You are on page 1of 7

Multiple Choice Questions on Error Detection and Correction

Computer Officer Preparation - Data Communication and Networking 1. Which error detection method uses one's complement arithmetic? A) B) C) D) Simple parity check Two-dimensional parity check CRC Checksum

2. Which error detection method consists of just one redundant bit per data unit? A) B) C) D) Simple parity check Two-dimensional parity check CRC Checksum

3. In cyclic redundancy checking, what is the CRC? A) B) C) D) The divisor The quotient The dividend The remainder

4. In cyclic redundancy checking, the divisor is _______ the CRC. A) B) C) D) The same size as one bit less than one bit more than none of the above

5. A burst error means that two or more bits in the data unit have changed. A) B) C) D) double-bit burst single-bit none of the above

6. In ________ error correction, the receiver corrects errors without requesting retransmission. A) B) C) D) backward onward forward none of the above

7. In ________ error correction, the receiver asks the sender to send the data again. A) B) C) D) backward retransmission forward none of the above

8. We can divide coding schemes into two broad categories: ________ and ______coding. A) B) C) D) block; linear linear; nonlinear block; convolution none of the above

9. In modulo-2 arithmetic, __________ give the same results. A) B) C) D) addition and multiplication addition and division addition and subtraction none of the above

10. In modulo-2 arithmetic, we use the ______ operation for both addition and subtraction. A) B) C) D) XOR OR AND none of the above

11. In _____ coding, we divide our message into blocks, each of k bits, called ___. A) B) C) D) block; blockwords linear; datawords block; datawords none of the above

12. We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called _________. A) B) C) D) datawords blockwords codewords none of the above

13. The ________ between two words is the number of differences between corresponding bits. A) B) C) D) Hamming code Hamming distance Hamming rule none of the above

14. To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block code must be _______. A) B) C) D) 5 6 11 none of the above

15. To guarantee correction of up to 5 errors in all cases, the minimum Hamming distance in a block code must be ________. A) B) C) D) 5 6 11 none of the above

16. In a linear block code, the _______ of any two valid codewords creates another valid codeword. A) B) C) D) XORing ORing ANDing none of the above

17. A simple parity-check code can detect __________ errors. A) B) C) an even-number of two no errors

D)

an odd-number of

18. _______codes are special linear block codes with one extra property. If a codeword is rotated, the result is another codeword. A) B) C) D) Non-linear Convolution Cyclic none of the above

19. The _____of errors is more difficult than the ______. A) B) C) D) correction; detection detection; correction creation; correction creation; detection

20. In modulo-11 arithmetic, we use only the integers in the range ______, inclusive. A) B) C) D) 1 to 10 1 to 11 0 to 10 none of the above

21. In modulo-2 arithmetic, we use only ______. A) B) C) D) 1 and 2 0 and 2 0 and 1 none of the above

22. Adding 1 and 1 in modulo-2 arithmetic results in _________. A) B) C) D) 1 2 0 none of the above

23. In block coding, if k =2 and n =3, we have _______ invalid codewords. A) B) C) 8 4 2

D)

none of the above

24. The Hamming distance between equal codewords is _________. A) B) C) D) 1 n 0 none of the above

25. The Hamming distance between 100 and 001 is ________. A) B) C) D) 2 0 1 none of the above

26. In block coding, if n = 5, the maximum Hamming distance between two codewords is ________. A) B) C) D) 2 3 5 none of the above

27. If the Hamming distance between a dataword and the corresponding codeword is three, there are _____ bits in error. A) B) C) D) 3 4 5 none of the above

28. The _______ of a polynomial is the highest power in the polynomial. A) B) C) D) range degree power none of the above

29. The divisor in a cyclic code is normally called the _________. A) B) degree generator

C) D)

redundancy none of the above

30. A generator that contains a factor of ____ can detect all odd-numbered errors. A) B) C) D) x x+1 1 none of the above

31. Checksums use _________ arithmetic. A) B) C) D) two's complement arithmetic one's complement arithmetic either (a) or (b) none of the above

32. In one's complement arithmetic, if positive 7 is 0111, then negative 7 is ________. A) B) C) D) 1111 1101 1000 none of the above

33. The checksum of 1111 and 1111 is _________. A) B) C) D) 1111 0000 1110 0111

34. The checksum of 0000 and 0000 is __________. A) B) C) D) 1111 0000 1110 0111

Answers:

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 3

D A D C B C B C C A C C B B C A D C A C C C B C A C A B B

You might also like