All RF Cafe quizzes would make perfect fodder
employment interviews for technicians or engineers - particularly those who are fresh
out of school or are relatively new to the work world. Come to think of it, they would
make equally excellent study material for the same persons who are going to be interviewed
for a job.
Click here for the complete list of
RF Cafe Quizzes.
Note: Some material based on books have quoted passages.
This quiz is based on the information presented in Battlespace Technologies: Network-Enabled Information Dominance, by Richard S. Deakin. Published by Artech House.
Note: Some of these books are available as prizes in the monthly RF Cafe Giveaway.
This book has some of the best photos of modern war-fighting technology that I have seen.
Note: My across-the-pond friend, Ian Poole, of Adrio Communications and webmaster of the Radio-Electronics.com website, is prominently acknowledged by the author for his role in producing the book.
1. What is the most significant difference between past generations in war-fighting technology and contemporary technology?
a) Nuclear weapons
b) Women in the military
c) Pilotless vehicles
d) Information dominance
2. This new Network Enabled Capability (NEC), depends on which of these philosophies?
a) Think globally, not locally
b) Think synchronized knowledge, not synchronized requests
c) Think loosely coupled flexibility, not tightly coupled efficiency
d) All the above
3. Match the following network names to the diagrams.
|A ________||Delany triangulation|
|C ________||Fully connected|
|F ________||Minimally connected|
|G ________||Multiinput multioutput node|
Insert answer graphic
(see page 65)
4. Which system provides technically derived intelligence to detect, locate, track, identify,
and describe the specific characteristics of fixed and dynamic target objects and sources?
a) MASINT (measurement and signature intelligence)
b) HUMINT (human intelligence)
c) ELINT (electronic intelligence)
d) RADINT (radar intelligence)
5. Which phenomenon is NOT a component of an aircraft's detection signature?
a) Wake turbulence and aerodynamic surface heating
b) Optical glint and acoustic signature
c) Pilot size and weight
d) Radar emissions and IR exhaust signature
6. What is "layered surveillance?"
a) Stacking of threats in order of relevance
b) Using multiple generations of technologies
c) Stacking physical layers of IP data
d) Deploying sensors at various altitudes from ground to space
7. Which markup language / protocol is fictitious?
a) Microsoft Markup Language (MML)
b) eXtensible Markup Language (XML)
c) Transducer Markup Language (TML)
d) Hyper Text Markup Language (HTML)
8. Long-range communications is most dependent on which parameter
a) More on frequency than on power
b) More on power than on frequency
c) Equally on both
9. What is a primary characteristic of burst communications?
a) Amplitude Modulation
b) Data compression
c) Quadrature modulation
10. What is shown in the picture to the right?
a) An autonomous robotic spider
b) A articulately tactile sensor unit
c) An inverted "dead bug" IC mounting configuration
d) A Klingon spaceship
Need some help? Click here for the answers and explanations.