0% found this document useful (0 votes)
2 views14 pages

Telecom Exams Answers

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 14

QUIZZES

1. C
2. B
3. B
4. A
5. A
6. A
7. A
8. B
9. D
10. B
11. D
12. B
13. B
14. B
15. A
16. B
17. B
18. D
19. B
20. A
21. B
22. D
23. A
24. C
25. C
26. B
27. D
28. D
29. C
30. C
31. C
32. C
33. C
34. D
35. A
36. D
37. C
38. B
39. B
40. B
41. C
42. B
43. B
WEEK 1

1. B
2. B
3. B
4. C
5. A
6. A
7. B
8. B
9. B
10. B
11. B
12. A
13. B
14. B
15. B
16. B
17. C
18. C
19. A
20. A
21. A
22. C
23. A
24. B
25. A
26. C
27. C
28. B
29. A
30. A

WEEK 2

1. B
2. C
3. B
4. A
5. B
6. B
7. C
8. A
9. A
10. A
11. A
12. C
13. B
14. A
15. A
16. A
17. B
18. B
19. A

WEEK 3

1. B
2. A
3. A
4. A
5. A
6. A
7. B
8. A
9. A
10. A
11. A
12. A
13. A
14. C
15. A
16. A
17. A
18. C

WEEK 4

1. B
2. C
3. A
4. A
5. C
6. C
7. B
8. A
9. A
10. B
11. B
12. C
13. C
14. B
15. A
16. A
17. B
18. A

Week 5

1. c) To reduce the size of multimedia data for efficient transmission and storage

2. a) Lossless compression

3. b) Lossless compression retains all original data without any loss of information.

4. b) PNG

5. c) To recover lost or corrupted video data and maintain video playback quality

6. c) To serve as a reference frame for other frames in the video

7. b) Ensuring error-free delivery of video data to maintain video quality

8. b) To add redundant information to the video data for error recovery

9. a) Packet loss

10. a) H.264 (AVC)

11. a) It reduces temporal redundancy and achieves higher compression ratios.

12. a) To encode the motion information between two consecutive frames

13. a) Block-based motion compensation

14. a) It assigns shorter codes to frequently occurring symbols, resulting in higher compression
efficiency.

15. a) To minimize the visual impact of errors in the received video

16. b) Chapter 2

17. b) To predict motion from both previous and future frames

18. a) H.265 (HEVC)

19. a) It improves error resilience by allowing reference frames from different intervals.

20. b) Balancing the trade-off between error recovery and compression efficiency.
Week 6

1. b) WiFi

2. a) Worldwide Interoperability for Microwave Access

3. a) Chapter 1

4. b) Mobility and convenience for wireless connectivity

5. a) 2.4 GHz and 5 GHz

6. c) To act as a central hub for wireless devices to connect to the network

7. a) Increased data throughput and improved link reliability

8. c) Interference from neighboring WiFi networks

9. a) Providing broadband wireless access over a wide area

10. a) Chapter 1

11. a) WiMAX offers larger coverage areas and longer range.

12. a) Limited availability of frequency bands

13. a) Chapter 6

14. a) To communicate with subscriber devices and manage radio resources

15. c) WiMAX offers a more flexible and cost-effective deployment model.

16. a) To communicate with the WiMAX base station and access the network

17. a) Higher data rates and greater bandwidth capacity

18. d) Chapter 4

19. c) Handling the last-mile connectivity for users

20. d) To convert optical signals to electrical signals for end-user devices

week 7

1. a) Mobile Ad Hoc Wireless Network

2. b) A self-configuring network of mobile devices connected by wireless links

3. a) Nodes communicate directly with each other via wireless links.

4. b) Rapid deployment and flexibility in dynamic environments


5. b) Chapter 2

6. b) Handling frequent changes in network topology due to node mobility

7. a) Dynamic and frequently changing

8. c) Ad-hoc On-demand Distance Vector (AODV)

9. a) Lower latency and faster data transmission

10. a) Chapter 1

11. c) To optimize the utilization of the radio spectrum by dynamically adapting to the environment

12. b) The ability of the radio to perceive and adapt to the radio environment

13. a) Efficient use of underutilized or temporarily vacant spectrum bands

14. c) To identify available spectrum bands for opportunistic use

15. b) Developing efficient spectrum sensing and decision-making algorithms

16. a) To make intelligent decisions about spectrum access and utilization

17. a) To detect the presence of primary users and identify available spectrum bands

18. d) Chapter 4

19. a) To store information about available spectrum bands and their usage

20. a) Efficient utilization of spectrum resources and increased spectrum availability

week 8

1. c) Committees comprised of industry stakeholders who collaborate to develop standards

2. a) Participation in the standards development process is optional, not mandated by law.

