Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Woodjh
W
Woodjh
Community Contributor
Quizzes Created: 3 | Total Attempts: 4,193
| Attempts: 1,067 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. The three cornerstones of voice network system security are availability,

Explanation

Confidentiality refers to the protection of sensitive information from unauthorized access or disclosure. In a voice network system, it is crucial to ensure that only authorized individuals can access and listen to the conversations. Integrity, on the other hand, ensures that the information transmitted over the network remains intact and unaltered. It is important to prevent any unauthorized modification or tampering of the voice data. Therefore, confidentiality and integrity are the two key cornerstones of voice network system security.

Submit
Please wait...
About This Quiz
3d1x2 5 Level CDC Vol. 3 - Quiz

This quiz, titled '3D1X2 5 level CDC vol. 3', tests knowledge on satellite communications, microwave frequencies, and waveguide sizing. It is designed for learners seeking to understand the impact of weather on microwave frequencies, factors affecting the refractive index, and the operational specifics of defense satellite systems.

Personalize your quiz and earn a certificate with your name on it!
2. What function in a video tape recorder (VTR) is accomplished by transporting the videotape across the head gap at the same speed at which it was recorded?

Explanation

The function in a video tape recorder (VTR) that is accomplished by transporting the videotape across the head gap at the same speed at which it was recorded is Playback. During playback, the VTR reads the recorded video signal from the tape and displays it on the screen or outputs it to another device for viewing. This allows the user to watch the previously recorded content at the original speed it was recorded.

Submit
3. What is the main purpose of a boundary fence?

Explanation

The main purpose of a boundary fence is to present a physical and psychological deterrent to unauthorized entry. This means that the fence acts as a barrier to prevent people from entering a certain area without permission. It serves as a visual indication that the area is off-limits and helps to discourage potential intruders from attempting to enter. Additionally, the fence can also provide a sense of security and peace of mind to those inside the protected area.

Submit
4. How is information recorded or sotred on the videotape?

Explanation

Information is recorded or stored on a videotape through a series of magnetic patterns. These magnetic patterns are created and manipulated to represent the audio and video signals that make up the recorded information. The tape is passed over a magnetic head, which magnetizes the particles on the tape according to the patterns, allowing the information to be stored and retrieved when needed.

Submit
5. What is the beginning of a cable system called

Explanation

The beginning of a cable system is called the head-end. This is where the signal is received and distributed to the rest of the cable network. It is the central point where all the incoming signals are processed, encoded, and then transmitted to the subscribers through the trunk lines. The head-end is responsible for managing and controlling the entire cable system, making it a crucial component in delivering television, internet, and other services to the subscribers.

Submit
6. The basic configuration of the entry control facility (ECF) includes a?

Explanation

The basic configuration of the entry control facility (ECF) includes a gatehouse, personnel entry gate, inspection equipment, and vehicle entrapment area. This configuration ensures that there is a designated area for security personnel to monitor and control entry into a facility. The gatehouse serves as a control point where personnel can verify identification and grant access. The personnel entry gate is the physical barrier that allows individuals to enter or exit the facility. Inspection equipment is necessary to screen individuals and their belongings for any prohibited items. The vehicle entrapment area is a designated space where vehicles can be inspected and controlled before entering the facility.

Submit
7. Which sensor uses heat radiation to detect intruders?

Explanation

Passive infrared sensors use heat radiation to detect intruders. These sensors are designed to detect changes in infrared energy emitted by objects in their field of view. When an intruder enters the sensor's range, their body heat emits infrared energy that is detected by the sensor, triggering an alarm or activating a security system. Unlike ultrasonic and microwave sensors, which use sound waves or electromagnetic waves respectively, passive infrared sensors rely on detecting heat radiation to identify intruders. Dual-phenomenology is not a sensor technology and is not related to heat radiation detection.

Submit
8. What type alarm occurs if  the sensor post cover in vertical taut-wire sensor (VTWS) is removed?

Explanation

If the sensor post cover in a vertical taut-wire sensor (VTWS) is removed, it would trigger a tamper alarm. This alarm is designed to detect any unauthorized tampering or interference with the sensor equipment.

Submit
9. The primary reason you should measure the voltage across terminal or distribution frame protectors  before removing and replacing them is to

Explanation

Measuring the voltage across terminal or distribution frame protectors before removing and replacing them ensures that dangerous voltages are not present on the line. This is important for the safety of the person working on the circuit, as it helps to prevent electric shocks or other accidents that could occur if high voltages are present. It is a precautionary measure to ensure that the circuit is de-energized and safe to work on.

Submit
10. What must a line of detection detect?

Explanation

A line of detection must detect any movement or activity such as walking, running, rolling, crawling, or jumping that occurs within the line of detection. This means that if any person or object passes through the line, it should be detected by the system. The other options mentioned in the question, such as walking, running, rolling, crawling, or jumping outside the line of detection, potential for intruder to bypass the system, and possibility of equipment failures, are not directly related to what a line of detection must detect.

Submit
11. The next generation recieve terminal (NGRT) accepts feeds from which two satellite bands?

Explanation

The correct answer is Ku, Ka. The next generation receive terminal (NGRT) accepts feeds from these two satellite bands.

