
14. In soft decision approach 0 represents
a) Certainly one
b) Certainly zero
c) Very likely zero
d) Could be either zero or one
View Answer
Answer: d
Explanation: The decoder front end produces an integer for each bit in the data stream. This
integer is the measure of how likely it is that the bit 0 or 1 and is called as soft bit. It ranges from
-127 to 127. Here 0 represents ‘could be either zero or one’.
1. QPSK is a composite of
a) Two BPSK
b) Three BPSK
c) Two FSK
d) Two M-ary PSK
View Answer
Answer: a
Explanation: QPSK is effectively a composite of two BPSK signals transmitted on orthogonal
components of the carrier.
Answer: a
Explanation: In non coherent orthogonal MFSK modulation, the IF transmission bandwidth is WIF
= M/T.
Answer: b
Explanation: For non coherent orthogonal MFSK modulation the bandwidth efficiency is
R/W=log2M/M.
4. The bandwidth efficiency increases as M increases.
a) True
b) False
View Answer
Answer: b
Explanation: The bandwidth efficiency decreases as M increases.
Answer: c
Explanation: The bandwidth efficiency of QPSK is equal to that of the BFSK.
Answer: d
Explanation: Of all the modulation showed, QAM is the most bandwidth efficient one.
Answer: a
Explanation: The primary communication resources are transmitted power and channel
bandwidth.
Answer: b
Explanation: Within the same block size, the code with greater redundancy requires more
bandwidth expansion.
Answer: c
Explanation: Offset QPSK and MSK are two examples of constant envelope modulation schemes
that are attractive for systems using non linear transponders.
Answer: c
Explanation: BPSK requires more bandwidth than the other modulation techniques for the given
level of spectral density.
Answer: d
Explanation: MSK spectrum has wider main lobe level and lower side lobe levels than the other
modulation spectrum.
Answer: b
Explanation: MSK is spectrally more efficient than the other modulation schemes. It has wider
main lobe level and lower side lobe levels.
Answer: a
Explanation: QPSK has narrower main lobe than MSK because for a given rate the QPSK symbol
rate is half the MSK symbol rate.
14. Which technique can be used for bandwidth reduction?
a) BPSK
b) QPSK
c) MPSK
d) MFSK
View Answer
Answer: c
Explanation: Coherent M-ary PSK modulation is a well known technique for achieving bandwidth
reduction.
Answer: c
Explanation: QPSK modulation consists of two independent streams. One stream amplitude
modulates cosine wave and the other amplitude modulates sine wave.
Answer: b
Explanation: QAM is a combination of both ASK and PSK and is also called as amplitude phase
keying.
Answer: a
Explanation: The term coded refers to the presence of error correction coding scheme involving
the use of redundant bits and expanded bandwidth.
3. In MPSK, R/W
a) Increases with increase in M
b) Increases with decrease in M
c) Decreases with increase in M
d) Is not dependent on M
View Answer
Answer: a
Explanation: The bandwidth efficiency R/W increases as M increases in case of MPSK modulation.
4. In MFSK, R/W
a) Increases with increase in M
b) Increases with decrease in M
c) Decreases with increase in M
d) Is not dependent on M
View Answer
Answer: c
Explanation: In MFSK, the denominator increases faster as the numerator when M increases.
Thus R/W decreases with increase in M.
Answer: b
Explanation: For an uncoded system, if the channel is power limited MFSK is selected and if it is
bandwidth limited MPSK is selected.
Answer: a
Explanation: The relationship between symbol transmission rate and data rate R is given by Rs=
R/log2M.
Answer: b
Explanation: When the output is quantized for more than two levels, soft decision is made.
Answer: d
Explanation: The basic ways to increase the throughput of the system is to increase the EIRP, by
reducing the system losses, providing channel bandwidth, and efficient allocation of CR.
10. In which technique spot beam antennas are used to point the radio signals in different
directions?
a) Code division
b) Space division
c) Frequency division
d) None of the mentioned
View Answer
Answer: b
Explanation: In space division multiplexing, spot beam antennas are used to separate radio
signals by pointing in different directions.
Answer: a
Explanation: In polarization division technique orthogonal polarization is used to separate signals
for reuse.
13. In double side band spectrum which side-band is called as inverted side-band?
a) LSB
b) USB
c) LSB & USB
d) None of the mentioned
View Answer
Answer: a
Explanation: The double side band spectrum consists of two side bands. LSB is called as inverted
side-band and the USB is called as erect side-band.
Answer: b
Explanation: The mixing and filtering yields frequency shifted channels and it removes the USB.
Answer: c
Explanation: In FDM multiplex hierarchy, the first level is composed of five channels. The second
level consists of five groups or 60 channels.
16. The orbital period of communication satellites is _______ as that of earth’s rotational period.
a) Same
b) Greater
c) Lesser
d) None of the mentioned
View Answer
Answer: a
Explanation: The communication satellite is in circular orbit and has orbital period same as that
of the earth’s rotational period
Answer: b
Explanation: Higher density lattice structures are formed by adding improvement to the signal
subset choice by starting with the densest possible lattice for the space.
2. Choosing a closely packed signal subset from any regular lattice or array of candidate points is
called as
a) Optimum signal constellation boundaries
b) Higher density lattice structures
c) Trellis coded modulation
d) None of the mentioned
View Answer
Answer: a
Explanation: Optimum signal constellation boundaries are obtained by choosing closely packed
signal subset from any regular lattice or array of candidate points.
Answer: d
Explanation: Trellis coded modulation is a achieves error performance improvements without
expansion of bandwidth. It uses redundant non binary modulation in combination with finite
state machines.
Answer: c
Explanation: In finite state machines, the set of possible future outputs are predicted using
present input and past output.
Answer: a
Explanation: Trellis coded modulation scheme has memory ( a finite state machine) such as the
convolutional code.
Answer: a
Explanation: In trellis coded modulation increase in channel capacity is achieved by signal set
expansion.
Answer: a
Explanation: Transmission bandwidth of non orthogonal signalling depends on rate of signalling
and not on density of signal points in the constellation.
Answer: b
Explanation: Free distance which is the minimum distance between members of set of allowed
code sequences determines the error performance.
Answer: a
Explanation: Flat top sampling of low pass signals gives rise to aperture effect.
Answer: d
Explanation: In a delta modulation system, granular noise occurs when the modulating signal
remains constant.
Answer: a
Explanation: A PAM signal can be detected by using low pass filter.
Answer: a
Explanation: Coherent demodulation of FSK signal can be performed using matched filter.
Answer: c
Explanation: The use of non uniform quantization leads to increase in SNR for low level signals.
Answer: b
Explanation: PAM requires a synchronizing signal.
Answer: b
Explanation: A PWM signal can be generated by a mono stable multi vibrator.
Answer: b
Explanation: False because different message signals are not applied to the channel
simultaneously.
9. In an ideal TDM system, the cross correlation between two users of the system is
a) 1
b) 0
c) Infinity
d) -1
View Answer
Answer: b
Explanation: In an ideal TDM system, the cross correlation between two users of the system is 0.
Answer: b
Explanation: In M-ary FSK as M increases error decreases.
Answer: c
Explanation: In M-ary FSK as M tends to infinity, probability of error becomes zero.
4. Which modulation technique have the same bit and symbol error probability?
a) BPSK
b) DPSK
c) OOK
d) All of the mentioned
View Answer
Answer: d
Explanation: BPSK, DPSK, OOK and non coherent FSK have same bit and symbol error
probability.
Answer: a
Explanation: Class A amplifiers have 50% maximum power efficiency.
Answer: c
Explanation: Class C amplifiers generate high distortion and it is closer to switch than an
amplifier.
Answer: c
Explanation: Class B linear amplifiers have maximum power efficiency of 78.5%.
Answer: c
Explanation: Class C has the maximum power efficiency when compared to the other linear
amplifiers.
Answer: c
Explanation: Two basic properties to determine stream’s fidelity are bit depth and sampling rate,
number of times per second that samples are taken.
Answer: d
Explanation: In bipolar codes, the pulses can be positive, negative or absent.
Answer: c
Explanation: Delta modulation is the process of analog to digital and digital to analog conversion
technique used for transmission of voice signals.
Answer: b
Explanation: To achieve high signal to noise ratio, delta modulation must use over sampling
techniques.
Answer: b
Explanation: The demodulator used in delta modulation is a simple form of integrator.
Answer: c
Explanation: Sources of noise in delta modulation are granularity and slope overload.
7. When probability of receiving a symbol is 1 then how much information will be obtained?
a) Little information
b) Much information
c) No information
d) None of the mentioned
View Answer
Answer: c
Explanation: When the probability of receiving a symbol is 1 then the information obtained is
zero.
