Term
| List the four factors most important to having good microphone techniques. |
|
Definition
| Loudness; Rates of speech; Pronunciation; Patterns of speech |
|
|
Term
| Choose the microphone technique described: Accent the word in the more widely accepted way |
|
Definition
|
|
Term
| Choose the microphone technique described: Keep voice level above background noises |
|
Definition
|
|
Term
| Choose the microphone technique described: Group words so that the ideas are clear |
|
Definition
|
|
Term
| Choose the microphone technique described: Do not run ideas or words together |
|
Definition
|
|
Term
| Choose the microphone technique described: Speak words as they are commonly accepted in this country |
|
Definition
|
|
Term
| Choose the microphone technique described: Allow more time for key words and phrases |
|
Definition
|
|
Term
| Concerning rate of speech, you should speak quickly enough to sound how? |
|
Definition
|
|
Term
| Which factor of good microphone techniques involves strong and distinct movements of the speech mechanism? |
|
Definition
|
|
Term
| List the letters than can sound alike over a voice circuit and requires phonetic spelling to eliminate confusion. |
|
Definition
|
|
Term
| Describe one of the two purposes for always spelling out encoded groups. |
|
Definition
| It either eliminates any doubts in the receiving operator's mind or it gives a slightly longer interval between characters; thereby, improving the receiving operator's accuracy of recording. |
|
|
Term
| What prowords should you use to avoid confusion and misunderstanding? |
|
Definition
|
|
Term
| Why was the time-zone demarcation originally established and mainly spaced at regular intervals? |
|
Definition
|
|
Term
| Working eastward from Greenwich (Zone Z), list the local time zones in alphabetical order. |
|
Definition
|
|
Term
| Working westward from Greenwich (Zone Z), list the local time zones in alphabetical order. |
|
Definition
|
|
Term
| How many degrees wide are M and Y local time zones? |
|
Definition
| 7.5°. They share a 15° zone |
|
|
Term
| Define what the digits and letter in the DTG 231545R. |
|
Definition
| 23 - Day of the month; 1545 Time in Zone R. |
|
|
Term
| Calculate the date and time you would record a message transmitted from 53°20'30"N to you at 006°45'W on 12 March 2010 at 1635 hours local time. |
|
Definition
| Divide the longitude by 15 = 0, with a remainder of 6°45'; 121635Z |
|
|
Term
Type of practice: Use of excessive transmit power |
|
Definition
|
|
Term
Type of practice: Excessive tuning and test |
|
Definition
| Specifically forbidden practice |
|
|
Term
Type of practice: Transmitting at speeds beyond the capability of the receiving operator |
|
Definition
|
|
Term
Type of practice: Use other than authorized prowords |
|
Definition
| Specifically forbidden practice |
|
|
Term
Type of practice: Excessive time changing frequencies/adjusting equipment |
|
Definition
|
|
Term
Type of practice: Profane, indecent, or obscene language |
|
Definition
| Specifically forbidden practice |
|
|
Term
Type of practice: Violation of radio silence |
|
Definition
| Specifically forbidden practice |
|
|
Term
| Why is it necessary to sometimes use radio silence? |
|
Definition
| To prevent information from reaching hostile forces |
|
|
Term
| Which method of authentication validates an imposed emergency radio silence and verifies it is authentic? |
|
Definition
| transmission authentication |
|
|
Term
| When an emergency silence is imposed, when must all stations called cease transmitting? |
|
Definition
|
|
Term
| What is the purpose of authentication? |
|
Definition
| To prevent the enemy from entering the net |
|
|
Term
| List one example of a military situation that would require authentication when transmitting operating instructions? |
|
Definition
| Closing down a station or watch; changing frequencies other than normally scheduled changes; requesting artillery fire support; directing relocation of units, etc |
|
|
Term
| What is operational distinction between the two methods of authentication? |
|
Definition
| Challenge and reply requires two-way communications; transmission is one-way with no reply. |
|
|
Term
| When must the transmission authentication be used? |
|
Definition
| When authentication is required, and its not possible or desirable for the receiving station to reply. |
|
|
Term
