Home
MCQS
Electrical measurements MCQ Quiz Hub
Digital Communications MCQs set-14
Choose a topic to test your knowledge and improve your Electrical measurements skills
1. In digital communication, interaction between ______ is possible.
Any layer to layer
One layer to next layer
layers
None of the mentioned
2. Some advantages of spread spectrum are
Low susceptibility
Immunity to jamming
Reduced interference
All of the mentioned
3. Processing gain is the ratio of message bandwidth to signal bandwidth.
True
False
4. Which is better for avoiding jamming?
Direct sequence spread spectrum
Frequency hopping spread spectrum
Time hopping spread spectrum
None of the mentioned
5. Which is more bandwidth efficient?
Direct sequence spread spectrum
Frequency hopping spread spectrum
Time hopping spread spectrum
None of the mentioned
6. Which is more simpler to implement?
Direct sequence spread spectrum
Frequency hopping spread spectrum
Time hopping spread spectrum
None of the mentioned
7. Which uses orthogonal codes?
Synchronous CDMA
Asynchronous CDMA
Synchronous & Asynchronous CDMA
None of the mentioned
8. Which is more suitable when large number of transmitters are used?
Synchronous CDMA
Asynchronous CDMA
Synchronous & Asynchronous CDMA
None of the mentioned
9. CDMA rejects
Narrow band interference
Wide band interference
Narrow & Wide band interference
None of the mentioned
10. Frequency planning is very essential in
FDMA
TDMA
FDMA & TDMA
None of the mentioned
11. CDMA uses
Hard hand off
Soft hand off
Hard & Soft hand off
None of the mentioned
12. In public key cryptosystem _____ keys are used for encryption and decryption.
Same
Different
Encryption Keys
None of the mentioned
13. In public key cryptosystem which is kept as public?
Encryption keys
Decryption keys
Encryption & Decryption keys
None of the mentioned
14. In a trapdoor function, the functions are easy to go in
One direction
Two directions
All directions
None of the mentioned
15. Pretty good privacy program is used for
Electronic mails
File encryption
Electronic mails & File encryption
None of the mentioned
16. PGP system uses
Private key system
Public key system
Private & Public key system
None of the mentioned
17. Private key algorithm is used for _____ encryption and public key algorithm is used for _____ encryption.
Messages, session key
Session key, messages
Can be used for both
None of the mentioned
18. Which are called the block ciphers?
IDEA
CAST
Triple-DES
All of the mentioned
19. Which has a key length of 128 bits?
IDEA
Triple-DES
IDEA & Triple-DES
None of the mentioned
20. Which algorithm can be used to sign a message?
Public key algorithm
Private key algorithm
Public & Private key algorithm
None of the mentioned
21. Examples of hash functions are
MD5
SHA-1
MD5 & SHA-1
None of the mentioned
22. A cryptographic hash function has variable output length.
True
False
23. A set of numbers is called as super increasing if
Each element is greater than previous element
Each element greater than sum of all the previous elements
Each element greater than the average of all elements
Each element lesser than the sum of all the elements
24. Knapsack problem can be solved by
Public key cryptosystem
Private key cryptosystem
Public & Private key cryptosystem
None of the mentioned
25. Merkle hellman is a symmetric cryptosystem.
True
False
26. In this Merkle Hellman method same key is used for encryption and decryption.
True
False
27. Cipher system can be solved effectively by statistically using
Time of occurrence
Frequency of occurrence
Length of the message
None of the mentioned
28. Encryption transformations are known as
Diffusion
Confusion
Diffusion & Confusion
None of the mentioned
29. For n input bits the number of substitution patterns are
2n
(2n)!
1/2n!
2n!
30. In transposition, the plaintext letters are
Substituted
Rearranged
Removed
None of the mentioned
31. The substitution of the letters are done
Serially
Parallel way
Serially & Parallel way
None of the mentioned
32. In cipher feedback method, encryption is done on
Single individual bits
Characters
Single individual bits & Characters
None of the mentioned
33. In stream encryption, the key sequence repeats itself.
True
False
34. In which method, key-stream is generated independently?
Synchronous
Self synchronous
Synchronous & Self synchronous
None of the mentioned
35. Synchronous ciphers uses
Confusion
Diffusion
Confusion & Diffusion
None of the mentioned
36. Public key cryptosystem uses same key for both encryption and decryption.
True
False
37. Which should be kept as a secret in public key cryptosystem?
Encryption key
Decryption key
Encryption & Decryption key
None of the mentioned
38. Public key cryptosystem is also known as
One way function
Two way function
Feedback function
None of the mentioned
39. Euler’s totient function is determined by
pq
(p-1)(q-1)
(p+1)(q+1)
p/q
40. Pretty good privacy (PGP) security system uses
Public key cryptosystem
Private key cryptosystem
Public & Private key cryptosystem
None of the mentioned
41. Public key cryptosystem is used for the encryption of
Messages
Session key
Session key & Messages
None of the mentioned
42. For digital signatures private key cryptosystem is used.
True
False
43. Data compression includes
Removal of redundant character
Uniform distribution of characters
Removal of redundant character & Uniform distribution of characters
None of the mentioned
44. PGP offers _____ block ciphers for message encryption.
Triple-DES
CAST
IDEA
All of the mentioned
45. Which block cipher has key length of 128 bits?
IDEA
CAST
IDEA & CAST
None of the mentioned
46. These three ciphers can operate of ______ of plaintext and cipher text.
128 bit blocks
64 bit blocks
256 bit blocks
156 bit blocks
47. The key size of DES is
56 bits
64 bits
128 bits
168 bits
48. Which operation is used in encryption using IDEA?
Addition modulo 216
Bit wise XOR
Addition modulo 216 & Bit wise XOR
None of the mentioned
49. What is the key size allowed in PGP?
1024-1056
1024-4056
1024-4096
1024-2048
50. Which algorithm is used for public key encryption?
RSA
Diffie-Hellman
RSA & Diffie-Hellman
None of the mentioned
Submit