Get premium membership and access revision papers, questions with answers as well as video lessons.

Telecommunication Network (Bbit 242) (Cisy 231) 1St Trimester 2014 Question Paper

Telecommunication Network (Bbit 242) (Cisy 231) 1St Trimester 2014 

Course:Bachelor Of Business Information Technology

Institution: Kenya Methodist University question papers

Exam Year:2014



TELECOMMUNICATION NETWORK (BBIT 242) (CISY 231) 1ST TRIMESTER 2014
KENYA METHODIST UNIVERSITY

END OF 1'ST 'TRIMESTER 2014 (EVENING) EXAMINATION

FACULTY : COMPUTING & INFORMATICS
DEPARTMENT : COMPUTER SCIENCE AND BUSINESS
INFORMATION
UNIT CODE : BBIT 242/CISY 231
UNIT TITLE : TELECOMMUNICATION NETWORK
TIME : 2 HOURS


Instructions: Answer all questions in section A and any other two questions in section B.

SECTION A

Question One

Define the term multiplexing.
(2mks)
Describe the role of a modem by describing the modulation and demodulation process.
(4mks)
Define the term parity check bit and briefly explain how the even parity and odd parity checks work.
(5mks)
List two advantages of data compression across a network.
(4mks)
Differentiate between the checksum error detection technique and the CRC error detection technique.
(4mks)
List four functions of a telephone set
(4mks)
Briefly describe two advantages of ISDN.
(4mks)
List three places where x25 is used.
(3mks)
SECTION B:

Question Two

Mobile telecommunication has grown in importance and its use has steadily increased in Kenya. With different mobile telecommunication commanding different market shares in the country. Discuss the reasons behind the growth of mobile telephony in Kenya.
(10mks)
The development of mobile telecommunication has seen the emergence of mobile number portability (MNP) in Kenya study the industry trends in MNP in Kenya and come up with challenges facing MUP from your challenges recommend solution to make MNP a success in Kenya.
(10mks)
Question Three

Compression aims to achieve various aims in multimedia methods include lossy and lossless compression methods. Describe the following compression methods you may use examples to illustrate your answer.
Huffman coding.
(8mks)
Run length encoding.
(3mks)
Explain the following as related to compression
Spatial compression.
(3mks)
Temporal compression
(3mks)
Question Four

Explain the following network threats and provide possible solutions of combating the problem.
Denial of service
Confidential breaches
Data diddling
(8mks)
State the specification of giga Ethernet
(2mks)
Distinguish between PSTN and PSDN technologies of data transmission.
(4mks)
Describe the following wireless telecommunication technologies
Microware
Cellular radio technology
Satellite.
(6mks)






More Question Papers


Popular Exams



Return to Question Papers