Site MapHelpFeedbackQuizzes
Quizzes
(See related pages)

1
In __________ compression, the integrity of the data _____ preserved because compression and decompression algorithms are exact inverses of each other.
A)lossless; is
B)lossless; is not
C)lossy; is
D)lossy; is not
2
Which of the following compression method is not lossless?
A)run-length coding
B)dictionary coding
C)arithmetic coding
D)predictive coding
3
Lempel Ziv Welch (LZW) method is an example of ______________.
A)run-length coding
B)dictionary coding
C)arithmetic coding
D)predictive coding
4
______________ assigns shorter codes to symbols that occur more frequently and longer codes to those that occur less frequently.
A)run-length coding
B)dictionary coding
C)arithmetic coding
D)Huffman coding
5
In arithmetic coding the entire message is mapped to a real number in the interval _________.
A)(0, 1)
B)[0, 1]
C)[0, 1)
D)(0, 1]
6
Which of the following compression methods is considered as predictive coding?
A)DM
B)DPCM
C)LPC
D)All of the choices are correct.
7
In ________, instead of quantizing each sample separately, the differences are quantized.
A)predictive coding
B)perceptual coding
C)transfer coding
D)pulse code modulation
8
The adaptive DM (ADM) is used to solve the problem of _________ in DM.
A)a slowly growing original function
B)a fast growing original function
C)overload distortion or granular noise
D)All of the choices are correct.
9
_______ can achieve a high level of compression and is normally used in military for compressing speech. The synthesized speech, though intelligible, lacks naturalness and quality to identify the speaker.
A)LCP
B)DPCM
C)ADM
D)ADPCM
10
__________ coding is based on the science of psychoacoustics, which is the study of how people perceive sound.
A)predictive coding
B)perceptual coding
C)transfer coding
D)None of the choices are correct.
11
Which step of transform coding used in multimedia is lossy?
A)transformation step
B)quantization step
C)reverse transformation step
D)All of the choices are correct.
12
Since the square matrix that represents the DCT coefficient is an ____________ matrix, inverse and transpose are the same.
A)linear
B)square
C)orthogonal
D)symmetric
13
____________ is used to compress images.
A)MPEG
B)JPEG
C)MPEG or JPEG
D)None of the choices are correct.
14
The first phase of JPEG compression process is ___________.
A)DCT transformation
B)quantization
C)lossless compression encoding
D)None of the choices are correct.
15
The second phase of JPEG compression process is ___________.
A)DCT transformation
B)quantization
C)lossless compression encoding
D)None of the choices are correct.
16
The third phase of JPEG is ___________.
A)DCT transformation
B)quantization
C)lossless compression encoding
D)None of the choices are correct.
17
____________ is used to compress video.
A)MPEG
B)JPEG
C)MPEG or JPEG
D)None of the choices are correct.
18
In MPEG method, the ________ compression of each frame is done with JPEG; redundant frames are removed during _______ compression.
A)temporal; spatial
B)spatial; temporal
C)lossy; lossless
D)None of the choices are correct.
19
________ audio/video refers to on-demand requests for compressed audio/video files.
A)Streaming live
B)Streaming stored
C)Interactive
D)None of the choices are correct.
20
___________ audio/video refers to the broadcasting of radio and TV programs through the Internet.
A)Streaming live
B)Streaming stored
C)Interactive
D)None of the choices are correct.
21
_________ audio/video refers to the use of the Internet for interactive audio/video applications.
A)Streaming live
B)Streaming stored
C)Interactive
D)None of the choices are correct.
22
A ________ buffer is required for real-time traffic.
A)playback
B)reordering
C)sorting
D)None of the choices are correct.
23
To establish time relationship and order of the packets, a real-time traffic needs __________ on each packet
A)only a timestamp
B)only a sequence number
C)both a timestamp and a sequence number
D)None of the choices are correct
24
__________ means changing the encoding of a payload to a lower quality to match the bandwidth of the receiving network.
A)Translation
B)Mixing
C)Encoding
D)None of the choices are correct.
25
__________ means combining several streams of traffic into one stream.
A)Translation
B)Mixing
C)Encoding
D)None of the choices are correct.
26
To makeup for the lost and corrupt packets, the real-time traffic normally ____________.
A)retransmits the lost and corrupt packets
B)uses forward error correction (FEC) method
C)retransmits the whole traffic
D)None of the choices are correct.
27
A real-time video performance lasts 10 min. If there is jitter in the system, the viewer spends _______ minutes watching the performance.
A)less than 10
B)more than 10
C)exactly 10
D)None of the choices are correct.
28
A _______ shows the time a packet was produced relative to the first or previous packet.
A)timestamp
B)playback buffer
C)sequence number
D)None of the choices are correct.
29
_______ are used to number the packets of a real-time transmission.
A)Timestamps
B)Playback buffers
C)Sequence numbers
D)None of the choices are correct.
30
A _______ adds signals from different sources to create a single composite signal.
