

MCQOPTIONS
Saved Bookmarks
This section includes 389 Mcqs, each offering curated multiple-choice questions to sharpen your Electronics and Telecommunication Engineering [ENT knowledge and support exam preparation. Choose a topic below to get started.
201. |
Select correct statement for addressing of node |
A. | address reveal a about the position of the node and its role. |
B. | address reveal about the position of the node, but not about the role. |
C. | address does not reveal anything about the position of the node. reveal something about the role. |
D. | address does not reveal anything about the position of the node as well as its role. |
Answer» C. address does not reveal anything about the position of the node. reveal something about the role. | |
202. |
Select correct statement for naming |
A. | name reveal a about the position of the node and its role. |
B. | name reveal about the position of the node, but not about the role. |
C. | name does not reveal anything about the position of the node. reveal something about the role. |
D. | name does not reveal anything about the position of the node as well as its role. |
Answer» D. name does not reveal anything about the position of the node as well as its role. | |
203. |
Forward Error Control- |
A. | should not try to prevent errors but only discover errors. |
B. | should try to prevent errors only |
C. | should try to prevent errors and avoid discovery of errors |
D. | attempts to prevent errors instead of only detecting them |
Answer» E. | |
204. |
The purpose of error control is to |
A. | guarantee communication is error-free & in-sequence, |
B. | guarantee communication is duplicate-free, and loss-free |
C. | guarantee communication is error-free and loss-free |
D. | a and b both |
Answer» E. | |
205. |
Backward Error Control – |
A. | should not try to prevent errors but only discover errors. |
B. | should try to prevent errors |
C. | should try to prevent errors and avoid discovery of errors |
D. | none of the above |
Answer» B. should try to prevent errors | |
206. |
In the clear communication zone communication is |
A. | at least a 90% |
B. | almost impossible, but interference might still occur. |
C. | interference free. |
D. | from almost 100% to 0% |
Answer» C. interference free. | |
207. |
The packet reception ratio (PPR) is depicted against the distance |
A. | at long distance between nodes, the prr increases |
B. | at short distance between nodes, the prr decreases |
C. | at long distance between nodes, the prr decreases |
D. | ppr is independent of distance between nodes |
Answer» D. ppr is independent of distance between nodes | |
208. |
incorrect statement is |
A. | the lower the received signal strength indicator -rssi, better the signal. |
B. | link quality indicator (lqi) positive number ranging from approximately 110 to 50 |
C. | link quality indicator (lqi) positive number ranging from approximately 0 to 100 |
D. | packet reception ratio measured in fraction |
Answer» C. link quality indicator (lqi) positive number ranging from approximately 0 to 100 | |
209. |
The MAC protocol, |
A. | guarantee that the transmission will be successful |
B. | does not guarantee that the transmission will be successful |
C. | guarantee that the retransmission will be successful |
D. | none of above |
Answer» C. guarantee that the retransmission will be successful | |
210. |
Long preamble used in Berkeley MAC (B-MAC) has to be send at least for duration of |
A. | wakeup time |
B. | less than wakeup time |
C. | sleeping time |
D. | less than sleeping time |
Answer» D. less than sleeping time | |
211. |
Long preamble used in Berkeley MAC (B-MAC) has long preamble consist of |
A. | application data |
B. | other payloads |
C. | has fixed length and may carry sender, receiver, and packet size information |
D. | has variable length and may carry sender, receiver, and packet size information |
Answer» E. | |
212. |
Berkeley MAC (B-MAC) was developed to tackle the problems of |
A. | t-mac |
B. | s-mac |
C. | lpl |
D. | all of above |
Answer» C. lpl | |
213. |
Timeout-MAC (T-MAC) letting the nodes timeout when nothing happens |
A. | during their sleep periods. |
B. | during their active periods. |
C. | before the active period. |
D. | after the active period. |
Answer» C. before the active period. | |
214. |
An inherent problems with S-MAC is |
A. | it does not allow sensor nodes to sleep for extensive amounts of time. |
B. | internal clocks are not present. |
C. | the internal clock of the nodes are not synchronized. |
D. | the internal clock of the nodes are synchronized. |
Answer» D. the internal clock of the nodes are synchronized. | |
215. |
This version is time scheduled. A central controller in the network assigns a fixed transmission order |
A. | 1-persistent csma |
B. | non-persistent csma |
C. | p-persistent csma |
D. | o-persistent csma |
Answer» E. | |
