1. The unit of average mutual information is


b) Bytes

c) Bits per symbol

d) Bytes per symbol

2. The method of converting a word to stream of bits is called as

a) Binary coding 

b) Source coding

c) Bit coding 

d) Cipher coding


3 When the base of the logarithm is 2, then the unit of measure of information is

a) Bits 

b) Bytes

c) Nats 

d) Hertz


4 The channel capacity is

a. The maximum information transmitted by one symbol over the channel

b. Information contained in a signal

c. The amplitude of the modulated signal

d. All of the above


5. According to Shannon Hartley theorem,

a. The channel capacity becomes infinite with infinite bandwidth

b. The channel capacity does not become infinite with infinite bandwidth

c. Has a tradeoff between bandwidth and Signal to noise ratio

d. Both b and c are correct


6. Information rate is defined as

a. Information per unit time 

b. Average number of bits of information per second

c. rH 

d. All of the above


7. Entropy is

a. Average information per message 

b. Information in a signal

c. Amplitude of signal 

d. All of the above


8. The information I contained in a message with probability of occurrence is given by (k is constant)

a. I = k log21/P 

b. I = k log2P

c. I = k log21/2P 

d. I = k log21/P2


9. A discrete source emits one of 5 symbols once every scond. The symbol Probabilities are ½,1/4,1/8,1/16,1/16 respectively. What is the source entropy near to.


a. 1.875 bits/symbol

b. !.875 bits

c. 1.895 symbol

d. None


10. Out of following which is not Block of Digital Communication System


a) Source Encoder

b) Channel Encoder

c) Modulator

d) Sequence Amplifier


11. How amount of Information is get Calculated in bits


a) log21/P 

b) log21/P2

c) log21/P2

d) None from Above


12. Select correct entropy for the source that emits one of three possible symbols A,B and C in a statistically independent sequence with probabilities ½,1/4,1/4.


a) 1.5 bits/Symbol

b) 2.8 bits

c) 15 bytes

d) 15 bytes /sym


13. The technique that may be used to increase average information per bit is

a. Shannon-Fano algorithm 

b. ASK

c. FSK 

d. Digital modulation techniques


14.  Which is the correct expression for code efficiency in terms of entropy.

a) Code efficiency = Average code word length(N)/Entropy(H) 

b) Code efficiency = Entropy(H) / 2*Average code word length(N)

c) Code efficiency = Entropy(H) / Average code word length(N)

d) None from Above


15.  What is correct formula to calculate information rate.

a) R = r H bits / sec b) R=sI bits

c) R= sH

d) H=sR


16.  For Shannon FANO coding scheme which of following steps is correct: Step 1: List the source symbols in order of decreasing probability. Step 2: Partition the set into two sets that are as close to equiprobable as possible, and sign 0 to the upper set and 1 to the lower set. Step: Continue this process, each time partitioning the sets with as nearly equal probabilities as possible until further partitioning is not possible.

a) Only 1

b) Only 2

c) Both 1 and 2

d) All are correct


17. In which block of Digital Communication system coding is performed


a) Discrete Information source

b) Source Decoder

c) Channel Encoder

d) Modulator


18. Select proper unit for Joint Entropy of Source


a) Bits/Sequence

b) Bits/Symbol

c) bits

d) None of above


19. The probability of occurance of various letters of the English alphabet are given below. A=0.081 B=0.016 C=0.032 D=0.037 E=0.124 F=0.023 G=0.016 H=0.051 I=0.072 J=0.001 K=0.005 L=0.040 M=0.022 N=0.072 O=0.079 P=0.023 Q=0.002 R=0.060 S=0.066 T=0.096 U=0.031 V=0.009 W=0.020 X=0.002 Y=0.019 Z=0.001


Which Element Carries less amount of Information.

a) A

b) T

c) E

d) Q


20. A source of Information A generates the symbols {a1,a2,a3,a4,a5} with probabilities [0.4, 0.3, 0.15, 0.10, 0.05] respectively.what will be entropy for above source


a) H ≈ 1.5370 bits/symbol

b) H ≈ 2.0087 bits/symbol

c) H ≈ 1.2560 bits/symbol

d) H ≈ none of above


31. Which among the following represents the flawless hand-off with no perceivable interruption of service?

A)Hard hand-off   

B)Soft hand-off

C) Intracell hand-off             

 D)Intercell hand-off


32.Which method of cellular network assists in minimizing the co-channel interference associated with the angle of degree?

A) Cell Splitting       

B) Cell Segmentation & Dualization


C) Cell Sectoring     

D) Handoff


33. What is frequency reuse?

A)Process of selecting and allocating channels         

B)Process of selection of mobile users

C) Process of selecting frequency of mobile equipment        

D)Process of selection of number of cells


34.  In a cellular telephone system, which type of interference results from imperfect design of filters in receivers by allowing nearby frequencies to enter the receiver?