Answer: c
Explanation: In channel encoding includes addition of redundancy to the signal such that any bit
errors can be corrected.
Answer: b
Explanation: Modulation procedure includes digital to analog conversion which produces a
continuous time signal that can be sent through the channel.
Answer: a
Explanation: Circuit connection in point to point communication is called as switching. Switching
does not exist in broadcast communication or network.
Answer: a
Explanation: Space division has dedicated paths and time division has dedicated time slots.
Answer: a
Explanation: In time division, actual switch is called as speech memory and in space division
actual switch is called as cross point.
Answer: a
Explanation: In time division, connection is established using data exchange and in space division
it is established using galvanic connections.
Answer: d
Explanation: Some of the features of analogue switches are good bandwidth, low cost, low
distortion, lower reliability.
15. Operations performed by switching system
a) Path establishment
b) Information exchange
c) Tariff computation
d) All of the mentioned
View Answer
Answer: d
Explanation: Operations performed by switching network are path establishment, information
exchange, tariff computation, maintenance, billing etc.
Answer: c
Explanation: Time discretization and amplitude discretization are the two processes done in PCM
system.
Answer: a
Explanation: Sampling process is used for time discretization and quantization process is used
for amplitude discretization.
Answer: c
Explanation: Modulation process corresponds to switching or keying the amplitude, frequency or
phase of CW carrier.
4. Matched filter
a) Is a non linear filter
b) Produces maximum output SNR
c) All of the mentioned
d) None of the mentioned
View Answer
Answer: b
Explanation: Matched filter is a linear filter which produces maximum output SNR for a given
transmitted signal.
Answer: c
Explanation: Uni-polar base-band signalling, PSK and FSK has same probability of error.
Answer: b
Explanation: Bipolar base-band signalling has high error probability performance than the others.
The probability of error value is A2T.
Answer: b
Explanation: Time division multiplexing uses low pass filter and commutator.
Answer: a
Explanation: In TDM, at the receiver end low pass filtering is done to obtain individual signals.
Answer: a
Explanation: CDMA provides more secure communication than TDMA and FDMA.
Answer: c
Explanation: Entropy can be defined as the measure of randomness or information.
Answer: b
Explanation: Entropy calculation returns a deterministic number and not a random variable.
12. Entropy of N random variables is the _____ of the entropy of individual random variable.
a) Sum
b) Product
c) Sum of squares
d) Average
View Answer
Answer: a
Explanation: Entropy of N random variables is the sum of the entropy of individual random
variable.
Answer: a
Explanation: Average energy per bit is given by average energy symbol divided by log2 M.
2. Which FSK has no phase discontinuity?
a) Continuous FSK
b) Discrete FSK
c) Uniform FSK
d) None of the mentioned
View Answer
Answer: a
Explanation: Continuous frequency shift keying has no phase discontinuity between symbols.
3. FSK reception is
a) Phase Coherent
b) Phase non coherent
c) Phase Coherent & non coherent
d) None of the mentioned
View Answer
Answer: c
Explanation: Reception of FSK can be either phase coherent or phase non coherent.
Answer: c
Explanation: Frequency shift keying uses correlation receiver and phase locked loop.
Answer: b
Explanation: In non coherent reception of FSK, energy in each frequency is measured.
Answer: b
Explanation: Every frequency has two orthogonal functions – sine and cosine.
7. If we correlate the received signal with any one of the two orthogonal function, the obtained
inner product will be
a) In phase
b) Quadrature
c) Zero
d) Cannot be determined
View Answer
Answer: c
Explanation: If we correlate the received signal with only one of the orthogonal function for
example sine, the inner product obtained will be zero.
8. If we correlate the received signal with both orthogonal function the inner product will be
a) In phase
b) Quadrature
c) In phase and quadrature
d) Unity
View Answer
Answer: c
Explanation: If we correlate the received signal with both the orthogonal function, the two inner
products obtained will be in phase and quadrature.
Answer: a
Explanation: A simulation of digital communication system is used to estimate bit error rate.
Answer: b
Explanation: Matched filter is a demodulation technique with LTI.
Answer: c
Explanation: Amplitude shift keying and uni-polar PAM both schemes are called as on off keying.
12. QAM uses ______ as the dimensions.
a) In phase
b) Quadrature
c) In phase & Quadrature
d) None of the mentioned
View Answer
Answer: c
Explanation: QAM uses in phase and quadrature which is cosine and sine respectively as the
dimensions.
Answer: c
Explanation: BPSK is similar to bipolar PAM and both have same probability of error.
Answer: c
Explanation: Digital microwave relay, dial up modem and etc uses QAM modulation technique.
8. Questions on Synchronization
Answer: c
Explanation: Being in phase lock means that the receiver’s local oscillator is synchronized in both
frequency and phase with the received signal.
Answer: c
Explanation: Non coherent system requires frequency synchronization.
Answer: c
Explanation: Frame synchronization is necessary when the information is organized in blocks or
messages of some uniform number of symbols. Thus block code needs frame synchronization.
Answer: d
Explanation: Non coherently detected BPSK is the simplest digital receiver and it requires
frequency tracking, bit timing synchronizations and also phase synchronization.
Answer: b
Explanation: Transmitter plays a role in synchronization by varying the frequency and timing of
its transmissions to correspond to expectation of receiver. This transmitter synchronization
implies two way communication.
Answer: b
Explanation: For each level increase in synchronization levels, cost increases.
Answer: c
Explanation: For communication system using non coherent modulation techniques and many
users accessing the central communication node, synchronization is necessary.
9. Which method has fast acquisition and can work without return link?
a) Open loop method
b) Closed loop method
c) Open & Closed loop method
d) None of the mentioned
View Answer
Answer: a
Explanation: The main advantage of open loop method is that acquisition is fast, the procedure
can work without return link and the amount of real time computation that is required is small.
Answer: b
Explanation: Closed loop method requires return link, large amount of real time processing and
has two way link.
Answer: a
Explanation: Open loop method is inflexible, does not adjust quickly to unplanned changes and
needs external authority that provides prior knowledge, where as closed loop method does not
need all these.
12. Which method needs precorrect time?
a) Open loop method
b) Closed loop method
c) Open & Closed loop method
d) None of the mentioned
View Answer
Answer: a
Explanation: In open loop method the frequency and time are precorrected.
13. In open loop method, the time reference error __________ with respect to time.
a) Increases exponentially
b) Decreases exponentially
c) Increases quadratically
d) Decreases quadratically
View Answer
Answer: a
Explanation: In open loop transmitter synchronization system, the time reference error increases
quadratically with time.
14. When a terminal is able to utilize the measurements made on the return link it is called as
a) Open loop method
b) Closed loop method
c) Quasi close loop method
d) None of the mentioned
View Answer
Answer: c
Explanation: The case where a terminal is able to utilize the measurements made on a return link
signal is called as quasi closed loop transmitter synchronization.
15. Which reduces the effective distance between signals in signal space?
a) Time error
b) Frequency offset
c) Time error & Frequency offset
d) None of the mentioned
View Answer
Answer: c
Explanation: Time error or frequency offset or combination of both will reduce the effective
distance between signals in signal space and degrade error performance.
16. The system which has ______ signal to noise ratio can tolerate larger timing error.
a) Large
b) Small
c) Large & Small
d) None of the mentioned
View Answer
Answer: a
Explanation: The system with increased signal to noise ratio will allow it to tolerate larger timing
error so the improvement is error performance is rapid.
Section 49: Receiver Synchronization
1. Phase locked loops consists of
a) Phase detectors
b) Loop filter
c) Voltage controlled oscillator
d) All of the mentioned
View Answer
Answer: d
Explanation: Phase locked loops have three basic components – phase detector, loop filter and
voltage controlled oscillator. It measures the phase difference between the incoming signal and
local replica.
Answer: b
Explanation: A VCO is an oscillator whose output frequency is a linear function of its input voltage
over some range of input and output.
Answer: b
Explanation: Most of the PLL designs have second order loop as they can be made
unconditionally stable.
4. A cycle slip occurs when the magnitude of the original phase error exceeds
a) Π radians
b) 2π radians
c) π/2 radians
d) π2 radians
View Answer
Answer: b
Explanation: A cyclic slip occurs when the magnitude of the original phase error exceeds 2π
radians.
5. When phase noise and phase jitter is doubled, the phase variance increases by
a) Two times
b) Four times
c) 0.5 times
d) 8 times
View Answer
Answer: b
Explanation: In PLL, when the phase jitter and phase noise increases by 2, the phase variance
increases by 4 than that of the original signal.
