Which of the following usually stores all user-related data that is also relevant to GSM mobile systems?
SIM
4In which one of the following codes with specific characteristics can be applied to the transmission?
CDMA
1Which of the following offers packet mode data transfer service over the cellular network?
GPRS
2Which one of the following enables us to use the entire bandwidth simultaneously?
CDMA
2In the Cellular Network, on which of the following, the cell's shape depends?
Environment Condition
3In a Cellular network, which of the following is used to use the same frequency for others?
Frequency reuse
2Which of the following uses wireless as the mode of communication for transferring or exchanging data between various mobiles over a short-range?
Bluetooth technology
3The main aim of the file system is to support________
All of the above
4Which of the following can be considered as the primary function of snooping TCP?
To buffer data close to the mobile host to perform fast local retransmission in case of packet loss.
1In which one of the following, the slow and fast hopping is used?
FHSS
3Mobile Computing allows transmission of data from one wireless-enabled device to another_
Wireless-enabled device
3Which of the following can be considered as the drawbacks of the Mobile and Wireless Devices?
All of the above
4In general, a mobile computing environment can also be considered as the type of __________ environment.
Distributed computing
3When was the 2G communication introduced in the market?
1988
4Which of the following is supported data rates of 4G Networks?
100mbs
2Which one of the following is considered as the GSM supplementary service?
Call forwarding
3How many sub-systems are Global Systems for Mobiles?
3
2Which of the following is considered as the heart of the Global Systems for Mobiles (or GSM)?
Networks Switching Sub System
1The term "HLR" stands for the ______
Home Location Register
1BSC comes under which of the following category?
Radio
2The term TDM stands for___.
Time Division Multiplexing
1In which of the following, the single-channel has the ability to carry all transmissions simultaneously?
In the Code Division, Multiple Access (or CDMA)
1In which one of the following times is specifically divided into several time slots that are in the fixed patterns?
TDMA
2How many types of security services are provided by the GSM?
3
3In which one of the following, the early FM push to talk telephone system, was used?
Half Duplex
1Which of the following statements about the Half Duplex is correct?
It is a type of communication in one direction at a time
2The term _________ refers to transporting a mobile station from one base station to another base station.
Handoff or hand over
3Which of the following stores Mobile Subscriber ISDN number – MSISDN?
Home location register
1In which of the following Codes with specific characteristics can be applied to the transmission?
CDMA
3The base station covers a specific area that is called a ——
Cell
1What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
Host to host
2Length of Port address in TCP/IP is _________
16bit long
2Which one of the following can help in avoiding the interferences between the neighboring base station?
Assigning different group of channels
1Cellular System or having small cells needs ——–
All of the above
4In Mobile OS, top of the layer contains
Applications
1Choose the mobile OS:
All of the above
4Java ME was designed by
Sun Microsystem
2Palm OS is designed for
32 bit architecture
1Symbian OS based on
little-endian
1Which of the following services/service are defined within the bearer services?
All of the above
4Which of the following system takes a user bitstream and perform an (XOR)? The result is either the sequence 0110101 (if the user bit equals 0) or its complement 1001010 (if the user bit equals 1).
DSSS
2UMTS use which multiple access technique?
CDMA
1What is the chip rate of W-CDMA?
3.84 Mcps
2Which among the following is a dynamic data base
VLR
1What are the functions of BTS
All
4Which of the following segments a TCP connection into a fixed part and a wireless part?
Indirect TCP
1Advantages of Indirect TCP includes
All of the above
4The main function of snooping TCP is
To buffer data close to the mobile host to perform fast local retransmission in case of packet loss.
1I-TCP and Snooping TCP does not help much if a mobile host gets
Disconnected
2M-TCP wants to improve overall throughput to
All of the above
4Disadvantages of Mobile TCP includes
Assuming low bit error rates
1A very useful extension of TCP is the use of
Selective retransmission
3Which of the following combine packets for connection establishment and connection release with user data packets?
Transaction oriented TCP
1Which of the following protocols ‘snoops’ the packet flow in both directions to recognize acknowledgments?
None of the above
4Which of the following TCP protocol is specially adapted when the problems arising from lengthy or frequent disconnections?
Mobile TCP
1What is the possible reason for a packet loss in a fixed network in the transmission path?
Temporary overload at some point
1Mobile Phone OS contains open APIs that may be _____________ attack.
vulnerable to
2BBProxy tool is used in which mobile OS?
Blackberry
4Which operating system is the Android OS based on?