Submit
12. What is a major advantage of digital recording over analog recording

Explanation

A major advantage of digital recording over analog recording is that material can be edited generation after generation without noticeable degradation in quality. This means that digital recordings can be manipulated and modified without any loss in the original audio quality. In contrast, analog recordings tend to degrade over time with each generation of copying or editing, resulting in a loss of fidelity and clarity. Therefore, the ability to edit digital recordings without degradation makes digital recording a preferred choice in many professional and creative industries.

Submit
13. Trend Analysis is a program that trends all of these outage data except

Explanation

Trend Analysis is a program that analyzes and tracks data over time to identify patterns and trends. It can analyze outage data such as outage times, reasons for outages, and the number of outages. However, preempted outages are not included in the trend analysis program.

Submit
14. Broadband refers to a technology that can transmit?

Explanation

Broadband refers to a technology that can transmit a relatively wide range of frequencies. This means that it is capable of transmitting signals across a broad spectrum of frequencies, allowing for the transmission of various types of information, including both high and low frequency data. This makes broadband technology versatile and capable of supporting a wide range of applications, such as internet connectivity, telecommunications, and multimedia streaming.

Submit
15. Base cables normally enter the central office (CO) facility through a

Explanation

The correct answer is cable vault. A cable vault is a structure or room where cables are stored and managed. It is designed to provide protection and organization for the cables entering the central office facility. This is typically a secure and controlled environment to ensure the proper functioning of the cables and to prevent any damage or interference. The other options, such as cable manhole, telecommunications cable closet, and building cable raceway, do not specifically refer to the location where cables enter the central office facility.

Submit
16. You can compare a video tape recorder (VTR) head to a/an

Explanation

An electromagnet is the most suitable comparison to a video tape recorder (VTR) head. Both the VTR head and an electromagnet use magnetic fields to function. The VTR head uses a magnetic field to read and write data on a video tape, while an electromagnet uses a magnetic field created by an electric current to attract or repel objects. Therefore, the electromagnet is the best choice for comparison to a VTR head.

Submit
17. If all deployed and fixed locations use global positioning system (GPS) referenced clocks, we can eliminate crypto-sync loss due to?

Explanation

If all deployed and fixed locations use global positioning system (GPS) referenced clocks, we can eliminate crypto-sync loss due to timing slips. This is because GPS clocks provide highly accurate and synchronized time information, ensuring that all devices are perfectly aligned and there are no timing discrepancies or slips between them. Therefore, by using GPS clocks, we can eliminate any potential loss of synchronization in the cryptographic system caused by timing slips.

Submit
18. What was the primary driving factor behind the invention of telephone exchange system?

Explanation

The primary driving factor behind the invention of the telephone exchange system was the issue of cabling caused by point-to-point telephone access. With point-to-point access, each telephone line required a separate cable, which became impractical and expensive as the number of telephone lines increased. The telephone exchange system allowed multiple telephone lines to be connected through a central exchange, eliminating the need for separate cables for each line and making communication more efficient and cost-effective.

Submit
19. What role does the Private Branch Exchange (PBX) play in the telephony industry?

Explanation

A Private Branch Exchange (PBX) is a small scale switch that handles internal calls for an organization. It allows for internal communication within the organization by routing calls between internal extensions. This system is commonly used in businesses to manage and streamline their internal telephony needs.

Submit
20. What is the primary mode of detection for the microwave fence sensor?

Explanation

The primary mode of detection for the microwave fence sensor is beam break. This means that when the beam emitted by the sensor is broken or interrupted, it triggers an alarm or detection signal. This mode of detection is commonly used in security systems to detect unauthorized entry or movement within a designated area.

Submit
21. What is one path high frequency (HF) transmissions follow from the antenna to the distant end?

Explanation

Groundwave is the correct answer because high frequency (HF) transmissions, which include radio waves, travel along the Earth's surface in the form of groundwaves. These groundwaves propagate by hugging the ground and following its curvature, allowing them to travel long distances. This is different from other types of waves like lightwaves, microwaves, and soundwaves, which do not follow the same path as groundwaves for long-distance transmission.

Submit
22. What is the means of measureing the amount of time that has been played or recorded on a video tape recorder (VTR)

Explanation

A counter is a means of measuring the amount of time that has been played or recorded on a video tape recorder (VTR). It keeps track of the duration of the recorded content, allowing users to easily navigate to specific points in the video. The counter displays the elapsed time in hours, minutes, and seconds, providing a convenient way to monitor the progress of the recording or playback.

Submit
23. To transmit an audio signal over radio frequency (RF), it first has to be?

Explanation

To transmit an audio signal over radio frequency (RF), it first has to be modulated. Modulation is the process of varying the characteristics of the RF signal in accordance with the audio signal. This allows the audio signal to be carried by the RF signal and transmitted wirelessly. Modulation techniques such as amplitude modulation (AM), frequency modulation (FM), or phase modulation (PM) are commonly used to achieve this.

Submit
24. When a telephone network is circuit switched, each call

Explanation

In a circuit-switched telephone network, each call has a dedicated circuit created by the switch. This means that a specific path is established between the calling and receiving parties, and this path remains dedicated to the call for its duration. The switch sets up the circuit and ensures that the connection remains uninterrupted until the call is terminated. This dedicated circuit ensures reliable and consistent communication between the parties involved in the call.

