 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 46 Mcqs, each offering curated multiple-choice questions to sharpen your Digital Communications knowledge and support exam preparation. Choose a topic below to get started.
| 1. | Which are called as substitution encryption techniques? | 
| A. | Caesar cipher | 
| B. | Trithemius cipher | 
| C. | Caesar & Trithemius cipher | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 2. | The transmitter of frequency hopping system is fed with encoding scheme such as | 
| A. | Frequency shift keying | 
| B. | Binary phase shift keying | 
| C. | Frequency & Binary phase shift keying | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 3. | Spread spectrum can be used to transmit | 
| A. | Analog data | 
| B. | Digital data | 
| C. | Analog & Digital data | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 4. | The segment of the key-stream of plaintext is obtained by _____ of two sequences together. | 
| A. | ANDing | 
| B. | ORing | 
| C. | Addition | 
| D. | Modulo 2 addition | 
| Answer» E. | |
| 5. | In which method cipher feedback is used? | 
| A. | Synchronous encryption method | 
| B. | Self synchronous encryption method | 
| C. | All of the mentioned | 
| D. | None of the mentioned | 
| Answer» C. All of the mentioned | |
| 6. | In CDMA the incoming signal is _____ with the spreading code. | 
| A. | Added | 
| B. | Multiplied | 
| C. | XOR-ed | 
| D. | None of the mentioned | 
| Answer» C. XOR-ed | |
| 7. | The ratio (J/S)reqd gives the measure of | 
| A. | Vulnerability to interference | 
| B. | Invulnerability to interference | 
| C. | All of the mentioned | 
| D. | None of the mentioned | 
| Answer» C. All of the mentioned | |
| 8. | Short code is configured using ______ shift register. | 
| A. | 4-stage | 
| B. | 2-stage | 
| C. | 12-stage | 
| D. | 15-stage | 
| Answer» E. | |
| 9. | Which type of demodulator is used in the frequency hopping technique? | 
| A. | Coherent | 
| B. | Non coherent | 
| C. | Coherent & Non coherent | 
| D. | None of the mentioned | 
| Answer» C. Coherent & Non coherent | |
| 10. | Walsh cover technique is used for | 
| A. | Channelization | 
| B. | Spreading | 
| C. | Channelization & Spreading | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 11. | In CDMA, the users share the bandwidth | 
| A. | Synchronously | 
| B. | Asynchronously | 
| C. | Synchronously & Asynchronously | 
| D. | None of the mentioned | 
| Answer» C. Synchronously & Asynchronously | |
| 12. | Processing gain is given as | 
| A. | Wss/R | 
| B. | Rch/R | 
| C. | Wss/R & Rch/R | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 13. | The minimum spacing between consecutive hop positions gives the | 
| A. | Minimum number of chips necessary | 
| B. | Maximum number of chips necessary | 
| C. | Chip rate | 
| D. | None of the mentioned | 
| Answer» B. Maximum number of chips necessary | |
| 14. | The conditions for perfect secrecy are | 
| A. | Only one key transforming message should exist | 
| B. | All keys should be equally likely | 
| C. | One key transforming message to each cipher text & all keys should be equally likely | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 15. | The types of channels that reverse channel contains are | 
| A. | Traffic | 
| B. | Access | 
| C. | Traffic & Access | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 16. | The standard building block uses _______ of a key to transform 64-bit input into 64-bit output. | 
| A. | 32 bit | 
| B. | 48 bit | 
| C. | 64 bit | 
| D. | 128 bit | 
| Answer» C. 64 bit | |
| 17. | The steps followed in forward channel CDMA includes | 
| A. | Modulo 2 addition | 
| B. | Channelization | 
| C. | Modulo 2 addition & Channelization | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 18. | In which method the key-stream is generated independently of the message? | 
| A. | Synchronous encryption method | 
| B. | Self synchronous encryption method | 
| C. | All of the mentioned | 
| D. | None of the mentioned | 
| Answer» B. Self synchronous encryption method | |
| 19. | The jammer which monitors a communicator's signal is known as | 
| A. | Frequency follower jammers | 
| B. | Repeat back jammers | 
| C. | Frequency follower & Repeat back jammers | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 20. | Spread spectrum multiple access techniques allows the multiple signal to be transmitted | 
| A. | One after the other | 
| B. | Simultaneously | 
| C. | All of the mentioned | 
| D. | None of the mentioned | 
| Answer» C. All of the mentioned | |
| 21. | Which has worse signal to noise performance? | 
| A. | Delay locked loop | 
| B. | Tau-dither loop | 
| C. | Delay locked & Tau-dither loop | 
| D. | None of the mentioned | 
| Answer» C. Delay locked & Tau-dither loop | |
| 22. | Spread spectrum is a ______ technique. | 
| A. | Encoding | 
| B. | Decoding | 
| C. | Encoding & Decoding | 
| D. | None of the mentioned | 
| Answer» B. Decoding | |
| 23. | Frequency hopping system can provide reliable mitigation only if | 
