|
1 | | In __________ compression, the integrity of the data _____ preserved because compression and decompression algorithms are exact inverses of each other. |
| | A) | lossless; is |
| | B) | lossless; is not |
| | C) | lossy; is |
| | D) | lossy; is not |
|
|
|
2 | | Which of the following compression method is not lossless? |
| | A) | run-length coding |
| | B) | dictionary coding |
| | C) | arithmetic coding |
| | D) | predictive coding |
|
|
|
3 | | Lempel Ziv Welch (LZW) method is an example of ______________. |
| | A) | run-length coding |
| | B) | dictionary coding |
| | C) | arithmetic coding |
| | D) | predictive coding |
|
|
|
4 | | ______________ assigns shorter codes to symbols that occur more frequently and longer codes to those that occur less frequently. |
| | A) | run-length coding |
| | B) | dictionary coding |
| | C) | arithmetic coding |
| | D) | Huffman coding |
|
|
|
5 | | In arithmetic coding the entire message is mapped to a real number in the interval _________. |
| | A) | (0, 1) |
| | B) | [0, 1] |
| | C) | [0, 1) |
| | D) | (0, 1] |
|
|
|
6 | | Which of the following compression methods is considered as predictive coding? |
| | A) | DM |
| | B) | DPCM |
| | C) | LPC |
| | D) | All of the choices are correct. |
|
|
|
7 | | In ________, instead of quantizing each sample separately, the differences are quantized. |
| | A) | predictive coding |
| | B) | perceptual coding |
| | C) | transfer coding |
| | D) | pulse code modulation |
|
|
|
8 | | The adaptive DM (ADM) is used to solve the problem of _________ in DM. |
| | A) | a slowly growing original function |
| | B) | a fast growing original function |
| | C) | overload distortion or granular noise |
| | D) | All of the choices are correct. |
|
|
|
9 | | _______ can achieve a high level of compression and is normally used in military for compressing speech. The synthesized speech, though intelligible, lacks naturalness and quality to identify the speaker. |
| | A) | LCP |
| | B) | DPCM |
| | C) | ADM |
| | D) | ADPCM |
|
|
|
10 | | __________ coding is based on the science of psychoacoustics, which is the study of how people perceive sound. |
| | A) | predictive coding |
| | B) | perceptual coding |
| | C) | transfer coding |
| | D) | None of the choices are correct. |
|
|
|
11 | | Which step of transform coding used in multimedia is lossy? |
| | A) | transformation step |
| | B) | quantization step |
| | C) | reverse transformation step |
| | D) | All of the choices are correct. |
|
|
|
12 | | Since the square matrix that represents the DCT coefficient is an ____________ matrix, inverse and transpose are the same. |
| | A) | linear |
| | B) | square |
| | C) | orthogonal |
| | D) | symmetric |
|
|
|
13 | | ____________ is used to compress images. |
| | A) | MPEG |
| | B) | JPEG |
| | C) | MPEG or JPEG |
| | D) | None of the choices are correct. |
|
|
|
14 | | The first phase of JPEG compression process is ___________. |
| | A) | DCT transformation |
| | B) | quantization |
| | C) | lossless compression encoding |
| | D) | None of the choices are correct. |
|
|
|
15 | | The second phase of JPEG compression process is ___________. |
| | A) | DCT transformation |
| | B) | quantization |
| | C) | lossless compression encoding |
| | D) | None of the choices are correct. |
|
|
|
16 | | The third phase of JPEG is ___________. |
| | A) | DCT transformation |
| | B) | quantization |
| | C) | lossless compression encoding |
| | D) | None of the choices are correct. |
|
|
|
17 | | ____________ is used to compress video. |
| | A) | MPEG |
| | B) | JPEG |
| | C) | MPEG or JPEG |
| | D) | None of the choices are correct. |
|
|
|
18 | | In MPEG method, the ________ compression of each frame is done with JPEG; redundant frames are removed during _______ compression. |
| | A) | temporal; spatial |
| | B) | spatial; temporal |
| | C) | lossy; lossless |
| | D) | None of the choices are correct. |
|
|
|
19 | | ________ audio/video refers to on-demand requests for compressed audio/video files. |
| | A) | Streaming live |
| | B) | Streaming stored |
| | C) | Interactive |
| | D) | None of the choices are correct. |
|
|
|
20 | | ___________ audio/video refers to the broadcasting of radio and TV programs through the Internet. |
| | A) | Streaming live |
| | B) | Streaming stored |
| | C) | Interactive |
| | D) | None of the choices are correct. |
|
|
|