Submit
25. Which digital multiplex system (DMS)-100 database facility is responsible for creating and maintaining tables of data in a controlled manner

Explanation

The DMS-100 database facility responsible for creating and maintaining tables of data in a controlled manner is the Table control. This facility ensures that the tables are created and managed properly, ensuring data integrity and consistency. It allows for the creation, modification, and deletion of tables, as well as enforcing rules and constraints on the data stored in the tables. The Table control facility plays a crucial role in managing the database and ensuring its proper functioning.

Submit
26. Trend Analysis is a program that ensures circuits meet management thresholds (MT) on what basis?

Explanation

Trend Analysis is a program that ensures circuits meet management thresholds (MT) on a monthly basis. This means that the program analyzes the performance of circuits and compares it to the predetermined thresholds on a monthly frequency. By doing so, it helps monitor and identify any deviations or issues in circuit performance, allowing for timely intervention and maintenance.

Submit
27. One disadvantage of microwave wavelengths is that the frequencies are susceptible to?

Explanation

Microwave wavelengths are susceptible to weather effects because they can be absorbed, scattered, or refracted by atmospheric conditions such as rain, fog, or snow. This can result in signal degradation or loss, affecting the quality and reliability of microwave communication systems.

Submit
28. What is not a factor in determining the refractive index of air?

Explanation

The refractive index of a medium determines how much light is bent when it passes through that medium. In the case of air, the refractive index is mainly determined by factors such as atmospheric pressure, temperature, and moisture content. However, the propagation medium, which refers to the medium through which the light is traveling, is not a factor in determining the refractive index of air. The refractive index of air remains constant regardless of the propagation medium.

Submit
29. How many miles above the earth are satellites placed in orbit?

Explanation

Satellites are placed in orbit approximately 22,300 miles above the Earth's surface. This distance is known as the geostationary orbit, where satellites rotate at the same speed as the Earth's rotation, allowing them to stay fixed in one position relative to the Earth's surface. This high orbit is necessary for satellites to have a clear line of sight and provide uninterrupted communication and observation services.

Submit
30. Broadband technology uses all of thes etransmission mediums except?

Explanation

Broadband technology utilizes various transmission mediums to provide high-speed internet access. Telephone lines, television cable lines, and satellite systems are commonly used for broadband connections. However, laser light is not typically used as a transmission medium in broadband technology. Instead, fiber optic cables are used to transmit data using laser light.

Submit
31. Which models of the digital multiplex system (DMS) family are commonly used at Air Force bases to provide base telephone services?

Explanation

DMS-100 and Meridian System Logic (MSL)-100 are commonly used models of the digital multiplex system (DMS) family at Air Force bases to provide base telephone services.

Submit
32. Which piece of the Recieve broadcast manager (RBM) functions as a common television set-top converter box?

Explanation

The video converter functions as a common television set-top converter box in the Recieve broadcast manager (RBM). It is responsible for converting the broadcast signal into a format that can be displayed on a television.

Submit
33. How many lines of video are discarded in high-definition 1080 line video encoded with 1920X1088 pixel frames prior to display?

Explanation

In high-definition 1080 line video encoded with 1920X1088 pixel frames, 8 lines of video are discarded prior to display. This means that out of the 1088 lines in each frame, 8 lines are not shown on the screen.

Submit
34. What component carries the signal to individual subscribers?

Explanation

The trunk line is responsible for carrying the signal to individual subscribers. It acts as a main pathway or highway that connects the head-end (where the signal originates) to the individual receivers or subscribers. The trunk line ensures that the signal is transmitted efficiently and effectively to reach each subscriber, allowing them to receive the desired content or service.

Submit
35. How many B and D channels does the standard configuration in North American Integrated Services Digital Network (ISDN) primary rate interface (PRI) application use?

Explanation

The standard configuration in North American ISDN PRI application uses 23 B channels and 1 D channel. The B channels are used for carrying voice or data traffic, while the D channel is used for signaling and control purposes.

Submit
36. What is the Maximum number of ports that a digital multiplex system-100 (DMS-100) supports?

Explanation

The maximum number of ports that a digital multiplex system-100 (DMS-100) supports is 100,000.

Submit
37. What part of the video switcher allows titles or other video scenes to be inserted into a full screen  background?

Explanation

The effects keyer is the part of the video switcher that allows titles or other video scenes to be inserted into a full screen background. It is responsible for overlaying or superimposing these elements onto the main video feed.

Submit
38. The secuirty lighting inside the restricted area is used to?

Explanation

The security lighting inside the restricted area is used to facilitate the detection and tracking of intruders. By providing a well-lit environment, the security forces personnel can easily identify any unauthorized individuals who may have entered the area. This allows them to quickly respond and take appropriate action to ensure the safety and security of the restricted area. The lighting also acts as a deterrent, as potential intruders are less likely to attempt unauthorized entry if they know they will be easily spotted.

Submit
39. Within how many normal duty hours of completion action on the Telecommunications Service Order (TSO) must the circuit control offfice (CCO) submit an in-effect report?

Explanation

Within 72 normal duty hours of completion, the circuit control office (CCO) must submit an in-effect report on the Telecommunications Service Order (TSO). This report is necessary to provide updates and status on the TSO, ensuring that all relevant parties are informed and any necessary actions can be taken in a timely manner.

Submit
40. The determining factor in calculating the correct size of a waveguide is?

Explanation

The correct size of a waveguide is determined by the frequency of the signal being transmitted. Different frequencies require different sizes of waveguides to ensure efficient transmission.