| When authentication is required or desired, which party should challenge first? |
|
Definition
|
|
Term
| What rule should you apply when referencing an encoding and authentication cipher table? |
|
Definition
| Read down for authentication and read right for encoding and decoding |
|
|
Term
| To ensure you successfully encode and decode communication, what should you do? |
|
Definition
| Check and recheck before transmitting |
|
|
Term
| What is transmitter to the receiving station and is key to the decryption process? |
|
Definition
|
|
Term
| What is the purpose of using variants for repeated numbers and letters. |
|
Definition
| To prevent showing patterns in our encoded messages. |
|
|
Term
| What is the objective of certain foreign governments pertaining to the United State's electromagnetic environment? |
|
Definition
|
|
Term
| List the three major responsibilities you have, as an operator, pertaining to radio deception. |
|
Definition
1. Anticipate various forms of intentional interference 2. Be familiar with the procedures that help maintain effective communication 3.Remember that if the interference is intentional, you should try to identify it, evaluate the ECCM and respond appropriately. |
|
|
Term
| Name the three major types of deception. |
|
Definition
1. Imitative 2. Manipulative 3. Simulative |
|
|
Term
| List two types of tactics that a deceptive operator uses to mislead us. |
|
Definition
1. Use the call sign of a friendly station to answer net calls and accept traffic 2. Offer coded traffic that cannont be decoded; pretend to have important traffic to cause delays and create confusion |
|
|
Term
| List two types of tactics that a deceptive operator uses to mislead us. |
|
Definition
3. Transmit false orders and instructions, countermand existing order, or issue conflicting statements 4. Try to break listening silence by using distress calls, obscene language, or insults |
|
|
Term
| Name a type of accidental interference that can disturb radio frequencies. |
|
Definition
| Thunderstorms or friendly electronic devices |
|
|
Term
| As an operator, why is it important to recognize particular types of jamming? |
|
Definition
| To counteract jamming with defensive measures |
|
|
Term
| Which type of modulated jamming effect can be demoralizing? |
|
Definition
|
|
Term
| Which type of modulated jamming sounds like grunting? |
|
Definition
|
|
Term
| Which type of modulated jamming produces only a nuisance effect and allows you to work through it? |
|
Definition
|
|
Term
| Briefly explain what you can do to find out if radio interference is due to a faulty radio set or coming from an outside source? |
|
Definition
| Disconnect the antenna. If the interference stops, it is not due to your radio source and comes from an outside source. If it doesn't stop your radio set needs attention. |
|
|
Term
| List the items you would include in a detailed description when reporting jamming or suspected jamming. |
|
Definition
| Jamming type, strength, frequency used, origination direction, etc |
|
|
Term
| What two actions should you perform, in the cipher mode, if jamming is very disruptive on the primary frequency and it occurs before the NCS can direct a frequency change? |
|
Definition
| Automatically move to the first AJ/ALT frequency listed for that time-period and maintain a listening watch while waiting for direction from the NCS. |
|
|
Term
| How long do you maintain a listening watch before moving to the second AJ/ALT once all stations move to the first AJ/ALT frequency? |
|
Definition
|
|
Term
| What is mandatory for the NCS to do following a "GO CIPHER" transmission? |
|
Definition
| Transmission authentication |
|
|
Term
| What are the two purposes of the field MIJI reports? |
|
Definition
| To evaluate the enemy’s actions or intentions and provide data for appropriate tactical countermeasures on the battlefield and to provide a complete and accurate follow-up report to ensure MIJI incidents are documented and evaluated, which provides data for a continuing study of foreign electronic warfare capabilities and activities. |
|
|
Term
| What is the primary reason for an initial MIJI report? |
|
Definition
| Identify intruding element for targeting and eventually neutralization/elimination. |
|
|
Term
| What part of a follow-up MIJI report must be securely transmitted by an offline system. |
|
Definition
|
|