Answer: b
Explanation: Acquisition is accomplished by external signal or circuits or sometimes it might be
unaided (self acquisition). This acquisition process is an inherently non linear operation.
Answer: a
Explanation: The sweep rate must not be too large, or the loop will be driven through the lock
point so fast that it will fail to acquire.
Answer: a
Explanation: Closed loop synchronizers are more accurate, but they are much more complex and
costly.
Answer: c
Explanation: The main operation of the edge detector is differentiation and rectification by the
use of square law detector.
Answer: c
Explanation: Continuous phase modulation is an important signalling technique because of their
bandwidth efficiency. Bandwidth efficiency is obtained by increasing the smoothness of the
signal.
Answer: a
Explanation: The increase in smoothness in the signals concentrate the signal energy in a
narrower bandwidth, reducing the amount of bandwidth required.
Answer: b
Explanation: The number of filters in CPM receiver structure is given by ML.
Answer: a
Explanation: In modulation schemes such as frequency modulation and pulse code modulation
spreading of spectrum occurs but it cannot be considered as types of spread spectrum
technique.
2. Gaussian noise has _____ power spread _____ over all frequencies.
a) Zero, uniformly
b) Zero, non uniformly
c) Infinite, uniformly
d) Infinite, non uniformly
View Answer
Answer: c
Explanation: Gaussian noise is a mathematical model which has infinite power spread uniformly
over all frequencies.
3. Jamming is caused by
a) Multipath
b) Natural phenomena
c) Multipath & Natural phenomena
d) None of the mentioned
View Answer
Answer: c
Explanation: Jamming can be caused by natural phenomenon and also is caused by multipath.
4. Which system makes the detection difficult for all users other than the intended users?
a) Low probability of intercept
b) Low probability of detection
c) Low probability of intercept & detection
d) None of the mentioned
View Answer
Answer: c
Explanation: Low probability of detection or low probability of intercept is a system which makes
the detection difficult for anyone but the intended users.
Answer: c
Explanation: The radio meter consists of band pass filter, squaring circuit and integrating circuit.
Answer: c
Explanation: Spread spectrum signals are used for ranging or determination of position location.
Answer: a
Explanation: Uncertainty in the delay measurement is directly proportional to the rise time of the
pulse and inversely proportional to the bandwidth of the signal pulse.
9. In spread spectrum technique, the desired signal is multiplied _____ and interference signal is
multiplied _____
a) Once, twice
b) Twice, once
c) Twice, thrice
d) Thrice, twice
View Answer
Answer: b
Explanation: In spread spectrum technique, the desired signal is multiplied twice and
interference signal is multiplied once.
Answer: b
Explanation: Each satellite has 12 transponders with a bandwidth of 36 Mhz each.
Answer: d
Explanation: The preamble portion consists of synchronization, addressing and error control
sequences.
Answer: b
Explanation: Dynamic allocation method is more efficient than fixed assignment as any slot won’t
be wasted unnecessarily.
Answer: b
Explanation: Both TDMA and FDMA has equivalent performance but when it comes to average
packet delay TDMA has lesser delay than FDMA.
Answer: a
Explanation: The maximum waiting time before transmission of a packet is given by (M-1)T/M.
15. CDMA is
a) Similar to FDMA
b) Similar to TDMA
c) Combination of both
d) None of the mentioned
View Answer
Answer: c
Explanation: Code division multiple access is the technique which is the combination of both
TDMA and FDMA.
Answer: c
Explanation: The FH modulation is considered as a two step process. It includes data modulation
and frequency hopping modulation.
Answer: b
Explanation: CDMA when compared to TDMA does not need precise time coordination among
various simultaneous transmitters.
Answer: d
Explanation: A local area network can be used to interconnect computers, terminals, printers and
so on located within a building or a small set of buildings.
Answer: b
Explanation: Local area network uses high bandwidth cables for designing.
Answer: b
Explanation: The maximum packet size of Ethernet is 1526 bytes where a byte is 8 bits.
Answer: c
Explanation: The minimum packet size is 72 bytes, consisting of 8 byte preamble, 14 byte header,
46 byte data, 4 byte parity.
5. The interface between the ring and the stations are passive.
a) True
b) False
View Answer
Answer: b
Explanation: The interface between the rings and the stations are active rather than passive.
Answer: a
Explanation: Bit stuffing is done by inserting a zero in the data stream after seven consecutive
ones.
Answer: a
Explanation: As channel capacity R increases, the channel throughput should also increase.
Answer: b
Explanation: In Aloha technique if the negative acknowledgment is received, the re-transmission
is done after a random delay so that it doesn’t collide again.
Answer: a
Explanation: The Pure Aloha technique has constant packet lengths.
10. For a throughput of value less than 0.20, which has less average delay?
a) S-ALOHA
b) Pure ALOHA
c) R-ALOHA
d) None of the mentioned
View Answer
Answer: a
Explanation: For a throughput value of less than 0.20, S-ALOHA has less average delay than
R-ALOHA.
11. For a throughput value of 0.20 to 0.67, which has less average delay?
a) S-ALOHA
b) Pure ALOHA
c) R-ALOHA
d) None of the mentioned
View Answer
Answer: c
Explanation: For throughput value of 0.20 to 0.67, it is clear that R-ALOHA is superior and has less
average delay than S-ALOHA.
Answer: a
Explanation: Binary tree search is used for rapid polling of user population and it is used for
multiple users.
Answer: b
Explanation: Binary tree search is more efficient method than straight polling in case of a large
population.
Answer: c
Explanation: At lower throughput values, S-ALOHA works better and for higher throughput
values R-ALOHA works better.
Answer: b
Explanation: INTELSAT II and III operate its traveling wave tube amplifiers in linear region.
Answer: b
Explanation: The capacity of the transponder drops as the number of carriers increases.
Answer: a
Explanation: Guard bands are needed between the carriers. Thus as carriers increases, guard
bands are also increases.
Answer: d
Explanation: TWTA operating in the linear region reduces interference, and can provide less
overall power. The channel becomes power limited and can service fewer carriers.
Answer: c
Explanation: SPADE operation and binary tree search can be used when the traffic is heavy.
6. SPADE uses
a) QPSK
b) BPSK
c) FSK
d) MSK
View Answer
Answer: a
Explanation: SPADE uses digital voice transmission – QPSK.
7. SPADE is a
a) MAA system
b) DAMA system
c) MAA & DAMA system
d) None of the mentioned
View Answer
Answer: b
Explanation: SPADE is a DAMA system where all channels are shared.
Answer: b
Explanation: In SPADE system, the carrier is assigned dynamically, that is on demand.
Answer: a
Explanation: TDMA earth station equipment is more costlier than the FDMA equipments.
Answer: a
Explanation: TDMA operation needs very precise synchronization needed to assure orthogonality
of time slots.
Answer: b
Explanation: FDM technique is based on the orthogonality of sinusoids.
Answer: a
Explanation: Synchronous time division multiplexing provides constant bandwidth and constant
delay.
3. Random access is
a) Distributed
b) Fault tolerant
c) Distributed & Fault tolerant
d) None of the mentioned
View Answer
Answer: c
Explanation: Random access is simple, distributed and very fault tolerant.
Answer: a
Explanation: Synchronous TDM is an example for the reservation system.
Answer: b
Explanation: Reservation systems are useful when delays are large.
6. In slotted system, access is
a) Synchronous
b) Asynchronous
c) Synchronous & Asynchronous
d) None of the mentioned
View Answer
Answer: b
Explanation: In slotted system, access is asynchronous and requires addressing information
inside.
Answer: b
Explanation: The collision window is twice the cable length.
Answer: c
Explanation: Bridges and routers isolates collision.
Answer: c
Explanation: As speed and distance goes up, minimum packet size also goes up.
Answer: d
Explanation: TDM and FDM are both orthogonal multiplexing.
Answer: d
Explanation: Companding is used to protect all small signals in PCM from quantizing noise.
2. TDM is used to
a) Increase the information transmission rate
b) Use only one carrier frequency to handle different signals
c) To use different frequency bands for different signals
d) To protect all small signals in PCM from quantizing noise
View Answer
Answer: b
Explanation: TDM is used to use only one carrier frequency to handle different signals.
Answer: b
Explanation: FDM has greater bandwidth.
Answer: a
Explanation: TDM has lower noise immunity.
Answer: a
Explanation: True. TDM can be employed to transmit channels having unequal bandwidth.
Answer: b
Explanation: Digital communication provides better fidelity control.
Answer: b
Explanation: In digital communication reusing of components is possible.
Answer: c
Explanation: Abstraction is the mechanism of breaking the problem down.
