All RF Cafe Quizzes make great fodder for
employment interviews for technicians or engineers - particularly those who are
fresh out of school or are relatively new to the work world. Come to think of it,
they would make equally excellent study material for the same persons who are going
to be interviewed for a job.
Click here for the complete list of
RF Cafe Quizzes.
Note: Some material based on books have
quiz is based on the information presented in Battlespace Technologies: Network-Enabled Information Dominance, by
Richard S. Deakin. Published by Artech House.
Some of these books are available as prizes in the monthly
RF Cafe Giveaway.
book has some of the best photos of modern war-fighting technology that I have seen.
Note: My across-the-pond friend, Ian Poole, of Adrio Communications and webmaster of the
Radio-Electronics.com website, is prominently
acknowledged by the author for his role in producing the book.
1. What is the
most significant difference between past generations in war-fighting technology and contemporary technology?
a) Nuclear weapons
b) Women in the military
c) Pilotless vehicles
d) Information dominance
2. This new Network Enabled Capability (NEC), depends on which of these philosophies?
a) Think globally, not locally
b) Think synchronized knowledge, not synchronized requests
loosely coupled flexibility, not tightly coupled efficiency
d) All the above
3. Match the following network names to the diagrams.
||Multiinput multioutput node
Insert answer graphic
(see page 65)
4. Which system provides technically derived intelligence to
detect, locate, track, identify,
and describe the specific characteristics of fixed and dynamic target
objects and sources?
a) MASINT (measurement and signature intelligence)
b) HUMINT (human intelligence)
c) ELINT (electronic intelligence)
d) RADINT (radar intelligence)
5. Which phenomenon is NOT a component of an aircraft's detection signature?
a) Wake turbulence and aerodynamic surface heating
b) Optical glint and acoustic signature
size and weight
d) Radar emissions and IR exhaust signature
6. What is
a) Stacking of threats in order of relevance
b) Using multiple generations of
c) Stacking physical layers of IP data
d) Deploying sensors at various altitudes from ground
7. Which markup language / protocol is fictitious?
Markup Language (MML)
b) eXtensible Markup Language (XML)
c) Transducer Markup Language (TML)
Text Markup Language (HTML)
8. Long-range communications is most dependent on
a) More on frequency than on power
b) More on power than on frequency
c) Equally on both
is a primary characteristic of burst communications?
a) Amplitude Modulation
b) Data compression
c) Quadrature modulation
What is shown in the picture to the right?
a) An autonomous robotic spider
b) A articulately tactile
c) An inverted "dead bug" IC mounting configuration
d) A Klingon spaceship
Need some help? Click here for the
answers and explanations.