Questions
A string of 6 suspension insulators is to be fitted with guard ring. The pin to...

A string of 6 suspension insulators is to be fitted with guard ring. The pin to earth capacitances are equal to C. what are the values of line to pin capacitances to have uniform distribution over the string ?

In: Electrical Engineering

explain how a capacitor stores energy as an electrostatic charge. also draw a couple pictures

explain how a capacitor stores energy as an electrostatic charge. also draw a couple pictures

In: Electrical Engineering

types of faults in induction machine and how to solve each problem and which types of...

types of faults in induction machine and how to solve each problem and which types of test for the problem online or offline or both of them I can use

In: Electrical Engineering

Draw the circuit of a Boost Regulator and explain the operation of this circuit with the...

Draw the circuit of a Boost Regulator and explain the operation of this circuit with the aid of waveforms.

In: Electrical Engineering

Question 41 The 802.11 standard specifies the use of what technique in order to minimize the...

Question 41

  1. The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions?

    a.

    Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

    b.

    Carrier Sense Single Access with Collision Adaptation (CSSA/CA)

    c.

    Carrier Sense Multiple Access with Collision Mitigation (CMSA/CM)

    d.

    Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

1.25 points

Question 42

  1. The LLC sublayer is primarily concerned with managing MAC addresses in message frames.

    True

    False

1.25 points

Question 43

  1. The ST and SC fiber connectors are the most commonly found connectors due to their smaller sizes.

    True

    False

1.25 points

Question 44

  1. The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.

    True

    False

1.25 points

Question 45

  1. The Wireless Personal Area Network (WPAN) is defined in the 802.15 standard.

    True

    False

1.25 points

Question 46

  1. The most secure Wi-Fi communication is made possible by combining a RADIUS server with WPA or WPA2, known as WPA-Enterprise or WPA2-Enterprise, respectively.

    True

    False

1.25 points

Question 47

  1. The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?

    a.

    channel bonding

    b.

    multiple input-multiple output (MIMO)

    c.

    spread spectrum frequency hopping

    d.

    frame aggregation

1.25 points

Question 48

  1. The wireless spectrum, as defined by the FCC, spans between which two frequencies?

    a.

    3 kHz and 500 GHz

    b.

    9 kHz and 300 GHz

    c.

    125 kHz and 150 GHz

    d.

    3 MHz and 300 GHz

1.25 points

Question 49

  1. Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?

    a.

    captive portal

    b.

    guest network profile

    c.

    WPA2-Enterprise

    d.

    browser hijacking

1.25 points

Question 50

  1. Utilizing time slots that are adjusted according to priority and need is an example of what type of multiplexing on copper lines?

    a.

    frequency division multiplexing

    b.

    time division multiplexing

    c.

    statistical time division multiplexing

    d.

    wavelength division multiplexing

1.25 points

Question 51

  1. What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?

    a.

    control frames

    b.

    extended frames

    c.

    management frames

    d.

    data frames

1.25 points

Question 52

  1. What is the fastest Ethernet standard that can possibly be used on twisted-pair cabling?

    a.

    10TBase-T

    b.

    10GBase-T

    c.

    1000Base-T

    d.

    100Base-T

1.25 points

Question 53

  1. What is the industry standard angle for an Angle Polished Connector (APC)?

    a.

    16 degrees

    b.

    14 degrees

    c.

    12 degrees

    d.

    8 degrees

1.25 points

Question 54

  1. What is the maximum supported throughput of a CAT6 cable?

    a.

    100 Mbps

    b.

    1 Gbps

    c.

    100 Gbps

    d.

    10 Gbps

1.25 points

Question 55

  1. What is the minimum category of UTP cable required in order to support Gigabit speeds?

    a.

    Cat 5

    b.

    Cat 5e

    c.

    Cat 3

    d.

    Cat 6

1.25 points

Question 56

  1. What is the purpose of the Layer 2 LLC sublayer?

    a.

    It is used to manage MAC addresses in message frames.

    b.

    It is used to handle multiplexing, flow and error control, and reliability.

    c.

    It performs management of the physical layer's modulation techniques.

    d.

    It is used to manage low-level encryption on a network.

1.25 points

Question 57

  1. What kind of tool can you use to measure voltage on a cable length?

    a.

    time domain reflectometer

    b.

    light meter

    c.

    multimeter

    d.

    continuity tester

1.25 points

Question 58

  1. What multiplexing technology lowers cost by spacing frequency bands wider apart to allow for cheaper transceiver equipment?

    a.

    dense wavelength division multiplexing

    b.

    spaced wavelength division multiplexing

    c.

    coarse wavelength division multiplexing

    d.

    statistical time division multiplexing

1.25 points

Question 59

  1. What optional protocol can be used in 802.11 to reserve the medium for one node's use?

    a.

    RTS/CTS (Request to Send/Clear to Send)

    b.

    HA/RA (Hold Airtime/Reserved Airtime)

    c.

    RAR/CTU (Reserve Airtime Request/Clear to Use)

    d.

    RT/FT (Request Time/Fair Time)

1.25 points

Question 60

  1. What scenario describes an evil twin attack?

    a.

    A hacker is actively sending wireless probes to discover available wireless networks.

    b.

    A malicious access point is configured with the SSID of a non-malicious public access point.

    c.

