CS601 Lecture 16 Important MCQSapi.ning.com/.../CS601_Lecture_16_Important_MCQS_2.pdf · CS601...
Transcript of CS601 Lecture 16 Important MCQSapi.ning.com/.../CS601_Lecture_16_Important_MCQS_2.pdf · CS601...
Hello friends this is most important MCQS and short question Pleas I need your parry only and inshallha we put the best afford for you. Regard Muhammadsaqib
CS601 Lecture 1 Important MCQS
1: Modern telecommunication industry began in 1837 with the invention of the telegraph by __________.
• Samuel Morse
2: Invention of telephone by ____________________in 1876.
• Alexander Graham Bell
3: Development of wireless communication technology by _____________in the 1890s.
• Guglielmo Marconi
4:By__________ telephone and telegraph companies had developed a network of communication facilities throughout the industrialized world.
• 1950’s
5: Large-scale integration of _______reduced cost and size of terminals and communication equipment
• Circuits
6: New ___________that facilitated the development of data communication networks.
• software systems
7: _______________ is the exchange of data (in the form of 0’s and 1’s) between two devices (computers) via some form of the transmission medium.”
• Data Communication
8: Data communication is considered to be______ if the communicating devices are present in the same building or a similarly restricted geographical area
• Local
9: Data Communication is considered _________ if the devices are farther apart.
• remote
10: Similarly, a data communication system is made up of 5 components________.
• 5 component (Massage, Sender, Receiver, Medium, Protocol) 12: the data from the sender might not be an appropriate format for the _________and will need to be processed.
• transmission medium
13: ___________ is the Physical path that a message uses to travel from the Sender to thereceiver.
• Medium
14: ___________set of Rules Governing Communication.
• Protocol
15: Without ___________ two devices may be connected but they will not be able to communicate.
• Protocol
16: communication dialog between network users or applications different Types of this __________for Info Exchange.
• Session
17: _________ interconnected group of computers and communication devices we will look into it in a little bit.
• Network
18: _________ a network-attached device.
• Node
CS601 Lecture 2 Important MCQS
1: ______________connects adjacent nodes.
• Links
2: Wires, Cables, Any thing that physically connects two ______________.
• Nodes
2: __________ end-to-end route within a network.
• Path
3: __________ the conduit over which data travels.
• Circuit
4: ___________dividing messages into fixed-length packets prior to transmission over a network’s communication media.
• Parkerizing
5: __________ determining a message’s path from sending to receiving nodes.
• Routing
6: _____________can be a Computer, Printer or any other device capable of sending or receiving.
• Nodes
7: The links connecting Nodes are called ________________.
• COMMUNICATION CHANNELS
8: ______________ in which all terminals or computers share the links.
• Network
9: A system designer can limit the kind of interaction that a given user can have with the entire system is called ________.
• Security
10: Both multiple computers and multiple users can interact for a task is called ________.
• Collaborative Processing.
11: ____________ can be measured in many ways including Transit and Response Time.
• Performance
12: Well designed ________________ can speed up the processes.
• Software
13: unauthorized access, Sensitive data, protection at multiple level, lower level passwordand user ID, Upper level encryption is the facture of _____________.
• Security.
14: Frequency of Failure, network after Failure, recovery time of a network failure,Catastrophe and fire, earthquake and theft are the facture of ______________.
• Reliability
CS601 Lecture 3 Important MCQS
1: _____________________Need to make efficient use of Transmission facilities that areshared among a no. of communicating devices.
• Transmission System Utilization
2: Techniques like________________ to allow multiple users to share total capacity of a Transmission Medium.
• Multiplexing
3:____________________: TX. System should not be overwhelmed by traffic.
• Congestion Control
4: __________ a device must have an Interface with the Transmission system/Transmission Medium.
• Interfacing
5: Electromagnetic Signals travel over Transmission Medium. Once an interface is established, __________is required.
• Signal generation
6: The transmission and the reception should be properly ____________.
• Synchronized.
7: ________________ means that the receiver must be able to determine, when to expect a new transmission and when to send acknowledgements.
• Synchronization 8: To make sure that source does not overwhelm destination by sending data faster than itcan be handled and processed____________.
• Flow Control
9: If a data transmission is interrupted due to a fault somewhere in the system, ____________techniques are needed.