216. |
If the channel is busy, it back-offs for a random amount of time and then retries. |
A. | 1-persistent csma |
B. | non-persistent csma |
C. | p-persistent csma |
D. | o-persistent csma |
Answer» C. p-persistent csma | |
217. |
If the channel is busy, continues sensing the channel until it becomes idle again. |
A. | 1-persistent csma |
B. | non-persistent csma |
C. | p-persistent csma |
D. | o-persistent csma |
Answer» B. non-persistent csma | |
218. |
When a node has a packet to send, it listens for traffic on the channel. |
A. | if the channel is free, it initially sends message, cts. |
B. | if the channel is free, it initially waits for message, cts. |
C. | if the channel is free, it initially sends message, rts. |
D. | if the channel is free, it initially waits for message, rts. |
Answer» D. if the channel is free, it initially waits for message, rts. | |
219. |
In centralized TDMA, |
A. | the schedule is calculated online and provided when required |
B. | the schedule is calculated offline and provided to the sensor nodes at startup. |
C. | the schedule is calculated offline and provided when required |
D. | the schedule is calculated online and provided when after regular interval of time |
Answer» C. the schedule is calculated offline and provided when required | |
220. |
RF Transceiver draws more current in |
A. | sleep mode |
B. | receive mode |
C. | transmit mode |
D. | search mode |
Answer» D. search mode | |
221. |
Microcontroller has current drawn typically of 1.8 mA and 5.1 µA respectively in |
A. | active mode and sleep mode |
B. | sleep mode and active mode |
C. | ideal mode and active mode |
D. | sleep mode and ideal mode |
Answer» B. sleep mode and active mode | |
222. |
Design Criteria for Medium Access Protocols |
A. | maximize the throughput by minimizing the delay and energy spent. |
B. | maximize the throughput by maximize the delay and minimizing energy spent. |
C. | minimize the throughput by minimizing the delay and energy spent. |
D. | maximize the throughput by maximize the delay and energy spent. |
Answer» B. maximize the throughput by maximize the delay and minimizing energy spent. | |
223. |
Throughput is defined as the number of bits or bytes successfully |
A. | received per time unit t |
B. | lost per time unit t |
C. | transmitted per time unit t |
D. | retransmitted per time unit t |
Answer» D. retransmitted per time unit t | |
224. |
in case of exposed terminal problem |
A. | two senders are in the communication range of each other |
B. | two senders are not in the communication range of each other |
C. | independent of sender range |
D. | two receivers are in the communication range of each other |
Answer» B. two senders are not in the communication range of each other | |
225. |
in case of hidden terminal problem |
A. | two senders are in the communication range of each other |
B. | two senders are not in the communication range of each other |
C. | independent of sender range |
D. | none of the above |
Answer» C. independent of sender range | |
226. |
Receiving power additionally influenced by |
A. | fading (frequency dependent) & shadowing |
B. | reflection & refraction depending on the density |
C. | scattering & diffraction |
D. | all of above |
Answer» E. | |
227. |
Incorrect statement about Time and frequency multiplexing in combination is |
A. | better protection against tapping |
B. | protection against frequency selective interference |
C. | higher data rates compared to code multiplex |
D. | no precise coordination required |
Answer» E. | |
228. |
The Receive time is |
A. | this is the time taken by the sender to construct the message |
B. | this is the delay incurred while waiting for access to the transmission channel due to contention, collisions etc |
C. | this is the time for message to travel across the channel to the destination node |
D. | this is the time for the network interface on the receiver side to get the message and notify the host of its arrival |
Answer» E. | |
229. |
The Propagation time is |
A. | this is the time taken by the sender to construct the message |
B. | this is the delay incurred while waiting for access to the transmission channel due to contention, collisions etc |
C. | this is the time for message to travel across the channel to the destination node |
D. | this is the time for the network interface on the receiver side to get the message and notify the host of its arrival |
Answer» D. this is the time for the network interface on the receiver side to get the message and notify the host of its arrival | |
230. |
The Access time is |
A. | this is the time taken by the sender to construct the message |
B. | this is the delay incurred while waiting for access to the transmission channel due to contention, collisions etc |
C. | this is the time for message to travel across the channel to the destination node |
