Deck 6: Error Detection and Correction

Full screen (f)
exit full mode
Question
The ratio of data bits to total bits is called the code rate .
Use Space or
up arrow
down arrow
to flip the card.
Question
Redundant bits are not used by the receiver for error detection.
Question
A ________ error can occur in the presence of white noise when a slight random deterioration of the signal to noise ratio is sufficient to confuse the receiver's decision of a single bit.

A)burst
B)idle
C)single-bit
D)digital
Question
Error detection found in data link control protocols such as HDLC is not a useful technique.
Question
Modulo 2 arithmetic uses binary addition with no carries,which is just the exclusive-OR (XOR)operation.
Question
Error correction works by adding sufficient redundancy to the transmitted message.
Question
The simplest error detecting scheme is to append a parity bit to the end of a block of data.
Question
The Internet checksum is considerably less effective than the CRC.
Question
In ________ transmission each block of data is formatted as a frame that includes a starting and an ending flag.

A)parallel
B)asynchronous
C)analog
D)synchronous
Question
The characteristics that distinguish various data link configurations are topology and whether the link is half duplex or full duplex.
Question
________ is one of the most fundamental requirements in the transmission of a stream of bits from one device to another.

A)Standardization
B)Digitalization
C)Synchronization
D)Configuration
Question
In a(n)________ there is a cluster of bits in which a number of errors occur,although not necessarily all of the bits in the cluster suffer an error.

A)error burst
B)single-bit error
C)idle state
D)error detection
Question
CRC-32 is not used in IEEE 802 LAN standards.
Question
Error correction is best used with wireless applications.
Question
Burst errors can be caused by impulse noise.
Question
An error detection code simply detects the presence of an error. .
Question
The use of Manchester encoding is a form of synchronization.
Question
Single bit errors are more common and more difficult to deal with.
Question
Regardless of the design of the transmission system,there will be errors,resulting in the change of one or more bits in a transmitted block of data.
Question
In __________ transmission systems,an error occurs when a binary 1 is transmitted and a binary 0 is received,or a binary 0 is transmitted and a binary 1 is received.

A)analog
B)digital
C)parallel
D)none of the above
Question
Three approaches are in common use for coping with data transmission errors: error-detection codes,error-correction codes,and __________ protocols.
Question
The ratio of redundant bits to data bits,(n - k)/k ,is called the __________ of the code.

A)redundancy
B)coding gain
C)code rate
D)fixed parity
Question
Error correction works by adding ________ to the transmitted message.

A)decoding
B)clarification
C)error burst
D)redundancy
Question
A way of viewing the CRC process is to express all values as ________ in a dummy variable X with binary coefficients.
Question
The ________ is a measure of how much additional bandwidth is required to carry data at the same data rate as without the code.
Question
In ________ transmission systems,an error occurs when a bit is altered between transmission and reception.

A)analog
B)digital
C)idle
D)guided
Question
A ________ error is an isolated error condition that alters one bit but does not affect nearby bits.
Question
The use of coding allows a reduction,referred to as the ________,and defined as the reduction in decibels to achieve a specified BER of an error correcting coded system compared to an uncoded system using the same modulation.

A)code rate
B)fixed coding
C)coding gain
D)block code
Question
Correction of errors using an error detecting code requires that block of data to be ________.

A)skipped over
B)deleted
C)retransmitted
D)streamed
Question
The ________ is a measure of how much additional bandwidth is required to carry data at the same data rate as without the code.
Question
FEC codes are designed not just to detect but correct errors,avoiding the need for __________.
Question
The __________ d(v1 ,v2)between two n -bit binary sequences v1 and v2 is the number of bits in which v1 and v2 disagree.

A)check bits
B)FCS
C)ECC
D)Hamming distance
Question
___________ operates in a fashion similar to error detection but is capable of correcting certain errors in a transmitted bit stream.
Question
The data,plus preamble,postamble and control information are called a ________.
Question
The __________ is the reduction,in decibels,to achieve a specified BER of an error-correcting coded system compared to an uncoded system using the same modulation.

A)FEC
B)Hamming distance
C)coding gain
D)checksum
Question
The ratio of redundant bits to data bits is called the ________ of the code.
Question
A ___________ is an isolated error condition that alters one bit but does not affect nearby bits.

A)parity error
B)burst error
C)single-bit error
D)streaming error
Question
The _________ is a string of 1-bit storage devices with each device having an output line,which indicates the value currently stored,and an input line.

A)shift register
B)parity
C)digital logic
D)none of the above
Question
The __________ is a measure of how much additional bandwidth is required to carry data at the same data rate as without the code.

A)burst rate
B)code rate
C)stream rate
D)idle rate
Question
Redundant bits are used by the _________ for the purpose of error detection or correction.
Question
In an ??????__________ ,there is a cluster of bits in which a number of errors occur,although not necessarily all of the bits in the cluster suffer an error.
Question
A __________ error can occur in the presence of white noise.
Question
Forward error correction schemes are frequently used in __________ transmission, where retransmission schemes are highly inefficient and error rates may be high.
Question
The simplest error-detecting scheme is to append a __________ bit to the end of a block of data.
Question
An ___________ is a group of bits in which two successive erroneous bits are always separated by less than a given number x of correct bits.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Error Detection and Correction
1
The ratio of data bits to total bits is called the code rate .
True
2
Redundant bits are not used by the receiver for error detection.
False
3
A ________ error can occur in the presence of white noise when a slight random deterioration of the signal to noise ratio is sufficient to confuse the receiver's decision of a single bit.