Submit
41. Which is NOT a disadvantage of laser light transmission

Explanation

The correct answer is "No need for careful alignment of transmitter and receiver." This is not a disadvantage of laser light transmission because it suggests that there is no requirement for precise alignment between the transmitter and receiver. In reality, laser light transmission does require careful alignment to ensure optimal signal transmission.

Submit
42. Because the enhanced network (ENET) is a matrix, any input channel has access to any available

Explanation

The enhanced network (ENET) being a matrix means that any input channel can connect to any available output channel. This allows for flexibility and efficient communication between different channels, enabling data to be transmitted from input channels to output channels as needed.

Submit
43. Which satellite communications system is used to transmit space operations?

Explanation

The Defense Satellite Communications System (DSCS) is used to transmit space operations. This system is specifically designed for military use and provides secure and reliable satellite communications for the Department of Defense. It enables the transmission of critical information and supports various military operations and missions. The DSCS ensures effective communication between ground stations, airborne platforms, and space-based assets, making it an essential component of satellite communications for space operations.

Submit
44. What is the most serious threat to voice network system integrity?

Explanation

Subversion is the most serious threat to voice network system integrity because it involves intentionally undermining or sabotaging the system. This can be done by unauthorized individuals gaining access to the system and making unauthorized changes or by introducing malicious software or code that disrupts the system's functioning. Subversion poses a significant risk as it can lead to the compromise of sensitive information, disruption of services, and potential financial and reputational damage to the organization. Unauthorized monitoring, inexperienced switch technicians, and inadequate maintenance practices can also pose threats, but they are not as severe as deliberate subversion.

Submit
45. The red,gree, and blue (RGB) outputs from the camera go to the?

Explanation

The red, green, and blue (RGB) outputs from the camera are sent to an encoder. An encoder is a device that converts analog signals into digital signals. In this case, the RGB outputs from the camera, which are analog signals, need to be converted into digital signals for further processing or transmission. Therefore, an encoder is required to perform this conversion.

Submit
46. How many inches is the beam width at the widest portion of the infrared perimeter detection sensor?

Explanation

The beam width at the widest portion of the infrared perimeter detection sensor is 2 inches.

Submit
47. Which module provides encryption/decryption of traffic into and out of the thearter of deployable communications/integrated communications access package (TDC/ICAP) network?

Explanation

The correct answer is Crypto. The Crypto module provides encryption and decryption of traffic into and out of the theater of deployable communications/integrated communications access package (TDC/ICAP) network. This module ensures the security and confidentiality of the data being transmitted over the network by encrypting it before transmission and decrypting it upon receipt.

Submit
48. How many card slots does the FCC-100 have, and how many of  them are available for user configuration?

Explanation

The FCC-100 has a total of 16 card slots. Out of these 16 slots, 8 of them are available for user configuration.

Submit
49. What configuration does the Red Data Module normally operate in?

Explanation

The Red Data Module normally operates in the configuration of Gateway/client. This means that it can function as both a gateway and a client simultaneously. As a gateway, it can connect and communicate with other devices or systems, while as a client, it can receive and process data from these connected devices or systems. This configuration allows for efficient and seamless data exchange between different components of a network.

Submit
50. What reports must be sent if the circuit does not meet all required parameters and the Telecommunications Service Order (TSO) issuing authority advises that the circuit is accepted for service?

Explanation

If the circuit does not meet all required parameters and the TSO issuing authority advises that the circuit is accepted for service, the reports that must be sent are the "Exception" reports. These reports highlight the discrepancies or exceptions in the circuit's performance or compliance with the required parameters. By sending these reports, the authorities are acknowledging that the circuit does not fully meet the requirements but is still accepted for service.

Submit
51. Which Defense Information Systems Agency Circular(s) (DISAC) contain information needed to assign to temporary command communications service designator (CCSD)?

Explanation

The correct answer is 310-70-1 and 310-55-1. These DISAC circulars contain the necessary information to assign a temporary command communications service designator (CCSD).

Submit
52. What modulation technique is used by the Advanced Television Systems Committee (ATSC) system

Explanation

The Advanced Television Systems Committee (ATSC) system uses 8-vestigial sideband (8-VSB) modulation technique. This modulation technique is used for transmitting digital television signals over the airwaves. The 8-VSB modulation technique allows for efficient use of bandwidth and provides robust transmission, allowing for better reception in challenging signal environments. It is specifically designed for the transmission of digital television signals and is the standard modulation technique used in the ATSC system.

Submit
53. For either secure or nonsecure data network in theater deployable communications (TDC), the Crypto Interface Module's router normally acts as the?

Explanation

The Crypto Interface Module's router normally acts as the external router in either a secure or nonsecure data network in theater deployable communications (TDC). This means that it is responsible for routing external traffic between the TDC network and other external networks.

Submit
54. What recieve broadcast manager (RBM) processes military specific and classified information?

Explanation

The correct answer is "Type one". The Type one RBM is responsible for processing military specific and classified information.

Submit
55. If a circuit fails its management threshold (MT), what test might be performed?

Explanation

If a circuit fails its management threshold (MT), a quality control (QC) test might be performed. This test is conducted to ensure that the circuit meets the required quality standards and specifications. It involves checking the performance, functionality, and reliability of the circuit to identify any faults or issues that may have caused it to fail the management threshold. The QC test helps in identifying and resolving any problems with the circuit, ensuring that it is functioning properly and meets the desired quality standards.