• Recovery
10: two entities in different systems cannot just send data and expect to be understood. For communication to occur, these entities must agree on a ____________
• PROTOCOL
11: ___________ represents the Structure or the format of the Data, Meaning the order inwhich data is presented.
• Syntax
12: _________ Refer to the Meaning of each section of bits and what action should be taken based on interpretation?
• Semantics
13: Instead of having a single Module for performing communication, there is astructured set of modules that implement communications function” This structure iscalled __________________.
• Protocol Architecture
14: File Transfer contains all of the logic is unique to the file transfer application such as:
• Transmitting passwords, File Commands
15: Systems share a point to point link or Data can pass without intervening active agentand simple protocol is called the _______________. Characteristics of the protocol.
• Direct
16: Switched networks or Interne works or internets, Data transfer depend on otherentities Complex Protocol is called the _______________. Characteristics of the protocol
• Indirect
17: Communications is a complex task and to complex for single unit structured designbreaks down problem into smaller units layered structure is called the _______________.Characteristics of the protocol
• Monolithic or Structured
18: Communication between peer entities is called the _______________characteristicsof the protocol.
• Symmetric
19: Client/server called the _______________characteristics of the protocol.
• Asymmetric
CS601 LESSON NO: 4 IMPORTANT MCQS
1: A ____________provides a model for development that makes it possible for a product to work regardless of the individual manufacturer.
• Standard
2: An example of non-standardized products is _________.
• AUTOMOBILES
3: Why Standards are Essential?
Answer: Creating and Maintaining an Open and competitive Market for EquipmentManufacturers .Guaranteeing National and International Interoperability of Data andTelecommunications Technology and Equipment
4: there are ____________ Categories of standard communication.
• Two (De Jure “ By Law”) and ( De facto “ By Fact”)
5: Standards not approved by an organized body but have been adopted as standardsthrough their widespread use it is __________ Categories of stranded.
• De fecto
6: Standards that have been legislated by an officially recognized regulation body it is__________ Categories of stranded.
• De jure 7: Standards that are originally invented by a Commercial Organizations a basis for theoperation of its products they are wholly owned by that company. They are also called_______________.
• Closed Standards
8: They are originally developed by groups or committees that have passed them intopublic domains. They are also called _________ because they open Communicationbetween different systems.
• Open Standards
9: ___________ are Procedural Bodies and they are so slow moving and cannot co-opwith the fast growing communication industry.
• Standard Creation Committees
10: International Standard’s Organization is __________.
• ISO
11: Integrated Services Digital Network stand for __________.
• ISDN
12: The American National Standard Institute __________
• ANSI
13: The Institute of Electrical and Electronics Engineers________________.
• IEEE
14: _____________ is the Special Interest Groups with representatives from interestedcorporations they facilitate and fasten standardization process by working withuniversities, and users to test, evaluate and standardize new technologies.
• Forums
15: All communication technology is subject to regulation and laws by governmentagencies. The purpose is to protect Public Interest by regulating Radio, Television andCable Communications.
• Regulatory Agencies
16: “Line Configuration refers to the way two or more devices attach to a ______”
• Link
17: A ______ is the physical communication path that transfers data from one device to the other.
• Link
18: Mostly _______________connection use wire/cable to connect with each other.
• point-to-point
19: Microwave, Satellite Links can also be used Data and Control information pas _________between entities with no intervening agent.
• Directly
20: More than two devices share the Link that is the capacity of the channel is SHARED now. Is called ________________.
• Multipoint Line Configuration
21: If several devices can share the link simultaneously, it’s called_______ shared line configuration.
• Spatially
22: If users must take turns using the link, then it’s called _________shared or Time Shared Line Configuration.
• Temporally
CS601 LESSON: NO 5 MCQS
1: The____________ is the geometric representation of the relationship of the links and the linking devices (Nodes) in a Network.
• Topology
2: “____________defines the physical or the Logical Agreement of Links in a Network”
• Topology
3: _____________of a Network is suggestive of how a network is laid out. It refers to thespecific configuration and structure of the connections between the Links and the Nodes.
• Topology
4: Question: What to consider when choosing a Topology?
Answer: Relative status of the devices to be linked.
5: One device controls traffic and the others must transmit through it. is called__________.
• Primary to secondary
6: In a __________ every device has dedicated a point-to-point link to every other device.
• Mash topology
7: if the6 nodes have 15 links in mash topology and how many links will be a 7 node _____.