A)timestamp
B)sequence number
C)mixer
D)None of the choices are correct.
31
A _______ changes the format of a high-bandwidth video signal to a lower quality narrow-bandwidth signal.
A)timestamp
B)sequence number
C)translator
D)None of the choices are correct.
32
_____ is an application layer protocol that establishes, manages, and terminates a multimedia session.
A)SIP
B)H.323
C)RTP
D)None of the choices are correct.
33
_____ is a standard designed by ITU to allow telephones on the public telephone network to talk to computers connected to the Internet.
A)SIP
B)H.323
C)RTP
D)None of the choices are correct.
34
_____ is not suitable for interactive multimedia traffic because we cannot allow retransmission of packets.
A)TCP
B)UDP
C)RTP
D)None of the choices are correct.
35
__________ is the protocol designed to handle real-time traffic on the Internet.
A)TCP
B)UDP
C)RTP
D)None of the choices are correct.
36
___________ is a protocol for controlling the flow and quality of data in association with RTP.
A)SIP
B)RTCP
C)H.232
D)None of the choices are correct.
37
An RTP packet is encapsulated in _______.
A)a UDP user datagram
B)a TCP segment
C)an IP datagram
D)None of the choices are correct
38
Stream Control Transmission Protocol (SCTP) is a new _____________ protocol.
A)reliable, character-oriented
B)reliable, message-oriented
C)unreliable, message-oriented
D)None of the choices are correct.
39
SCTP allows __________ service in each association.
A)only single-stream
B)multistream
C)only double-stream
D)None of the choices are correct.
40
SCTP association allows _____________ for each end.
A)only one IP address
B)multiple IP addresses
C)only two IP addresses
D)None of the choices are correct.
41
In SCTP, a data chunk is numbered using ________.
A)a TSN
B)an SI
C)an SSN
D)None of the choices are correct.
42
To distinguish between different streams, SCTP uses ___________.
A)a TSN
B)an SI
C)an SSN
D)None of the choices are correct
43
To distinguish between different data chunks belonging to the same stream, SCTP uses ___________.
A)TSNs
B)SIs
C)SSNs
D)None of the choices are correct.
44
TCP has ____________; SCTP has ____________.
A)packets; segments
B)packet; frames
C)segments; frames
D)None of the choices are correct.
45
The control information in SCTP are carried in the ________.
A)header control field
B)control chunks
C)data chunks
D)None of the choices are correct.
46
In SCTP, acknowledgment numbers are used to acknowledge _____________.
A)both data chunks and control chunks
B)only control chunks
C)only data chunks
D)None of the choices are correct
47
In an SCTP packet, control chunks come ___________ data chunks.
A)after
B)before
C)between
D)None of the choices are correct.
48
A connection in SCTP is called a(n) ____________.
A)negotiation
B)association
C)transmission
D)None of the choices are correct.
49
Which of the following is not a characteristic attributed to a data flow?
A)reliability
B)delay
C)bandwidth
D)All choices are correct
50
Which of the following method is used to improve QoS?
A)Scheduling
B)Resource reservation
C)Traffic shaping or policing
D)All choices are correct.
51
Which of the following method is a scheduling technique?
A)FIFO queuing
B)priority queuing
C)weighted fair queuing
D)All choices are correct.
52
A _______ algorithm is a policing technique that shapes bursty traffic into fixed-rate traffic by averaging the data rate, but it does not give credit to the user during idle periods.
A)leaky bucket
B)2) token bucket
C)priority queuing
D)weighted fair queuing
53
A _______ algorithm is a policing technique that allows bursty traffic at a regulated maximum rate and give some credits to the user during idle periods.
A)leaky bucket
B)token bucket
C)priority queuing
D)weighted fair queuing
54
Which QoS model depends heavily on resource reservation?.
A)IntServ
B)DiffServ
C)Scheduling
D)Policing
55
Integrated Services is a _______________ QoS model designed for IP.
A)flow-based
B)class-based
C)reliability-based
D)efficiency-based
56
Differentiated Services is a _______________ QoS model designed for IP.
A)flow-based
B)class-based
C)reliability-based
D)efficiency-based
57
Guaranteed services in IntServ model are required for __________ application
A)on-demand audio/video
B)stored audio/video
C)real-time
D)All choices are correct
58
Controlled-Load services in IntServ model is designed for applications that ______________________.
A)can accept some delays, but are sensitive to packet loss
B)can accept some packet loss, but are sensitive to delay
C)are sensitive to both delay and packet loss
D)are sensitive to neither delay nor packet loss
59
IntServ model is ________________________________________
A)scalable but has service type limitation.
B)scalable and does not have service type limitation.
C)not scalable and has service type limitation.
D)not scalable but does not have service type limitation.
60
To implement _________, the DS node uses _________________ such as meters, markers, shapers, and droppers
A)Diffserv; traffic conditioners
B)Diffserv; gadgets
C)IntServ; traffic conditioners
D)IntServ; gadgets







Computer NetworksOnline Learning Center

Home > Chapter 8 > Quizzes