Linux
2What mobile payment service uses the physical phone?
NFC
3Which of these mobile operating system are open source?
Android
3Which of the following is required to create Apple iOS apps?
Xcode
2Which of the following is not a prerequisite for doing m-commerce transaction?
A registered account with Vendor
4_______ is the payment facilitator through which customers shall make payments for their purchases?
Payment Gateway
1Symbian operating system running on which processor?
ARM Processor
2Challenges of mobile computing include ———
All of the above
4Slow and fast hopping is used in
FHSS
1Which of the protocol does not care congested network and continues to send packets into an already congested network?
UDP
2Which of the following protocols are Reactive Protocols?
DSR, AODV
1Android allows application developers to write code in which language ?
Java
1DECT stands for
Digital European Cordless Telephone
3Paging systems were based on
Simplex systems
1MIN stands for
Mobile Identification Number
1The interference between the neighboring base stations is avoided by
Assigning different group of channels
1Radio capacity may be increased in cellular concept by
Increasing the number of base stations & reusing the channels
2Hexagon shape is used for radio coverage for a cell because
All of the above
4The advantage of using frequency reuse is
All of the above
4Inter system Handoffs are done
All of the above
4When all of the radio channels are in use in a trunking system
All of the above
4Interference in cellular systems is caused by
All of the above
4Interference in frequency bands may lead to
All of the above
4The techniques used to improve the capacity of cellular systems are
All of the above
4Direct sequence spread spectrum demodulation uses
DPSK
1The digital modulation technique used in frequency selective channels is
BPSK
3Computational complexity of an algorithm refers to the
Number of operations for one iteration of algorithm
1What is multiplexing?
How several users can share a medium with minimum or no interference
1Dimensions of multiplexing can be carried out:
All of the above
4Expansion of BSC
Base station controller
1Expand EIR
Equipment identity register
1The main tasks of the physical layer comprise
channel coding and error detection/correction
1Which components provide the functions for registration, authentication, identification, location updating, and the provision of a temporary mobile subscriber identity
Mobility management
1Expand MSISDN:
Mobile station international ISDN number
1Purpose of Temporary mobile subscriber identity
To hide the IMSI, which would give away the exact identity of the user signaling
1The ___________stores personal, secret data and is protected with a PIN against unauthorized use.
SIM
2Algorithm ______ is used for authentication, _________ is used for encryption
A3, A5
1Information bearing channels in ISDN are called ______
B channels
3Which of the following is true for ATM?
Multiplexing technique
3US cellular standard CDPD stands for _________
Cellular Digital Packet Data
1The layer protocol, RRMP stands for _________
Radio Resource Management Protocol
1RMD is a _______ and ________ data service.
Public, two way
3The MSC provides subscriber access to the PSTN via the _______
Switching end points
4What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
Host to host
2Which of the following protocols uses both TCP and UDP?
DNS
4Length of Port address in TCP/IP is _________
16bit long
2Virtual terminal protocol is an example of _________
Application layer
2A device operating at physical layer is called __________
Repeater
4A packet in Transmission Control Protocol (TCP) is called a ____________
Segment
3In wireless LAN, there are many hidden stations so that __________ cannot be detected.
Collision
2Transmission Control Protocol/Internet Networking Protocol have ___________
Four Layers
1A mobile operating system can be found on all of these devices EXCEPT which?
Computer
2Which of the following is a fundamental principle of wireless communication?
Electromagnetic waves
1Which of the following is considered as the heart of the Global Systems for Mobiles (or GSM)?
Networks Switching Sub System
1In which of the following, the single-channel has the ability to carry all transmissions simultaneously?
In the Code Division, Multiple Access (or CDMA)
1In which one of the following, the early FM push to talk telephone system, was used?
Half Duplex
1Which of the following statements about the Half Duplex is correct?
It is a type of communication in one direction at a time
2The term _________ refers to transporting a mobile station from one base station to another base station.
Handoff or hand over
3Which one of the following can help in avoiding the interferences between the neighboring base station?
Assigning different group of channels
1Which of the following is known as one of the responsibilities of mobile Switching Centre (or MSC) in cellular telephone systems?
Connection of mobile to PSTN
1What is the nominal range of Bluetooth?
10 m
2Which of the following scheme is used by Bluetooth?
Frequency hopping TDD scheme
1In which of the following Codes with specific characteristics can be applied to the transmission?
CDMA
3The base station covers a specific area that is called a ——
Cell
1Which of the following services/ services are defined by the GSM?
