You are on page 1of 8

UNIT 1I - Cognitive Radio Architecture

1. ------------------ is a key factor for successful operation of IEEE 802.22 Systems and it is needed not
only for communication between BS and CPEs.
a) Channel estimation
b) Self coexistence
c) Synchronization
d) Scheduling

Answer : c

2. Qos support at the MAC layer is to define the ---------------


a) Transmission ordering and scheduling on the air -interface
b) Receiving ordering and scheduling on the air -interface
c) Transmission ordering and synchronization on the air -interface
d) Receiving ordering and synchronization on the air -interface

Answer : a

3. The ………………. layer support Qos for upstream and downstream traffic
a) 802.22 MAC
b) 802.22 PHY
c ) 802.22 NETWORK
d) 802.22 DATA LINK

Answer : a

4. ------------------------ plays a key role in protecting the incumbents due to the required coordination
for reliable spectrum sensing
a) Channel estimation
b) Self coexistence
c) Synchronization
d )Scheduling

Answer : b

5. Frame preamble is used for -----------------------

a) Channel synchronization estimation


b) Self coexistence
c) Time Synchronization
d )Scheduling

Answer : a

6. Super Frame preamble is used for -----------------------

a) Channel synchronization estimation


b) Self coexistence
c) Time Synchronization
d )Scheduling

Answer : c
7. In 802.22 MAC ,FRAMES are grouped into a super frame structure, which was introduced to allow
for
a) Better incumbent protection
b) Self coexistence
c) Better incumbent protection and Self coexistence
d )Scheduling

Answer : c

8. ------------------------------ layer is used to support a system that user vacant TV channels to provide
wireless communication access over distances of up to 100 km
a) 802.22 MAC
b) 802.22 PHY
c ) 802.22 NETWORK
d) 802.22 DATA LINK

Answer : b

9. In IEEE 802.22 ,the protection of incumbent services the --------------- perform the role of a master
and -------------perform the role of the slaves
a) BS and MS
b) BS and CPEs
c) MS and BS
d) CPEs and MS
e)
Answer : b

10. The application of ------------------------------- is wireless broadband access in rural and remote areas
with performance comparable to those of existing fixed broadband access technologies.
a) IEEE 802.22 WLAN
b) IEEE 802.22 WPAN
c) IEEE 802.22 WRAN
d) IEEE 802.22 WAN

Answer : c

11. The SCA also specifies a …………………. middleware,which is used to provide a standardized
method of software objects to communicate with each other .

a) RXML b) CORBA c) UML d) RKRL

Answer : b

12. The SCA is built upon a stand set of OS features called


a) HAL
b) POSIX
c) CORBA
d) RXML

Answer : b
13. ….………… is a core framework to provide a standardized process for identifying the available
computational resources of the radio ,matching those resources to the required resources for an
application.
a)CORBA
b) ORB
c)UML
d)SCA

Answer : d

14. ….……….. consists of input /output driven package that know how to control each interface

A )HAL
b) POSIX
c)Board support
d )Software drivers

Answer : c

15. ….…………….. occurs when there is an exact match between a current stimulus and a prior
experience .
a) Binding
b) Stimulus recognition
c) Learning
d) Recognition

Answer : b

16. ….…………….. occurs when there is an nearly exact match between a current stimulus and a prior
experience .
a) Binding
b) Stimulus recognition
c) Learning
d) Recognition

Answer : a

17. ….………………. determines the significance of an observation by binding the observation to a


previously known set of stimuli of a scene .
a) Orient phase
b) Plan phase
c) Act phase
d) Decide phase

Answer : a
18. ….………………. is a function of perception,observation,decision and action.
a) Learning
b) cognition
c) synchronization
d) Scheduling

Answer : a

19. ….………………. for interacting with a higher authority such as network


infrastructure.
a) Wake epoch
b) Prayer epoch
c) Sleep epoch
d) Dream epoch

Answer : b

20. ….………………. for performing computationally intensive pattern recognition and


learning.
a) Wake epoch
b) Prayer epoch
c) Sleep epoch
d) Dream epoch

Answer : d

21. ….………………. for power down conditions.


