Download presentation
Presentation is loading. Please wait.
Published byWilfred Norman Modified over 8 years ago
1
Information and Communication Technologies T209-A Review Session Prepared By: Dr. Abdulrahman Awadhi B.Sc., Ph.D. a.awadhi@aou.org.bh
2
Information and Communication Technologies Exam Paper Structure This exam is composed of 4 parts. Part I: True and False: –This part consists of 30 questions carrying a WEIGHT OF 0.5 marks each. You must answer ALL. Part II: Multiple Choices: –This part consists of 15 questions carrying a WEIGHT OF 1 mark each. You must answer ALL. Part III: Short essay questions: –This part consists of 10 questions carrying a WEIGHT OF 3 marks each. You must answer ALL. Part IV: Longer problems: –This part consists of 8 questions carrying a WEIGHT OF 5 marks each. You must answer ALL.
3
Information and Communication Technologies Note: The following questions and answers are examples on the structure of the final exam. These are not exact or part of the formal final exam. These slides are not covering all the topics which will be included in the exam. Final exam will cover all materials from modules 1,2 and 3. CD T529 also included in the exam.
4
Information and Communication Technologies Part 1: Answer the following True/False statements (put T or F answers in the brackets): 2.5G is an intermediate status between the second generation and the third generation mobile phone systems. Answer [T] A bridge divides a LAN into separate collision domains. Answer [T]
5
Information and Communication Technologies 8-bit binary equivalent of denary 68 is 01111111. Answer [F] 3G cellular phone systems use FDMA technology. Answer [F] The RAD Action object is equivalent to the I/O symbol in the flowchart. Answer [F]
6
Information and Communication Technologies The Generic Object symbol in RAD is used for TtS synthesis. Answer [T] The term knowledge can be defined as information coded for subsequent processing, generally by a computer. Answer [F]
7
Information and Communication Technologies Part 2: Read all the answers and circle the most correct statement: The ______ attempts to explore the physical aspect of ICT system to enable users to manipulate them in ways that are more similar to the ways in which we interact with one another and with the objects in the real world A.virtual reality B.augmented reality C.visual reality D.physical reality E.none of the above Answer B
8
Information and Communication Technologies the CSLU Toolkit is classed as an ________ recognition system A.continuous-speech B.speaker-dependent C.speaker-enrolment D.speaker-independent E.none of the above Answer D
9
Information and Communication Technologies suppose that we have a signal with amplitude = 2.5 and the frequency = 30 Hz. Then the sinewave expression of this signal is : A.x = 5 sin (20 л t) B.x = 2.5 sin (30 л t) C.x = 2.5 sin (60 л t) D.x = 5 sin (40 л t) E.none of the above Answer C
10
Information and Communication Technologies the Arabic language comprises ____________ different phonemes A.42 B.28 C.100 D.26 E.none of the above Answer E
11
Information and Communication Technologies __________ RAD object provides a means to execute program code directly A.generic B.action C.media D.start E.none of the above Answer B
12
Information and Communication Technologies The maximum Ethernet frame size is: A.1518 bytes B.1518 bits C.64 bytes D.512 bytes E.None of the above Answer A
13
Information and Communication Technologies The minimum Ethernet frame size is: A.1518 bytes B.64 bits C.64 bytes D.512 bytes E.None of the above Answer C
14
Information and Communication Technologies The repeater is related to _________________ layer A.physical B.data link C.network D.transport E.None of the above Answer A
15
Information and Communication Technologies The bridge is related to __________________ layer physical data link Network transport None of the above Answer B
16
Information and Communication Technologies The Gateway is related to _________________ layer A.physical B.data link C.network D.transport E.None of the above Answer C
17
Information and Communication Technologies The SNMP protocol is related to _______ layer A.physical B.data link C.application D.transport E.None of the above Answer C
18
Information and Communication Technologies Part 3: Answer the following questions in the space given below each question. Compression is a process that is often used when files are transferred across the Internet (and sometimes when they are stored, as well). What is compression and what is meant by lossless compression and lossy compression methods. Give an example on each method. Lossless compression is a process which compresses the original binary data in such a way that it can be reconstructed exactly later on (e.g. ZIP compression). Lossy compression is a process which compresses the original binary data in such a way that it cannot be reconstructed exactly later on (e.g. MP3 coding)
19
Information and Communication Technologies In each country there are several companies all offering a mobile telephone system in the same physical region. Each of these companies uses radio signals to connect its subscribers’ mobile phones to its base stations. Explain how do these companies distinguish between the calls being made by their users and those being made by other users? The radio spectrum available for GSM telephony has been divided up into various bands, and each company has been allocated just some of these bands. Thus the companies distinguish between their subscribers and those of other companies by using different sets of frequencies for the calls.
