Explore topic-wise MCQs in Digital Communications.

This section includes 46 Mcqs, each offering curated multiple-choice questions to sharpen your Digital Communications knowledge and support exam preparation. Choose a topic below to get started.

1.

Which are called as substitution encryption techniques?

A. Caesar cipher
B. Trithemius cipher
C. Caesar & Trithemius cipher
D. None of the mentioned
Answer» D. None of the mentioned
2.

The transmitter of frequency hopping system is fed with encoding scheme such as

A. Frequency shift keying
B. Binary phase shift keying
C. Frequency & Binary phase shift keying
D. None of the mentioned
Answer» D. None of the mentioned
3.

Spread spectrum can be used to transmit

A. Analog data
B. Digital data
C. Analog & Digital data
D. None of the mentioned
Answer» D. None of the mentioned
4.

The segment of the key-stream of plaintext is obtained by _____ of two sequences together.

A. ANDing
B. ORing
C. Addition
D. Modulo 2 addition
Answer» E.
5.

In which method cipher feedback is used?

A. Synchronous encryption method
B. Self synchronous encryption method
C. All of the mentioned
D. None of the mentioned
Answer» C. All of the mentioned
6.

In CDMA the incoming signal is _____ with the spreading code.

A. Added
B. Multiplied
C. XOR-ed
D. None of the mentioned
Answer» C. XOR-ed
7.

The ratio (J/S)reqd gives the measure of

A. Vulnerability to interference
B. Invulnerability to interference
C. All of the mentioned
D. None of the mentioned
Answer» C. All of the mentioned
8.

Short code is configured using ______ shift register.

A. 4-stage
B. 2-stage
C. 12-stage
D. 15-stage
Answer» E.
9.

Which type of demodulator is used in the frequency hopping technique?

A. Coherent
B. Non coherent
C. Coherent & Non coherent
D. None of the mentioned
Answer» C. Coherent & Non coherent
10.

Walsh cover technique is used for

A. Channelization
B. Spreading
C. Channelization & Spreading
D. None of the mentioned
Answer» D. None of the mentioned
11.

In CDMA, the users share the bandwidth

A. Synchronously
B. Asynchronously
C. Synchronously & Asynchronously
D. None of the mentioned
Answer» C. Synchronously & Asynchronously
12.

Processing gain is given as

A. Wss/R
B. Rch/R
C. Wss/R & Rch/R
D. None of the mentioned
Answer» D. None of the mentioned
13.

The minimum spacing between consecutive hop positions gives the

A. Minimum number of chips necessary
B. Maximum number of chips necessary
C. Chip rate
D. None of the mentioned
Answer» B. Maximum number of chips necessary
14.

The conditions for perfect secrecy are

A. Only one key transforming message should exist
B. All keys should be equally likely
C. One key transforming message to each cipher text & all keys should be equally likely
D. None of the mentioned
Answer» D. None of the mentioned
15.

The types of channels that reverse channel contains are

A. Traffic
B. Access
C. Traffic & Access
D. None of the mentioned
Answer» D. None of the mentioned
16.

The standard building block uses _______ of a key to transform 64-bit input into 64-bit output.

A. 32 bit
B. 48 bit
C. 64 bit
D. 128 bit
Answer» C. 64 bit
17.

The steps followed in forward channel CDMA includes

A. Modulo 2 addition
B. Channelization
C. Modulo 2 addition & Channelization
D. None of the mentioned
Answer» D. None of the mentioned
18.

In which method the key-stream is generated independently of the message?

A. Synchronous encryption method
B. Self synchronous encryption method
C. All of the mentioned
D. None of the mentioned
Answer» B. Self synchronous encryption method
19.

The jammer which monitors a communicator's signal is known as

A. Frequency follower jammers
B. Repeat back jammers
C. Frequency follower & Repeat back jammers
D. None of the mentioned
Answer» D. None of the mentioned
20.

Spread spectrum multiple access techniques allows the multiple signal to be transmitted

A. One after the other
B. Simultaneously
C. All of the mentioned
D. None of the mentioned
Answer» C. All of the mentioned
21.

Which has worse signal to noise performance?

A. Delay locked loop
B. Tau-dither loop
C. Delay locked & Tau-dither loop
D. None of the mentioned
Answer» C. Delay locked & Tau-dither loop
22.

Spread spectrum is a ______ technique.