a) Wake epoch
b) Prayer epoch
c) Sleep epoch
d) Dream epoch

Answer : c

22. ….………………. is the primary reasoning activities during this large epoch of time
are reactive to the environment .
a) Wake epoch
b) Prayer epoch
c) Sleep epoch
d) Dream epoch

Answer : a
23. ….………………. comprises a set of design rules by which the cognition level of
information services may be achieved by a specified set of components in a way that
supports the cost-effective evolution of increasingly capable implements over time.

a) CRA
b) SDR Function
c) Cognition function
d) SDR Components

Answer : a

24. ….………………. for (speech synthesis,text,graphics,and multimedia displays.

a) Local effector
b) SDR Function
c) Cognition function
d) System applications

Answer : a

25. ….………………. for (symbol grounding for system control,planning and learning )

a) Local effector
b) SDR Function
c) Cognition function
d) System applications

Answer : c

26. ….………………. which include RF sensing and SDR Applications.

a) Local effector
b) SDR Function
c) Cognition function
d) System applications

Answer : b

27. ….………………. media independent services such as playing a game .

a) Local effector
b) SDR Function
c) Cognition function
d) System applications

Answer : d

28. ….………………. to measure (location,temperature,accelerometer,compass etc).


a) Local environment sensors
b) SDR Function
c) Cognition function
d) System applications

Answer : a

29. ….………………. which includes haptic ,acoustic and video sensing and perception
function .

a) Local environment sensors


b) User sensory perception
c) Cognition function
d) System applications

Answer : b

30. ….………………. way to distinguish a spread spectrum transmission from the


background is to sample the entire bandwidth which may be impossible for the
cognitive radio that leads to false identification of empty spectrum .

a) Hidden primary user


b) Spread spectrum primary user
c) Hidden secondary user
d) Spread spectrum secondary user

Answer : b

31. Challenges of cognitive radio network …………

a) Hidden primary user & Spread spectrum primary user


b) Spread spectrum primary user
c) Hidden secondary user & Spread spectrum secondary user
d) Spread spectrum secondary user

Answer : a

32.Cognitive radio architecture minimizes the dependence on knowledge -engineering


through the integration of …………….

A )Machine learning
e) Spectrum sensing
f) Artificial intelligence
g) Spectrum sharing

Answer : a
33.….………………. behavior is optimized for real time interaction with the
user,isochronous control of software radio assets, and real time sensing of the environment.
h) Learning
i) waking
j) synchronization
k) Scheduling

Answer : b

34. During the ….………………. the PDA process experience from the waking behavior
is using non-incremental machine learning algorithms.
a )Wake epoch
b )Prayer epoch
c )Sleep epoch
d )Dream epoch

Answer : c

35.------------------ is a context where the user overrode a PDA decision about which PDA had no
little or no uncertainty.

a )conflict
b )Self coexistence
c )Time Synchronization
d )Scheduling

Answer : a

35. Attempt to resolve unresolved conflicts via the meditation of the PDAs home network may
be called ----------------------------
a )Wake behavior
b )Prayer behavior
c )Sleep behavior
d )Dream behavior

Answer : b

36. ------------------------ stage initates tasks with specified resources for specified amounts
of time.
a )Plan phase
b )Act phase
c )Orient phase
d )decide phase

Answer : b
37. ------------------------------ represents plans for the control of the software radio
personalities
a )Plan phase
b )Act phase
c )Orient phase
d )decide phase

Answer : a

38. ------------------------------ determines the novelty of stimuli represented in the


sequence hierarchy.
a )Plan phase
b )Act phase
c )Orient phase
d )decide phase

Answer : c

39. ------------------------------ selects among alternatives generated by the planning phase


.Its knowledge representation depends on the radio procedure components .
a )Plan phase
b )Act phase
c )Orient phase
d )decide phase

Answer : d

You might also like