• 21
8: Mesh Topology is _______. If one link fails, it does not affect other links
• Robust
9: In a ____________Each device has a dedicated point-to-point link to a central controller (Hub)
• Start topology
10: A variation of Star Topology is called _____________ topology.
• Tree
11: Nodes in a Tree are linked to a __________that controls the traffic to and from network.
• central hub
12: Central Hub in a Tree is an _________________.
• ACTIVE HUB
13: ____________ contains a repeater.
• ACTIVE HUB
14: _______is a hardware device that regenerates the received bit pattern before sending them out.
• Repeater
15: ____________ strengthens TX. And increases the distance a signal can travel.
• Repeater
16: Secondary Hub in a Tree may be ______ or ______.
• Active , Passive HUB
17: ___________simply provides physical connection between attached devices.
• Passive Hub
18: Because of_____________, More devices can be attached to a Central Hub and therefore increase the distance a signal can travel.
• Secondary Hub
19: example of tree topology is ________.
• Cable TV
CS601 LESSON NO: 6 MCQS
1: Each device has point-to-point dedicated link with only two devices on either side.
• Ring Topology
2: in a _____________ each device has a repeater incorporated.
• Ring Topology
3: In a ring topology if one device does not receive a signal within a specified period, it can issue an alarm to tell network ________about the problem and its location.
• Operator
4: A break in a ring i.e. a disabled station can disable the entire network is the___________type of disadvantage of ring topology.
• Unidirectional Traffic
5: Several topologies combined in a larger topology are called a _____________.
• Hybrid Topology
6: Example: One department of a business may have decided to use a Bus while other hasa Ring. The two can be connected via a Central Controller in____________.
• Star topology
7:________________ Mode is used to define the direction of the signal flow between the linked devices”
• Transmission
8: Transmission modes ____________.
• Simplex • Half- Duplex
• Full-Duplex • All of the given
9: Communication is Unidirectional, only one of the two stations can transmit, other can only receive. It’s a ______ mode of star topology.
• Simplex
10: Each station can both transmit and receive but not at the sometime. When one device is sending the other can only receive and vice versa. It’s a ______ mode of star topology.
• Half-Duplex
11: Both stations can transmit and receive simultaneously two ways Street with traffic flowing in both directions at the same time Signals traveling in either direction share the capacity of the link. It’s a ______ mode of star topology.
• Full-Duplex
12: A_______ is usually privately owned and Links the devices in single office, Building or a campus.
• LAN
13: How to implement a WAN?
Answer: Traditionally WAN s has been implemented using one of the two technologies.
• Circuit switching • Pocket switching
14: A dedicated communication path is established between two stations through the node of the network. This type of switching is known as ____________.
• Circuit switching
15: Data is sent out in small chunks called______________.
• “Packets”
CS601 LESSON NO: 7MCQS
1: Designed to extend over an entire city, it may be a single network e.g. Cable TV Network or Interconnection of a No. of LANs into a larger network. This type of networkis known is _____________.
• Metropolitan Area network
2: Difference B/W internet and Internet?
• internet: combination of network.• Internet : Specific word wide network
3: international standard organization OSI establish in ___________.
• 1947
4: ___________ is a model that allows two different systems to communicate regardless of their underlying network.
• Open system
5: Definition of OSI model.
• A layered from work for the design of network system that allow communication across all type of computer system regardless of their underline architecture.
6: the communication is governed by __________________.
• Protocol
7: The processes on each m/c that communicate at a given layer are called ___________processes.
• Peer–to peer
8: Headers are added at layer 6,5,4,3,2. Trailer is added at______________.
• Layer 2.
9: network support layer is _________.
• Layer, 5, 6, 7.
CS601 LESSON NO: 8 MCQS
1: Physical layer decides the type of ______.
• ENCODING2: The ___________data consists of a stream of bits (sequence of 1’s and 0’s) ¾ to be transmitted the bits must be ENCODED into signals: Electrical or Optical
• physical layer
3: Date Rate (Bits per second) also decided by the Physical Layer So, Physical layer defines the Duration of a Bit. Means how long will a bit last.
• Data Rate / Transmission Rate
4: Sender and Receiver must be synchronized at the bit level. Sender and Receiver clocksmust be synchronized. It is done by Physical layer.
• Synchronization of Bits
5: The data link divides the stream of bits from Network layer into manageable data units called “________”. This process is known as Framing.