Answer: b
Explanation: In digital communication, in layers only one layer and its next layer can
communicate.
Answer: b
Explanation: Processing gain is the ratio of signal bandwidth to message bandwidth.
Answer: b
Explanation: Frequency hopping spread spectrum is better for avoiding jamming.
Answer: c
Explanation: Time hopping spread spectrum is more bandwidth efficient.
Answer: a
Explanation: Direct sequence spread spectrum is more simpler to implement.
Answer: a
Explanation: Synchronous CDMA uses orthogonal codes and asynchronous CDMA uses
pseudorandom codes.
7. Which is more suitable when large number of transmitters are used?
a) Synchronous CDMA
b) Asynchronous CDMA
c) Synchronous & Asynchronous CDMA
d) None of the mentioned
View Answer
Answer: b
Explanation: Asynchronous CDMA is more suitable for large number of transmitters.
8. CDMA rejects
a) Narrow band interference
b) Wide band interference
c) Narrow & Wide band interference
d) None of the mentioned
View Answer
Answer: a
Explanation: CDMA effectively rejects narrow band interference.
Answer: c
Explanation: Frequency planning is necessary for both TDMA and FDMA.
Answer: b
Explanation: CDMA uses soft hand off which provides more reliable communication.
Answer: d
Explanation: The three basic properties that can be applied for pseudorandom sequence are
balance, run and correlation properties.
Answer: a
Explanation: The shift register operation is controlled by clock pulses.
Answer: d
Explanation: A linear feedback shift register consists of four stage register for storage and
shifting, modulo 2 adder and feedback path.
5. If the initial pulse of 1000 is fed to shift register, after how many clock pulses does the sequence
repeat?
a) 15
b) 16
c) 14
d) 17
View Answer
Answer: a
Explanation: If the initial pulse 1000 is given to shift register, the foregoing sequence repeats
after 15 clock pulses.
7. For maximal length sequence, the sequence repetition clock pulses p is given by
a) 2n + 1
b) 2n -1
c) 2n
d) None of the mentioned
View Answer
Answer: b
Explanation: For maximal length sequence, produced by n stage linear feedback shift register the
sequence repetition clock pulses p is given by 2n -1 .
Answer: b
Explanation: For any cyclic shift the auto-correlation function is equal to -1/p.
Answer: b
Explanation: If the jammer noise shares the same bandwidth, the result could be destructive.
Answer: b
Explanation: Pulse jammer consists of pulse modulated band-limited noise.
11. Which are the design options for anti jam communicator?
a) Time diversity
b) Frequency diversity
c) Special discrimination
d) All of the mentioned
View Answer
Answer: d
Explanation: The design options for anti-jam communicator are time diversity, frequency
diversity and special discrimination.
Answer: b
Explanation: The ratio (J/S)reqd gives the measure of how invulnerable the system is to
interference.
Answer: c
Explanation: The system will be efficient if it has greater (J/S)reqd and larger system’s noise
rejection capability.
Answer: b
Explanation: The broadband jammer or wide-band jammer is the one which jams the entire Wss
with its fixed power.
Answer: a
Explanation: In a system, to increase the error probability the processing gain should be
increased.
Answer: b
Explanation: Greater degradation is possible more with partial jamming than broadband
jamming.
Answer: c
Explanation: The smart jammers which monitor a communicator’s signals is known as frequency
follower or repeat back jammers.
Answer: c
Explanation: DS/BPSK is a two step precess which includes despreading and demodulation.
Answer: a
Explanation: In direct sequence process, De-spreading correlator is followed by a modulator.
Answer: a
Explanation: The processing gain is given by the ratio of the minimum bandwidth of the data to
data rate.
4. Chip is defined as
a) Shortest uninterrupted waveform
b) Largest uninterrupted waveform
c) Shortest diversion
d) None of the mentioned
View Answer
Answer: a
Explanation: A chip is defined as the shortest uninterrupted waveform in the system.
Answer: c
Explanation: Processing gain is given as both as the ratio of the minimum bandwidth of the data
to data rate and also the by the ratio of code chip rate and data rate as minimum bandwidth is
approximately equal to code chip rate.
6. Which modulation scheme is preferred for direct sequence spread spectrum process?
a) BPSK
b) QPSK
c) BPSK & QPSK
d) None of the mentioned
View Answer
Answer: c
Explanation: Both the modulation scheme BPSK and QPSK can be used for direct sequence
spread spectrum process.
Answer: c
Explanation: The frequency hopping spread spectrum system uses M-ary frequency shift keying
modulation scheme.
Answer: a
Explanation: The minimum spacing between consecutive hop positions given the minimum
number of chips necessary in the frequency word.
9. Which system allows larger processing gain?
a) Direct sequence
b) Frequency hopping
c) Direct sequence & Frequency hopping
d) None of the mentioned
View Answer
Answer: b
Explanation: Frequency hopping spread spectrum system allows greater processing gain than
direct sequence spread spectrum technique.
Answer: b
Explanation: In frequency hopping spread spectrum phase coherence is hard to maintain from
hop to hop.
Answer: b
Explanation: As it is difficult to maintain phase coherence, non coherent demodulator is used.
Answer: b
Explanation: Robustness gives the ability of a signal to withstand the impairments such as noise,
jamming etc.
Answer: a
Explanation: The repeated symbols are called as chips.
14. Slow frequency hopping is
a) Several hops per modulation
b) Several modulations per hop
c) Several symbols per modulation
d) None of the mentioned
View Answer
Answer: b
Explanation: Slow frequency hopping is several modulation per frequency hop.
Answer: d
Explanation: Fast frequency hopping is several frequency hops per modulation.
Answer: a
Explanation: In frequency hopping technique hop duration is shorter than the symbol duration.
Answer: b
Explanation: Acquisition is a process of bringing two spreading signals into coarse alignment with
one another.
2. Tracking maintains the possible waveform ______ alignment using a feedback loop.
a) Fine
b) Coarse
c) Fine & Coarse
d) None of the mentioned
View Answer
Answer: a
Explanation: Tracking continuously maintains the best possible waveform fine alignment by
means of a feedback loop.
3. Acquisition can be of ______ type.
a) Coherent
b) Non coherent
c) Coherent & Non coherent
d) None of the mentioned
View Answer
Answer: c
Explanation: Acquisition can be categorized as two types coherent and non coherent.
4. Uncertainty in the distance between transmitter and receiver translates into uncertainty in
a) Frequency
b) Propagation delay
c) Efficiency
d) None of the mentioned
View Answer
Answer: b
Explanation: uncertainty in the distance between the transmitter and the receiver translates into
uncertainty in the propagation delay.
Answer: b
Explanation: It considers all possible code positions in parallel and maximum likelihood
algorithm is used to acquire the code.
6. Acquisition can be accomplished ________ as all possible codes are examined ______
a) Slowly, one by one
b) Rapidly, simultaneously
c) Slowly, simultaneously
d) Rapidly, one by one
View Answer
Answer: b
Explanation: Acquisition can be accomplished rapidly as all possible codes are examined
simultaneously.
Answer: a
Explanation: A single correlator or matched filter does serial search.
8. How many correlators are used for despreading and code tracking function?
a) One
b) Two
c) Three
d) None of the mentioned
View Answer
Answer: a
Explanation: The design of code tracking function or despreading function needs only one
correlator.
Answer: b
Explanation: The signal to noise performance of TDL is a bit worse than DDL.
Answer: b
Explanation: If the PN codes are not purely orthogonal in direct CDMA interference will occur.
Answer: b
Explanation: If the active users were to double, then the received Eb/I0 would essentially be
halved.
Answer: d
Explanation: In CDMA, 100% frequency reuse can be employed.
4. Bandwidth efficiency improvement involves
a) Dividing the geographical region into cells
b) Allowing frequency allocation
c) Dividing the geographical region into cells & Allowing frequency allocation
d) None of the mentioned
View Answer
Answer: c
Explanation: The idea of dividing the geographical region into cells and allowing frequency
allocation of one cell can be reused represents bandwidth efficiency improvement methods.
Answer: a
Explanation: CDMA has more user capacity compared to AMPS and TDMA.
Answer: b
Explanation: CDMA technique capacity is interference limited.
Answer: c
Explanation: TDMA and FDMA capacity is dimension limited.
Answer: d
Explanation: The forward link contains different types of channels such as paging, pilot,
synchronization and traffic.
9. The types of channels that reverse channel contains are
a) Traffic
b) Access
c) Traffic & Access
d) None of the mentioned
View Answer
Answer: c
Explanation: The reverse channel contains two types of channels – traffic and access.
Answer: c
Explanation: Forward channel CDMA includes steps like modulo 2 addition, channelization, and
base station identification.