A. Encoding
B. Decoding
C. Encoding & Decoding
D. None of the mentioned
Answer» B. Decoding
23.

Frequency hopping system can provide reliable mitigation only if

A. Hopping rate is greater than the symbol rate
B. Hopping bandwidth is large
C. Hopping rate is greater than the symbol rate & its bandwidth is large
D. None of the mentioned
Answer» D. None of the mentioned
24.

The original bandwidth of the unspread signal in spread spectrum is ____ to data rate.

A. Proportional
B. Inversely proportional
C. Not related
D. None of the mentioned
Answer» B. Inversely proportional
25.

Pulse jammer consists of

A. Pulse modulated excess band noise
B. Pulse modulated band-limited noise
C. Pulse width modulated excess band noise
D. Pulse width modulated band-limited noise
Answer» C. Pulse width modulated excess band noise
26.

For hybrid systems the minimum required processing gain is

A. 5db
B. 10db
C. 17db
D. 25db
Answer» D. 25db
27.

Which method is better?

A. To share same bandwidth
B. To share different bandwidth
C. To share same & different bandwidth
D. None of the mentioned
Answer» C. To share same & different bandwidth
28.

Spread spectrum has immunity from

A. Noise
B. Multi-path distortion
C. Noise & Multi-path distortion
D. None of the mentioned
Answer» D. None of the mentioned
29.

In substitution technique encryption protection is more.

A. True
B. False
Answer» C.
30.

A cipher system is said to have perfect secrecy if

A. Posteriori probability is equal to priori probability
B. Posteriori probability is greater than priori probability
C. Posteriori probability is less than priori probability
D. None of the mentioned
Answer» B. Posteriori probability is greater than priori probability
31.

Which system allows larger processing gain?

A. Direct sequence
B. Frequency hopping
C. Direct sequence & Frequency hopping
D. None of the mentioned
Answer» C. Direct sequence & Frequency hopping
32.

Spread spectrum makes ______ difficult.

A. Jamming
B. Interception
C. Jamming & Interception
D. None of the mentioned
Answer» D. None of the mentioned
33.

Multi paths may be because of

A. Reflections from buildings
B. Refraction
C. Atmospheric reflections
D. All of the mentioned
Answer» E.
34.

In DSSS the signal is recovered using

A. Low pass filter
B. High pass filter
C. Band pass filter
D. Band stop filter
Answer» D. Band stop filter
35.

Which filter is used to get the final FHSS signal?

A. Low pass filter
B. High pass filter
C. Band pass filter
D. Band stop filter
Answer» D. Band stop filter
36.

In which technique is phase coherence hard to maintain?

A. Direct sequence
B. Frequency hopping
C. Direct sequence & Frequency hopping
D. None of the mentioned
Answer» C. Direct sequence & Frequency hopping
37.

Perfect secrecy can be achieved for

A. Finite number of messages
B. Infinite number of messages
C. Finite & Infinite number of messages
D. None of the mentioned
Answer» C. Finite & Infinite number of messages
38.

The 64 bit block input key has _____ number of parity bits.

A. 4
B. 6
C. 8
D. 16
Answer» D. 16
39.

One-time pad has

A. Random key
B. Unconditional security
C. Can be used only once
D. All of the mentioned
Answer» E.
40.

For any cyclic shift, the auto-correlation function is equal to

A. 1/p
B. -1/p
C. -p
D. p
Answer» C. -p
41.

Direct system allows detection of signals whose psd level is

A. Below noise level
B. Above noise level
C. All of the mentioned
D. None of the mentioned
Answer» B. Above noise level
42.

Which are the design options for anti jam communicator?

A. Time diversity
B. Frequency diversity
C. Special discrimination
D. All of the mentioned
Answer» E.
43.

In Vigenere method ______ is provided.

A. Priming key
B. Feedback
C. Priming key & Feedback
D. None of the mentioned
Answer» D. None of the mentioned
44.

The width of each channel in frequency hopping spread spectrum corresponds to

A. Bandwidth of input signal
B. Pseudorandom sequence used
C. Carrier frequency
D. None of the mentioned
Answer» B. Pseudorandom sequence used
45.

For direct sequence systems what is the minimum required processing gain?

A. 3db
B. 10db
C. 12db
D. 20db
Answer» C. 12db
46.

The _____ the uncertainty, the ______ is the information content.

A. Lesser, greater
B. Greater, lesser
C. Lesser, lesser
D. Greater, greater
Answer» E.