D. | this is the time for the network interface on the receiver side to get the message and notify the host of its arrival |
Answer» C. this is the time for message to travel across the channel to the destination node | |
231. |
The Send time is |
A. | this is the time taken by the sender to construct the message |
B. | this is the delay incurred while waiting for access to the transmission channel due to contention, collisions etc |
C. | this is the time for message to travel across the channel to the destination node |
D. | this is the time for the network interface on the receiver side to get the message and notify the host of its arrival |
Answer» B. this is the delay incurred while waiting for access to the transmission channel due to contention, collisions etc | |
232. |
The latency in channel can be decomposed into following components |
A. | send time |
B. | access time and receive time |
C. | propagation time |
D. | alln of above |
Answer» E. | |
233. |
Following aspects of the energy cost in a sensor network make it challenging to reason about optimizing energy |
A. | multi-hop communication can be more efficient than direct transmission |
B. | when a node transmits, all other nodes within range can hear |
C. | neither a nor b |
D. | a and b both |
Answer» E. | |
234. |
__________in S-MAC is similar to the using an RTS/CTS exchange |
A. | collision avoidance |
B. | overhearing avoidance |
C. | both |
D. | one of above |
Answer» B. overhearing avoidance | |
235. |
The S-MAC protocol includes following major component |
A. | periodic listen and sleep |
B. | collision avoidance |
C. | message passing |
D. | all of above |
Answer» E. | |
236. |
Within the coverage range, nodes communication is by__________ |
A. | multicast |
B. | broadcast |
C. | both |
D. | none of above |
Answer» C. both | |
237. |
Densor sensor field---------- the odds of detecting a signal source within the range |
A. | increases |
B. | decreases |
C. | not affect |
D. | independent of |
Answer» B. decreases | |
238. |
Which of these is not true for Time-Division Duplex (TDD)? |
A. | tdd uses different time slots for transmission and reception paths |
B. | single radio frequency can be used |
C. | it increases the battery life of mobile phones |
D. | a duplexer is required |
Answer» D. a duplexer is required | |
239. |
What is the measurement used to indicate the amount of interference to a particular location? |
A. | crosstalk |
B. | snr |
C. | rfi |
D. | emi |
Answer» C. rfi | |
240. |
Which of the following is a type of wireless network interference that can originate from a nearby radio wave transmitter? |
A. | snr |
B. | rfi |
C. | emi |
D. | crosstalk |
Answer» C. emi | |
241. |
What is the receive signal strength indicator used to measure? |
A. | the ssid of the access point with the strongest signal. |
B. | the weakest signal on any channel within the range of an access point. |
C. | the strongest signal on a particular channel at a specific location. |
D. | the channel which the least signal to noise ratio. |
Answer» D. the channel which the least signal to noise ratio. | |
242. |
What type of interference is emitted by nearby electrical motors, appliances, or faulty connections? |
A. | snr |
B. | rfi |
C. | crosstalk |
D. | emi |
Answer» E. | |
243. |
__________ communications mode means that it can both transmit and receive, but only one action at a time. |
A. | radio |
B. | multiplexing |
C. | full duplex |
D. | half duplex |
Answer» E. | |
244. |
The radio communication spectrum is divided into bands based on ______. |
A. | frequency |
B. | cost and hardware |
C. | transmission media |
D. | amplitude |
Answer» B. cost and hardware | |
245. |
The __________ is designed to radiate the aura of the electromagnetic field created by the electric current. |
A. | intensity |
B. | antenna |
C. | radio |
D. | phase |
Answer» C. radio | |
246. |
The general rule of __________ is the inverse-square law, which measures an electromagnetic wave's strength relative to the distance over which it is transmitted. |
A. | intensity |
B. | frequency |
C. | amplitude |
D. | propagation |
Answer» E. | |
247. |
Which of the RF multiplexing methods uses times slices to carry multiple data streams on a single carrier? |
A. | fdm |
B. | fm |
C. | tdm |
D. | am |
Answer» D. am | |
248. |
What is the term used to describe the height of a radio wave? |
A. | frequency |
B. | amplitude |
C. | wavelength |
D. | modulation |
Answer» C. wavelength | |
249. |
What signal transmission method intersperses message segments from multiple sessions into a single medium? |
A. | dsss |
B. | multiplexing |
C. | modulation |
D. | fhss |
Answer» C. modulation | |
250. |
Since a wireless ad-hoc network is decentralized and its topology is dynamic, each of the wireless nodes must perform its own message __________. |
A. | forwarding |
B. | protocols |
C. | switching |
D. | range |
Answer» B. protocols | |