20
Information and Communication Technologies In the context of computers, what are (a) a bit, (b) a byte, and (c) an octet and how are they related to each other? A bit is a binary digit. That is, it is either 1 or 0. A byte is a group of 8 bits. An octet is another name for a byte.
21
Information and Communication Technologies What is meant by error detection and error correction in the context of manipulating and transmitting binary data? Error detection is a process whereby pieces of binary data are checked while they are being manipulated or transmitted, in order to discover whether an error has occurred. If an error is detected, a special action usually follows: for example a request for retransmission of the binary data, or the display of an error message. Error correction is a process whereby pieces of binary data are checked while they are being manipulated or transmitted, in order to discover whether an error has occurred. If an error is detected, it is corrected.
22
Information and Communication Technologies Briefly explain the beauty or usefulness of spectrogram for speech recognition. The power of spectrogram for speech recognition lies in the fact that it helps in tracking the shift of the formant frequencies with time – that is, the variation in the resonant frequency of the vocal tract during an utterance of speech. Since each utterance has its own distinct set of formant contours, hence this provides another acoustical characteristic to help recognize individual phonemes, and hence words.
23
Information and Communication Technologies What are the main duties of the TCP and IP layers in the TCP/IP protocol stack? In OSI terms, TCP is the transport layer protocol and is concerned with end-to-end issues rather than routing messages. It provides a reliable service in the sense that it guarantees error-free transportation of messages between source and destination. In OSI terms, IP is the network layer protocol and is concerned with routing messages across the network. It provides no guarantee that it will succeed, although it tries its best i.e. it provides a "best-effort" service.
24
Information and Communication Technologies Briefly discuss 2 main features of the air interface of the 2G GSM phone system. What does GPRS stand for? How does GPRS make GSM a 2.5G system? The air interface of the GSM phone system uses the TDMA technology. It uses 8 time slots instead of 6 as used by the North American TDMA system. GPRS stands for General Packet Radio System. It makes GSM a 2.5G system by providing it limited Data Communication capability such as the SMS data feature.
25
Information and Communication Technologies Radio signals are modulated onto carriers. Explain the terms ‘carrier’ and ‘modulation’ in this context. In the context of this question, the carrier will be a radio wave. Modulation is the variation of some characteristic of this radio wave (such as its amplitude, or its frequency) in accordance with the value at each instant of another signal (called the message signal) in order to make the message signal more suitable for transmission. For example, the message signal may have only component frequencies which are much lower than radio frequencies, but may need to be sent as a radio signal. Modulation makes this possible.
