Coding | Mcqs | Multiple choice questions | Informative | Computer Science | Engineering | Aptitude | Quants | Verbal

INFEED

Mobile Computing MCQ

Mobile Computing MCQ:

  • Which of the following usually stores all user-related data that is also relevant to GSM mobile systems?

    SIM

    4
  • In which one of the following codes with specific characteristics can be applied to the transmission?

    CDMA

    1
  • Which of the following offers packet mode data transfer service over the cellular network?

    GPRS

    2
  • Which one of the following enables us to use the entire bandwidth simultaneously?

    CDMA

    2
  • In the Cellular Network, on which of the following, the cell's shape depends?

    Environment Condition

    3
  • In a Cellular network, which of the following is used to use the same frequency for others?

    Frequency reuse

    2
  • Which of the following uses wireless as the mode of communication for transferring or exchanging data between various mobiles over a short-range?

    Bluetooth technology

    3
  • The main aim of the file system is to support________

    All of the above

    4
  • Which of the following can be considered as the primary function of snooping TCP?

    To buffer data close to the mobile host to perform fast local retransmission in case of packet loss.

    1
  • In which one of the following, the slow and fast hopping is used?

    FHSS

    3
  • Mobile Computing allows transmission of data from one wireless-enabled device to another_

    Wireless-enabled device

    3
  • Which of the following can be considered as the drawbacks of the Mobile and Wireless Devices?

    All of the above

    4
  • In general, a mobile computing environment can also be considered as the type of __________ environment.

    Distributed computing

    3
  • When was the 2G communication introduced in the market?

    1988

    4
  • Which of the following is supported data rates of 4G Networks?

    100mbs

    2
  • Which one of the following is considered as the GSM supplementary service?

    Call forwarding

    3
  • How many sub-systems are Global Systems for Mobiles?

    3

    2
  • Which of the following is considered as the heart of the Global Systems for Mobiles (or GSM)?

    Networks Switching Sub System

    1
  • The term "HLR" stands for the ______

    Home Location Register

    1
  • BSC comes under which of the following category?

    Radio

    2
  • The term TDM stands for___.

    Time Division Multiplexing

    1
  • In which of the following, the single-channel has the ability to carry all transmissions simultaneously?

    In the Code Division, Multiple Access (or CDMA)

    1
  • In which one of the following times is specifically divided into several time slots that are in the fixed patterns?

    TDMA

    2
  • How many types of security services are provided by the GSM?

    3

    3
  • In which one of the following, the early FM push to talk telephone system, was used?

    Half Duplex

    1
  • Which of the following statements about the Half Duplex is correct?

    It is a type of communication in one direction at a time

    2
  • The term _________ refers to transporting a mobile station from one base station to another base station.

    Handoff or hand over

    3
  • Which of the following stores Mobile Subscriber ISDN number – MSISDN?

    Home location register

    1
  • In which of the following Codes with specific characteristics can be applied to the transmission?

    CDMA

    3
  • The base station covers a specific area that is called a ——

    Cell

    1
  • What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?

    Host to host

    2
  • Length of Port address in TCP/IP is _________

    16bit long

    2
  • Which one of the following can help in avoiding the interferences between the neighboring base station?

    Assigning different group of channels

    1
  • Cellular System or having small cells needs ——–

    All of the above

    4
  • In Mobile OS, top of the layer contains

    Applications

    1
  • Choose the mobile OS:

    All of the above

    4
  • Java ME was designed by

    Sun Microsystem

    2
  • Palm OS is designed for

    32 bit architecture

    1
  • Symbian OS based on

    little-endian

    1
  • Which of the following services/service are defined within the bearer services?

    All of the above

    4
  • Which of the following system takes a user bitstream and perform an (XOR)? The result is either the sequence 0110101 (if the user bit equals 0) or its complement 1001010 (if the user bit equals 1).

    DSSS

    2
  • UMTS use which multiple access technique?

    CDMA

    1
  • What is the chip rate of W-CDMA?

    3.84 Mcps

    2
  • Which among the following is a dynamic data base

    VLR

    1
  • What are the functions of BTS

    All

    4
  • Which of the following segments a TCP connection into a fixed part and a wireless part?

    Indirect TCP

    1
  • Advantages of Indirect TCP includes

    All of the above

    4
  • The main function of snooping TCP is

    To buffer data close to the mobile host to perform fast local retransmission in case of packet loss.

    1
  • I-TCP and Snooping TCP does not help much if a mobile host gets

    Disconnected

    2
  • M-TCP wants to improve overall throughput to

    All of the above

    4
  • Disadvantages of Mobile TCP includes

    Assuming low bit error rates

    1
  • A very useful extension of TCP is the use of

    Selective retransmission

    3
  • Which of the following combine packets for connection establishment and connection release with user data packets?

    Transaction oriented TCP

    1
  • Which of the following protocols ‘snoops’ the packet flow in both directions to recognize acknowledgments?

    None of the above

    4
  • Which of the following TCP protocol is specially adapted when the problems arising from lengthy or frequent disconnections?