All of the above
4Which of the following wireless technology is used for exchanging data between a variety of fixed and mobile devices over a very short diameter?
Bluetooth technology
2In which of the following the total available bandwidth is split into many channels of smaller bandwidth plus guard spaces between the channels?
FHSS
1Which of the following uses high-frequency radio waves instead of cables for connecting the devices in LAN?
Wireless LAN
2Which of the following is/are the advantages of a wireless LAN?
All of the above
4In piconet devices connected with the master is called
Slaves
1The hexagon shape is used for radio coverage because
It uses the maximum area for coverage
1The frequency modulation for mobile communication systems was invented by_____
Edwin Armstrong
4Which of the following is also known as the developer of the world's first cellular system?
Nippon Telephone and Telegraph (NTT)
2Which one of the following is not referred as the characteristics of the cellular telephone system?
Large frequency spectrum
1Which of the following is known as one of the responsibilities of mobile Switching Centre (or MSC) in cellular telephone systems?
Connection of mobile to PSTN
1Which of the following is also referred to as the functions of forward Voice Channel?
Voice transmission from the base station to mobiles
3TCP supports many of the Internet’s most popular application protocols and resulting applications, including
All of the above
4Advantages of Indirect TCP includes
All of the above
4The main function of snooping TCP is —-
To buffer data close to the mobile host to perform fast local retransmission in case of packet loss.
1I-TCP and Snooping TCP does not help much if a mobile host gets
Disconnected
2M-TCP wants to improve overall throughput to
All of the above
4Disadvantages of Mobile TCP includes
Assuming low bit error rates
1A very useful extension of TCP is the use of
Selective retransmission
3Which of the following combine packets for connection establishment and connection release with user data packets?
Transaction oriented TCP
1Mobile Computing allows transmission of data, from one wireless-enabled device to another —-
Wireless-enabled device
3Which of the following is the base of most mobile communications?
GSM
1Important mobile computing application/s is/are —–
All of the above
4Which of the following system takes a user bitstream and perform an (XOR)? The result is either the sequence 0110101 (if the user bit equals 0) or its complement 1001010 (if the user bit equals 1).
DSSS
2Which of the protocol does not care congested network and continues to send packets into an already congested network?
UDP
2What is the possible reason for a packet loss in a fixed network in the transmission path?
Temporary overload at some point
1The exponential growth of the congestion window in the slow start mechanism refers to
Doubles the congestion window every time the acknowledgments come back
2Which of the following the foreign agent buffers all packets with destination mobile host and additionally ‘snoops’ the packet flow in both directions to recognize acknowledgments?
Snooping TCP
1Communication device must show evidence of any one of the following features
All the above
4Choose the role of carrier sense multiple access with collision detection, (CSMA/CD)
A sender senses the medium before transmitting to see if it is free. If medium is busy it waits, if free it starts sending data
1In which of the following Codes with specific characteristics can be applied to the transmission?
CDMA
3Which of the following devices display short text messages, has a tiny display, and cannot send any messages?
Pager
1In this multiplexing scheme, the frequency band for the communication remains the same for sender and receiver.
FDM
1In Frequency Hopping Spread Spectrum (FHSS) systems, the total available bandwidth is split into many channels of smaller bandwidth plus ___ between the channels.
guard spaces
2Which of the following allow the use of entire bandwidth simultaneously?
CDMA
3Hidden terminals not only cause collisions but also cause unnecessary delay.
1Digital information services were offered in which generation of cellular system
Both b and c
4The maximum throughput in the slotted Aloha scheme is ___ per cent.
36
3Code division multiple access (CDMA) uses a form of transmission known as __ along with the use of different codes.
Direct Sequence Spread Spectrum
2In this type of communication, one channel is directed from the mobile station to the base station and another channel is directed from the base station to the mobile station using different frequencies.
Frequency division duplex
2Which of the following stores all the user-related data that is relevant for the GSM system in mobile computing?
SIM
1Which of the following stores Mobile Subscriber ISDN number – MSISDN?
Home location register
1The original GSM allows data rates up to ___ bit/s for non-voice services.
9600
2The database for all IMEIs is ___.
EIR
3TCP is a reliable protocol that incorporates
All of the above
4Which of the following is the base of most mobile communications?
GSM
1TCP supports many of the Internet’s most popular application protocols and resulting applications, including
All of the above
4Which of the following services/service are defined within the bearer services?