Answer: c
Explanation: Walsh cover is used for channelization plus spreading.
Answer: d
Explanation: The code in the forward direction, short code is designed using 15 stage shift
register.
13. How many channels are transmitted in the forward and reverse direction?
a) 1,64
b) 64,1
c) 2,32
d) 32,2
View Answer
Answer: b
Explanation: In forward direction 64 channels are transmitter and in reverse direction, only one
channel is transmitted.
14. Which channel is more robust?
a) Forward channel
b) Reverse channel
c) Forward & Reverse channel
d) None of the mentioned
View Answer
Answer: a
Explanation: Forward channel is more robust than the reverse channel.
Answer: b
Explanation: Mobile unit continuously scans for stronger pilot and provides and serves hand off
process.
Answer: c
Explanation: Soft hand off process is served by the mobile. It scans for stronger pilot and
requests handoff to base station.
Answer: c
Explanation: Cryptosystems which includes the process of encryption and decryption is used for
both privacy and authentication.
Answer: c
Explanation: Unconditionally secure system is the one which has insufficient information
available to crypt-analyst. One such system is one-time pad.
Answer: a
Explanation: An earliest example of a mono alphabetic cipher was the Caesar cipher.
Answer: a
Explanation: In Caesar cipher each plain text is replaced with a new letter obtained by an
alphabetic shift.
Answer: b
Explanation: The Trithemius cipher is a poly alphabetical cipher.
Answer: a
Explanation: In auto key method feedback is necessary for the encryption process.
8. In Vigenere method ______ is provided.
a) Priming key
b) Feedback
c) Priming key & Feedback
d) None of the mentioned
View Answer
Answer: c
Explanation: Vigenere method which is also called as vigenere auto method priming key and
feedback are used.
Answer: a
Explanation: A cipher system is said to have perfect secrecy if for every message and cipher text
the posteriori probability is equal to priori probability.
Answer: c
Explanation: The conditions for perfect secrecy are, there is only one key transforming message
to each cipher text and all keys should be equally likely.
11. The _____ the uncertainty, the ______ is the information content.
a) Lesser, greater
b) Greater, lesser
c) Lesser, lesser
d) Greater, greater
View Answer
Answer: d
Explanation: The more uncertainty there is in predicting the occurrence of a message, the
greater the information content.
Answer: b
Explanation: Equivocation is defined as the conditional probability of X given Y.
13. The maximum number of message bits contained in each character is called as
a) True rate
b) Absolute rate
c) Optimum rate
d) None of the mentioned
View Answer
Answer: b
Explanation: Absolute rate is the maximum number of message bits contained in each character.
Answer: b
Explanation: With a finite key size, equivocation approaches zero.
Answer: b
Explanation: A system is said to be unbreakable when unique solution is not available because of
the number of equations being smaller than the number of unknown key bits.
Answer: c
Explanation: Examples of substitution encryption techniques are Caesar cipher and Trithemius
cipher.
Answer: b
Explanation: The substitution techniques have less encryption protection.
3. The standard building block uses _______ of a key to transform 64-bit input into 64-bit output.
a) 32 bit
b) 48 bit
c) 64 bit
d) 128 bit
View Answer
Answer: b
Explanation: The standard building block uses 48 bit keys to transform 64 bit input data into 64
bit output.
4. The 64 bit block input key has _____ number of parity bits.
a) 4
b) 6
c) 8
d) 16
View Answer
Answer: c
Explanation: The 64 bit input key has 8 parity bits placed in 8,16…..64 bit positions.
Answer: d
Explanation: One time pad is an encryption system with random key, used one time only, that
exhibits unconditional security.
Answer: b
Explanation: Perfect secrecy can be achieved for infinite number of messages since each
message would be encrypted with different portion of random key.
7. The segment of the key-stream of plaintext is obtained by _____ of two sequences together.
a) ANDing
b) ORing
c) Addition
d) Modulo 2 addition
View Answer
Answer: d
Explanation: The crypt-analyst performs modulo 2 addition of two sequences together to get the
sequence of key-stream of plaintext.
8. In which method the key-stream is generated independently of the message?
a) Synchronous encryption method
b) Self synchronous encryption method
c) All of the mentioned
d) None of the mentioned
View Answer
Answer: a
Explanation: In Synchronous encryption method, the key-stream is generated independently of
message.
Answer: b
Explanation: In self synchronous encryption technique, cipher feedback is used and the
key-stream is related to the messages.
10. Spread spectrum multiple access techniques allows the multiple signal to be transmitted
a) One after the other
b) Simultaneously
c) All of the mentioned
d) None of the mentioned
View Answer
Answer: b
Explanation: Spread spectrum multiple access technique allows multiple signals occupying the
same RF bandwidth to be transmitted simultaneously without interfering with one and another.
Answer: b
Explanation: In CDMA system, all participants can share the entire bandwidth asynchronously.
Answer: d
Explanation: Multi paths may be caused by atmospheric reflections, refraction, reflections from
buildings or other objects and may result in fluctuation in the received signal level.
13. For direct sequence systems what is the minimum required processing gain?
a) 3db
b) 10db
c) 12db
d) 20db
View Answer
Answer: b
Explanation: For a direct sequence systems, the minimum required processing gain is 10db.
Answer: c
Explanation: For hybrid systems employing both direct sequence and frequency hopping, the
minimum required processing gain is 17db.
Answer: c
Explanation: The frequency hopping system can provide reliable mitigation only if its hopping
rate is faster than the symbol rate and the hopping bandwidth is large.
Answer: a
Explanation: Direct sequence spread spectrum techniques allow for the detection of signals
whose psd is below noise level.
Answer: c
Explanation: Spread spectrum is used to transmit analog data and digital data using analog
signal.
Answer: c
Explanation: Spread spectrum makes jamming and interception difficult and provides improved
reception.
Answer: c
Explanation: Spread spectrum has immunity to noise and multi-path distortion.
Answer: a
Explanation: The width of the channel in frequency hopping spread spectrum corresponds to
bandwidth of the input signal.
6. The transmitter of frequency hopping system is fed with encoding scheme such as
a) Frequency shift keying
b) Binary phase shift keying
c) Frequency & Binary phase shift keying
d) None of the mentioned
View Answer
Answer: c
Explanation: For transmission, the binary data is fed into modulator using modulation scheme
such as frequency shift keying or binary phase shift keying.
Answer: c
Explanation: Band pass filter is used to block difference frequency and allow the sum frequency
to yield final FHSS signal.
Answer: b
Explanation: In CDMA, the incoming signal is multiplied with the spreading code.
9. The original bandwidth of the unspread signal in spread spectrum is ____ to data rate.
a) Proportional
b) Inversely proportional
c) Not related
d) None of the mentioned
View Answer
Answer: a
Explanation: In spread spectrum, the original bandwidth of the unspread signal is proportional to
the data rate.
Answer: c
Explanation: In direct sequence spread spectrum, band pass signal at the demodulator can be
used to recover the original signal.
Answer: b
Explanation: In conventional cryptosystem, same keys are used for encryption and decryption
where as in public key cryptosystem different keys are used.
Answer: a
Explanation: In public key cryptosystem, the encryption keys are kept as public where as
decryption keys are kept as secret.
Answer: a
Explanation: A trapdoor is a one way function. Such functions can go easily in only one direction.
Answer: c
Explanation: Pretty good privacy (PGP) privacy program is used for both electronic mails and file
encryption.
Answer: c
Explanation: Pretty good privacy system uses both private key and public key based systems.
6. Private key algorithm is used for _____ encryption and public key algorithm is used for _____
encryption.
a) Messages, session key
b) Session key, messages
c) Can be used for both
d) None of the mentioned
View Answer
Answer: a
Explanation: Private key algorithm is used for encryption of messages and public key algorithm is
used for encryption of session keys.
Answer: d
Explanation: Some of the examples of block codes are triple-DES, CAST and IDEA.
Answer: a
Explanation: Triple-DES uses 168 bit key size and IDEA and CAST uses 128 bits key length.
Answer: a
Explanation: Public key algorithms are used to sign a message and private key algorithms are
used to encrypt the messages.
Answer: c
Explanation: Some examples of hash functions are MD5 and SHA-1.
11. A cryptographic hash function has variable output length.
a) True
b) False
View Answer
Answer: b
Explanation: A cryptographic hash function has fixed output length.
Answer: b
Explanation: A set of numbers is called as super increasing if each element is greater than the
sum of all the numbers lesser than it.
Answer: a
Explanation: The knapsack problem can be solved by public key cryptosystem system using
knapsack vector and data vector.
