Telecommunication Network (Bbit 242) (Cisy 231) 1St Trimester 2014 Question Paper
Telecommunication Network (Bbit 242) (Cisy 231) 1St Trimester 2014
Course:Bachelor Of Business Information Technology
Institution: Kenya Methodist University question papers
Exam Year:2014
TELECOMMUNICATION NETWORK (BBIT 242) (CISY 231) 1ST TRIMESTER 2014
KENYA METHODIST UNIVERSITY
END OF 1'ST 'TRIMESTER 2014 (EVENING) EXAMINATION
FACULTY : COMPUTING & INFORMATICS
DEPARTMENT : COMPUTER SCIENCE AND BUSINESS
INFORMATION
UNIT CODE : BBIT 242/CISY 231
UNIT TITLE : TELECOMMUNICATION NETWORK
TIME : 2 HOURS
Instructions: Answer all questions in section A and any other two questions in section B.
SECTION A
Question One
Define the term multiplexing.
(2mks)
Describe the role of a modem by describing the modulation and demodulation process.
(4mks)
Define the term parity check bit and briefly explain how the even parity and odd parity checks work.
(5mks)
List two advantages of data compression across a network.
(4mks)
Differentiate between the checksum error detection technique and the CRC error detection technique.
(4mks)
List four functions of a telephone set
(4mks)
Briefly describe two advantages of ISDN.
(4mks)
List three places where x25 is used.
(3mks)
SECTION B:
Question Two
Mobile telecommunication has grown in importance and its use has steadily increased in Kenya. With different mobile telecommunication commanding different market shares in the country. Discuss the reasons behind the growth of mobile telephony in Kenya.
(10mks)
The development of mobile telecommunication has seen the emergence of mobile number portability (MNP) in Kenya study the industry trends in MNP in Kenya and come up with challenges facing MUP from your challenges recommend solution to make MNP a success in Kenya.
(10mks)
Question Three
Compression aims to achieve various aims in multimedia methods include lossy and lossless compression methods. Describe the following compression methods you may use examples to illustrate your answer.
Huffman coding.
(8mks)
Run length encoding.
(3mks)
Explain the following as related to compression
Spatial compression.
(3mks)
Temporal compression
(3mks)
Question Four
Explain the following network threats and provide possible solutions of combating the problem.
Denial of service
Confidential breaches
Data diddling
(8mks)
State the specification of giga Ethernet
(2mks)
Distinguish between PSTN and PSDN technologies of data transmission.
(4mks)
Describe the following wireless telecommunication technologies
Microware
Cellular radio technology
Satellite.
(6mks)
More Question Papers
Exams With Marking Schemes
Popular Exams
Mid Term Exams
End Term 1 Exams
End Term 3 Exams
Opener Exams
Full Set Exams
Return to Question Papers