1. The unit of average mutual information is

a)Bits

b) Bytes

c) Bits per symbol

d) Bytes per symbol

2. The method of converting a word to stream of bits is called as

a) Binary coding

b) Source coding

c) Bit coding

d) Cipher coding

3 When the base of the logarithm is 2, then the unit of measure of information is

a) Bits

b) Bytes

c) Nats

d) Hertz

4 The channel capacity is

a. The maximum information transmitted by one symbol over the channel

b. Information contained in a signal

c. The amplitude of the modulated signal

d. All of the above

5. According to Shannon Hartley theorem,

a. The channel capacity becomes infinite with infinite bandwidth

b. The channel capacity does not become infinite with infinite bandwidth

c. Has a tradeoff between bandwidth and Signal to noise ratio

d. Both b and c are correct

6. Information rate is defined as

a. Information per unit time

b. Average number of bits of information per second

c. rH

d. All of the above

7. Entropy is

a. Average information per message

b. Information in a signal

c. Amplitude of signal

d. All of the above

8. The information I contained in a message with probability of occurrence is given by (k is constant)

a. I = k log21/P

b. I = k log2P

c. I = k log21/2P

d. I = k log21/P2

9. A discrete source emits one of 5 symbols once every scond. The symbol Probabilities are ½,1/4,1/8,1/16,1/16 respectively. What is the source entropy near to.

a. 1.875 bits/symbol

b. !.875 bits

c. 1.895 symbol

d. None

10. Out of following which is not Block of Digital Communication System

a) Source Encoder

b) Channel Encoder

c) Modulator

d) Sequence Amplifier

11. How amount of Information is get Calculated in bits

a) log21/P

b) log21/P2

c) log21/P2

d) None from Above

12. Select correct entropy for the source that emits one of three possible symbols A,B and C in a statistically independent sequence with probabilities ½,1/4,1/4.

a) 1.5 bits/Symbol

b) 2.8 bits

c) 15 bytes

d) 15 bytes /sym

13. The technique that may be used to increase average information per bit is

a. Shannon-Fano algorithm

b. ASK

c. FSK

d. Digital modulation techniques

14.  Which is the correct expression for code efficiency in terms of entropy.

a) Code efficiency = Average code word length(N)/Entropy(H)

b) Code efficiency = Entropy(H) / 2*Average code word length(N)

c) Code efficiency = Entropy(H) / Average code word length(N)

d) None from Above

15.  What is correct formula to calculate information rate.

a) R = r H bits / sec b) R=sI bits

c) R= sH

d) H=sR

“>“>

16.  For Shannon FANO coding scheme which of following steps is correct: Step 1: List the source symbols in order of decreasing probability. Step 2: Partition the set into two sets that are as close to equiprobable as possible, and sign 0 to the upper set and 1 to the lower set. Step: Continue this process, each time partitioning the sets with as nearly equal probabilities as possible until further partitioning is not possible.

a) Only 1

b) Only 2

c) Both 1 and 2

d) All are correct

17. In which block of Digital Communication system coding is performed

a) Discrete Information source

b) Source Decoder

c) Channel Encoder

d) Modulator

18. Select proper unit for Joint Entropy of Source

a) Bits/Sequence

b) Bits/Symbol

c) bits

d) None of above

19. The probability of occurance of various letters of the English alphabet are given below. A=0.081 B=0.016 C=0.032 D=0.037 E=0.124 F=0.023 G=0.016 H=0.051 I=0.072 J=0.001 K=0.005 L=0.040 M=0.022 N=0.072 O=0.079 P=0.023 Q=0.002 R=0.060 S=0.066 T=0.096 U=0.031 V=0.009 W=0.020 X=0.002 Y=0.019 Z=0.001

Which Element Carries less amount of Information.

a) A

b) T

c) E

d) Q

20. A source of Information A generates the symbols {a1,a2,a3,a4,a5} with probabilities [0.4, 0.3, 0.15, 0.10, 0.05] respectively.what will be entropy for above source

a) H ≈ 1.5370 bits/symbol

b) H ≈ 2.0087 bits/symbol

c) H ≈ 1.2560 bits/symbol

d) H ≈ none of above

31. Which among the following represents the flawless hand-off with no perceivable interruption of service?

A)Hard hand-off

B)Soft hand-off

C) Intracell hand-off

D)Intercell hand-off

32.Which method of cellular network assists in minimizing the co-channel interference associated with the angle of degree?

A) Cell Splitting

B) Cell Segmentation & Dualization

C) Cell Sectoring

D) Handoff

33. What is frequency reuse?

A)Process of selecting and allocating channels

B)Process of selection of mobile users

C) Process of selecting frequency of mobile equipment

D)Process of selection of number of cells

34.  In a cellular telephone system, which type of interference results from imperfect design of filters in receivers by allowing nearby frequencies to enter the receiver?

A) Co-channel Interference

B)Adjacent-channel Interference

C) Equivance Interference

D))None of the above

35. Which of the following is a universally adopted shape of cell?

A)Square

B)Circle

C)Triangle

” style=”color: rgb(0, 0, 0); font-family: “Times New Roman”; font-size: medium;”>” style=”color: rgb(0, 0, 0); font-family: “Times New Roman”; font-size: medium;”>

D)Hexagon

36. If the system is designed with the usage of hexagonal-shaped cells, how are the base-stations located?

A) At the corner of the cell

B)  At the edge of cell

C)  At the centre of cell

D)  All of the above

37. Why the shape of cell is not circle?

A)Overlapping regions or gaps are left

B)Omni directionality

C)Complex design

D)Small area

38. For a cellular system, if there are N cells and each cell is allocated k channel. What is the total number of available radio channels, S?