Answer: b
Explanation: Merkell hellman cryptosystem is a public key asymmetric cryptosystem method.
15. In this Merkle Hellman method same key is used for encryption and decryption.
a) True
b) False
View Answer
Answer: b
Explanation: In Merkle hellman cryptosystem method, two separate private and public keys are
used for encryption and decryption.
Answer: b
Explanation: By statistically using the frequency of occurrence of individual characters and
character combinations we can solve many cipher systems.
Answer: c
Explanation: The encryption transformations were termed confusion and diffusion by Shannon.
Answer: b
Explanation: For n input bits the total number of possible substitution or connection patterns are
(2n)!.
Answer: b
Explanation: In permutation or transposition, the positions of the plaintext letters in the message
are simply rearranged.
Answer: b
Explanation: The substitution part of the encryption scheme is performed in parallel on small
segment of the blocks.
6. In cipher feedback method, encryption is done on
a) Single individual bits
b) Characters
c) Single individual bits & Characters
d) None of the mentioned
View Answer
Answer: a
Explanation: In cipher feedback method, single individual bits are encrypted rather than
characters and this leads to stream encryption.
Answer: b
Explanation: In stream encryption, random key-stream is used. The key sequence never repeats.
Answer: a
Explanation: In synchronous encryption system, the key-stream is generated independently of
the message.
Answer: a
Explanation: Synchronous cipher system is designed to use confusion and not diffusion.
10. Public key cryptosystem uses same key for both encryption and decryption.
a) True
b) False
View Answer
Answer: b
Explanation: Public key cryptosystem uses different keys for encryption and decryption.
Answer: b
Explanation: In public key cryptosystem, decryption key needs to be kept as a secret.
Answer: a
Explanation: Public key cryptosystem is called as a trap door one way function.
Answer: b
Explanation: The Euler’s totient function is determined by (p-1)(q-1), where p and q are kept
hidden.
Answer: c
Explanation: PGP uses many encryption techniques such as private key cryptosystem and also
public key cryptosystem.
Answer: b
Explanation: Public key cryptosystem is used for encryption of messages and private key
cryptosystem is used for encryption of messages.
Answer: b
Explanation: Public key cryptosystem is used for the creation of digital signatures.
Answer: c
Explanation: Data compression removes redundant character strings in a file and produces a
more uniform distribution of characters.
Answer: d
Explanation: Pretty good privacy security system offers three block ciphers for message
encryption – Triple-DES, IDEA and CAST.
Answer: c
Explanation: The block ciphers IDEA and CAST has key length of 128 bits where as Triple-DES has
key size of 168 bits.
7. These three ciphers can operate of ______ of plaintext and cipher text.
a) 128 bit blocks
b) 64 bit blocks
c) 256 bit blocks
d) 156 bit blocks
View Answer
Answer: b
Explanation: The three ciphers – Triple-DES, IDEA and CAST can operate on 64 bit blocks of plain
text and cipher text.
Answer: a
Explanation: The key size of DES algorithm is 56 bits and with Triple-DES, the message to be
encrypted is run on DES algorithm 3 times.
Answer: c
Explanation: The arithmetic operations used in IDEA are addition modulo 216, multiplication
modulo 216+1, and bit wise XOR.
Answer: c
Explanation: Pretty good privacy security system allows 1024 to 4096 bits of key size.
Answer: c
Explanation: The two algorithms used for public key encryption in PGP are RSA and
Diffie-Hellman algorithms.
Answer: b
Explanation: The recipient should first decrypt the message using private key and then with the
public key.
13. The digital signature provides authentication to the
a) Sender
b) Message
c) Sender & Message
d) None of the mentioned
View Answer
Answer: c
Explanation: The digital signature provides authentication to both the sender and the message.
Answer: a
Explanation: In hash function the output length is fixed and it is easy to compute.
Answer: a
Explanation: Hash function is collision free and it is unfeasible that two different messages will
create the same hash value.
Answer: a
Explanation: The DSA algorithm uses and is based on discrete logarithm problem.
Answer: c
Explanation: The received power expressed in terms of transmitted power is attenuated by a
factor called path loss or free space loss.
Answer: b
Explanation: Scintillation is used to describe fading caused by physical changes in the
propagating medium.
Answer: c
Explanation: large scale fading refers to signal power attenuation or path loss due to motion in
large area.
Answer: c
Explanation: Small scale fading refers to changes in amplitude and phase as a result of small
changes in spatial positioning between transmitter and receiver.
Answer: c
Explanation: Small scale fading manifests itself in two mechanisms- time spreading of the signal
( signal dispersion) and time variant behavior of the channel.
Answer: d
Explanation: The parameters used to statistically describe path loss due to large scale fading are
reference distance, path loss exponent and standard deviation of random variable.
Answer: c
Explanation: Small scale fading occurs due to time delay and frequency or Doppler shift.
9. What are the types of small scale fading that occurs due to Doppler shift?
a) Slow fading
b) Fast fading
c) Slow & Fast fading
d) None of the mentioned
View Answer
Answer: c
Explanation: Slow fading and fast fading occurs due to Doppler or frequency shift.
Answer: c
Explanation: The received signal usually consists of several discrete multipath components
causing multipath intensity profile to exhibit multiple isolated peaks also called as fingers or
returns.
2. If delay time is greater than symbol time, _______ fading occurs.
a) Frequency selective
b) Time selective
c) Frequency non selective
d) None of the mentioned
View Answer
Answer: a
Explanation: When delay time is greater than symbol time, frequency selective fading occurs.
Answer: c
Explanation: If delay time is lesser than the symbol time, frequency non selective or flat fading
occurs.
4. When channel coherence bandwidth is greater than the transmitted signal bandwidth ______
occurs.
a) Time selective
b) Frequency selective
c) Frequency non selective
d) None of the mentioned
View Answer
Answer: c
Explanation: Frequency non selective or flat fading occurs if channel coherence bandwidth is
greater than the transmitted signal bandwidth.
Answer: c
Explanation: Signal dispersion and coherence bandwidth characterizes the channel’s time
spreading properties in a local area.
6. When channel coherence time is less than the time duration of a transmission symbol, then
______ fading occurs.
a) Fast
b) Slow
c) Time selective
d) None of the mentioned
View Answer
Answer: a
Explanation: Fast fading occurs when the channel coherence time is less than the time duration
of a transmission symbol.
Answer: b
Explanation: Coherence time is the minimum time required for magnitude or phase change of
the channel to become uncorrelated from the previous value.
8. When a user’s moving, the user’s velocity causes shift in frequency. This is called as
a) Doppler shift
b) Frequency shift
c) Velocity shift
d) None of the mentioned
View Answer
Answer: a
Explanation: When a user’s moving, the user’s velocity causes shift in frequency of the
transmitted signal along each signal path. This is called as Doppler shift.
Answer: b
Explanation: Coherence time is inversely proportional to Doppler spread.
Answer: c
Explanation: Block fading can occur in both frequency domain and time domain. This is called as
doubly block fading.
11. If coherence bandwidth is smaller than the bandwidth of the signal, _____ fading occurs.
a) Flat
b) Frequency selective
c) Fast fading
d) Time selective
View Answer
Answer: b
Explanation: Frequency selective fading occurs when coherence bandwidth is smaller than the
bandwidth of the transmitted signal.
Answer: d
Explanation: Flat fading can be combated by means of error coding, equalization and adaptive bit
loading.
Answer: d
Explanation: The effect of Doppler shift can be removed by using diversity scheme such as
orthogonal frequency division multiplexing, by using two receivers with separate antennas or by
using specially designed diversity receiver.
14. When transmitter and receiver moves towards each other, the magnitude of frequency shift is
a) Positive
b) Negative
c) Zero
d) Infinity
View Answer
Answer: a
Explanation: When transmitter and receiver moves towards each other, the magnitude of
frequency shift is positive, where as if it moves away from each other then it is negative.
15. If signalling rate is less than fading rate, _____ fading occurs.
a) Slow
b) Fast
c) Time selective
d) None of the mentioned
View Answer
Answer: b
Explanation: A channel is said to be fast fading if symbol rate or signalling rate is less than fading
rate.
16. Frequency tracking loop can minimize irreducible error rate by using
a) GMSK
b) DMSK
c) MSK
d) QAM
View Answer
Answer: b
Explanation: Frequency tracking loop can minimize the irreducible error rate in a mobile system
by using differential minimum shift keying modulation.
Answer: d
Explanation: The most common techniques used for combining diversity signals are selection,
feedback, maximal ratio and equal gain.
Answer: d
Explanation: Diversity technique is a common method used for combating fading, co-channel
interference and error bursts.
