MCQOPTIONS
Saved Bookmarks
This section includes 46 Mcqs, each offering curated multiple-choice questions to sharpen your Digital Communications knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which are called as substitution encryption techniques? |
| A. | Caesar cipher |
| B. | Trithemius cipher |
| C. | Caesar & Trithemius cipher |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 2. |
The transmitter of frequency hopping system is fed with encoding scheme such as |
| A. | Frequency shift keying |
| B. | Binary phase shift keying |
| C. | Frequency & Binary phase shift keying |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 3. |
Spread spectrum can be used to transmit |
| A. | Analog data |
| B. | Digital data |
| C. | Analog & Digital data |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 4. |
The segment of the key-stream of plaintext is obtained by _____ of two sequences together. |
| A. | ANDing |
| B. | ORing |
| C. | Addition |
| D. | Modulo 2 addition |
| Answer» E. | |
| 5. |
In which method cipher feedback is used? |
| A. | Synchronous encryption method |
| B. | Self synchronous encryption method |
| C. | All of the mentioned |
| D. | None of the mentioned |
| Answer» C. All of the mentioned | |
| 6. |
In CDMA the incoming signal is _____ with the spreading code. |
| A. | Added |
| B. | Multiplied |
| C. | XOR-ed |
| D. | None of the mentioned |
| Answer» C. XOR-ed | |
| 7. |
The ratio (J/S)reqd gives the measure of |
| A. | Vulnerability to interference |
| B. | Invulnerability to interference |
| C. | All of the mentioned |
| D. | None of the mentioned |
| Answer» C. All of the mentioned | |
| 8. |
Short code is configured using ______ shift register. |
| A. | 4-stage |
| B. | 2-stage |
| C. | 12-stage |
| D. | 15-stage |
| Answer» E. | |
| 9. |
Which type of demodulator is used in the frequency hopping technique? |
| A. | Coherent |
| B. | Non coherent |
| C. | Coherent & Non coherent |
| D. | None of the mentioned |
| Answer» C. Coherent & Non coherent | |
| 10. |
Walsh cover technique is used for |
| A. | Channelization |
| B. | Spreading |
| C. | Channelization & Spreading |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 11. |
In CDMA, the users share the bandwidth |
| A. | Synchronously |
| B. | Asynchronously |
| C. | Synchronously & Asynchronously |
| D. | None of the mentioned |
| Answer» C. Synchronously & Asynchronously | |
| 12. |
Processing gain is given as |
| A. | Wss/R |
| B. | Rch/R |
| C. | Wss/R & Rch/R |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 13. |
The minimum spacing between consecutive hop positions gives the |
| A. | Minimum number of chips necessary |
| B. | Maximum number of chips necessary |
| C. | Chip rate |
| D. | None of the mentioned |
| Answer» B. Maximum number of chips necessary | |
| 14. |
The conditions for perfect secrecy are |
| A. | Only one key transforming message should exist |
| B. | All keys should be equally likely |
| C. | One key transforming message to each cipher text & all keys should be equally likely |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 15. |
The types of channels that reverse channel contains are |
| A. | Traffic |
| B. | Access |
| C. | Traffic & Access |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 16. |
The standard building block uses _______ of a key to transform 64-bit input into 64-bit output. |
| A. | 32 bit |
| B. | 48 bit |
| C. | 64 bit |
| D. | 128 bit |
| Answer» C. 64 bit | |
| 17. |
The steps followed in forward channel CDMA includes |
| A. | Modulo 2 addition |
| B. | Channelization |
| C. | Modulo 2 addition & Channelization |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 18. |
In which method the key-stream is generated independently of the message? |
| A. | Synchronous encryption method |
| B. | Self synchronous encryption method |
| C. | All of the mentioned |
| D. | None of the mentioned |
| Answer» B. Self synchronous encryption method | |
| 19. |
The jammer which monitors a communicator's signal is known as |
| A. | Frequency follower jammers |
| B. | Repeat back jammers |
| C. | Frequency follower & Repeat back jammers |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 20. |
Spread spectrum multiple access techniques allows the multiple signal to be transmitted |
| A. | One after the other |
| B. | Simultaneously |
| C. | All of the mentioned |
| D. | None of the mentioned |
| Answer» C. All of the mentioned | |
| 21. |
Which has worse signal to noise performance? |
| A. | Delay locked loop |
| B. | Tau-dither loop |
| C. | Delay locked & Tau-dither loop |
| D. | None of the mentioned |
| Answer» C. Delay locked & Tau-dither loop | |
| 22. |
Spread spectrum is a ______ technique. |
| A. | Encoding |
| B. | Decoding |
| C. | Encoding & Decoding |
| D. | None of the mentioned |
| Answer» B. Decoding | |
| 23. |
Frequency hopping system can provide reliable mitigation only if |