3. b) Flexibility and responsiveness to industry needs and innovations

4. a) To ensure compatibility, interoperability, and uniformity among products and systems

5. b) Chapter 2

6. a) To bring together industry stakeholders to collaborate on standards development

7. a) Balancing the interests of different industry stakeholders

8. a) To reach a consensus among industry stakeholders on technical specifications

9. a) Chapter 1

10. a) Greater industry involvement and flexibility in setting standards

11. c) Standardization process influenced by market forces and industry collaboration


12. a) Interoperability and compatibility among products from different manufacturers

13. a) To facilitate the development and maintenance of standards through collaboration

14. b) To manage the evolution of standards from conception to obsolescence

15. c) Chapter 3

16. c) To gather feedback from the public and industry to improve the standard

17. a) Balancing the benefits of standardization with the potential loss of proprietary advantages

18. a) Encouragement of innovation and technical diversity

19. c) The standardization process conducted by official standards organizations

20. a) Interoperability with a broader range of products and systems

week 9

1. b) Networking where mobile devices collaborate to improve network performance

2. a) Improved coverage and network reliability

3. c) To assist each other in data transmission and network access

4. b) Chapter 2

5. d) Coordinating the cooperation among mobile devices and managing overhead

6. a) Extended coverage and reduced path loss

7. b) The use of multiple mobile devices to create a virtual antenna array

8. c) To improve the performance and efficiency of mobile networks through collaboration

9. d) Chapter 4

10. a) To combine data from multiple mobile devices for more robust data transmission

11. c) To organize and manage the cooperation among mobile devices

12. b) Extended coverage and network connectivity

13. c) Chapter 3

14. c) To focus the transmitted signal towards a specific mobile device

15. d) Coordinating the cooperation among competing operators and managing resources

16. a) Higher capacity and reduced interference

17. a) Sharing of network resources among cooperating mobile devices

18. c) Chapter 5
19. c) To mitigate interference through collaboration among mobile devices

20. c) Improved handover performance and reduced signal dropouts

GENERAL QUESTIONS

WEEK 1

1. D. Printer

2. A. Code Division Multiple Access

3. B. 2G

4. D. Greater resistance to noise and interference

5. B. Data communication

6. D. To provide radio coverage to mobile devices within its area

7. A. Bluetooth

8. B. To allocate specific channels for different services

9. B. ITU

10. C. Mobile communication

11. C. Interference from other users

12. D. To enhance signal reception and transmission

13. B. Adjusting the direction of transmitted radio signals to focus on a specific target

14. A. Transmitting data over multiple channels simultaneously

15. A. By increasing the speed of data transmission

16. A. Space-time coding

17. B. Transmitting data using multiple antennas simultaneously

18. B. Increased data transfer rates

19. C. Phased Array

20. B. By adjusting the phase and amplitude of signals from each antenna

WEEK 2

1. C. Interference from multiple users


2. D. To decode and separate multiple user signals in a multi-user environment

3. C. Interference between multiple users with different signal strengths

4. C. Direct Sequence Spread Spectrum (DSSS)

5. C. To combine multipath signals to improve reception

6. C. By enabling simultaneous communication with multiple users on different frequencies

7. D. Enhanced signal reception and transmission

8. D. It allows for beamforming and spatial multiplexing

9. B. The technique of adjusting the direction of transmitted signals to focus on a specific target

10. C. To improve the efficiency of radio frequency spectrum utilization

11. C. Frequency Beamforming

12. A. Space-time coding

13. B. Transmitting data using multiple antennas simultaneously

14. A. By increasing the speed of data transmission

15. C. Phased Array

16. C. Improved resistance to interference

17. D. The increase in signal strength achieved by using multiple antennas

18. B. Spatial Multiplexing

19. D. Smart Antenna

20. B. To separate and decode multiple user signals that share the same frequency

WEEK 3

1. C. Enhance the data transfer rates in wireless communication

2. A. Increased resistance to interference and fading

3. B. By transmitting data over multiple channels simultaneously

4. C. WCDMA

5. A. To provide faster data transfer rates for mobile devices

6. C. 4G

7. C. Orthogonal Frequency Division Multiplexing (OFDM)

8. A. Improved resistance to interference and fading


9. C. It supports both voice and data communication

10. C. To combine signals from multiple antennas for improved transmission

11. A. To enable multi-user communication on the same frequency band

12. C. Orthogonal Frequency Division Multiplexing (OFDM)

13. C. By providing higher data transfer rates

14. C. To enable simultaneous communication with multiple users on different frequencies

15. C. Orthogonal Frequency Division Multiplexing (OFDM)

16. D. By providing multiple subcarriers for data transmission

17. A. To provide high data rates to multiple users simultaneously

18. A. Diversity gain

19. B. Radio Resource Management (RRM)

20. C. Higher data transfer rates

WEEK 4

1. A. Managing the allocation of radio frequencies to different users

2. D. To improve the overall performance and efficiency of the wireless network

3. A. Transmit Power Control (TPC)

4. A. To allocate different frequencies to different users in a cell

5. B. To switch a mobile device from one cell to another without interruption

6. C. Managing interference between neighboring cells

7. C. To reduce the impact of interference on network performance

8. B. Transmit Power Control (TPC)

9. A. To ensure seamless handover between cells with different technologies

10. D. Quality of Service (QoS)

11. A. To allocate radio resources efficiently to different users

12. D. Number of antennas in the Antenna Array

13. B. To prioritize data packets based on their importance and specific requirements

14. C. Proportional Fairness


15. D. It balances the allocation of radio resources among users based on their channel conditions
and data rate requirements