All of the above
4The overlapping portion of two piconets is called——–
Scatter net
3Identify the correct services from the following usecase:Imagine you wanted to print a document sitting in the lobby of a hotel using your laptop. If you drop the document over the printer icon, where would you expect the document to be printed?
Location aware services
2As a very simple receiver, a __________ can only display short text messages, has a tiny display, and cannot send any messages
Pager
1The main tasks of this layer include accessing the medium, multiplexing of different data streams, correction of transmission errors, and synchronization
Data link layer
2The mobile station has to perform a __________ when changing from one cell to another
Handover
1used for allocating a separated space to users in wireless networks.
Space Division Multiple Access
1Assigning different slots for uplink and downlink using the same frequency is called
Time Division Duplex
1Expansion of DAMC is
Demand Assigned Multiple Access
2DAMA is an _________ scheme
Explicit Reservation
2The same number can be used throughout location. This service is mandatory for all providers and free of charge. It is called
emergency number
1The call management (CM) layer contains which entities
All the above
4______________take place within the network of one provider, between two providers in one country.
Roaming
3To hide the IMSI, which would give away the exact identity of the user signaling over the air interface
Temporary mobile subscriber identity
1Standard TCP is used between _________ and ___________
Fixed computer, Access point
1Which tunnelling protocol is used to encapsulate all packets (e.g., IP, PPP) destined for the UE?
GPRS Tunnelling Protocol (GTP)
1Which of the following is/are the example/s of WPANs?
Bluetooth & Zigbee
4This term defines the current location of the MN from an IP point of view.
Care-of address (COA)
1One of the following mechanisms allows the encapsulation of packets of one protocol suite into the payload portion of a packet of another protocol suite.
Generic Routing Encapsulation
3At what level does TCP uses flow and error control mechanisms?
Transport level
4A TCP connection is identified by which of the following tuple
socket pair
4Identify the requirements accompanied the development of the standard Mobile Ip:
All of the Above
4What is Foregin Network?
The foreign network is the current subnet the MN visits and which is not the home network.
1How does the MN discover that it has moved?
For this purpose mobile IP describes two methods: agent advertisement and agent solicitation
1Choose correct Definition of Tunneling :
Tunnelling is sending a packet through a tunnel, is achieved by using encapsulation.
3Identify the purpose of Dynamic Host Configuration Protocol
Simplifiy the installation and maintenance of networked computers
1Checksums use _________ arithmetic.
one's complement arithmetic
2How does a DHCP server dynamically assign IP address to host?
Addresses are leased to host. A host will usually keep the same address by periodically contacting the DHCP sever to renew the lease.
3When we need Mobile Ad-Hoc Network?
All of the Above
4The mobile nodes (devices) add or leave a Mobile Ad-hoc Network, changing the _____ of this network over time.
Topology
2Mobile Ad-hoc Networks are less secure because _____.
The nodes are autonomous.
2Which of the following correctly describes an advantage of a Mobile Ad-hoc Network?
Autonomous nodes that can act as both a host and a router.
1The Open Shortest Path First(OSPF) protocol is an intra domain routing protocol based on …….. routing.
Link state
2In ………. a route is selected for each destination pair of nodes in the network.
Fixed routing
2Identify the correct choice of Route maintenance:
If a node is continuously sending packets via a route, it has to make sure that the route is held upright
2Which of these is not a feature of VANET?
Stable Connectivity
3How to avoid looping issues in DSDV?
Sequence Numbers
1How can we optimized route discovery?
All of the Above
4Inefficient behavior of a nonoptimized mobile IP is called?
Triangular Routing
1Which of the following protocols are Reactive Protocols?
DSR, AODV
1Expansion of RREQ and RREP
Route Request and Route Reply
1Select the security attacks in AODV
All of the Above
4What is TTL?
Refers to the amount of time or “hops” that a packet is set to exist inside a network before being discarded by a router.
1MANET nodes life depend on
Power Resources
3Movement of the nodes affects the operation of a MANET as node movement MANETs need to rely on robust routing protocols.And this MANET have random node movement.
1If the packet loss due to transmission error the sender can now retransmit the missing packet(s) before the timer expires. This behavior is called
Fast retransmit
1The Wireless Application Environment, provides an architecture for communication between
wireless devices and Web servers
2WAP allows the devices to view pages from
Internet
2Which of the following segments a TCP connection into a fixed part and a wireless part?
Indirect TCP
1M-TCP wants to improve overall throughput to
All of the above
4TCP supports the most popular application protocols and resulting applications, including
All of the above
4Which protocol is used in transport layer of WAP Architecture?