    Mobile TCP

    1
  • What is the possible reason for a packet loss in a fixed network in the transmission path?

    Temporary overload at some point

    1
  • Mobile Phone OS contains open APIs that may be _____________ attack.

    vulnerable to

    2
  • BBProxy tool is used in which mobile OS?

    Blackberry

    4
  • Which operating system is the Android OS based on?

    Linux

    2
  • What mobile payment service uses the physical phone?

    NFC

    3
  • Which of these mobile operating system are open source?

    Android

    3
  • Which of the following is required to create Apple iOS apps?

    Xcode

    2
  • Which of the following is not a prerequisite for doing m-commerce transaction?

    A registered account with Vendor

    4
  • _______ is the payment facilitator through which customers shall make payments for their purchases?

    Payment Gateway

    1
  • Symbian operating system running on which processor?

    ARM Processor

    2
  • Challenges of mobile computing include ———

    All of the above

    4
  • Slow and fast hopping is used in

    FHSS

    1
  • Which of the protocol does not care congested network and continues to send packets into an already congested network?

    UDP

    2
  • Which of the following protocols are Reactive Protocols?

    DSR, AODV

    1
  • Android allows application developers to write code in which language ?

    Java

    1
  • DECT stands for

    Digital European Cordless Telephone

    3
  • Paging systems were based on

    Simplex systems

    1
  • MIN stands for

    Mobile Identification Number

    1
  • The interference between the neighboring base stations is avoided by

    Assigning different group of channels

    1
  • Radio capacity may be increased in cellular concept by

    Increasing the number of base stations & reusing the channels

    2
  • Hexagon shape is used for radio coverage for a cell because

    All of the above

    4
  • The advantage of using frequency reuse is

    All of the above

    4
  • Inter system Handoffs are done

    All of the above

    4
  • When all of the radio channels are in use in a trunking system

    All of the above

    4
  • Interference in cellular systems is caused by

    All of the above

    4
  • Interference in frequency bands may lead to

    All of the above

    4
  • The techniques used to improve the capacity of cellular systems are

    All of the above

    4
  • Direct sequence spread spectrum demodulation uses

    DPSK

    1
  • The digital modulation technique used in frequency selective channels is

    BPSK

    3
  • Computational complexity of an algorithm refers to the

    Number of operations for one iteration of algorithm

    1
  • What is multiplexing?

    How several users can share a medium with minimum or no interference

    1
  • Dimensions of multiplexing can be carried out:

    All of the above

    4
  • Expansion of BSC

    Base station controller

    1
  • Expand EIR

    Equipment identity register

    1
  • The main tasks of the physical layer comprise

    channel coding and error detection/correction

    1
  • Which components provide the functions for registration, authentication, identification, location updating, and the provision of a temporary mobile subscriber identity

    Mobility management

    1
  • Expand MSISDN:

    Mobile station international ISDN number

    1
  • Purpose of Temporary mobile subscriber identity

    To hide the IMSI, which would give away the exact identity of the user signaling

    1
  • The ___________stores personal, secret data and is protected with a PIN against unauthorized use.

    SIM

    2
  • Algorithm ______ is used for authentication, _________ is used for encryption

    A3, A5

    1
  • Information bearing channels in ISDN are called ______

    B channels

    3
  • Which of the following is true for ATM?

    Multiplexing technique

    3
  • US cellular standard CDPD stands for _________

    Cellular Digital Packet Data

    1
  • The layer protocol, RRMP stands for _________

    Radio Resource Management Protocol

    1
  • RMD is a _______ and ________ data service.

    Public, two way

    3
  • The MSC provides subscriber access to the PSTN via the _______

    Switching end points

    4
  • What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?

    Host to host

    2
  • Which of the following protocols uses both TCP and UDP?

    DNS

    4
  • Length of Port address in TCP/IP is _________

    16bit long

    2
  • Virtual terminal protocol is an example of _________

    Application layer

    2
  • A device operating at physical layer is called __________

    Repeater

    4
  • A packet in Transmission Control Protocol (TCP) is called a ____________

    Segment

    3
  • In wireless LAN, there are many hidden stations so that __________ cannot be detected.

    Collision

    2
  • Transmission Control Protocol/Internet Networking Protocol have ___________

    Four Layers

    1
  • A mobile operating system can be found on all of these devices EXCEPT which?

    Computer

    2
  • Which of the following is a fundamental principle of wireless communication?

    Electromagnetic waves

    1
  • Which of the following is considered as the heart of the Global Systems for Mobiles (or GSM)?

    Networks Switching Sub System

    1
  • In which of the following, the single-channel has the ability to carry all transmissions simultaneously?

    In the Code Division, Multiple Access (or CDMA)

    1
  • In which one of the following, the early FM push to talk telephone system, was used?

    Half Duplex

    1
  • Which of the following statements about the Half Duplex is correct?

    It is a type of communication in one direction at a time

    2
  • The term _________ refers to transporting a mobile station from one base station to another base station.

