Term
List the four factors most important to having good microphone techniques. |
|
Definition
Loudness; Rates of speech; Pronunciation; Patterns of speech |
|
|
Term
Choose the microphone technique described: Accent the word in the more widely accepted way |
|
Definition
|
|
Term
Choose the microphone technique described: Keep voice level above background noises |
|
Definition
|
|
Term
Choose the microphone technique described: Group words so that the ideas are clear |
|
Definition
|
|
Term
Choose the microphone technique described: Do not run ideas or words together |
|
Definition
|
|
Term
Choose the microphone technique described: Speak words as they are commonly accepted in this country |
|
Definition
|
|
Term
Choose the microphone technique described: Allow more time for key words and phrases |
|
Definition
|
|
Term
Concerning rate of speech, you should speak quickly enough to sound how? |
|
Definition
|
|
Term
Which factor of good microphone techniques involves strong and distinct movements of the speech mechanism? |
|
Definition
|
|
Term
List the letters than can sound alike over a voice circuit and requires phonetic spelling to eliminate confusion. |
|
Definition
|
|
Term
Describe one of the two purposes for always spelling out encoded groups. |
|
Definition
It either eliminates any doubts in the receiving operator's mind or it gives a slightly longer interval between characters; thereby, improving the receiving operator's accuracy of recording. |
|
|
Term
What prowords should you use to avoid confusion and misunderstanding? |
|
Definition
|
|
Term
Why was the time-zone demarcation originally established and mainly spaced at regular intervals? |
|
Definition
|
|
Term
Working eastward from Greenwich (Zone Z), list the local time zones in alphabetical order. |
|
Definition
|
|
Term
Working westward from Greenwich (Zone Z), list the local time zones in alphabetical order. |
|
Definition
|
|
Term
How many degrees wide are M and Y local time zones? |
|
Definition
7.5°. They share a 15° zone |
|
|
Term
Define what the digits and letter in the DTG 231545R. |
|
Definition
23 - Day of the month; 1545 Time in Zone R. |
|
|
Term
Calculate the date and time you would record a message transmitted from 53°20'30"N to you at 006°45'W on 12 March 2010 at 1635 hours local time. |
|
Definition
Divide the longitude by 15 = 0, with a remainder of 6°45'; 121635Z |
|
|
Term
Type of practice: Use of excessive transmit power |
|
Definition
|
|
Term
Type of practice: Excessive tuning and test |
|
Definition
Specifically forbidden practice |
|
|
Term
Type of practice: Transmitting at speeds beyond the capability of the receiving operator |
|
Definition
|
|
Term
Type of practice: Use other than authorized prowords |
|
Definition
Specifically forbidden practice |
|
|
Term
Type of practice: Excessive time changing frequencies/adjusting equipment |
|
Definition
|
|
Term
Type of practice: Profane, indecent, or obscene language |
|
Definition
Specifically forbidden practice |
|
|
Term
Type of practice: Violation of radio silence |
|
Definition
Specifically forbidden practice |
|
|
Term
Why is it necessary to sometimes use radio silence? |
|
Definition
To prevent information from reaching hostile forces |
|
|
Term
Which method of authentication validates an imposed emergency radio silence and verifies it is authentic? |
|
Definition
transmission authentication |
|
|
Term
When an emergency silence is imposed, when must all stations called cease transmitting? |
|
Definition
|
|
Term
What is the purpose of authentication? |
|
Definition
To prevent the enemy from entering the net |
|
|
Term
List one example of a military situation that would require authentication when transmitting operating instructions? |
|
Definition
Closing down a station or watch; changing frequencies other than normally scheduled changes; requesting artillery fire support; directing relocation of units, etc |
|
|
Term
What is operational distinction between the two methods of authentication? |
|
Definition
Challenge and reply requires two-way communications; transmission is one-way with no reply. |
|
|
Term
When must the transmission authentication be used? |
|
Definition
When authentication is required, and its not possible or desirable for the receiving station to reply. |
|
|
Term