16. D. To manage the queue of data packets waiting to be transmitted

17. C. Managing interference between neighboring cells

18. C. Proportional Fairness

19. C. By prioritizing data packets based on their importance

20. D. Quality of Service (QoS)

WEEK 5

1. B. Mobile and Ad Hoc Network

2. C. It is a decentralized and self-configuring network

3. D. Dynamic and flexible network formation

4. C. Using direct wireless links

5. A. Limited scalability as the network size grows

6. B. Automatically adjust radio parameters based on the environment

7. B. It enables devices to dynamically access available spectrum bands

8. D. They use predetermined transmission power levels

9. A. Dynamic Spectrum Access (DSA)

10. A. Spectrum Sensing

11. B. It is the process of sharing spectrum between licensed and unlicensed users

12. D. It is not compatible with existing wireless communication standards

13. A. Dynamic Spectrum Access (DSA)

14. C. It enables cognitive radios to adapt to changes in the radio environment

15. C. To allocate and reallocate spectrum to cognitive radios dynamically

16. A. Unauthorized access to licensed spectrum by secondary users

17. A. Dynamic Spectrum Access (DSA)

18. C. To adapt to changes in the radio environment and use spectrum efficiently

19. D. Decentralized and autonomous decision-making

20. D. Cognitive radio


21. B. The process of scanning and detecting primary users in the frequency bands

22. A. It allows cognitive radios to share and utilize underutilized spectrum bands

23. D. Carrier Sense Multiple Access (CSMA)

24. C. They can dynamically adapt to changes in the radio environment

25. D. The process of switching between different frequency bands based on availability

26. A. Limited spectrum availability for opportunistic transmission

27. B. By sensing and detecting spectrum holes in the radio environment

28. B. Spectrum Sensing

29. B. To detect the presence of primary users and avoid harmful interference

30. C. Implementing spectrum sensing capabilities may increase the complexity of radio devices

WEEK 6

1. A. Overwhelm a target system with a large volume of malicious traffic

2. A. It is launched from multiple sources

3. A. Disrupt normal system operations and services

4. C. The number of sources used to launch the attack

5. A. Application layer

6. A. To exhaust the resources of a specific application or service

7. A. An attack that spoofs the source IP address and uses legitimate services to amplify the attack

8. A. A network of compromised devices controlled by an attacker

9. B. To disrupt the operations of a target organization or website

10. C. By using a combination of hardware and software solutions to filter and block malicious traffic

11. A. Regularly updating and patching software and operating systems

12. A. To monitor network traffic and identify patterns consistent with known DDoS attacks

13. A. It restricts the number of requests from a single IP address to prevent overwhelming the
target

14. C. A botnet offers a distributed network of sources, making it harder to trace and mitigate the
attack

15. A. It distributes website content across multiple servers, reducing the impact of a DDoS attack
16. A. To increase the volume of malicious traffic sent to the target system

17. B. Flood attack

18. A. By implementing traffic filtering and blocking at the network level

19. A. To filter and clean incoming traffic before forwarding legitimate traffic to the target

20. A. Attackers demand a ransom from the target to stop the DDoS attack

WEEK 7

1. A. To focus on outdated technologies and practices

2. C. Blockchain

3. C. To develop decentralized and secure communication systems

4. C. Blockchain

5. C. By creating decentralized and tamper-proof records of transactions

6. A. Fiber-to-the-x (FttX) technologies

7. D. To connect and interconnect various devices and objects to the internet

8. C. Internet of Things (IoT)

9. C. It enhances the data processing capabilities of network devices

10. D. Massive MIMO technology

11. C. To increase the capacity and efficiency of wireless communication systems

12. A. Massive MIMO

13. D. By enhancing the spatial multiplexing of data

14. C. Quantum communication

15. D. To create highly secure and unbreakable communication channels

16. A. Quantum communication

17. A. Reflection attack

18. A. By implementing traffic filtering and blocking at the network level

19. A. To filter and clean incoming traffic before forwarding legitimate traffic to the target

20. D. Zero Trust Architecture

21. D. It allows for dynamic configuration and management of network resources

22. A. Cloud computing


23. D. To provide scalable and on-demand data storage and processing capabilities

24. A. Cloud computing

25. D. By enabling flexible and cost-effective data storage and processing

26. D. Zero Trust Architecture

27. D. To enhance network security by assuming all devices are untrusted

28. A. Zero Trust Architecture

29. C. By assuming all devices are untrusted and implementing strict access controls

30. C. Artificial Intelligence (AI) for network management

31. D. To optimize network performance through intelligent decision-making

32. A. Artificial Intelligence (AI) for network management

33. D. By making intelligent decisions to improve network performance

34. C. Green communication

35. D. To reduce the energy consumption of telecommunication networks

36. A. Green communication

37. C. By reducing the energy consumption of network devices and infrastructure

38. D. Fault-tolerant network design

39. D. To ensure network resilience and reliability in the face of failures or disruptions

40. A. Fault-tolerant network design

You might also like