• FRAMES
6: Data Link layer adds a _________to Frame.
• HEADER
7: ___________defines the physical address of sender (Source address) and/or receiver address (Destination address).
• Header
8: If ________is intended for a device outside the network, the receiver address is the address of the device that connects one network to the other.
• Frame
9: Data Link layer imposes __________mechanisms to prevent overwhelming the receiver.
• Flow Control
10: Error Control bits are added to the form in the___________.
• TRAILER
11: Two or more devices may be connected to a single link. Data link protocols are necessary to determine which device will have the control of the link at a given time. It iscalled ______________.
• Access control
12: _____________ is Responsible for Source-to-Destination delivery.
• NETWORK LAYER
13: ___________________ensures that each packet gets from its point of origin to its final destination.
• Network Layer
14: If the two systems are connected to the same network, there is no need for Network layer and ___________delivery is enough.
• node –to node
15: If two systems are connected to two different networks, there is often a need for _____________delivery.
• Source-to destination
16: _____________addressing implemented by Data link layer handles addressing Problem locally.
• Physical
17: If a packet is going from one network to another, we need another _______-system tohelp distinguish source & destination systems.
• Addressing
18: Network layer adds Header to the data coming from upper layers that among other things include _______________of the sender and receiver.
• LOGICAL ADDRESS
19: When independent networks or links are connected together to create an
• “internetwork”
CS601 Lecture 09 Important MCQS
1: _____________ is the Responsible for Source-to-Destination delivery of Entire Message.
• Transport layer
2: ____________ oversees source-to-destination delivery of the entire packets but itdoes not recognize any relationship b/w those packets.
• Network layer
3: Transport layer ________includes a type of address called Service Point Address or PORT Address.
• Header
4: This sequence no.s enables ___________at the receiving m/c to reassemble message correctly at the destination and to identify and replace lost packets.
• Transport layer
5: _______________can be either connection-less or connection-oriented.
• Transport layer
6: Treats each segment as an independent packet and delivers it to the transport layer of the destination m/c. its called __________.
• Connection less
7: A connection is established first with Transport layer before delivering the packet. Its called ____________.
• Connection oriented
8: Like Data link layer, _____________is also responsible for Flow control.
• Transport layer
9: ______________ is the Network Dialog Controller.
• Session layer
10: ________________ Establishes, Maintains, and synchronizes the interaction betweencommunicating systems.
• Session layer
11: Session layer allows two systems to enter into a _____________.
• dialog
12: ________ allows communication between two processes to take place either in half duplex or full duplex mode.
• Dialog Controller
13: If a system is sending a file of 2000 pages, it is advisable to insert __________after every 100 page to ensure that each 100 page unit is received and acknowledged independently.
• Check point
14: _________________ layer is concerned with Syntax and Semantics of info exchange between two systems.
• Presentation Layer
CS601 LESSON NO: 10 MCQS
1: The info should be changed to ____________before being transmitted.
• bit streams
2: Because different computers use different ENCODING _________-is responsible for interoperability b/w these encoding methods.
• presentation layer
3: to carry sensitive information, a system must be able to assure privacy. _________means that sender transforms original info to another form and sends the resulting message out over the network.
• Encryption
4: ____________reverses the original process to transform message back to its original form.
• Decryption
5: Data ____________reduces the number of bits to be transmitted.
• Compression
6: _____________Enables the user either human or software to access the network It provides user interface and support for the services such as electronic mail, Remote File access and Transfer, Shared Database Management and other services.
• Application Layer
7: __________is a software version of a physical terminal and allows a user to log on to remote host.
• NVT
8: ________ is the application allows a user to access file on remote computer to make changes or read data.
• FTAM
9: ________ allow to access to a network recourses.
• Application
10: _________ translate, encrypt and compress data.
• Presentation layer
11: _________ to move pocket from source to destination to provide internetworking.
• Network
12: ___________ is organizing a bit into farms to provide node to node delivery.
• Data link
13: ________is to transmit a bit over a medium to provide mechanical and electrical specification.
• Physical layer
CS601 LESSON NO: 11 MCQS
1: One of the major concerns of ______________is moving information in the form of electromagnetic signals across a TX medium.
• Physical layer
2: In analog ________ is a set of specific points of data and all possible points b/w them.
• Continuous
3: In digital ________ is a set of specific points of data with no points in between
• Discrete
4: Example of ANALOG Data is _____________.
