-17-(-34)=? Correct Answers 17
-49 ÷ -7? Correct Answers 7
(-25) + (42) + (-62) + (20) =? Correct Answers -25
(10 x 103) + (26 x 104) = ? Correct Answers 270 x 10^3
(17) x (-19) =? Correct Answers -323
(20) ÷ (-4) + (-2) x (-10) - (-2) x (7) =? Correct Answers 29
(250 x 10^-6) - (7 x 10^-5) = ? Correct Answers 180 x 10^-6
(480 × 10^-5) divided by (60 x 10^-3) = ? Correct Answers 8 ×
10^-2
(75 × 10^3) + (25 x 10^4) =? Correct Answers 32.5 x 10^4
(83 × 10^ 6) + (27 × 10^7) = ? Correct Answers 353 × 10^6
0.00004= —— × 10 to the power of —— ? Correct Answers
4,-4
0.00004= ——- × 10 to the power of ——? Correct Answers
4,-5
0.5349 ÷ 0.1420? Correct Answers 3.7669014
,3 6/9 + 6 1/3 + 9 5/9= Correct Answers 19 5/9
67.84 + 81.786 + 4281.98 = ? Correct Answers 4,431.606
7 3/8 ÷7 1/4= Correct Answers 1. 1/58
8.13 X 0.123 =? Correct Answers 0.99999
A customer reports a problem of no dial tone (NDT). Upon
inspection, the technician notices that new carpeting has been
installed. What should the technician do next? Correct Answers
Look for a cable that runs under the carpet; it is likely that the
cable has a short from the carpeting tack strip.
A transmitter outputs 100 mW. An antenna cable connects the
transmitter to an amplifier, and the power into the amplifier's
input measures 50 ml. The amplifier increases the signal to
the original transmitter's power level and sends the signal to
the antenna. The antenna receives the signal from the
amplifier at 75 mW, and then transmits at 150 mW. What is the
IR's power level in this F circuit? Correct Answers 75mW
Access points (AP) must support what encryption techniques
in order to comply with Institute of Electrical and Electronics
Engineers (IEEE) 802.11i security standards? Correct Answers
Temporal Key Integrity Protocol (TKIP), Advanced Encryption
Standard (AES), and AES-CCMP (Counter-Mode/CBC-MAC
Protocol).
After a digital TV (DTV) service problem has been analyzed
and possible causes considered, what is accomplished by
,isolating the various network elements? Correct Answers It
narrows the scope of likely problem sources.
After resolving the problem with the premises wiring issue,
which of the following is the next step in the six-step process
that the technician should take? Correct Answers Verify that
the problem has been resolved and that phone service
is running perfectly on all phones.
All 802.11 standards use one of two frequency bands. What are
these frequency bands? Correct Answers 2.4 GHz and 5 GHz
bands.
Although there are many different implementations of spread
spectrum technology, what are the only types specified by the
Federal Communications Commission (FCC) in the Codes of
Federal Regulation (CFR), Volume 47, Part 15? Correct
Answers Direct Sequencing Spread Spectrum (DSSS) and
Frequency
Hopping Spread Spectrum (FHSS).
An independent basic service set (IBSS) is also commonly
referred to as which one of the following? Correct Answers ad
hoc network
As a general rule, how does an increase in effective isotropic
radiated power (EIRP) relate to the link budget range? Correct
Answers Each 6 decibels (dB) increase in EIRP equates to a
doubling of
range.
, As a subscriber enters a hotspot area, what signals their
mobile wireless device of an available Wi-Fi network? Correct
Answers The access point (AP) advertises to the wireless device
to enable connection.
Bluetooth is a short range wireless personal area network
(PAN) technology that is covered under which Institute of
Electrical and Electronics Engineers (IEEE) standard? Correct
Answers IEEE 802.15
Bluetooth uses which spread spectrum technology? Correct
Answers Frequency-hopping spread spectrum (FHSS).
By taking control of the expectations you have, you are Correct
Answers More likely to improve your motivation and be a
better problem solver.
Considering antenna diversity, what is the
point of sampling two antennas? Correct Answers To pick the
input signal of whichever antenna has the best reception.
During which step of the six-step troubleshooting process for
a digital TV (DTV) service problem are quadrature amplitude
modulation (QAM) channel measurements typically taken?
Correct Answers Diagnosing symptoms.
For maximum security, you should base your wireless local
area network (WLAN) user authentication on which one of the
following? Correct Answers Device-independent schemes,
such as user names and passwords.