Submit
56. The intergrated Services Digital Network (ISDN) configuration normally used to connect switches together is the?

Explanation

The correct answer is "primary rate interface (PRI)". ISDN is a digital telecommunications standard that allows the transmission of voice, video, and data over traditional telephone lines. The primary rate interface (PRI) is the ISDN configuration typically used to connect switches together. It provides 23 bearer channels for voice and data transmission, along with one signaling channel for call setup and control. The basic rate interface (BRI) is another ISDN configuration, but it is typically used for connecting end-user devices such as telephones or fax machines to the network. The trunk rate interface (TRI) and switch rate interface (SRI) are not standard ISDN configurations.

Submit
57. What link is used to connect the digital multiplex system (DMS)-core to the DMS-bus?

Explanation

The link used to connect the digital multiplex system (DMS)-core to the DMS-bus is DS-512.

Submit
58. What interior intrusion detection system (IIDS) is designed to detect intruders attempting to enter a shelter, storage igloo, or building?

Explanation

The AN/GSS-39 interior intrusion detection system (IIDS) is designed to detect intruders attempting to enter a shelter, storage igloo, or building.

Submit
59. When aligning a microeave fence sensor, what reading do you look for from the automatic gain control (AGC) using a multimeter?

Explanation

When aligning a microwave fence sensor, you would look for the lowest possible reading from the automatic gain control (AGC) using a multimeter. The AGC is responsible for adjusting the gain of the sensor to maintain a consistent signal level. By aligning the sensor to the lowest possible reading, you ensure that the signal is not too strong, which could lead to false alarms or interference.

Submit
60. For theater deployable communications (TDC) network design that has the crypto interface module (CIM) and the promina multiplexer (P-MUX) in separate locations, which piece of equipment is necessary?

Explanation

The CV-2048/8448-D is necessary for the theater deployable communications (TDC) network design with the crypto interface module (CIM) and the promina multiplexer (P-MUX) in separate locations. This equipment is specifically designed for high-speed data encryption and decryption, making it essential for secure communication in the TDC network.

Submit
61. Why are the R-Y and B-Y signals shifted 33 degrees counterclockwise?

Explanation

The R-Y and B-Y signals are shifted 33 degrees counterclockwise in order to maximize the color acuity for human vision. By shifting the R-Y signal to maximum and the B-Y signal to minimum color acuity, it helps align these signals with the way humans perceive colors. This adjustment ensures that the R-Y and B-Y signals accurately represent their respective primary colors in a way that is most visually pleasing and natural to human observers.

Submit
62. What are the frequencies at which the two common mode nulling adjustments are set in the video distribution amplifier?

Explanation

The two common mode nulling adjustments in the video distribution amplifier are set at 60 Hz and 5.5 MHz.

Submit
63. Between what ranges can you adjust the SDI-76 microwave sensor?

Explanation

The SDI-76 microwave sensor can be adjusted between the ranges of 15-75 feet. This means that the sensitivity of the sensor can be set to detect objects within this distance range. Adjusting the sensor within this range allows for flexibility in detecting objects at different distances, depending on the specific requirements of the application.

Submit
64. In the event of a power failure, how many hours can the vertical taut-wire senseor (VTWS) remain operation?

Explanation

The vertical taut-wire sensor (VTWS) can remain operational for 4 hours in the event of a power failure.

Submit
65. The first position of a trunk identifer indicates the?

Explanation

The first position of a trunk identifier indicates the "from" (sending) station. This means that the first position of the identifier specifies the station or location from where the trunk communication is originating. It helps in identifying the source of the communication and ensures that it is correctly routed to the intended destination.

Submit
66. What is the range of the alternate current (AC) presence time delay relay in the AN/GSS-39 system before a power loss reported?

Explanation

The range of the alternate current (AC) presence time delay relay in the AN/GSS-39 system before a power loss is between 1.5 to 15 seconds.

Submit
67. What is the operating frequency of the synchronizing oscillator in the "A" sensor post of the infrared pulsed intrusion detection system (IPIDS)?

Explanation

The operating frequency of the synchronizing oscillator in the "A" sensor post of the infrared pulsed intrusion detection system (IPIDS) is 1200 Hz.

Submit
68. What modulation technique is used for Digital Video Broadcasting - Cable transmission?

Explanation

MPEG-2 is the modulation technique used for Digital Video Broadcasting - Cable transmission. MPEG-2 is a standard for encoding and decoding audio and video signals. It is widely used for broadcasting digital television signals and is specifically designed for cable transmission. It provides efficient compression and high-quality video and audio transmission, making it suitable for delivering digital content over cable networks.

Submit
69. What type of signal is sent to the fence protection system (FPS) signal processor when an alarm is detected?

Explanation

When an alarm is detected, an analog signal is sent to the fence protection system (FPS) signal processor. This means that the signal is continuous and varies in amplitude and frequency. Analog signals are commonly used in alarm systems as they can accurately represent the detected alarm and provide real-time information to the FPS signal processor.

Submit
70. What does the AN/GSS-39 system use to monitor the integrity of all sensor wiring to the control panel?

Explanation

The AN/GSS-39 system uses an EOL module to monitor the integrity of all sensor wiring to the control panel. The EOL module is responsible for detecting any faults or tampering in the sensor wiring and ensuring that the system remains functional and secure. It serves as a crucial component in maintaining the overall integrity and reliability of the AN/GSS-39 system.