• Human voice
5: ____________ is a continuous waveform that changes smoothly over time. As the wave moves from value ‘A’ to value ‘B’, it passes through and includes an infinite number of values along its path.
• Analog Wave
6: A _______signal is discrete. It can have only a limited number of defined values, often as simple as 1s and 0s
• Digital
7: The transition of a digital signal from value to value is ______________like a light being switched ON and OFF.
• Instantaneous
8: A signal is called _________if it completes a pattern within a measurable time frame called a Period and then repeats that pattern over identical subsequent Periods.
• Periodic
9: The completion of one full pattern is called a _________.
• CYCLE
10: An ________signal is the one that changes constantly without exhibiting a pattern or cycle that repeats over time.
• A periodic
11: In _____________ that any a periodic signal can be decomposed into an infinite number of Periodic Signals.
• Fourier Transform
12: _____________ measured in Volts, Amperes or Watts.
• Amplitude
13: ________: Amount of time (in seconds) a signal need to complete one Cycle.
• Period
14: _________: Number of cycles completed in one second.
• Frequency
15: Seconds____HertzMilliseconds____KilohertzMicroseconds____MegahertzNanoseconds____GigahertzPicoseconds____Terahertz
CS601 LESSON NO: 12 MCQS
1: If a signal does not change, it will never complete any cycles, and frequency is no. of cycles in 1 second so __________
• Freq = 0
2: __________ describes the position of the waveform relative to time zero.
• Phase
3: A phase shift of 360 degrees corresponds to a shift of a ___________.
• Complete period.
4: A phase shift of 180 degree corresponds to a shift of a_____________.
• half a period
5: A phase shift of 90 degree corresponds to a shift of ______________.
• Quarter a period.
6: To show the relationship between amplitude and Frequency, we can use what is called a ___________Domain Plot.
• Frequency
7: They jump, slide, wobble and spike As long as any irregularities are consistent, cycle after cycle, a signal is still __________.
• Periodic
8: We need __________________ to decompose a composite signal into its components.
• FOURIER ANALYSIS
CS601 LESSON NO: 13 and 14: MCQS
1: _____________: of a signal is the collection of all the component frequencies it contains.
• Frequency Spectrum
2: Bandwidth: of a signal is the __________of the frequency spectrum.
• Width
3: Time required sending one single bit. It’s called ______________.
• Bit interval (second)
4: Number of bits sent per second. Its called ________________.
• Bit Rate (bps)
5: Frequency spectrum of a _________ signal contains an infinite number of frequencies with different amplitudes.
• Digital
6: Information must be transformed into signals before it can be transported across the communication media. It’s called ___________.
• Conversions
7: Data stored in the computer is in the form of 0’s and 1’s. To be carried from one place to the other, data is usually converted to digital signals. This is called “Digital-to-Digital Conversion” or “________________________”
• Encoding digital data into digital signals
8: For Example, conversion of Telephone conversation to digital signal for a no. ofdifferent reasons such as to decrease the effect of noise. This is called“_______________” or “Digitizing an Analog Signal.
• Analog-to-Digital Conversion
9: For example, to send data from one place to the other using a Telephone line. This is called “Digital-to-Analog Conversion” or “_________________________”
• Modulating a digital Signal
10: For Example, voice or music from radio station which is an analog signal istransmitted through the air; however the frequency of voice or music is not suitable forthis kind of TX. The signal should be carried by a higher frequency signal. This is called“____________________________” or “Modulating an analog Signal”.
• Analog-to-Analog Conversion
11: Average Amplitude of a unipolar encoded signal is non-zero. This is called DCComponent I.e. a component with _________ frequency.
• Zero
12: _____________ Problem can occur when data consists of long streams of 1’s or 0’s.
• Synchronization
13: Rx has to rely on a __________.
• TIMER
CS601 LESSON NO: 15 MCQS
1: The only problem with __________is that it requires two signal changes to encode onebit and therefore occupies more BANDWIDTH.
• RZ encoding
2: Best existing solution to the problem of Synchronization. Signal changes at the middle of bit interval but does not stop at zero. Instead it continues to the opposite pole.
• Biphase Encoding
3: Uses inversion at the middle of each bit interval for both synchronization and bit representation.
• Manchester
4: By using a single transition for a dual purpose, ________achieves the same level of synchronization as RZ but with only two levels of amplitude.
