Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts								
							Communication
				Q: 
				Subchannels are further grouped into ________, which can be allocated to wireless users.
A) links
B) chips
C) signals
D) bursts			
		
				Q: 
				Like OFDM, _______ employs multiple closely spaced subcarriers, but the subcarriers are divided into groups of subcarriers.
A) CDMA
B) IFFT
C) QPSK
D) OFDMA			
		
				Q: 
				FFT is a family of algorithms that form a special case of the __________ , which refers to any algorithm that generates a quantized Fourier transform of a time-domain function.
A) DFT
B) IFT
C) IFFT
D) QPSK			
		
				Q: 
				The relationship among the subcarriers in the OFDM scheme is referred
to as ________ .
A) modulation
B) B) subchannels
C) orthogonality
D) spread spectrum			
		
				Q: 
				With __________ , each bit in the original signal is represented by multiple bits in the transmitted signal, using a spreading code.
A) IFFT
B) DSSS
C) CDMA
D) FHSS			
		
				Q: 
				With ________ it is possible to simultaneously transmit either from or to different users by allocating the subcarriers during any one-time interval to multiple users.
A) OFDMA
B) SC-FDMA
C) SC-TDMA
D) all of the above			
		
				Q: 
				One prominent advantage of _______ over OFDMA is the lower peak-to-average power ration of the transmit waveform, which benefit the mobile user in terms of battery life and power efficiency.
A) PAPR
B) IFFT
C) FMDA
D) SC-FDMA			
		
				Q: 
				OFDMA subcarriers are divided into groups and each group is named a ______ .
A) chip
B) hop
C) subchannel
D) SCG			
		
				Q: 
				_________ is a common modulation scheme used with OFDM.
A) QPSK
B) FFT
C) IFFT
D) ISI			
		
				Q: 
				The ________ scheme uses advance digital signal processing techniques to distribute the data over multiple carriers at precise frequencies.
A) SC-FDMA
B) OFDM
C) OFDMA
D) CDMA			
		
				Q: 
				________ is used on the downlink channel to enable the base station to transmit different data streams to multiple users over the same frequency band.
A) OFDM
B) SC-FDMA
C) MIMO-BC
D) all of the above			
		
				Q: 
				________ is used on the uplink channel to provide multiple access to subscriber stations.
A) MIMO-MAC
B) MIMO-MU
C) MIMO-DS
D) MIMO-BC			
		
				Q: 
				__________ is when a source data stream is divided among the transmitting antennas.A) SC-FDMAB) Spatial multiplexingC) OFDMD) None of the above			
		
				Q: 
				With __________ the same data is coded and transmitted through multiple antennas.A) spatial multiplexingB) CDMAC) spatial diversityD) SC-FDMA			
		
				Q: 
				MIMO exploits the space dimension to improve wireless systems in terms of _________.
A) range
B) capacity
C) reliability
D) all of the above			
		
				Q: 
				Spread spectrum is an important form of encoding for wireless communications.			
		
				Q: 
				Subchannelization is not useful for battery-powered devices.			
		
				Q: 
				Orthogonal Frequency-Division Multiple Access employs multiple closely spaced subcarriers.			
		
				Q: 
				MU-MIMO techniques are used in both Wi-Fi and 4G cellular networks.			
		
				Q: 
				The IFFT operation has the effect of ensuring that the subcarriers do not interfere with each other.			
		
				Q: 
				OFDM cannot overcome intersymbol interference in a multipath environment.			
		
				Q: 
				MIMO systems are characterized by the number of antennas at each end of the wireless channel.			
		
				Q: 
				In OFDM all of the subcarriers are dedicated to a single data source.			
		
				Q: 
				MIMO-MAC systems outperform point-to-point MIMO.			
		
				Q: 
				A disadvantage of MU-MIMO is that the available capacity cannot be shared to meet time-varying demands.			
		
				Q: 
				Spatial diversity can be used when transmitting conditions are favorable and for relatively short distances compared to spatial multiplexing.			
		
				Q: 
				In a multipath scenario where each receiving antenna would experience a different interference environment, there is a high probability that if one antenna is suffering a high level of fading, another antenna has sufficient signal level.			
		
				Q: 
				Diverse multipath fading offers multiple views of the transmitted data at the receiver, thus increasing robustness.			
		
				Q: 
				In a MIMO scheme the transmitter employs a single antenna.			
		
				Q: 
				Together, MIMO and OFDM technologies are the cornerstone of emerging broadband wireless networks.			
		
				Q: 
				LDPC codes exhibit performance in terms of bit error probability that is veryclose to the ________ limit and can be efficiently implemented for high-speed use.			
		
				Q: 
				________ codes make highly efficient use of redundancy and block lengths and symbol sizes can be easily adjusted to accommodate a wide range of message sizes.			
		
				Q: 
				(A) Process received bits to compute the syndrome code in exactly the same fashion as the encoder processes the data bits to produce the check code; (B) if the syndrome bits are all zero, no error has been detected; and (C) if the syndrome is nonzero, perform additional processing on the syndrome for error correction, -- is the procedure for the decoding of a _________ code.			
		
				Q: 
				For a parity-check code there are three functions to perform: encoding, error detection, and __________ .			
		
				Q: 
				The ________ is a measure of how much additional bandwidth is required to carry data at the same data rate as without the code.			
		
				Q: 
				The ratio of redundant bits to data bits, (n - k)/k, is called the _______ of the code.			
		
				Q: 
				The m * n matrix H = [hij] is called the _______ .			
		