21 | | _________ audio/video refers to the use of the Internet for interactive audio/video applications. |
| | A) | Streaming live |
| | B) | Streaming stored |
| | C) | Interactive |
| | D) | None of the choices are correct. |
|
|
|
22 | | A ________ buffer is required for real-time traffic. |
| | A) | playback |
| | B) | reordering |
| | C) | sorting |
| | D) | None of the choices are correct. |
|
|
|
23 | | To establish time relationship and order of the packets, a real-time traffic needs __________ on each packet |
| | A) | only a timestamp |
| | B) | only a sequence number |
| | C) | both a timestamp and a sequence number |
| | D) | None of the choices are correct |
|
|
|
24 | | __________ means changing the encoding of a payload to a lower quality to match the bandwidth of the receiving network. |
| | A) | Translation |
| | B) | Mixing |
| | C) | Encoding |
| | D) | None of the choices are correct. |
|
|
|
25 | | __________ means combining several streams of traffic into one stream. |
| | A) | Translation |
| | B) | Mixing |
| | C) | Encoding |
| | D) | None of the choices are correct. |
|
|
|
26 | | To makeup for the lost and corrupt packets, the real-time traffic normally ____________. |
| | A) | retransmits the lost and corrupt packets |
| | B) | uses forward error correction (FEC) method |
| | C) | retransmits the whole traffic |
| | D) | None of the choices are correct. |
|
|
|
27 | | A real-time video performance lasts 10 min. If there is jitter in the system, the viewer spends _______ minutes watching the performance. |
| | A) | less than 10 |
| | B) | more than 10 |
| | C) | exactly 10 |
| | D) | None of the choices are correct. |
|
|
|
28 | | A _______ shows the time a packet was produced relative to the first or previous packet. |
| | A) | timestamp |
| | B) | playback buffer |
| | C) | sequence number |
| | D) | None of the choices are correct. |
|
|
|
29 | | _______ are used to number the packets of a real-time transmission. |
| | A) | Timestamps |
| | B) | Playback buffers |
| | C) | Sequence numbers |
| | D) | None of the choices are correct. |
|
|
|
30 | | A _______ adds signals from different sources to create a single composite signal. |
| | A) | timestamp |
| | B) | sequence number |
| | C) | mixer |
| | D) | None of the choices are correct. |
|
|
|
31 | | A _______ changes the format of a high-bandwidth video signal to a lower quality narrow-bandwidth signal. |
| | A) | timestamp |
| | B) | sequence number |
| | C) | translator |
| | D) | None of the choices are correct. |
|
|
|
32 | | _____ is an application layer protocol that establishes, manages, and terminates a multimedia session. |
| | A) | SIP |
| | B) | H.323 |
| | C) | RTP |
| | D) | None of the choices are correct. |
|
|
|
33 | | _____ is a standard designed by ITU to allow telephones on the public telephone network to talk to computers connected to the Internet. |
| | A) | SIP |
| | B) | H.323 |
| | C) | RTP |
| | D) | None of the choices are correct. |
|
|
|
34 | | _____ is not suitable for interactive multimedia traffic because we cannot allow retransmission of packets. |
| | A) | TCP |
| | B) | UDP |
| | C) | RTP |
| | D) | None of the choices are correct. |
|
|
|
35 | | __________ is the protocol designed to handle real-time traffic on the Internet. |
| | A) | TCP |
| | B) | UDP |
| | C) | RTP |
| | D) | None of the choices are correct. |
|
|
|
36 | | ___________ is a protocol for controlling the flow and quality of data in association with RTP. |
| | A) | SIP |
| | B) | RTCP |
| | C) | H.232 |
| | D) | None of the choices are correct. |
|
|
|
37 | | An RTP packet is encapsulated in _______. |
| | A) | a UDP user datagram |
| | B) | a TCP segment |
| | C) | an IP datagram |
| | D) | None of the choices are correct |
|
|
|
38 | | Stream Control Transmission Protocol (SCTP) is a new _____________ protocol. |
| | A) | reliable, character-oriented |
| | B) | reliable, message-oriented |
| | C) | unreliable, message-oriented |
| | D) | None of the choices are correct. |
|
|
|
39 | | SCTP allows __________ service in each association. |
| | A) | only single-stream |
| | B) | multistream |
| | C) | only double-stream |
| | D) | None of the choices are correct. |
|
|
|
40 | | SCTP association allows _____________ for each end. |
| | A) | only one IP address |
| | B) | multiple IP addresses |
| | C) | only two IP addresses |