A)burst
B)idle
C)single-bit
D)digital
C
4
Error detection found in data link control protocols such as HDLC is not a useful technique.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Modulo 2 arithmetic uses binary addition with no carries,which is just the exclusive-OR (XOR)operation.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
Error correction works by adding sufficient redundancy to the transmitted message.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
The simplest error detecting scheme is to append a parity bit to the end of a block of data.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
The Internet checksum is considerably less effective than the CRC.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
In ________ transmission each block of data is formatted as a frame that includes a starting and an ending flag.

A)parallel
B)asynchronous
C)analog
D)synchronous
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
The characteristics that distinguish various data link configurations are topology and whether the link is half duplex or full duplex.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
________ is one of the most fundamental requirements in the transmission of a stream of bits from one device to another.

A)Standardization
B)Digitalization
C)Synchronization
D)Configuration
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
In a(n)________ there is a cluster of bits in which a number of errors occur,although not necessarily all of the bits in the cluster suffer an error.

A)error burst
B)single-bit error
C)idle state
D)error detection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
CRC-32 is not used in IEEE 802 LAN standards.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Error correction is best used with wireless applications.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
Burst errors can be caused by impulse noise.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
An error detection code simply detects the presence of an error. .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
The use of Manchester encoding is a form of synchronization.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Single bit errors are more common and more difficult to deal with.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
Regardless of the design of the transmission system,there will be errors,resulting in the change of one or more bits in a transmitted block of data.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
In __________ transmission systems,an error occurs when a binary 1 is transmitted and a binary 0 is received,or a binary 0 is transmitted and a binary 1 is received.

A)analog
B)digital
C)parallel
D)none of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
Three approaches are in common use for coping with data transmission errors: error-detection codes,error-correction codes,and __________ protocols.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
The ratio of redundant bits to data bits,(n - k)/k ,is called the __________ of the code.

A)redundancy
B)coding gain
C)code rate
D)fixed parity
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
Error correction works by adding ________ to the transmitted message.

A)decoding
B)clarification
C)error burst
D)redundancy
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
A way of viewing the CRC process is to express all values as ________ in a dummy variable X with binary coefficients.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
The ________ is a measure of how much additional bandwidth is required to carry data at the same data rate as without the code.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
In ________ transmission systems,an error occurs when a bit is altered between transmission and reception.

A)analog
B)digital
C)idle
D)guided
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
A ________ error is an isolated error condition that alters one bit but does not affect nearby bits.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
The use of coding allows a reduction,referred to as the ________,and defined as the reduction in decibels to achieve a specified BER of an error correcting coded system compared to an uncoded system using the same modulation.

A)code rate
B)fixed coding
C)coding gain
D)block code
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
Correction of errors using an error detecting code requires that block of data to be ________.

A)skipped over
B)deleted
C)retransmitted
D)streamed
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
The ________ is a measure of how much additional bandwidth is required to carry data at the same data rate as without the code.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
FEC codes are designed not just to detect but correct errors,avoiding the need for __________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The __________ d(v1 ,v2)between two n -bit binary sequences v1 and v2 is the number of bits in which v1 and v2 disagree.

A)check bits
B)FCS
C)ECC
D)Hamming distance
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
___________ operates in a fashion similar to error detection but is capable of correcting certain errors in a transmitted bit stream.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
The data,plus preamble,postamble and control information are called a ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
The __________ is the reduction,in decibels,to achieve a specified BER of an error-correcting coded system compared to an uncoded system using the same modulation.

A)FEC
B)Hamming distance
C)coding gain
D)checksum
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
The ratio of redundant bits to data bits is called the ________ of the code.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
A ___________ is an isolated error condition that alters one bit but does not affect nearby bits.

A)parity error
B)burst error
C)single-bit error
D)streaming error
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The _________ is a string of 1-bit storage devices with each device having an output line,which indicates the value currently stored,and an input line.

A)shift register
B)parity
C)digital logic
D)none of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
The __________ is a measure of how much additional bandwidth is required to carry data at the same data rate as without the code.

A)burst rate
B)code rate
C)stream rate
D)idle rate
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
Redundant bits are used by the _________ for the purpose of error detection or correction.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
In an ??????__________ ,there is a cluster of bits in which a number of errors occur,although not necessarily all of the bits in the cluster suffer an error.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
A __________ error can occur in the presence of white noise.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
Forward error correction schemes are frequently used in __________ transmission, where retransmission schemes are highly inefficient and error rates may be high.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The simplest error-detecting scheme is to append a __________ bit to the end of a block of data.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
An ___________ is a group of bits in which two successive erroneous bits are always separated by less than a given number x of correct bits.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.