Telecom Exams Answers
Telecom Exams Answers
Telecom Exams Answers
1. C
2. B
3. B
4. A
5. A
6. A
7. A
8. B
9. D
10. B
11. D
12. B
13. B
14. B
15. A
16. B
17. B
18. D
19. B
20. A
21. B
22. D
23. A
24. C
25. C
26. B
27. D
28. D
29. C
30. C
31. C
32. C
33. C
34. D
35. A
36. D
37. C
38. B
39. B
40. B
41. C
42. B
43. B
WEEK 1
1. B
2. B
3. B
4. C
5. A
6. A
7. B
8. B
9. B
10. B
11. B
12. A
13. B
14. B
15. B
16. B
17. C
18. C
19. A
20. A
21. A
22. C
23. A
24. B
25. A
26. C
27. C
28. B
29. A
30. A
WEEK 2
1. B
2. C
3. B
4. A
5. B
6. B
7. C
8. A
9. A
10. A
11. A
12. C
13. B
14. A
15. A
16. A
17. B
18. B
19. A
WEEK 3
1. B
2. A
3. A
4. A
5. A
6. A
7. B
8. A
9. A
10. A
11. A
12. A
13. A
14. C
15. A
16. A
17. A
18. C
WEEK 4
1. B
2. C
3. A
4. A
5. C
6. C
7. B
8. A
9. A
10. B
11. B
12. C
13. C
14. B
15. A
16. A
17. B
18. A
Week 5
1. c) To reduce the size of multimedia data for efficient transmission and storage
2. a) Lossless compression
3. b) Lossless compression retains all original data without any loss of information.
4. b) PNG
5. c) To recover lost or corrupted video data and maintain video playback quality
9. a) Packet loss
14. a) It assigns shorter codes to frequently occurring symbols, resulting in higher compression
efficiency.
16. b) Chapter 2
19. a) It improves error resilience by allowing reference frames from different intervals.
20. b) Balancing the trade-off between error recovery and compression efficiency.
Week 6
1. b) WiFi
3. a) Chapter 1
10. a) Chapter 1
13. a) Chapter 6
16. a) To communicate with the WiMAX base station and access the network
18. d) Chapter 4
week 7
10. a) Chapter 1
11. c) To optimize the utilization of the radio spectrum by dynamically adapting to the environment
12. b) The ability of the radio to perceive and adapt to the radio environment
17. a) To detect the presence of primary users and identify available spectrum bands
18. d) Chapter 4
19. a) To store information about available spectrum bands and their usage
week 8
5. b) Chapter 2
9. a) Chapter 1
15. c) Chapter 3
16. c) To gather feedback from the public and industry to improve the standard
17. a) Balancing the benefits of standardization with the potential loss of proprietary advantages
week 9
4. b) Chapter 2
9. d) Chapter 4
10. a) To combine data from multiple mobile devices for more robust data transmission
13. c) Chapter 3
15. d) Coordinating the cooperation among competing operators and managing resources
18. c) Chapter 5
19. c) To mitigate interference through collaboration among mobile devices
GENERAL QUESTIONS
WEEK 1
1. D. Printer
3. B. 2G
5. B. Data communication
7. A. Bluetooth
9. B. ITU
13. B. Adjusting the direction of transmitted radio signals to focus on a specific target
20. B. By adjusting the phase and amplitude of signals from each antenna
WEEK 2
9. B. The technique of adjusting the direction of transmitted signals to focus on a specific target
20. B. To separate and decode multiple user signals that share the same frequency
WEEK 3
4. C. WCDMA
6. C. 4G
WEEK 4
13. B. To prioritize data packets based on their importance and specific requirements
WEEK 5
11. B. It is the process of sharing spectrum between licensed and unlicensed users
18. C. To adapt to changes in the radio environment and use spectrum efficiently
22. A. It allows cognitive radios to share and utilize underutilized spectrum bands
25. D. The process of switching between different frequency bands based on availability
29. B. To detect the presence of primary users and avoid harmful interference
30. C. Implementing spectrum sensing capabilities may increase the complexity of radio devices
WEEK 6
5. A. Application layer
7. A. An attack that spoofs the source IP address and uses legitimate services to amplify the attack
10. C. By using a combination of hardware and software solutions to filter and block malicious traffic
12. A. To monitor network traffic and identify patterns consistent with known DDoS attacks
13. A. It restricts the number of requests from a single IP address to prevent overwhelming the
target
14. C. A botnet offers a distributed network of sources, making it harder to trace and mitigate the
attack
15. A. It distributes website content across multiple servers, reducing the impact of a DDoS attack
16. A. To increase the volume of malicious traffic sent to the target system
19. A. To filter and clean incoming traffic before forwarding legitimate traffic to the target
20. A. Attackers demand a ransom from the target to stop the DDoS attack
WEEK 7
2. C. Blockchain
4. C. Blockchain
19. A. To filter and clean incoming traffic before forwarding legitimate traffic to the target
29. C. By assuming all devices are untrusted and implementing strict access controls
39. D. To ensure network resilience and reliability in the face of failures or disruptions