| | D) | None of the choices are correct. |
|
|
|
41 | | In SCTP, a data chunk is numbered using ________. |
| | A) | a TSN |
| | B) | an SI |
| | C) | an SSN |
| | D) | None of the choices are correct. |
|
|
|
42 | | To distinguish between different streams, SCTP uses ___________. |
| | A) | a TSN |
| | B) | an SI |
| | C) | an SSN |
| | D) | None of the choices are correct |
|
|
|
43 | | To distinguish between different data chunks belonging to the same stream, SCTP uses ___________. |
| | A) | TSNs |
| | B) | SIs |
| | C) | SSNs |
| | D) | None of the choices are correct. |
|
|
|
44 | | TCP has ____________; SCTP has ____________. |
| | A) | packets; segments |
| | B) | packet; frames |
| | C) | segments; frames |
| | D) | None of the choices are correct. |
|
|
|
45 | | The control information in SCTP are carried in the ________. |
| | A) | header control field |
| | B) | control chunks |
| | C) | data chunks |
| | D) | None of the choices are correct. |
|
|
|
46 | | In SCTP, acknowledgment numbers are used to acknowledge _____________. |
| | A) | both data chunks and control chunks |
| | B) | only control chunks |
| | C) | only data chunks |
| | D) | None of the choices are correct |
|
|
|
47 | | In an SCTP packet, control chunks come ___________ data chunks. |
| | A) | after |
| | B) | before |
| | C) | between |
| | D) | None of the choices are correct. |
|
|
|
48 | | A connection in SCTP is called a(n) ____________. |
| | A) | negotiation |
| | B) | association |
| | C) | transmission |
| | D) | None of the choices are correct. |
|
|
|
49 | | Which of the following is not a characteristic attributed to a data flow? |
| | A) | reliability |
| | B) | delay |
| | C) | bandwidth |
| | D) | All choices are correct |
|
|
|
50 | | Which of the following method is used to improve QoS? |
| | A) | Scheduling |
| | B) | Resource reservation |
| | C) | Traffic shaping or policing |
| | D) | All choices are correct. |
|
|
|
51 | | Which of the following method is a scheduling technique? |
| | A) | FIFO queuing |
| | B) | priority queuing |
| | C) | weighted fair queuing |
| | D) | All choices are correct. |
|
|
|
52 | | A _______ algorithm is a policing technique that shapes bursty traffic into fixed-rate traffic by averaging the data rate, but it does not give credit to the user during idle periods. |
| | A) | leaky bucket |
| | B) | 2) token bucket |
| | C) | priority queuing |
| | D) | weighted fair queuing |
|
|
|
53 | | A _______ algorithm is a policing technique that allows bursty traffic at a regulated maximum rate and give some credits to the user during idle periods. |
| | A) | leaky bucket |
| | B) | token bucket |
| | C) | priority queuing |
| | D) | weighted fair queuing |
|
|
|
54 | | Which QoS model depends heavily on resource reservation?. |
| | A) | IntServ |
| | B) | DiffServ |
| | C) | Scheduling |
| | D) | Policing |
|
|
|
55 | | Integrated Services is a _______________ QoS model designed for IP. |
| | A) | flow-based |
| | B) | class-based |
| | C) | reliability-based |
| | D) | efficiency-based |
|
|
|
56 | | Differentiated Services is a _______________ QoS model designed for IP. |
| | A) | flow-based |
| | B) | class-based |
| | C) | reliability-based |
| | D) | efficiency-based |
|
|
|
57 | | Guaranteed services in IntServ model are required for __________ application |
| | A) | on-demand audio/video |
| | B) | stored audio/video |
| | C) | real-time |
| | D) | All choices are correct |
|
|
|
58 | | Controlled-Load services in IntServ model is designed for applications that ______________________. |
| | A) | can accept some delays, but are sensitive to packet loss |
| | B) | can accept some packet loss, but are sensitive to delay |
| | C) | are sensitive to both delay and packet loss |
| | D) | are sensitive to neither delay nor packet loss |
|
|
|
59 | | IntServ model is ________________________________________ |
| | A) | scalable but has service type limitation. |
| | B) | scalable and does not have service type limitation. |
| | C) | not scalable and has service type limitation. |
| | D) | not scalable but does not have service type limitation. |
|
|
|
60 | | To implement _________, the DS node uses _________________ such as meters, markers, shapers, and droppers |
| | A) | Diffserv; traffic conditioners |
| | B) | Diffserv; gadgets |
| | C) | IntServ; traffic conditioners |
| | D) | IntServ; gadgets |
|
|