Answer: c
Explanation: Diversity technique can be applied at both base station and at mobile receivers.
Answer: b
Explanation: Most commonly used and more effective diversity technique is spatial diversity
technique.
5. Diversity technique
a) Provides significant link improvement
b) Needs training overhead
c) All of the mentioned
d) None of the mentioned
View Answer
Answer: a
Explanation: Diversity technique does not require training overhead at the transmitter and also
provides significant link performance.
Answer: c
Explanation: Adaptive equalizer operates on two modes – training mode and tracking mode.
Answer: c
Explanation: Frequency based modulation and phase based modulation is preferable for fading
channel than amplitude based modulation.
Answer: b
Explanation: As the time span increases, the fading is more uncorrelated and effectiveness also
increases.
9. Interleaving does
a) Forward error correction
b) Backward error correction
c) Forward & Backward error correction
d) None of the mentioned
View Answer
Answer: a
Explanation: Inter leaver does forward error correction.
10. Rake receiver does
a) Counter effects multi-path fading
b) Resembles equalizer
c) Resembles equalizer & Counter effects multi-path fading
d) None of the mentioned
View Answer
Answer: c
Explanation: Rake receiver resembles equalizers and it is used to counter the effects of multipath
fading and is also used to exploit the path diversity.
Answer: c
Explanation: The information reliability can be improved by computing the amplitude and time of
arrival of each component.
Answer: b
Explanation: A rake receiver uses multiple correlators to separately detect multiple strongest
components.
Answer: d
Explanation: Rake receivers are used in radio astronomy, CDMA, W-CDMA, wireless LAN
networks etc.
Answer: c
Explanation: The functionality of rake receiver resembles that of the equalizer and matched filter.
SECTION 66: Effects of Fading and Decision Theory
Answer: a
Explanation: Fading channel has memory and the received samples are correlated with each
other in time.
Answer: d
Explanation: Frequency selective distortion can be minimized by using adaptive equalization, by
using spread spectrum, by using pilot signal and also by using orthogonal FDM modulation.
Answer: c
Explanation: Slow fading can be minimized by using error correcting codes and also by using
diversity technique to get additional uncorrelated estimates of a signal.
Answer: c
Explanation: Fast fading can be minimized by using coding and interleaving, by using robust
modulation and by introducing signal redundancy to increase signalling rate.
Answer: c
Explanation: The known ISI which is introduced deliberately and the adjacent channel
interference is removed by cancelling filter and post processing equalizer.
Answer: a
Explanation: The inter-leaver is more effective in fast running vehicles.
8. Channel noise is
a) Additive
b) White and stationary
c) Has infinite bandwidth
d) All of the mentioned
View Answer
Answer: d
Explanation: Channel noise is stationary, additive and white with infinite bandwidth.
Answer: a
Explanation: Only the relevant noise components play an important role in decision making. It
does not depend on non relevant noise components.
Answer: c
Explanation: In matched filter a known signal is correlated with an unknown signal. It is similar to
convolving a unknown signal with time reversed version of it.
Answer: b
Explanation: 16-QAM needs ten times more signal power than BPSK to attain the same
probability of error.
Answer: b
Explanation: The rate of transmission of bits in 16-QAM is four times that of BPSK.
14. Symbol error probability can also be determined using upper bound.
a) True
b) False
View Answer
Answer: a
Explanation: Certain signals lacks symmetry in representation. For those signals symbol error
probability can be determined by using upper bound.
Answer: c
Explanation: For neyman pearson decision criterion two probabilities are important – probability
of false alarm and probability of miss.
Answer: d
Explanation: Some of the parameters calculated for an estimator are error, mean square error,
variance, sampling deviation etc.
1. Top layer is
a) Physical media
b) Application
c) Design
d) None of the mentioned
View Answer
Answer: b
Explanation: Top layer is application where as bottom layer is physical media.
Answer: d
Explanation: Entities also does A/D, D/A, encryption and error correction.
3. In channel, delay is
a) Fixed
b) Variable
c) Fixed & Variable
d) None of the mentioned
View Answer
Answer: c
Explanation: In channel, delay can be either fixed or variable.
Answer: d
Explanation: Channel can provide connectivity between point to point, 1 to many and also many
to many.
5. Embedding is a form of
a) Abstraction
b) Layering
c) Entity sharing
d) None of the mentioned
View Answer
Answer: b
Explanation: Embedding is a form of layering.
6. Transmission media is
a) Acoustic
b) Guided
c) Optical
d) All of the mentioned
View Answer
Answer: d
Explanation: Transmission media can be acoustic, electronic or optical form.
Answer: a
Explanation: In transmission media, the symbol type is generally analog signals.
Answer: c
Explanation: Noise can be random or systematic.
Answer: a
Explanation: The radiation loss increases as frequency increases.
Answer: d
Explanation: Attenuation is a function of channel length, transmission media and signal
frequencies.
1. Protocol is a set of
a) Formats
b) Procedures
c) Formats & Procedures
d) None of the mentioned
View Answer
Answer: c
Explanation: Protocol is a set of procedures and formats that entities use to communicate
information.
Answer: c
Explanation: The time to transmit frame is given by the ratio of frame size and channel capacity.
3. Window given the number of
a) Bytes
b) Frames
c) Bytes & Frames
d) None of the mentioned
View Answer
Answer: c
Explanation: Window gives the number of frames or bytes that can be in transit
unacknowledged.
4. Routing is
a) Static
b) Dynamic
c) Static & Dynamic
d) None of the mentioned
View Answer
Answer: c
Explanation: Routing can be static and dynamic.
Answer: a
Explanation: Routing is performed centrally and also in fully distributed way.
Answer: b
Explanation: Datagram is connection-less and virtual circuits are connection oriented.
Answer: d
Explanation: The protocols using UDP are echo, time, domain name server, network file system
etc.
Answer: a
Explanation: Some of the protocols using TCP are http, telnet, file transfer protocol, simple mail
transfer protocol etc.
Answer: c
Explanation: G series tells about level transmission, modulation and framing.
Answer: d
Explanation: Q series tells about signalling.
Answer: a
Explanation: Vector quantization will always equal or exceed the performance of scalar
quantization.
Answer: d
Explanation: Three types of analog source coding methods are temporal waveform coding,
spectral waveform coding and model based coding.
3. The source output in PCM and DPCM is quasi stationary.
a) True
b) False
View Answer
Answer: b
Explanation: The source output of PCM and DPCM and stationary in nature.
Answer: c
Explanation: Adaptive quantizer reduces the dynamic range of quantization noise in PCM and
DPCM.
Answer: c
Explanation: The two types of distortion that occurs in delta modulation are slope overload
distortion and granular noise.
Answer: b
Explanation: Binomial distribution deals with discrete random variable.
Answer: c
Explanation: In poisson distribution, variance is nearly same or equal to mean of the distribution.
Answer: c
Explanation: Stochastic process are random in nature and are a function of time.
Answer: b
Explanation: Stochastic process is a wide sense stationary process.
Answer: c
Explanation: If Gaussian process is a wide sense stationary process then it will also be strict
sense stationary process.
Answer: b
Explanation: Integrated services for digital domain integrates speech and data signals on the
same lines.
2. ISDN is a
a) Packet switched network
b) Circuit switched telephone network
c) Packet switched & Circuit switched telephone network
d) None of the mentioned
View Answer
Answer: c
Explanation: ISDN is a circuit switched telephone network which also provides access to packet
switched network.
Answer: c
Explanation: Circuit switched connection can be provided for either voice or data.
Answer: b
Explanation: Packet switched connection can be provided only for data.
Answer: a
Explanation: Channel bonding can achieve higher data rate.
Answer: c
Explanation: U-interface is the two wire connection or interface between exchange unit and
network terminating unit.
Answer: b
Explanation: The S interface is a four wire bus that ISDN consumer devices plug into.
Answer: d
Explanation: The services provided by ISDN and classified by attributes are bearer service,
teleservice and secondary service.
Answer: c
Explanation: ISDN services are characterized by attributes and attributes have definition and
allowable values.
Answer: c
Explanation: In layering n layer provides service to n+1 layer and use the service provided by n-1
layer.
2. Which can be used as an intermediate device in between transmitter entity and receiver entity?
a) IP router
b) Microwave router
c) Telephone switch
d) All of the mentioned
View Answer
Answer: d
Explanation: IP router, microwave router and telephone switch can be used as an intermediate
device between communication of two entities.
Answer: c
Explanation: Square wave has comparatively high frequency component in them.
Answer: b
Explanation: Synchronous has continuous transmission where as asynchronous have sporadic
transmission.
Answer: b
Explanation: Synchronous transmission needs bit transition.