• Manchester
5: ___________ at the middle of the bit interval is used for Synchronization but presence or absence of an additional transition at the beginning of bit interval is used to identify a bit.
• Inversion
6: Like RZ, it uses three voltage levels: Unlike RZ, zero level is used to represent binary 0. Binary 1’s are represented by alternate positive and negative voltages.
• Bipolar Encoding
7: type of Bipolar Encoding __________.
• Three ( AMI, B8ZS, HD3B)
8: AMI stand for ______________.
• Alternate Mark Inversion
9:___________ used in North America.
• B8ZS
10” __________ used in Europe & Japan
• HDB3
11: ___________ Convention adopted in North America to provide synch for long string of Zeros.
• B8ZS
12: Forces artificial signal changes called __________.
• VIOLATIONS
CS601 Lecture 16 Important MCQS
1: Type of the Digital to Digital Encoding is.
• 3
2: To send a Human voice over a long distance, we need to digitize it, since digital signal are less prone to Noise is called.
• Analog to Digital conversation
3: CODEC is called ____________.
• Coder decoder
4: First step in Analog to Digital conversion
• Plus Amplitude modulation
5: The technique take an Analog signal, Samples it, Generate a service of pluses based onthe result of sampling.
• Plus Amplitude modulation
6: ________ used a technique called simple and Hold mean at a given movement signal level is read and holed briefly.
• PAM
7: The pluses are of any amplitude (still analogs not digital). To make them digital, we need a ____________.
• PCM
8: Modifies pulses created by ________ to a complete Digital signal.
• PAM
9: PCM first Step is ________________.
• Quantization
10: __________ is a method of assigning integral value in a specific range to sampled instance.
• Quantization11: The sapling Rate must be least twice the highest frequency is called _______
• <Nyquist Theorem>
12: Bit Rate sampling Rate given by _______________
• Nyquist Theorem
LECTURE NO: 17 IMPORTANT MCQS OF CS601
1: The process of changing one of the characteristics of an analog signal based on the infoin a digital signal is called _________________.
• Digital to Analog conversation
2: Digital data must be modulated on an analog signal that has been manipulated to look like two distinct values corresponding to binary ___ to binary _____.
• 1 and 0.
3: A sine wave is defined by ________ characteristics.
• 3
4: There is fourth and better mechanism that combines changes in both amplitude and phase called_____________.
• Quadratue Amplitude Modulation (QAM)
5: No of bits transmitted during one second is called _________.
• Bit Rate.
6: No of signal units per second that are required to represent that bit is called________.
• Baud Rate
7: The baud rate determines the ___________ required to send the signal.
• B.W (Bandwidth)
8: In analog TX. The sending device produces a high frequency signal that acts as a basis for the information signal this base signal is called the _________or _____________.
• Carrier Signal , Carrier Frequency
9: In ______, the strength of carrier signal is varied to represent binary 1 or 0.
• ASK
10: In___________ the peak amplitude of the signal during each bit duration is constant and its value depends on the bit (1 or 0).
• ASK
11: Speed of transmission during __________ is limited by the physical characteristics ofTx. Medium.
• ASK
12: ______Unintentional voltages introduced onto a line by various sources such as Heat or Electromagnetic Radiation from other sources.
• Noise
13: (OOK) is called _______________.
• On-Off Keying
14: In ______, one of the bit values is represented by no voltage.
• OOK
15: When we __________ an ASK modulated signal, we get a spectrum of many simple frequencies.
• Decompose
LECTURE NO: 18 IMPORTANT MCQS OF CS601
1: __________device is looking for specific frequency changes over a given number of periods, it can ignore voltage spikes
• Rx
2: FSK shifts between two carrier frequencies, it is easier to analyze as two _________frequencies.
• co-existing
3: in a ________________ both peak amplitude and frequency remains constant as the phase changes.
• PSK
4: Minimum bandwidth required for PSK transmission is the same as__________.
• ASK
LECTURE NO: 19IMPORTANT MCQS OF CS601
1: Analog To Analog Conversion Methods.__________.
• AM• FM• PM• ALL of the given
2: Amplitude of carrier signal is changed according to the amplitude of ___________ signal.
• Modulating
3: Bandwidth of AM signal (modulated signal) = 2 * bandwidth of modulating signal.4: Frequency of carrier signal is ______according to the amplitude of modulating signal.
• Changed