Conventional
-49/-7 = - ANS-7
(-17) - (-34) = - ANS-17
(-25) + (42) + (-62) + (20) = - ANS--25
(17) x (-19) = - ANS--323
(20) / (-4) + (-2) x (-10) - (-2) x (7) = - ANS-29
(250 x 10 to the power of -6) - (7 x 10 to the power of -5) = - ANS-180 x 10 to the power of -6
(480 x 10 to the power of -5) divided by (60 x 10 to the power of -3) = - ANS-8 x 10 to the power
of -2
(75 × 103) + (25 × 104) = - ANS-(*Wrong) 100 × 10^3
(75 x 10 to the power of 3) + (25 x 10 to the power of 4) = - ANS-32.5 x 10 to the power of 4
0.00004 = ______ x 10 to the power of ______. - ANS-4, -5
0.5349 divided by 0.1420 = - ANS-3.7669014
10 to the power of -3 has a metric prefix of ______. - ANS-Milli
3 6/9 + 6 1/3 + 9 5/9 = - ANS-19 5/9
4/7 x 9 4/11 = - ANS-5 27/77
7 3/8 divided by 7 1/4 = - ANS-1 1/58
8.13 X 0.123 = - ANS-0.99999
A customer reports a problem of no dial tone (NDT). Upon inspection, the technician notices
that new carpeting has been installed. What should the technician do next? - ANS-Look for a
cable that runs under the carpet; it is likely that the cable has a short from the carpeting tack
strip.
A transmitter outputs 100 milliwatts (mW). An antenna cable connects the transmitter to an
amplifier, and the power into the amplifier's input measures 50 mW. The amplifier increases the
signal to the original transmitter's power level and sends the signal to the antenna. The antenna
receives the signal from the amplifier at 75 mW, and then transmits at 150 mW. What is the
intentional radiator's (IR) power level in this radio frequency (RF) circuit? - ANS-75 mW
Access points (AP) must support what encryption techniques in order to comply with IEEE
802.11i security standards? - ANS-Temporal Key Integrity Protocol (TKIP), Advanced Encryption
Standard (AES), and AES-CCMP (Counter-Mode/CBC-MAC Protocol).
After a digital TV (DTV) service problem has been analyzed and possible causes considered,
what is accomplished by isolating the various network elements? - ANS-It narrows the scope of
likely problem sources.
After resolving the problem with the premises wiring issue, which of the following is the next step
in the six-step process that the technician should take? - ANS-Verify that the problem has been
resolved and that phone service is running perfectly on all phones.
, All 802.11 standards use one of two frequency bands. What are these frequency bands? -
ANS-2.4 GHz and 5 GHz bands.
Although there are many different implementations of spread spectrum technology, what are the
only types specified by the FCC in the Codes of Federal Regulation (CFR), volume 47, part 15?
- ANS-Direct Sequencing Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum
(FHSS).
An independent basic service set (IBSS) is also commonly referred to as which one of the
following? - ANS-Ad hoc network.
As a general rule, how does an increase in effective isotropic radiated power (EIRP) relate to
the link budget range? - ANS-Each 6 decibels (dB) increase in EIRP equates to a doubling of
range.
As a subscriber enters a hotspot area, what signals their mobile wireless device of an available
Wi-Fi network? - ANS-The access point (AP) advertises to the wireless device to enable
connection.
Because the spectral density of a quadrature amplitude modulation (QAM) channel is much
higher than that of an analog TV channel, what is done to ensure equal power in all channels in
a network with analog and digital modulation channels? - ANS-Operate the analog TV channels
at higher amplitude level than the QAM channels.
Bluetooth is a short range wireless personal area network (WPAN) technology that is covered
under which Institute of Electrical and Electronics Engineers (IEEE) standard? - ANS-IEEE
802.15
Bluetooth uses which spread spectrum technology? - ANS-Frequency-hopping spread spectrum
(FHSS).
By taking control of the expectations you have, you are - ANS-More likely to improve your
motivation and be a better problem solver.
During which step of the six-step troubleshooting process for a digital TV (DTV) service problem
are quadrature amplitude modulation (QAM) channel measurements typically taken? -
ANS-Diagnosing symptoms.
For maximum security, you should base your wireless local area network (WLAN) user
authentication on which one of the following? - ANS-Device-independent schemes, such as
user names and passwords.
Given an access point (AP) with 100 milliwatts (mW) of output power connected through a cable
with 3 decibels (dB) of loss to the antenna with a 10 decibels isotropic (dBi) gain, what is the
approximate Equivalent Isotropically Radiated Power (EIRP) level from the antenna in milliwatts
(mW)? - ANS-* (WRONG)100 mW
Heat shrink tubing is installed over the fusion-splice to strengthen and protect it. When should
the heat shrink be installed on the fiber? - ANS-Before stripping the plastic coating from the
fiber.
How are interframe spaces used in an IEEE 802.11 wireless local area network (WLAN)? -
ANS-They are used to defer a station's access to the medium and provide various levels of
priority.
How are optical splitters used in the forward path? - ANS-In the forward path, optical splitters
are used as passive branching devices that divide an optical signal across multiple output fibers.