Answer: c
Explanation: In synchronous transmission, receiver must stay synchronous for 9 bits.
7. How error detection and correction is done?
a) By passing it through equalizer
b) By passing it through filter
c) By amplifying it
d) By adding redundancy bits
View Answer
Answer: d
Explanation: Error can be detected and corrected by adding additional information that is by
adding redundancy bits.
Answer: b
Explanation: Cyclic redundancy check is more efficient than parity check.
Answer: b
Explanation: CRC is more powerful and it can detect various kind of errors like 2 bit errors.
Answer: c
Explanation: CRC uses more math like multiplication and binary division.
Answer: a
Explanation: Error correction needs more check bits where as error detection needs less check
bits.
Answer: b
Explanation: Error detection is less affected by noise.
Answer: c
Explanation: Cipher coding is used to provide privacy for the information.
Answer: d
Explanation: Digital signals have ease of handing, storage and time dilation.
Answer: b
Explanation: Convolutional codes operates on a continuous stream of data.
Answer: b
Explanation: In the case of block codes, decoding is a complex method.
Answer: b
Explanation: Cyclic redundancy check has better distances.
Answer: c
Explanation: In symmetric key cryptosystem, both sender and receiver knows the same key.
Answer: c
Explanation: Mutual information can also be negative.
3. ASCII code is a
a) Fixed length code
b) Variable length code
c) Fixed & Variable length code
d) None of the mentioned
View Answer
Answer: a
Explanation: ASCII code is a fixed length code. It has a fixed length of 7 bits.
Answer: a
Explanation: Source coding reduces the size of the data and channel coding increases the size of
the data.
Answer: b
Explanation: In digital image coding, output image must be smaller than the input image.
Answer: b
Explanation: Lossy coding achieves greater compression where as lossless coding achieves only
moderate compression.
Answer: b
Explanation: A code is a mapping from discrete set of symbols to finite binary sequence.
Answer: a
Explanation: Fixed length codes are uniquely decodable codes where as variable length codes
may or may not be uniquely decodable.
Answer: b
Explanation: A rate distortion function is a monotone decreasing function and also a convex
function.
Answer: c
Explanation: Interpolating the value requires or is done by curve fitting and regression analysis.
Answer: c
Explanation: Interpolation provides a mean for estimating the function at the intermediate
points.
Answer: d
Explanation: Some of the interpolation techniques are linear interpolation, piecewise constant
interpolation, polynomial interpolation, spline interpolation etc.
4. Linear interpolation is
a) Easy
b) Precise
c) Easy & Precise
d) None of the mentioned
View Answer
Answer: a
Explanation: Linear interpolation is quick and easy but not precise.
5. Error is equal to
a) Distance between the data points
b) Square of the distance between the data points
c) Half the distance between the data points
d) None of the mentioned
View Answer
Answer: b
Explanation: Error is equal to square of the distance between the data points.
Answer: c
Explanation: Polynomial interpolation and spline interpolation produces smoother interpolants.
Answer: a
Explanation: Polynomial interpolation is more expensive than linear interpolation.
Answer: a
Explanation: Gaussian process is a non linear interpolation process.
9. Interpolation means
a) Adding new data points
b) Only aligning old data points
c) Only removing old data points
d) None of the mentioned
View Answer
Answer: a
Explanation: Interpolation is a method of adding new data points within the range of a discrete
set of known data points.
Answer: b
Explanation: Interpolation is a method of estimating the value of the function.
Answer: a
Explanation: Self information is always non negative.
Answer: a
Explanation: The unit of average mutual information is bits.
Answer: c
Explanation: When probability of error during transmission is 0.5 then the channel is very noisy
and thus no information is received.
Answer: a
Explanation: Binary Huffman coding is a prefix condition code.
Answer: b
Explanation: In binary Huffman coding the event with maximum probability has least number of
bits.
Answer: b
Explanation: Source coding is the method of converting a word to stream of bits that is 0’s and
1’s.
7. When the base of the logarithm is 2, then the unit of measure of information is
a) Bits
b) Bytes
c) Nats
d) None of the mentioned
View Answer
Answer: a
Explanation: When the base of the logarithm is 2 then the unit of measure of information is bits.
Answer: b
Explanation: When X and Y are statistically independent the measure of information I (x,y) is 0.
Answer: c
Explanation: The self information of a random variable is infinity.
Answer: c
Explanation: Entropy of a random variable is also infinity.
Answer: b
Explanation: Encoding block of symbols is more efficient than encoding each symbol of a block.
Answer: a
Explanation: Lempel-Ziv algorithm is a variable to fixed length algorithm.
13. Coded system are inherently capable of better transmission efficiency than the uncoded system.
a) True
b) False
View Answer
Answer: a
Explanation: Yes, the coded systems are capable of better transmission efficiency than the
uncoded system.
Answer: c
Explanation: Spread spectrum is used for hiding and encrypting signals.
Answer: c
Explanation: Rounding and truncation are examples of quantization process.
Answer: c
Explanation: Quantization is a many to few mapping process.
Answer: a
Explanation: Quantization is a non linear and irreversible process.
Answer: b
Explanation: High probability event conveys less information than a low probability event.
6. If the channel is noiseless information conveyed is ___ and if it is useless channel information
conveyed is ___
a) 0,0
b) 1,1
c) 0,1
d) 1,0
View Answer
Answer: d
Explanation: If the channel is noiseless information conveyed is 1 and if it is useless channel
information conveyed is 0.
Answer: d
Explanation: The mutual information between a pair of events can be positive negative or zero.
Answer: b
Explanation: The output of the source encoder is a sequence of binary digits. The conversion of
source output to digital form is done here in source encoder.
Answer: a
Explanation: The output of any information source is random.
10. When the base of the logarithm is e, the unit of measure of information is
a) Bits
b) Bytes
c) Nats
d) None of the mentioned
View Answer
Answer: c
Explanation: The unit of measure of information is determined based on the base of logarithm. If
the base is e then the unit is nats( natural unit).
Answer: b
Explanation: Uniform quantizer is also known as mid rise type quantizer.
Answer: a
Explanation: The signal to noise ratio can be increased by increasing the number of levels.
3. Prediction gain _____ for better prediction.
a) Increases
b) Decreases
c) Remains same
d) None of the mentioned
View Answer
Answer: a
Explanation: Prediction gain increases for better prediction.
4. Delta modulation is
a) 1 bit DPCM
b) 2 bit DPCM
c) 4 bit DPCM
d) None of the mentioned
View Answer
Answer: a
Explanation: Delta modulation is also considered as 1 bit DPCM.
5. 1 bit quantizer is a
a) Hard limiter
b) Two level comparator
c) Hard limiter & Two level comparator
d) None of the mentioned
View Answer
Answer: c
Explanation: 1 bit quantizer is also called as two level comparator and also as hard limiter.
Answer: b
Explanation: When step size is increased to prevent slope overload distortion, granular noise
occurs.
Answer: d
Explanation: Step size if effectively maintained using adaptive delta modulation.
8. The low pass filter at the output end of delta modulator depends on
a) Step size
b) Quantization noise
c) Bandwidth
d) None of the mentioned
View Answer
Answer: c
Explanation: The design of low pass filter at the output end of delta modulator depends on
bandwidth.
9. In early late timing error detection method if the bit is constant, then the slope will be
a) Close to zero
b) Close to infinity
c) Close to origin
d) None of the mentioned
View Answer
Answer: a
Explanation: In early timing error detection method if the bit is constant and doesn’t change,
then the slope will be close to zero.
10. The theoretical gain in zero crossing TED is greater than early late TED.
a) True
b) False
View Answer
Answer: a
Explanation: The theoretical gain in zero crossing timing error detection is twice more than that
in the early late timing error detection method.
Answer: b
Explanation: Distortion can be reduced by using non uniform quantizer.
Answer: c
Explanation: Vector quantization is widely used in speech coding for digital cellular systems.
13. The spectral density of white noise is
a) Exponential
b) Uniform
c) Poisson
d) Gaussian
View Answer
Answer: b
Explanation: The spectral density of white noise is uniform.
14. The probability density function of the envelope of narrow band noise is
a) Uniform
b) Gaussian
c) Rayleigh
d) Rician
View Answer
Answer: b
Explanation: The probability density function of the envelope of narrow band noise is Gaussian
function.
15. The type of noise that interferes much with high frequency transmission is
a) White
b) Flicker
c) Transit time
d) Shot
View Answer
Answer: c
Explanation: The type of noise that interferes much with high frequency transmission is transit
time.
Answer: b
Explanation: Thermal noise power of a resistor depends upon noise temperature.