Submit
71. At what distance does the detection pattern of the infrared perimeter detection sensor (IPDS) transmitters change, and to what pattern does it change?

Explanation

The detection pattern of the infrared perimeter detection sensor (IPDS) transmitters changes at a distance of 150 feet. When the distance reaches 150 feet, the signal is transmitted to two receivers instead of just one.

Submit
72. Circuits that fail to meet all parameters specified in the appropriate technical schedule when test and acceptance (T&A) is done may no be accepted for service without the express approval of?

Explanation

When test and acceptance (T&A) is conducted, circuits that do not meet all the specified parameters in the technical schedule may not be accepted for service unless they receive express approval from the Telecommunications Service Order (TSO) issuing authority. This means that the TSO issuing authority has the power to approve circuits that do not meet the parameters, allowing them to be accepted for service despite not meeting the requirements.

Submit
73. Where do incoming unswitched circuits from a peripheral module (PM) enter the NT9S35A cross-point card matrix?

Explanation

The incoming unswitched circuits from a peripheral module (PM) enter the NT9S35A cross-point card matrix through the vertical bus.

Submit
74. What voice mail interface has the capability to support the temporary absence gretting (TAG) feature?

Explanation

The Meridian mail user interface has the capability to support the temporary absence greeting (TAG) feature. This means that users can set up a temporary greeting to play for callers when they are away or unavailable. The Meridian mail user interface allows users to easily customize their greetings and manage their voicemail settings.

Submit
75. What is the maximum length of the vertical taut-wire sensor (VTWS)

Explanation

The maximum length of the vertical taut-wire sensor (VTWS) is 328 feet. This means that the sensor can measure distances up to 328 feet vertically.

Submit
76. The Intergrated Services Digital Network (ISDN) Gateway Exchange (IGX) switch allows for stacks of up to 8 IGX switches, while the Avaya Prologix switch can operate in a stack of?

Explanation

The Avaya Prologix switch can operate in a stack of 2.

Submit
77. Which major component of the NorTel digital switching system (DSS) interface line and trunk subscribers?

Explanation

The correct answer is peripheral module (PM). In the NorTel digital switching system (DSS), the peripheral module is a major component that is responsible for interfacing with both the line and trunk subscribers. It handles the communication between the subscribers and the central control of the system. The peripheral module plays a crucial role in ensuring smooth and efficient communication within the NorTel digital switching system.

Submit
78. What annunciator is used with the Advisor VIII control unit?

Explanation

The correct answer is Small permanent communications and display segment (SPCDS). This annunciator is used with the Advisor VIII control unit.

Submit
79. The tactical interface gateway (TIG) uses what protocol to allow backwards compatibility between the Avaya Prologix and legacy Triservice Tactical Communications (TRI-TAC) equipment?

Explanation

The tactical interface gateway (TIG) uses the Internet protocol to allow backwards compatibility between the Avaya Prologix and legacy Triservice Tactical Communications (TRI-TAC) equipment. This protocol enables communication and data transfer between different devices and networks, making it suitable for connecting the Avaya Prologix and legacy TRI-TAC equipment.

Submit
80. Which digital multiplex system (DMS)-100 database facility provides facilities for storing data modifications orders (DMO) and for retrieving them at a specified time for execution?

Explanation

The correct answer is "Pending order file." The pending order file in the DMS-100 database facility is used to store data modification orders (DMO) and retrieve them at a specified time for execution. This facility allows for the efficient management of data modifications and ensures that they are executed in a timely manner. Other options such as journal file, table control, and dump/restore are not specifically designed for storing and retrieving data modification orders.

Submit
81. What are the two parts/priorities to the Telecommunications Service Priority (TSP)?

Explanation

The correct answer is provisioning and restoration. Provisioning refers to the process of setting up and configuring a telecommunications service, while restoration refers to the process of recovering or repairing a service in the event of a disruption or failure. These two priorities are essential in ensuring the smooth operation and continuity of telecommunications services.

Submit
82. How many serial data interface ports does the Meridian Option 11C Small System Controller have?

Explanation

The Meridian Option 11C Small System Controller has 3 serial data interface ports.

Submit
83. Which elements make up the control component of the SuperNode central control?

Explanation

The control component of the SuperNode central control consists of the computing mode (CM) and the system load module (SLM). These elements are responsible for managing and controlling the overall operation of the SuperNode system. The computing mode determines the mode of operation, while the system load module monitors and manages the system's workload to ensure efficient performance. Together, CM and SLM play a crucial role in maintaining control and optimizing the functioning of the SuperNode central control.

Submit
84. An important concept to understand is that digital video is merely an alternate means for?

Explanation

Digital video is not primarily used for minimizing video loss or minimizing signal dropout. Instead, it is mainly used for carrying a video waveform. This means that digital video is a method of transmitting video signals in a digital format, allowing for more efficient and reliable transmission compared to analog methods. By converting the video waveform into digital data, it can be easily transmitted, stored, and processed without significant loss of quality.

Submit
85. What device is used to combine tv channels into a single line?

Explanation

A modulator is a device used to combine TV channels into a single line. It takes multiple signals and converts them into a format that can be transmitted over a single line. This allows for the efficient transmission of multiple channels over a limited bandwidth. Modulators are commonly used in cable and satellite TV systems to combine and transmit multiple channels to subscribers.