26
Information and Communication Technologies what are the main conditions that yield problems in automatic speech recognition? Speech style Extraneous noise list two of the HTI system ? GUI Virtual reality
27
Information and Communication Technologies what is an ultimate goal of HTC? The primary goal of HTC is to design and develop interfaces that enable natural and straightforward ways of communication between users and machines such as speech- based interfacing
28
Information and Communication Technologies Briefly show the three main stages of the isolated-word recognition system? a)Stage 1 consist of capturing a digital representation of the spoken word, this representation is referred to as the waveform. b)Stage 2 (spectrogram) converts the waveform into a series of elemental sound units, referred to as phonemes. so as to classify the words prior to recognition c)Stage 3 (time-aligned phoneme categorization graph) uses various forms of mathematical analysis to estimate the most likely word consistent with the series of recognized phonemes
29
Information and Communication Technologies What are the advantages to organizations of using computer networks? A- More efficient use of resources through sharing network elements such as printers and scanners B- Purchasing networked application software, which may be more economical than buying individual software packages C- Access to multiple sources of information D- Ability to transfer information across the network E- Opportunity for collaborative work using e-mail and conferencing facilities and to keep employees informed of the organization’s business through an intranet F- Remote access to the organization by customers, suppliers and field workers through an extranet
30
Information and Communication Technologies Briefly discuss the round trip delay?? The worst case scenario occurs when a frame transmitted at one end of a collision domain collides with another frame at the farthest end This is the worst case because this is the longest period of time for a collision to be detected by the transmitting computer, which has to wait for notice of the collision to propagate back. This time period is called the round trip delay, because it is the time it takes for a frame to take a ‘round trip’ to the furthest limit of the network
31
Information and Communication Technologies Why is it that, once a computer has monitored for the slot time, and detected no collisions, it can transmit the rest of its frame without risk of collision? If no collision has been detected in the slot time, then no other computer, even the one at the furthest limits of the collision domain, has tried to transmit. Once this point is reached, then all other computers will detected the transmitting computer’s frame through the carrier-sense (CS) part of the protocol, as by this time the frame will have reached all nodes within the same collision domain
32
Information and Communication Technologies Why does separating the attempts to transmit, of two computers, by at least one slot time ensure they do not collide? The slot time is chosen to allow a frame to propagate across the extremes of a collision domain and back again; called the round trip delay. Therefore, if one computer waits for one slot time before beginning to transmit, it is certain to detect if another computer had started to transmit one slot time earlier
33
Information and Communication Technologies Briefly discuss the SNMP protocol? Simple Network Management Protocol (SNMP), a standard protocol that specifies how information is carried between the agent and the network management software.
34
Information and Communication Technologies mention the two functions that related to RAD generic object? First they can generate spoken prompts using either a text-to-speech synthesizer or by playing pre-recorded speech waveforms Second they can be used to recognize spoken words …
35
Information and Communication Technologies
36
Part 4: Answer all the following questions in the space given below each question. Consider the following diagram: Idealized frequency spectrum of an analogue signal with cut-off frequencies f1 and f2 Let f1=10KHz and f2=5KHz. What is the bandwidth of the above signal? Bandwidth= f1 – f2 =10KHz-5KHz=5KHz What is the minimum sampling frequency in order to convert the above signal into digtail form? minimum sampling frequency=2*Bandwidth=2*5KHz=10KHz;
37
Information and Communication Technologies Given a propagation velocity of 1.77x10 8 m/s and a delay of 3.5 µS introduced by each repeater, what is the round trip delay for two computers at either end of a 2500 m link that includes three repeaters? The time travel between two computers is equal to the sum of the time required to travel along the cable and the delay introduced by the three repeaters. This is given by: One-way time (t)= (d/v) + (number of repeaters x delay) = (2500/1.77x10 8 ) + (3x3.5x10 -6 )=24.6 µS The round trip delay is twice this value: 49.2 µ S.
38
Information and Communication Technologies Consider a sinusoidal signal. Answer the following questions in this regard: What is the general equation for a sinusoidal and a cosinusoidal signal? X(t)=A sin(wt) is a sinusoidal signal Z(t)=B cos(wt) is a cosinusoidal signal Write the general equation for a sinusoidal signal with 0.75 the amplitude of the signal in part a). Y(t)=0.75A sin(wt). Write the general equation for a sinusoidal signal with half the angular frequency of the signal in part a). Y(t)=A sin(ω/2t). Write the general equation for a sinusoidal signal with an advance of π/4 radians. Y(t)=A sin(wt + π/4)
39
Information and Communication Technologies Part 4: Answer the following problems: (you should show all the steps required to solve the questions) suppose that we have an analogue signal covers the frequency range from 3 kHz to 11.5 kHz what is the bandwidth of the signal ? bandwidth = 11.5 – 3 = 8.5 kHz = 8500 Hz what is the minimum sampling rate required for a signal ? sampling rate = 2 x bandwidth = 2 x 8500 = 17000 Hz = 17 kHz
40
Information and Communication Technologies What is the maximum round trip delay for an Ethernet frame operating at 10 Mbit/s? Delay = number of bits sent / bit rate = 512 / 10 × 10 6 seconds = 1.2 µs
41
Information and Communication Technologies an analogue-to-digital converter has an input voltage range of + 5.5 V. if the resolution of the converter is 5 bits. What is the quantization interval? quantization interval = 11 / 2 5 = 11 / 32 = 0.34 volt What is the peak level of quantization noise produced by the converter defined above? peak quantization noise = 0.34 / 2 = 0.17
42
Information and Communication Technologies Work out the 7-bit Hamming code to transmit the number 4. The Hamming code for the number 4 is obtained by starting with the binary number for 4, which is 0100. The extra bits are even-parity check bits for three of the bits in the binary number to be sent. X applies to B, C and D. These bits are 1, 0 and 0, so X is 1, making an even number of 1s in the set BCDX. Y applies to A, C and D. These are all zero, so Y is 0 too. Similarly, Z applies to A, B and D, so is a 1. The final bit pattern is 0100101.