A) S=k*N

B)S=k/N

C)S=N/k

D)S=kN

39.What is a cluster in a cellular system?

A) Group of frequencies

B)Group of cells

C)Group of subscribers

D)Group of mobile systems

40. The spectrum of 30 M Hz Bandwidth divided into 50 KHz/duplex channels compute number of channel available per cell for 7 cell reuse

A)150 Channels/cell

B)85 channels /cell

C)120 Channels/cell

D)150 channels /cell

41. What is the responsibility of MSC in cellular telephone system?

A)Connection of mobile to base stations

B)Connection of mobile to PSTN

C)Connection of base station to PSTN

D)Connection of base station to MSC

42.Who has the responsibility of billing and system maintenance function in cellular system?

A)Base Station

B)PSTN

C)MSC

D)Mobile system

43. What is handoff?

A)Forward channel

B)Switching technique

C)Roamer

D)Guard channel

44. Which one is not an advantage of using frequency reuse?

A)Increased capacity

B)Limited spectrum is required

C)Same spectrum may be allocated to other network

D)Number of base stations is reduced

45. The interference between the neighbouring base stations is avoided by ____________

A)Assigning different group of channels

B)Using transmitters with different power level

C)Using different antennas

D)Using different base stations

46 . Roaming is feature of

A) Cellular Telephony

B) Cellular End Caller

C) Cellular Signal

D) Cellular Feature

47. In____________________ of cells we divide a group of channels into smaller groupings

A)Segmentation

B)Dualization

C)Handoff

D)Roaming

48. It is the process of subdividing a congested cell into smaller cells,

A)Dualization

B)Cell Splitting

C)Segmentation

D)Cell Sectoring

49. It is a method to increase capacity is to keep the cell radius unchanged and seek methods to decrease D/R ratio.

A)Handoff

B)Cell

C)Sectoring

D)Dualization

50. The Authentication Centre (AUC) provides authentication and encryption parameters that verify the user’s identity and ensure the confidentiality of each call.

A)TRUE

” style=”color: rgb(0, 0, 0);”>” style=”color: rgb(0, 0, 0);”>” style=”color: rgb(0, 0, 0);”>” style=”color: rgb(0, 0, 0);”>

B)False

51.Which of the following is the world’s first cellular system to specify digital modulation and     network level architecture?

A) AMPS

B)GSM

C)IS-54

D)CDMA

52.GSM stands for ____________

A)Global system for mobile

B)Groupe special mobile

C)Global special mobile

D)Groupe system mobile

53.Which of the following memory device stores information such as subscriber’s identification     number in GSM?

A) Register

B)Flip flop

C)SMS

D)SIM

54.Which of the following does not come under subsystem of GSM architecture?

A)BSS

B)Channel

C)NSS

D)OSS

55.Which of the following subsystem provides radio transmission between mobile station and MSC?

A) BSS

B)  NSS

C) OSS

D)BSC

56. ___________ manages the switching function in GSM.

A)BSS

B)NSS

C)OSS

D)MSC

57. __________ supports the operation and maintenance of GSM.

A)MSC

B)NSS

C)OSS

D)BSS

58.The process of transferring a mobile station from one base station to another is

A) MSC

B) Roamer

C) Hand off

D)  Forward channel

59. In a ______ handoff, a mobile station only communicates with one base station.

A) Hard

B)soft

C)medium

D)none of the above

60.In a ______ handoff, a mobile station can communicate with two base stations at the same time.

A) hard

B)Medium

C) soft

D) none of the above

61.Select incorrect options relate with CDMA.

A) Spread spectrum technology

B) Using same communication medium

C) Every user stays at a certain narrowband channel at a specific time period

D)  Each user has unique PN code

62.TDMA is a multiple access technique that has

A)  Different users in different time slots

B) Each user is assigned unique frequency slots

C) Each user is assigned a unique code sequence

D) Each signal is modulated with frequency modulation technique

63.The Authentication Centre (AUC) provides authentication and encryption parameters that verify the user’s identity and ensure the confidentiality of each call.

A) True

B) False

64.US digital cellular system based on CDMA was standardized as ________

A) IS-54

B)IS-136

C)IS-95

D)IS-76

65.In CDMA the pseudo random code must have following property

A)It must be deterministic

B)It must appear random to listener without prior knowledge

C)Code must have long period

D)All the Above

66.CDMA Technology is inherently Resistant to

A) interference

B) Jamming

C)both a & b

D) None from given

67.The Capacity of CDMA is depends on

A)Power Control Accuracy

B)Interference Power

C) Both a & b

D)None from Given

68.Which Handoff work on principal of “Make before break”

A)Hard Handoff

B)Soft handoff

C)Normal Handoff

D) Regular Handoff

69.“ Break before Make” is true for __________________

A)Hard Handoff

B)Soft handoff

C)Normal Handoff

D)Regular Handoff

70. CDMA is advantageous over spreads spectrum techniques for

1.Privacy due to unique codes

2.It rejects narrow band interference

3.Resistance to Multipath fading

4.Its ability to frequency reuse

A)1,2 and 3 are correct

B)1,2 and 3 are not correct

C)1 and 3 are correct

D) All are correct