Submit
86. Asymmetric trunk operation provides more effecient use of bandwidth by?

Explanation

Asymmetric trunk operation refers to the practice of not utilizing the bandwidth in the opposite direction of a one-way call. This means that when a call is made in one direction, the bandwidth in the opposite direction is not used, allowing for more efficient use of bandwidth. This is beneficial in situations where there is a need for one-way communication, as it prevents unnecessary bandwidth usage in the opposite direction.

Submit
87. A status acquisition message (SAM) is sent from?

Explanation

The correct answer is Defense Information Technology Contracting Office (DITCO). A status acquisition message (SAM) is sent from DITCO. DITCO is responsible for managing and overseeing the acquisition of information technology (IT) services and products for the Department of Defense (DoD). They act as the central contracting office for IT acquisitions, including the procurement of hardware, software, and telecommunications services. Therefore, it is logical to conclude that a SAM, which is a message related to the status of an acquisition, would be sent from DITCO.

Submit
88. What voice mail interface allows a user's mailbox to be partitioned into a main mailbox and up to eight submailboxes?

Explanation

The Voice Messaging User Interface Forum allows a user's mailbox to be partitioned into a main mailbox and up to eight submailboxes. This interface provides the necessary tools and options for managing and organizing voice messages in a user-friendly manner. It allows users to easily access and navigate through their main mailbox and submailboxes, ensuring efficient communication and organization of messages.

Submit
89. Which digital video tape format uses a 4:2:2 standard, with an 8 bit sampling rate, 19 mm wide tape, and has a 94 minute recording time?

Explanation

D1 is the correct answer because it is the only digital video tape format that matches all the given specifications. D1 uses a 4:2:2 standard, has an 8 bit sampling rate, and uses a 19 mm wide tape. Additionally, D1 has a recording time of 94 minutes, which is the same as the one mentioned in the question. Therefore, D1 is the correct answer.

Submit
90. Which is not a selectable option of the E-Flex II system?

Explanation

The E-Flex II system allows users to select various options for customization. The selectable options include alarm duration, number of cuts, and cable sensitivity. However, sector reporting priority is not a selectable option in the E-Flex II system.

Submit
91. How does the T-bus relate to the function of the Promina?

Explanation

The T-bus is responsible for carrying the multiplexed/demultiplexed information within the Promina system. It allows for communication between different cards and modules in the system, allowing for the transmission of data.

Submit
92. What components are directly connected to the input/output controller (IOC)?

Explanation

The components directly connected to the input/output controller (IOC) are printers, visual display unit (VDC), and tape drives. These components are connected to the IOC to facilitate input and output operations. The IOC acts as an interface between the CPU and these peripheral devices, allowing data to be transferred between them. By connecting printers, VDCs, and tape drives to the IOC, these devices can communicate with the CPU and perform their respective functions efficiently.

Submit
93. Which digital multiplex system (DMS)–100 database facility provides facilities for preserving data modifications orders (DMO) on tape or disk so that data tables can be restored if the system should fail?

Explanation

The correct answer is Journal file. The journal file facility in the DMS-100 database system allows for the preservation of data modifications orders (DMO) on tape or disk. This means that any changes made to the data tables can be recorded in the journal file, and in the event of a system failure, the data tables can be restored using the information stored in the journal file. This ensures data integrity and allows for easy recovery in case of system failures.

Submit
94. What is the maximum length of the Y taut-wire sensor  (YTWS)?

Explanation

The maximum length of the Y taut-wire sensor (YTWS) is 200 feet.

Submit
95. A standard Air Force E-Flex II monitors how many meters?

Explanation

The correct answer is 300. This suggests that a standard Air Force E-Flex II monitors a distance of 300 meters.

Submit
96. Which office or system confirms a restoration priority?

Explanation

The National Communications System (NCS) is responsible for confirming a restoration priority. This suggests that the NCS is the office or system that determines the order in which communication services should be restored during a disruption or emergency situation.

Submit
97. The GVG-110 video switcher effects key fills with

Explanation

The GVG-110 video switcher can fill key effects with either a key bus video or an internally-generated color matte signal. This means that the switcher can either use an external video source from the key bus or generate its own solid color background for the key effects.

Submit
98. What is the maximum number of channels of voice and/or data traffic that the FCC-100 can handle?

Explanation

The FCC-100 can handle a maximum of 16 channels of voice and/or data traffic.

Submit
99. The purpose of the GVG-110 general purpose contact-closure editor interface (GPI) is to allow

Explanation

The GVG-110 general purpose contact-closure editor interface (GPI) is designed to enable remote control of switcher transitions. This means that it allows users to control the switching between different sources or inputs on a switcher remotely, without having to physically operate the switcher itself. This can be useful in various applications such as live broadcasting, where the switcher transitions need to be controlled from a distance or automated for efficient workflow.

Submit
100. The GVG-110 video switcher serial interface allows?