Wireless Datagram Protocol
3Which Protocol provides error handling mechanism of WDP
WCMP
2Which class of WTP provides reliable message transfer with one reliable result message
Class 2
3In WML images are stored in which format?
WBMP
1WML user agent in WTA will be running on
Client
4In fast retransmit the RTO is calculated based on
Round trip time
2Which language is used for developing the applications of mobile devices
HDML
1Pages in WAP are converted to the http and TCP protocol at the _________
Gateway
4In slow start mechanism the transmission is started with
Lowest Window size
2The exponential growth of the congestion window in the slow start mechanism refers to
Doubles the congestion window every time the acknowledgments come back
2Advantages of Indirect TCP includes
All of the above
4The main function of snooping TCP is
To buffer data close to the mobile host to perform fast local retransmission in case of packet loss.
1Which of the following combine packets for connection establishment and connection release with user data packets?
Transaction oriented TCP
1Indirect TCP segments a TCP connection into a wireless and a—
Fixed part
1Check summing over user data and multiplexing/de-multiplexing of data from/to applications are the important functions of _________
Transport Layer
1The behavior TCP shows after the detection of congestion is called
Slow start
1The parameters of class 0 WTP are:
SA, SP, DA, DP, A, UD, C=0, H
2The functionalities of HTTP/1.1 in WSP are
All the above
4WTP achieves reliability using
Duplicate removal
2Android OS based on the following Operating System
Linux
2SDK Means
None of the above
4Wich of the following is best example for emergency notification?
Amber Alert
1Which of these Virtual Assistants is designed for Android
Google
1Which of the following controls the orientation of your phone?
Accelerometer
2What mobile payment service uses the physical phone?
NFC
3Which of these mobile operating system are open source?
Android
3What technology makes WiFi calling possible?
VOIP
1What format is an Android Application gonna be created as?
APK
2What are the constraints of Mobile OS?
All the above
4
Mobile Computing MCQ:
- 4
- 1
- 2
- 2
- 3
- 2
- 3
- 4
- 1
- 3
- 3
- 4
- 3
- 4
- 2
- 3
- 2
- 1
- 1
- 2
- 1
- 1
- 2
- 3
- 1
- 2
- 3
- 1
- 3
- 1
- 2
- 2
- 1
- 4
- 1
- 4
- 2
- 1
- 1
- 4
- 2
- 1
- 2
- 1
- 4
- 1
- 4
- 1
- 2
- 4
- 1
- 3
- 1
- 4
- 1
- 1
- 2
- 4
- 2
- 3
- 3
- 2
- 4
- 1
- 2
- 4
- 1
- 2
- 1
- 1
- 3
- 1
- 1
- 1
- 2
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 1
- 3
- 1
- 1
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 1
- 3
- 3
- 1
- 1
- 3
- 4
- 2
- 4
- 2
- 2
- 4
- 3
- 2
- 1
- 2
- 1
- 1
- 1
- 1
- 2
- 3
- 1
- 1
- 2
- 1
- 3
- 1
- 4
- 2
- 1
- 2
- 4
- 1
- 1
- 4
- 2
- 1
- 1
- 3
- 4
- 4
- 1
- 2
- 4
- 1
- 3
- 1
- 3
- 1
- 4
- 2
- 2
- 1
- 2
- 1
- 4
- 1
- 3
- 1
- 1
- 2
- 3
- 1
- 4
- 3
- 2
- 2
- 1
- 1
- 2
- 3
- 4
- 1
- 4
- 4
- 3
- 2
- 1
- 2
- 1
- 1
- 1
- 2
- 2
- 1
- 4
- 3
- 1
- 1
- 1
- 4
- 1
- 3
- 4
- 4
- 4
- 1
- 1
- 3
- 1
- 2
- 3
- 4
- 2
- 2
- 1
- 2
- 2
- 2
- 3
- 1
- 4
- 1
- 1
- 1
- 4
- 1
- 3
- 1
- 1
- 2
- 2
- 1
- 4
- 4
- 3
- 2
- 3
- 1
- 4
- 2
- 1
- 4
- 2
- 2
- 4
- 1
- 1
- 1
- 1
- 1
- 2
- 4
- 2
- 2
- 4
- 1
- 1
- 2
- 3
- 3
- 1
- 2
- 4
Which of the following devices display short text messages, has a tiny display, and cannot send any messages?
Pager (option 1)
Post a Comment