A) Co-channel Interference               

B)Adjacent-channel Interference

C) Equivance Interference 

D))None of the above


35. Which of the following is a universally adopted shape of cell?




” style=”color: rgb(0, 0, 0); font-family: “Times New Roman”; font-size: medium;”>” style=”color: rgb(0, 0, 0); font-family: “Times New Roman”; font-size: medium;”>


36. If the system is designed with the usage of hexagonal-shaped cells, how are the base-stations located?

A) At the corner of the cell               

B)  At the edge of cell

C)  At the centre of cell        

D)  All of the above


37. Why the shape of cell is not circle?

A)Overlapping regions or gaps are left         

B)Omni directionality

C)Complex design 

D)Small area


38. For a cellular system, if there are N cells and each cell is allocated k channel. What is the total number of available radio channels, S?

A) S=k*N   





39.What is a cluster in a cellular system?

A) Group of frequencies     

B)Group of cells

C)Group of subscribers      

D)Group of mobile systems


40. The spectrum of 30 M Hz Bandwidth divided into 50 KHz/duplex channels compute number of channel available per cell for 7 cell reuse


A)150 Channels/cell            

B)85 channels /cell

C)120 Channels/cell            

D)150 channels /cell


41. What is the responsibility of MSC in cellular telephone system?

A)Connection of mobile to base stations    

B)Connection of mobile to PSTN

C)Connection of base station to PSTN          

D)Connection of base station to MSC


42.Who has the responsibility of billing and system maintenance function in cellular system?

A)Base Station       




D)Mobile system


43. What is handoff?

A)Forward channel              

B)Switching technique


D)Guard channel


44. Which one is not an advantage of using frequency reuse?

A)Increased capacity           

B)Limited spectrum is required


C)Same spectrum may be allocated to other network          

D)Number of base stations is reduced


45. The interference between the neighbouring base stations is avoided by ____________

A)Assigning different group of channels      

B)Using transmitters with different power level

C)Using different antennas              

D)Using different base stations


46 . Roaming is feature of

A) Cellular Telephony          

B) Cellular End Caller

C) Cellular Signal    

D) Cellular Feature


47. In____________________ of cells we divide a group of channels into smaller groupings






48. It is the process of subdividing a congested cell into smaller cells,


B)Cell Splitting


D)Cell Sectoring


49. It is a method to increase capacity is to keep the cell radius unchanged and seek methods to decrease D/R ratio.






50. The Authentication Centre (AUC) provides authentication and encryption parameters that verify the user’s identity and ensure the confidentiality of each call.


” style=”color: rgb(0, 0, 0);”>” style=”color: rgb(0, 0, 0);”>” style=”color: rgb(0, 0, 0);”>” style=”color: rgb(0, 0, 0);”>


51.Which of the following is the world’s first cellular system to specify digital modulation and     network level architecture?


A) AMPS    





  52.GSM stands for ____________

A)Global system for mobile              

B)Groupe special mobile

C)Global special mobile     

D)Groupe system mobile


  53.Which of the following memory device stores information such as subscriber’s identification     number in GSM?

A) Register               

B)Flip flop




54.Which of the following does not come under subsystem of GSM architecture?






55.Which of the following subsystem provides radio transmission between mobile station and MSC?

A) BSS        


 C) OSS       



56. ___________ manages the switching function in GSM.






57. __________ supports the operation and maintenance of GSM.






58.The process of transferring a mobile station from one base station to another is

A) MSC       

B) Roamer

C) Hand off             

D)  Forward channel


59. In a ______ handoff, a mobile station only communicates with one base station.

A) Hard      



D)none of the above


60.In a ______ handoff, a mobile station can communicate with two base stations at the same time.

A) hard       


C) soft        

D) none of the above


61.Select incorrect options relate with CDMA.

A) Spread spectrum technology

B) Using same communication medium

C) Every user stays at a certain narrowband channel at a specific time period

D)  Each user has unique PN code


62.TDMA is a multiple access technique that has

A)  Different users in different time slots 

B) Each user is assigned unique frequency slots

C) Each user is assigned a unique code sequence 

D) Each signal is modulated with frequency modulation technique


63.The Authentication Centre (AUC) provides authentication and encryption parameters that verify the user’s identity and ensure the confidentiality of each call.

A) True       

B) False


64.US digital cellular system based on CDMA was standardized as ________

A) IS-54      






65.In CDMA the pseudo random code must have following property

A)It must be deterministic 

B)It must appear random to listener without prior knowledge

C)Code must have long period        

D)All the Above


66.CDMA Technology is inherently Resistant to

A) interference 

B) Jamming

C)both a & b       

D) None from given


67.The Capacity of CDMA is depends on

A)Power Control Accuracy            

B)Interference Power

C) Both a & b      

D)None from Given


68.Which Handoff work on principal of “Make before break”

A)Hard Handoff     

B)Soft handoff

C)Normal Handoff               

D) Regular Handoff


69.“ Break before Make” is true for __________________

A)Hard Handoff     

B)Soft handoff

C)Normal Handoff               

D)Regular Handoff


70. CDMA is advantageous over spreads spectrum techniques for

1.Privacy due to unique codes

2.It rejects narrow band interference

3.Resistance to Multipath fading

4.Its ability to frequency reuse

A)1,2 and 3 are correct       

B)1,2 and 3 are not correct

C)1 and 3 are correct         

D) All are correct