Explanation

The GVG-110 video switcher serial interface allows remote control of the switcher by a personal computer or digital picture manipulator. This means that users can control the switcher's functions and transitions from a computer or digital picture manipulator without needing to physically interact with the switcher itself. This provides convenience and flexibility in operating the switcher and allows for seamless integration with other digital systems.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 02, 2011
    Quiz Created by
    Woodjh
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The three cornerstones of voice network system security are...
What function in a video tape recorder (VTR) is accomplished by...
What is the main purpose of a boundary fence?
How is information recorded or sotred on the videotape?
What is the beginning of a cable system called
The basic configuration of the entry control facility (ECF) includes...
Which sensor uses heat radiation to detect intruders?
What type alarm occurs if  the sensor post cover in vertical...
The primary reason you should measure the voltage across terminal or...
What must a line of detection detect?
The next generation recieve terminal (NGRT) accepts feeds from which...
What is a major advantage of digital recording over analog recording
Trend Analysis is a program that trends all of these outage data...
Broadband refers to a technology that can transmit?
Base cables normally enter the central office (CO) facility through a
You can compare a video tape recorder (VTR) head to a/an
If all deployed and fixed locations use global positioning system...
What was the primary driving factor behind the invention of telephone...
What role does the Private Branch Exchange (PBX) play in the telephony...
What is the primary mode of detection for the microwave fence sensor?
What is one path high frequency (HF) transmissions follow from the...
What is the means of measureing the amount of time that has been...
To transmit an audio signal over radio frequency (RF), it first has to...
When a telephone network is circuit switched, each call
Which digital multiplex system (DMS)-100 database facility is...
Trend Analysis is a program that ensures circuits meet management...
One disadvantage of microwave wavelengths is that the frequencies are...
What is not a factor in determining the refractive index of air?
How many miles above the earth are satellites placed in orbit?
Broadband technology uses all of thes etransmission mediums except?
Which models of the digital multiplex system (DMS) family are commonly...
Which piece of the Recieve broadcast manager (RBM) functions as a...
How many lines of video are discarded in high-definition 1080 line...
What component carries the signal to individual subscribers?
How many B and D channels does the standard configuration in North...
What is the Maximum number of ports that a digital multiplex...
What part of the video switcher allows titles or other video scenes to...
The secuirty lighting inside the restricted area is used to?
Within how many normal duty hours of completion action on the...
The determining factor in calculating the correct size of a waveguide...
Which is NOT a disadvantage of laser light transmission
Because the enhanced network (ENET) is a matrix, any input channel has...
Which satellite communications system is used to transmit space...
What is the most serious threat to voice network system integrity?
The red,gree, and blue (RGB) outputs from the camera go to the?
How many inches is the beam width at the widest portion of the...
Which module provides encryption/decryption of traffic into and out of...
How many card slots does the FCC-100 have, and how many of  them...
What configuration does the Red Data Module normally operate in?
What reports must be sent if the circuit does not meet all required...
Which Defense Information Systems Agency Circular(s) (DISAC) contain...
What modulation technique is used by the Advanced Television Systems...
For either secure or nonsecure data network in theater deployable...
What recieve broadcast manager (RBM) processes military specific and...
If a circuit fails its management threshold (MT), what test might be...
The intergrated Services Digital Network (ISDN) configuration normally...
What link is used to connect the digital multiplex system (DMS)-core...
What interior intrusion detection system (IIDS) is designed to detect...
When aligning a microeave fence sensor, what reading do you look for...
For theater deployable communications (TDC) network design that has...
Why are the R-Y and B-Y signals shifted 33 degrees counterclockwise?
What are the frequencies at which the two common mode nulling...
Between what ranges can you adjust the SDI-76 microwave sensor?
In the event of a power failure, how many hours can the vertical...
The first position of a trunk identifer indicates the?
What is the range of the alternate current (AC) presence time delay...
What is the operating frequency of the synchronizing oscillator in the...
What modulation technique is used for Digital Video Broadcasting -...
What type of signal is sent to the fence protection system (FPS)...
What does the AN/GSS-39 system use to monitor the integrity of all...
At what distance does the detection pattern of the infrared perimeter...
Circuits that fail to meet all parameters specified in the appropriate...
Where do incoming unswitched circuits from a peripheral module (PM)...
What voice mail interface has the capability to support the temporary...
What is the maximum length of the vertical taut-wire sensor (VTWS)
The Intergrated Services Digital Network (ISDN) Gateway Exchange (IGX)...
Which major component of the NorTel digital switching system (DSS)...
What annunciator is used with the Advisor VIII control unit?
The tactical interface gateway (TIG) uses what protocol to allow...
Which digital multiplex system (DMS)-100 database facility provides...
What are the two parts/priorities to the Telecommunications Service...
How many serial data interface ports does the Meridian Option 11C...
Which elements make up the control component of the SuperNode central...
An important concept to understand is that digital video is merely an...
What device is used to combine tv channels into a single line?
Asymmetric trunk operation provides more effecient use of bandwidth...
A status acquisition message (SAM) is sent from?
What voice mail interface allows a user's mailbox to be...
Which digital video tape format uses a 4:2:2 standard, with an 8 bit...
Which is not a selectable option of the E-Flex II system?
How does the T-bus relate to the function of the Promina?
What components are directly connected to the input/output controller...
Which digital multiplex system (DMS)–100 database facility...
What is the maximum length of the Y taut-wire sensor  (YTWS)?
A standard Air Force E-Flex II monitors how many meters?
Which office or system confirms a restoration priority?
The GVG-110 video switcher effects key fills with
What is the maximum number of channels of voice and/or data traffic...
The purpose of the GVG-110 general purpose contact-closure editor...
The GVG-110 video switcher serial interface allows?
Alert!

Advertisement