				Q: 
				_________ codes are a widely used subclass of nonbinary BCH codes.			
		
				Q: 
				In the case of the CRC, a particular cyclic code can be represented by a polynomial divisor, called the ___________ .			
		
				Q: 
				Reed-Solomon is an example of a ________ code.			
		
				Q: 
				Bose-Chaudhuri-Hocquenghem is an example of a _________ code.			
		
				Q: 
				Cyclic codes can be easily encoded and decoded using __________ registers.			
		
				Q: 
				Frequency modulation and phase modulation are special cases of _________ modulation.			
		
				Q: 
				_________ modulation is the simplest form of modulation.			
		
				Q: 
				__________ has been defined as the process of combining an input signal m(t) and a carrier at frequency fc to produce a signal s(t) whose bandwidth is (usually) centered on fc.			
		
				Q: 
				__________ proposed an approach for the construction of LDPC codes by defining the LDPC parity-check matrix.
A) MacKay
B) Reed
C) Gallager
D) Neal			
		
				Q: 
				To compute an error-locator polynomial and solve for its roots is a technique for BCH decoding proposed by ________ .
A) Berlekamp
B) Reed-Solomon
C) Bose
D) Chaudhuri			
		
				Q: 
				Special cases of angle modulation are frequency modulation and ________ modulation.
A) VSB
B) repeat-accumulate
C) code rate
D) phase modulation			
		
				Q: 
				An LDPC construction technique that results in a systematic code is called a
__________ code.
A) Tanner
B) irregular LDPC
C) regular LDPC
D) repeat-accumulate			
		
				Q: 
				The ratio of data bits to total bits, k/n, is called the _________ .
A) code rate
B) parity-check matrix
C) systematic code
D) redundancy			
		
				Q: 
				With __________ codes, data are processed in chunks of m bits, called symbols.
A) FEC
B) systematic
C) Reed-Solomon
D) all of the above			
		
				Q: 
				__________ codes are among the most powerful cyclic block codes and are widely used in wireless applications.A) Parity checkB) B) BCHC) LPDCD) Repeat-accumulate			
		
				Q: 
				A ____________ code takes a fixed-length input and produces a fixed-length
check code.
A) cyclic error-correcting
B) cyclic redundancy check
C) cyclic logic check
D) none of the above			
		
				Q: 
				A _________ code takes an input of arbitrary length and produces a fixed-length CRC check code.
A) BCH
B) LFS
C) VSB
D) CRC			
		
				Q: 
				Many of the error-correcting block codes that are in use are in a category called ________ .
A) cyclic codes
B) logic codes
C) linear codes
D) BCH codes			
		
				Q: 
				___________ rule demonstrates that both FM and PM require greater bandwidth than AM.A) Reed'sB) Carson'sC) Chaudhuri'sD) Solomon's			
		
				Q: 
				________ uses one sideband and a reduced power carrier.
A) SSB
B) DBS
C) VSB
D) BTC			
		
				Q: 
				The _________ is the ratio of the amplitude of the input signal to the carrier.
A) modulation index
B) frequency phase
C) division rate
D) none of the above			
		
				Q: 
				__________ is a basic characteristic of a signal used for modulation.
A) Frequency
B) Amplitude
C) Phase
D) All of the above			
		
				Q: 
				Voice signals are transmitted over telephone lines at their original spectrum, which is referred to as __________ transmission.
A) modulation
B) baseband
C) frequency
D) parity			
		
				Q: 
				Stop-and-wait flow control is more efficient than sliding-window flow control.			
		
				Q: 
				With the exception of the repeat-accumulate code, the LDCP code is systematic.			
		
				Q: 
				With a nonsystematic code it is more difficult to determine a technique for generating a codeword from a block of data bits.			
		
				Q: 
				The syndrome indicates which of the individual parity-check equations do not equal 0.			
		
				Q: 
				LDPC codes cannot be efficiently implemented for high-speed use.			
		
				Q: 
				RS codes are well suited for burst error correction.			
		
				Q: 
				The LFSR implementation of a cyclic error-correcting encoder is the same as that of the CRC error-detecting code.			
		
				Q: 
				Amplitude modulation is a linear process and produces frequencies that are the sum and difference of the carrier signal and the components of the modulating signal.			
		
				Q: 
				DSBSC filters out the carrier frequency and sends both sidebands but does not use as much power and bandwidth as DSBTC.			
		
				Q: 
				The spectrum of the AM signal consists of the original carrier plus the spectrum of the input signal translated to fc.			
		
				Q: 
				SSB is a variant of AM that requires only half of the bandwidth.			
		
				Q: 
				The principal techniques for modulation using analog data are amplitude modulation, frequency modulation, and phase modulation.			
		
				Q: 
				For unguided transmission it is virtually impossible to transmit baseband signals.			
		
				Q: 
				Modulation does not permit frequency-division multiplexing.			
		
				Q: 
				When only analog transmission facilities are available, modulation is required to convert the digital data to analog form.			
		
				Q: 
				In addition to TCP, the ________ is the other transport-level protocol that is commonly used as part of the TCP/IP protocol suite.			
		
				Q: 
				RTT Variance Estimation, also known as ________, is the technique specified in the TCP standard that enables a TCP entity to adapt to changes in round-trip time.			
		
				Q: 
				A TCP implementation may employ one of three retransmission strategies: First-only, Individual, and ________.			
		
				Q: 
				TCP mechanisms can be grouped into the categories of data transfer, connection termination, and ________.			
		
				Q: 
				The ________ field in the TCP header contains the sequence number of the next data octet that the TCP entity expects to receive.