Exam 6: Error Detection and Correction
Exam 1: Data Communications, data Networks, 45 Questions
Exam 2: Protocol Architecture, tcpip, and45 Questions
Exam 3: Data Transmission45 Questions
Exam 4: Transmission Media45 Questions
Exam 5: Signal Encoding Techniques45 Questions
Exam 6: Error Detection and Correction45 Questions
Exam 7: Data Link Control Protocols45 Questions
Exam 8: Multiplexing45 Questions
Exam 9: Wan Technology and Protocols45 Questions
Exam 10: Cellular Wireless Networks45 Questions
Exam 11: Local Area Network Overview45 Questions
Exam 12: Ethernet45 Questions
Exam 13: Wireless Lans45 Questions
Exam 14: The Internet Protocol45 Questions
Exam 15: Transport Protocols45 Questions
Exam 16: Advanced Data Communications Topics44 Questions
Exam 17: Wireless Transmission Techniques45 Questions
Exam 19: Routing45 Questions
Exam 20: Congestion Control45 Questions
Exam 21: Internetwork Operation45 Questions
Exam 22: Internetwork Quality of Service45 Questions
Exam 23: Multiprotocol Label Switching45 Questions
Exam 24: Electronic Mail, dns, and Http45 Questions
Exam 25: Internet Multimedia Support45 Questions
Select questions type
Error correction is best used with wireless applications.
Free
(True/False)
4.7/5
(38)
Correct Answer:
False
Redundant bits are used by the _________ for the purpose of error detection or correction.
Free
(Short Answer)
4.9/5
(31)
Correct Answer:
receiver
The ratio of redundant bits to data bits,(n - k)/k ,is called the __________ of the code.
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
A
FEC codes are designed not just to detect but correct errors,avoiding the need for __________.
(Short Answer)
4.9/5
(30)
________ is one of the most fundamental requirements in the transmission of a stream of bits from one device to another.
(Multiple Choice)
4.9/5
(38)
The data,plus preamble,postamble and control information are called a ________.
(Short Answer)
4.9/5
(40)
The simplest error-detecting scheme is to append a __________ bit to the end of a block of data.
(Short Answer)
4.8/5
(38)
In a(n)________ there is a cluster of bits in which a number of errors occur,although not necessarily all of the bits in the cluster suffer an error.
(Multiple Choice)
4.9/5
(36)
The ratio of redundant bits to data bits is called the ________ of the code.
(Short Answer)
4.8/5
(31)
Forward error correction schemes are frequently used in __________ transmission, where retransmission schemes are highly inefficient and error rates may be high.
(Short Answer)
4.8/5
(30)
Modulo 2 arithmetic uses binary addition with no carries,which is just the exclusive-OR (XOR)operation.
(True/False)
4.8/5
(24)
Single bit errors are more common and more difficult to deal with.
(True/False)
4.7/5
(42)
___________ operates in a fashion similar to error detection but is capable of correcting certain errors in a transmitted bit stream.
(Short Answer)
4.8/5
(37)
Regardless of the design of the transmission system,there will be errors,resulting in the change of one or more bits in a transmitted block of data.
(True/False)
4.8/5
(37)
The Internet checksum is considerably less effective than the CRC.
(True/False)
4.8/5
(31)
The ________ is a measure of how much additional bandwidth is required to carry data at the same data rate as without the code.
(Short Answer)
4.8/5
(33)
In __________ transmission systems,an error occurs when a binary 1 is transmitted and a binary 0 is received,or a binary 0 is transmitted and a binary 1 is received.
(Multiple Choice)
4.9/5
(37)
An ___________ is a group of bits in which two successive erroneous bits are always separated by less than a given number x of correct bits.
(Short Answer)
4.8/5
(25)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)