    An attacker is actively attempting to brute force the PIN of a WPS enabled access point.

    d.

    A hacker is utilizing a protocol analyzer on a public Wi-Fi network to discover packet contents.

In: Electrical Engineering

Logisim Evolution is a freeware 4. Bit sequence recognizer [30] Submission file for this part: 4.circ...

Logisim Evolution is a freeware

4. Bit sequence recognizer [30]

  • Submission file for this part: 4.circ
  • Main circuit name: sequencecheck
  • Input pin(s): inputx [1], sysclock [1]
  • Output pin(s): outputr [1]

Derive a minimal state table for a Mealy model FSM that acts as a sequence checker. During four consecutive clock cycles, a sequence of four values of the signal x is applied, forming a binary number. The oldest value of x would become the most significant bit in that binary number. The most recent value of x would become the least significant bit.

The FSM will output outputr = 1 when it detects that the previous 4 bit sequence was either 0100 or 1010. At all other times, including when the previous sequence was not those described previously, outputr = 0. Implement the FSM as a circuit in Logisim Evolution.

Note that much like the last problem, this is not a sliding window. After the fourth clock pulse, the circuit resets itself and is ready to take in the next 4 bit sequence.

You will lose a significant portion of credit if your FSM is not minimized.

You will lose a significant portion of credit if your combinational logic is not minimized. If you violate both this and the previous constraint, you will get a 0.

In: Electrical Engineering

can you provide me by two questions with answers for fundamental of electrical enginnering. I want...

can you provide me by two questions with answers for fundamental of electrical enginnering. I want to test an expert   I want questions for testing an expert send the question with answers make it clear separat question and answer(hot question)

In: Electrical Engineering

Implement the following logic function as embedded logic inside a positive TSPC register. F= ab +...

Implement the following logic function as embedded logic inside a positive TSPC register.

F= ab + bcd + ad

In: Electrical Engineering

a. Find the average and rms values of the current i(t) = 6 + 10 sin...

a. Find the average and rms values of the current i(t) = 6 + 10 sin ωt A.
Vb in the voltage-regulator circuit below varies by ± 10 % from its nominal value of 12 V. If the circuit has a constant reverse breakdown voltage
VZ = 8.2 V for 75 mA ≤ iZ ≤ 1 A.
b. Obtain RS that will maintain vL = VZ = 8.2 V
c. Determine iZ ≥ 75 mA at the lowest value of Vb

In: Electrical Engineering

How to design FIR lowpass filter using matlab. Note : Do not write matlab code. Only...

How to design FIR lowpass filter using matlab.

Note : Do not write matlab code. Only explain the steps of designing filter

In: Electrical Engineering

Q1 / solve for emitter coupled logic (ECL) : 1) ECL inverter : Study its structure...

Q1 / solve for emitter coupled logic (ECL) :

1) ECL inverter : Study its structure and operation.

2) Study and analyze voltage transfer characteristic (VTC) of the ECL inverter.

3) Study and analyze noise margin of the ECL inverter.

4) Study the static power dissipation of the ECL inverter.

5) Study the propagation delay of the ECL inverter.

6) Design problem: Use ECL to design a 3-input NAND.

Ps : please solve the question in computer not on papers that will be much better, thank you!

In: Electrical Engineering

Assume that the registers have the following values all in hex and CS=0700, DS=0B00, SS=0A00, SI=A200,...

Assume that the registers have the following values all in hex and CS=0700, DS=0B00, SS=0A00, SI=A200, DI=2C00, AX=A00B, BX=130C, BP=AF09, CX=F1D5 and DX=1055. Calculate the physical address of memory where the operand is stored and show the contents of memory locations in each of the following addressing examples.

a) MOV [BX]-10AH, CH b) MOV [BP][DI]+1CH,DX c) MOV [DI+BP-99FH],BX d) MOV [SI+4BH],BL

In: Electrical Engineering

Compare hydroelectric and natural coal-fired power plants based on sustainability (or triple bottom line) perspectives. What...

Compare hydroelectric and natural coal-fired power plants based on sustainability (or triple bottom line) perspectives. What are the similarities and differences between their economics (1 point), social (1 point), and environmental (2 points) perspectives?

In: Electrical Engineering

A 100 F capacitor and a 225  resistor are connected in series with a 75.0 V battery....

A 100 F capacitor and a 225  resistor are connected in series with a 75.0 V battery. The switch is closed and the capacitor begins to charge.  

a)When does the capacitor hold 15.0 % of its maximum charge? Express your answer in milliseconds.

b)What is the voltage across the resistor at this same time?

Please state your answers as clear as possible and show all the steps and formulas used. Thank you!!!

In: Electrical Engineering

Describe the conditions under which an op-amp circuit will oscillate. Provide a technique to avoid undesirable...

  1. Describe the conditions under which an op-amp circuit will oscillate. Provide a technique to avoid undesirable oscillation.

  1. Explain why the gain-bandwidth product (GBW) is limited for any amplifier, and why GBW is constant for a fully compensated voltage feedback op-amp. If a fully compensated op-amp has GBW = 4 MHz, and its closed-loop amplifier circuit has gain (closed-loop gain) = 100, what is the loop gain at 100 Hz?

In: Electrical Engineering