| A. | Hopping rate is greater than the symbol rate |
| B. | Hopping bandwidth is large |
| C. | Hopping rate is greater than the symbol rate & its bandwidth is large |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 24. |
The original bandwidth of the unspread signal in spread spectrum is ____ to data rate. |
| A. | Proportional |
| B. | Inversely proportional |
| C. | Not related |
| D. | None of the mentioned |
| Answer» B. Inversely proportional | |
| 25. |
Pulse jammer consists of |
| A. | Pulse modulated excess band noise |
| B. | Pulse modulated band-limited noise |
| C. | Pulse width modulated excess band noise |
| D. | Pulse width modulated band-limited noise |
| Answer» C. Pulse width modulated excess band noise | |
| 26. |
For hybrid systems the minimum required processing gain is |
| A. | 5db |
| B. | 10db |
| C. | 17db |
| D. | 25db |
| Answer» D. 25db | |
| 27. |
Which method is better? |
| A. | To share same bandwidth |
| B. | To share different bandwidth |
| C. | To share same & different bandwidth |
| D. | None of the mentioned |
| Answer» C. To share same & different bandwidth | |
| 28. |
Spread spectrum has immunity from |
| A. | Noise |
| B. | Multi-path distortion |
| C. | Noise & Multi-path distortion |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 29. |
In substitution technique encryption protection is more. |
| A. | True |
| B. | False |
| Answer» C. | |
| 30. |
A cipher system is said to have perfect secrecy if |
| A. | Posteriori probability is equal to priori probability |
| B. | Posteriori probability is greater than priori probability |
| C. | Posteriori probability is less than priori probability |
| D. | None of the mentioned |
| Answer» B. Posteriori probability is greater than priori probability | |
| 31. |
Which system allows larger processing gain? |
| A. | Direct sequence |
| B. | Frequency hopping |
| C. | Direct sequence & Frequency hopping |
| D. | None of the mentioned |
| Answer» C. Direct sequence & Frequency hopping | |
| 32. |
Spread spectrum makes ______ difficult. |
| A. | Jamming |
| B. | Interception |
| C. | Jamming & Interception |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 33. |
Multi paths may be because of |
| A. | Reflections from buildings |
| B. | Refraction |
| C. | Atmospheric reflections |
| D. | All of the mentioned |
| Answer» E. | |
| 34. |
In DSSS the signal is recovered using |
| A. | Low pass filter |
| B. | High pass filter |
| C. | Band pass filter |
| D. | Band stop filter |
| Answer» D. Band stop filter | |
| 35. |
Which filter is used to get the final FHSS signal? |
| A. | Low pass filter |
| B. | High pass filter |
| C. | Band pass filter |
| D. | Band stop filter |
| Answer» D. Band stop filter | |
| 36. |
In which technique is phase coherence hard to maintain? |
| A. | Direct sequence |
| B. | Frequency hopping |
| C. | Direct sequence & Frequency hopping |
| D. | None of the mentioned |
| Answer» C. Direct sequence & Frequency hopping | |
| 37. |
Perfect secrecy can be achieved for |
| A. | Finite number of messages |
| B. | Infinite number of messages |
| C. | Finite & Infinite number of messages |
| D. | None of the mentioned |
| Answer» C. Finite & Infinite number of messages | |
| 38. |
The 64 bit block input key has _____ number of parity bits. |
| A. | 4 |
| B. | 6 |
| C. | 8 |
| D. | 16 |
| Answer» D. 16 | |
| 39. |
One-time pad has |
| A. | Random key |
| B. | Unconditional security |
| C. | Can be used only once |
| D. | All of the mentioned |
| Answer» E. | |
| 40. |
For any cyclic shift, the auto-correlation function is equal to |
| A. | 1/p |
| B. | -1/p |
| C. | -p |
| D. | p |
| Answer» C. -p | |
| 41. |
Direct system allows detection of signals whose psd level is |
| A. | Below noise level |
| B. | Above noise level |
| C. | All of the mentioned |
| D. | None of the mentioned |
| Answer» B. Above noise level | |
| 42. |
Which are the design options for anti jam communicator? |
| A. | Time diversity |
| B. | Frequency diversity |
| C. | Special discrimination |
| D. | All of the mentioned |
| Answer» E. | |
| 43. |
In Vigenere method ______ is provided. |
| A. | Priming key |
| B. | Feedback |
| C. | Priming key & Feedback |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 44. |
The width of each channel in frequency hopping spread spectrum corresponds to |
| A. | Bandwidth of input signal |
| B. | Pseudorandom sequence used |
| C. | Carrier frequency |
| D. | None of the mentioned |
| Answer» B. Pseudorandom sequence used | |
| 45. |
For direct sequence systems what is the minimum required processing gain? |
| A. | 3db |
| B. | 10db |
| C. | 12db |
| D. | 20db |
| Answer» C. 12db | |
| 46. |
The _____ the uncertainty, the ______ is the information content. |
| A. | Lesser, greater |
| B. | Greater, lesser |
| C. | Lesser, lesser |
| D. | Greater, greater |
| Answer» E. | |