43
Information and Communication Technologies What numbers were being transmitted when the following 7-bit pattern was received? (Either no error or exactly one error has occurred.) 1001100 To find out which numbers were transmitted you have to carry out three parity checks: For the signal 1001100: BCDX (i.e. 0011) is even ACDY (i.e. 1010) is even ABDZ (i.e. 1010) is even Thus there are no errors and the number transmitted was 1001 (the number 9).
44
Information and Communication Technologies What numbers were being transmitted when the following 7-bit pattern was received? (Either no error or exactly one error has occurred.) 1001111 For the signal 1001111: BCDX (i.e. 0011) is even ACDY (i.e. 1011) is odd ABDZ (i.e. 1011) is odd Thus the results of the checks show that there is an error in bit A. The correct signal is therefore 0001111, and the number transmitted is 0001 (the number 1).
45
Information and Communication Technologies Run-length coding is used in many compression algorithms. This involves detecting sequences of 0s or 1s in a stream of bits and replacing each sequence with a number that specifies the number of zeros or ones that are in sequence. Assume that we have a stream of 100 bits, the first 2 are 0s and the 98 that follows are 1s. What is the compressed version of this message? –In Binary: (00000010)0(01100010)1 –In Decimal: (2)0(98)1 What is the compression ratio in this case? –This gives a compression ratio (i.e. number of bits in the original message divided by the number in the compressed message) of 100/18, which is between 5 and 6. Is it a lossless compression or a lossy compression? –An important feature of run-length codes is that they can be reconstructed exactly by the decoder, provided, of course, there is no corruption of data during the process. So it is lossless compression.
46
Information and Communication Technologies What compression ratio has been achieved in the following re- coding? (00000111)1(00111111)0(00001011)1 The original uncompressed data comprised a series of 1s, then a series of 0s, followed by another series of 1s. The unbracketed digits tell us this. The first series of 1s has seven digits (from the preceding bracketed binary number 00000111). The series of 0s has 63 digits (from the preceding bracketed binary number 00111111). The second series of 1s has eleven digits (from the preceding bracketed binary number 00001011) Thus the uncompressed data comprised 7 + 63 + 11 = 81 digits. The compressed version has 27 digits. Hence the compression ratio is 81/27, which is 3.
47
Information and Communication Technologies suppose that we have hotels reservation system. this system deals with four famous hotels. the different types of hotels the client wishes to be available (with the price of single room per night ) are: Meridian 55 $ Sheraton 50 $ Safir International 45 $ Crown Plaza 40 $ Whereas the Safir Iternational and Crown Plaza hotels have only a single room, Meridian and Sheraton hotels can have both single room or suite. The suites prices are as following: Meridian 70 $ Sheraton 65 $ The voice recognition interface of this hotels reservation system will provide the following functions: Be friendly and welcoming Ask the user to enter the hotel type Check if they want a single room or suite in case if they choose Meridian or Sheraton hotels Confirm that the hotel reservation is correct Tell the user the price of this hotel If the user agree, then the system print the reservation voucher of this hotel and finish this transaction in a friendly manner Now you should do the following : Clearly draw the flowchart of this hotels reservation system ? Clearly label the symbols of this flowchart ? Shows how errors are handled
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.