When authentication is required or desired, which party should challenge first? |
|
Definition
|
|
Term
What rule should you apply when referencing an encoding and authentication cipher table? |
|
Definition
Read down for authentication and read right for encoding and decoding |
|
|
Term
To ensure you successfully encode and decode communication, what should you do? |
|
Definition
Check and recheck before transmitting |
|
|
Term
What is transmitter to the receiving station and is key to the decryption process? |
|
Definition
|
|
Term
What is the purpose of using variants for repeated numbers and letters. |
|
Definition
To prevent showing patterns in our encoded messages. |
|
|
Term
What is the objective of certain foreign governments pertaining to the United State's electromagnetic environment? |
|
Definition
|
|
Term
List the three major responsibilities you have, as an operator, pertaining to radio deception. |
|
Definition
1. Anticipate various forms of intentional interference 2. Be familiar with the procedures that help maintain effective communication 3.Remember that if the interference is intentional, you should try to identify it, evaluate the ECCM and respond appropriately. |
|
|
Term
Name the three major types of deception. |
|
Definition
1. Imitative 2. Manipulative 3. Simulative |
|
|
Term
List two types of tactics that a deceptive operator uses to mislead us. |
|
Definition
1. Use the call sign of a friendly station to answer net calls and accept traffic 2. Offer coded traffic that cannont be decoded; pretend to have important traffic to cause delays and create confusion |
|
|
Term
List two types of tactics that a deceptive operator uses to mislead us. |
|
Definition
3. Transmit false orders and instructions, countermand existing order, or issue conflicting statements 4. Try to break listening silence by using distress calls, obscene language, or insults |
|
|
Term
Name a type of accidental interference that can disturb radio frequencies. |
|
Definition
Thunderstorms or friendly electronic devices |
|
|
Term
As an operator, why is it important to recognize particular types of jamming? |
|
Definition
To counteract jamming with defensive measures |
|
|
Term
Which type of modulated jamming effect can be demoralizing? |
|
Definition
|
|
Term
Which type of modulated jamming sounds like grunting? |
|
Definition
|
|
Term
Which type of modulated jamming produces only a nuisance effect and allows you to work through it? |
|
Definition
|
|
Term
Briefly explain what you can do to find out if radio interference is due to a faulty radio set or coming from an outside source? |
|
Definition
Disconnect the antenna. If the interference stops, it is not due to your radio source and comes from an outside source. If it doesn't stop your radio set needs attention. |
|
|
Term
List the items you would include in a detailed description when reporting jamming or suspected jamming. |
|
Definition
Jamming type, strength, frequency used, origination direction, etc |
|
|
Term
What two actions should you perform, in the cipher mode, if jamming is very disruptive on the primary frequency and it occurs before the NCS can direct a frequency change? |
|
Definition
Automatically move to the first AJ/ALT frequency listed for that time-period and maintain a listening watch while waiting for direction from the NCS. |
|
|
Term
How long do you maintain a listening watch before moving to the second AJ/ALT once all stations move to the first AJ/ALT frequency? |
|
Definition
|
|
Term
What is mandatory for the NCS to do following a "GO CIPHER" transmission? |
|
Definition
Transmission authentication |
|
|
Term
What are the two purposes of the field MIJI reports? |
|
Definition
To evaluate the enemy’s actions or intentions and provide data for appropriate tactical countermeasures on the battlefield and to provide a complete and accurate follow-up report to ensure MIJI incidents are documented and evaluated, which provides data for a continuing study of foreign electronic warfare capabilities and activities. |
|
|
Term
What is the primary reason for an initial MIJI report? |
|
Definition
Identify intruding element for targeting and eventually neutralization/elimination. |
|
|
Term
What part of a follow-up MIJI report must be securely transmitted by an offline system. |
|
Definition
|
|