| A. | Hopping rate is greater than the symbol rate | 
| B. | Hopping bandwidth is large | 
| C. | Hopping rate is greater than the symbol rate & its bandwidth is large | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 24. | The original bandwidth of the unspread signal in spread spectrum is ____ to data rate. | 
| A. | Proportional | 
| B. | Inversely proportional | 
| C. | Not related | 
| D. | None of the mentioned | 
| Answer» B. Inversely proportional | |
| 25. | Pulse jammer consists of | 
| A. | Pulse modulated excess band noise | 
| B. | Pulse modulated band-limited noise | 
| C. | Pulse width modulated excess band noise | 
| D. | Pulse width modulated band-limited noise | 
| Answer» C. Pulse width modulated excess band noise | |
| 26. | For hybrid systems the minimum required processing gain is | 
| A. | 5db | 
| B. | 10db | 
| C. | 17db | 
| D. | 25db | 
| Answer» D. 25db | |
| 27. | Which method is better? | 
| A. | To share same bandwidth | 
| B. | To share different bandwidth | 
| C. | To share same & different bandwidth | 
| D. | None of the mentioned | 
| Answer» C. To share same & different bandwidth | |
| 28. | Spread spectrum has immunity from | 
| A. | Noise | 
| B. | Multi-path distortion | 
| C. | Noise & Multi-path distortion | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 29. | In substitution technique encryption protection is more. | 
| A. | True | 
| B. | False | 
| Answer» C. | |
| 30. | A cipher system is said to have perfect secrecy if | 
| A. | Posteriori probability is equal to priori probability | 
| B. | Posteriori probability is greater than priori probability | 
| C. | Posteriori probability is less than priori probability | 
| D. | None of the mentioned | 
| Answer» B. Posteriori probability is greater than priori probability | |
| 31. | Which system allows larger processing gain? | 
| A. | Direct sequence | 
| B. | Frequency hopping | 
| C. | Direct sequence & Frequency hopping | 
| D. | None of the mentioned | 
| Answer» C. Direct sequence & Frequency hopping | |
| 32. | Spread spectrum makes ______ difficult. | 
| A. | Jamming | 
| B. | Interception | 
| C. | Jamming & Interception | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 33. | Multi paths may be because of | 
| A. | Reflections from buildings | 
| B. | Refraction | 
| C. | Atmospheric reflections | 
| D. | All of the mentioned | 
| Answer» E. | |
| 34. | In DSSS the signal is recovered using | 
| A. | Low pass filter | 
| B. | High pass filter | 
| C. | Band pass filter | 
| D. | Band stop filter | 
| Answer» D. Band stop filter | |
| 35. | Which filter is used to get the final FHSS signal? | 
| A. | Low pass filter | 
| B. | High pass filter | 
| C. | Band pass filter | 
| D. | Band stop filter | 
| Answer» D. Band stop filter | |
| 36. | In which technique is phase coherence hard to maintain? | 
| A. | Direct sequence | 
| B. | Frequency hopping | 
| C. | Direct sequence & Frequency hopping | 
| D. | None of the mentioned | 
| Answer» C. Direct sequence & Frequency hopping | |
| 37. | Perfect secrecy can be achieved for | 
| A. | Finite number of messages | 
| B. | Infinite number of messages | 
| C. | Finite & Infinite number of messages | 
| D. | None of the mentioned | 
| Answer» C. Finite & Infinite number of messages | |
| 38. | The 64 bit block input key has _____ number of parity bits. | 
| A. | 4 | 
| B. | 6 | 
| C. | 8 | 
| D. | 16 | 
| Answer» D. 16 | |
| 39. | One-time pad has | 
| A. | Random key | 
| B. | Unconditional security | 
| C. | Can be used only once | 
| D. | All of the mentioned | 
| Answer» E. | |
| 40. | For any cyclic shift, the auto-correlation function is equal to | 
| A. | 1/p | 
| B. | -1/p | 
| C. | -p | 
| D. | p | 
| Answer» C. -p | |
| 41. | Direct system allows detection of signals whose psd level is | 
| A. | Below noise level | 
| B. | Above noise level | 
| C. | All of the mentioned | 
| D. | None of the mentioned | 
| Answer» B. Above noise level | |
| 42. | Which are the design options for anti jam communicator? | 
| A. | Time diversity | 
| B. | Frequency diversity | 
| C. | Special discrimination | 
| D. | All of the mentioned | 
| Answer» E. | |
| 43. | In Vigenere method ______ is provided. | 
| A. | Priming key | 
| B. | Feedback | 
| C. | Priming key & Feedback | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 44. | The width of each channel in frequency hopping spread spectrum corresponds to | 
| A. | Bandwidth of input signal | 
| B. | Pseudorandom sequence used | 
| C. | Carrier frequency | 
| D. | None of the mentioned | 
| Answer» B. Pseudorandom sequence used | |
| 45. | For direct sequence systems what is the minimum required processing gain? | 
| A. | 3db | 
| B. | 10db | 
| C. | 12db | 
| D. | 20db | 
| Answer» C. 12db | |
| 46. | The _____ the uncertainty, the ______ is the information content. | 
| A. | Lesser, greater | 
| B. | Greater, lesser | 
| C. | Lesser, lesser | 
| D. | Greater, greater | 
| Answer» E. | |