0

STEM for Communication: Exploring the Science, Technology, Engineering, and Mathematics of Communication Technologies

Description: STEM for Communication: Exploring the Science, Technology, Engineering, and Mathematics of Communication Technologies
Number of Questions: 15
Created by:
Tags: stem communication science technology engineering mathematics
Attempted 0/15 Correct 0 Score 0

Which of the following is NOT a component of a communication system?

  1. Transmitter

  2. Receiver

  3. Channel

  4. Noise


Correct Option: D
Explanation:

Noise is not a component of a communication system, but rather an unwanted disturbance that can interfere with the transmission of information.

What is the process of converting an analog signal into a digital signal called?

  1. Digitization

  2. Quantization

  3. Sampling

  4. Encoding


Correct Option: A
Explanation:

Digitization is the process of converting an analog signal into a digital signal, which involves sampling, quantization, and encoding.

Which of the following is NOT a type of modulation?

  1. Amplitude Modulation (AM)

  2. Frequency Modulation (FM)

  3. Phase Modulation (PM)

  4. Pulse Code Modulation (PCM)


Correct Option: D
Explanation:

Pulse Code Modulation (PCM) is a digital modulation technique, while Amplitude Modulation (AM), Frequency Modulation (FM), and Phase Modulation (PM) are analog modulation techniques.

What is the maximum data rate that can be transmitted over a channel with a given bandwidth called?

  1. Shannon Capacity

  2. Nyquist Rate

  3. Baud Rate

  4. Bit Rate


Correct Option: A
Explanation:

Shannon Capacity is the maximum data rate that can be transmitted over a channel with a given bandwidth, as determined by Claude Shannon's mathematical theory of communication.

Which of the following is NOT a type of network topology?

  1. Star

  2. Bus

  3. Ring

  4. Mesh


Correct Option: D
Explanation:

Mesh is not a type of network topology, but rather a type of network architecture in which each node is connected to every other node.

What is the process of dividing a message into smaller units for transmission called?

  1. Segmentation

  2. Fragmentation

  3. Packetization

  4. Encapsulation


Correct Option: C
Explanation:

Packetization is the process of dividing a message into smaller units for transmission, also known as packets.

Which of the following is NOT a type of error control technique?

  1. Forward Error Correction (FEC)

  2. Automatic Repeat Request (ARQ)

  3. Checksum

  4. Parity Check


Correct Option: C
Explanation:

Checksum is not a type of error control technique, but rather a method for detecting errors in data transmission.

What is the process of converting a digital signal into an analog signal called?

  1. Demodulation

  2. Decoding

  3. Reconstruction

  4. Digitization


Correct Option: A
Explanation:

Demodulation is the process of converting a digital signal into an analog signal, which is the opposite of modulation.

Which of the following is NOT a type of multiplexing?

  1. Frequency Division Multiplexing (FDM)

  2. Time Division Multiplexing (TDM)

  3. Wavelength Division Multiplexing (WDM)

  4. Code Division Multiplexing (CDM)


Correct Option: D
Explanation:

Code Division Multiplexing (CDM) is not a type of multiplexing, but rather a spread spectrum technique used in wireless communication.

What is the process of assigning a unique address to each device on a network called?

  1. Addressing

  2. Routing

  3. Switching

  4. Forwarding


Correct Option: A
Explanation:

Addressing is the process of assigning a unique address to each device on a network, which allows for the identification and communication between devices.

Which of the following is NOT a type of network protocol?

  1. Transmission Control Protocol (TCP)

  2. Internet Protocol (IP)

  3. Hypertext Transfer Protocol (HTTP)

  4. File Transfer Protocol (FTP)


Correct Option: C
Explanation:

Hypertext Transfer Protocol (HTTP) is not a type of network protocol, but rather an application protocol used for transferring web pages and files over the World Wide Web.

What is the process of establishing a connection between two devices on a network called?

  1. Handshake

  2. Authentication

  3. Authorization

  4. Encryption


Correct Option: A
Explanation:

Handshake is the process of establishing a connection between two devices on a network, which involves the exchange of control information to negotiate the parameters of the connection.

Which of the following is NOT a type of network security threat?

  1. Malware

  2. Phishing

  3. Spam

  4. DDoS Attack


Correct Option: C
Explanation:

Spam is not a type of network security threat, but rather an unwanted electronic message, typically advertising a product or service.

What is the process of protecting data from unauthorized access or modification called?

  1. Encryption

  2. Decryption

  3. Authentication

  4. Authorization


Correct Option: A
Explanation:

Encryption is the process of protecting data from unauthorized access or modification by converting it into a form that is unintelligible without the appropriate key.

Which of the following is NOT a type of wireless communication technology?

  1. Wi-Fi

  2. Bluetooth

  3. Cellular

  4. Satellite


Correct Option: D
Explanation:

Satellite is not a type of wireless communication technology, but rather a type of communication system that uses satellites to transmit and receive signals.

- Hide questions