    Handoff or hand over

    3
  • Which one of the following can help in avoiding the interferences between the neighboring base station?

    Assigning different group of channels

    1
  • Which of the following is known as one of the responsibilities of mobile Switching Centre (or MSC) in cellular telephone systems?

    Connection of mobile to PSTN

    1
  • What is the nominal range of Bluetooth?

    10 m

    2
  • Which of the following scheme is used by Bluetooth?

    Frequency hopping TDD scheme

    1
  • In which of the following Codes with specific characteristics can be applied to the transmission?

    CDMA

    3
  • The base station covers a specific area that is called a ——

    Cell

    1
  • Which of the following services/ services are defined by the GSM?

    All of the above

    4
  • Which of the following wireless technology is used for exchanging data between a variety of fixed and mobile devices over a very short diameter?

    Bluetooth technology

    2
  • In which of the following the total available bandwidth is split into many channels of smaller bandwidth plus guard spaces between the channels?

    FHSS

    1
  • Which of the following uses high-frequency radio waves instead of cables for connecting the devices in LAN?

    Wireless LAN

    2
  • Which of the following is/are the advantages of a wireless LAN?

    All of the above

    4
  • In piconet devices connected with the master is called

    Slaves

    1
  • The hexagon shape is used for radio coverage because

    It uses the maximum area for coverage

    1
  • The frequency modulation for mobile communication systems was invented by_____

    Edwin Armstrong

    4
  • Which of the following is also known as the developer of the world's first cellular system?

    Nippon Telephone and Telegraph (NTT)

    2
  • Which one of the following is not referred as the characteristics of the cellular telephone system?

    Large frequency spectrum

    1
  • Which of the following is known as one of the responsibilities of mobile Switching Centre (or MSC) in cellular telephone systems?

    Connection of mobile to PSTN

    1
  • Which of the following is also referred to as the functions of forward Voice Channel?

    Voice transmission from the base station to mobiles

    3
  • TCP supports many of the Internet’s most popular application protocols and resulting applications, including

    All of the above

    4
  • Advantages of Indirect TCP includes

    All of the above

    4
  • The main function of snooping TCP is —-

    To buffer data close to the mobile host to perform fast local retransmission in case of packet loss.

    1
  • I-TCP and Snooping TCP does not help much if a mobile host gets

    Disconnected

    2
  • M-TCP wants to improve overall throughput to

    All of the above

    4
  • Disadvantages of Mobile TCP includes

    Assuming low bit error rates

    1
  • A very useful extension of TCP is the use of

    Selective retransmission

    3
  • Which of the following combine packets for connection establishment and connection release with user data packets?

    Transaction oriented TCP

    1
  • Mobile Computing allows transmission of data, from one wireless-enabled device to another —-

    Wireless-enabled device

    3
  • Which of the following is the base of most mobile communications?

    GSM

    1
  • Important mobile computing application/s is/are —–

    All of the above

    4
  • Which of the following system takes a user bitstream and perform an (XOR)? The result is either the sequence 0110101 (if the user bit equals 0) or its complement 1001010 (if the user bit equals 1).

    DSSS

    2
  • Which of the protocol does not care congested network and continues to send packets into an already congested network?

    UDP

    2
  • What is the possible reason for a packet loss in a fixed network in the transmission path?

    Temporary overload at some point

    1
  • The exponential growth of the congestion window in the slow start mechanism refers to

    Doubles the congestion window every time the acknowledgments come back

    2
  • Which of the following the foreign agent buffers all packets with destination mobile host and additionally ‘snoops’ the packet flow in both directions to recognize acknowledgments?

    Snooping TCP

    1
  • Communication device must show evidence of any one of the following features

    All the above

    4
  • Choose the role of carrier sense multiple access with collision detection, (CSMA/CD)

    A sender senses the medium before transmitting to see if it is free. If medium is busy it waits, if free it starts sending data

    1
  • In which of the following Codes with specific characteristics can be applied to the transmission?

    CDMA

    3
  • Which of the following devices display short text messages, has a tiny display, and cannot send any messages?

    Pager

    1
  • In this multiplexing scheme, the frequency band for the communication remains the same for sender and receiver.

    FDM

    1
  • In Frequency Hopping Spread Spectrum (FHSS) systems, the total available bandwidth is split into many channels of smaller bandwidth plus ___ between the channels.

    guard spaces

    2
  • Which of the following allow the use of entire bandwidth simultaneously?

    CDMA

    3
  • Hidden terminals not only cause collisions but also cause unnecessary delay.

    1
  • Digital information services were offered in which generation of cellular system

    Both b and c

    4
  • The maximum throughput in the slotted Aloha scheme is ___ per cent.

    36

    3
  • Code division multiple access (CDMA) uses a form of transmission known as __ along with the use of different codes.

    Direct Sequence Spread Spectrum

    2
  • In this type of communication, one channel is directed from the mobile station to the base station and another channel is directed from the base station to the mobile station using different frequencies.

    Frequency division duplex

    2
  • Which of the following stores all the user-related data that is relevant for the GSM system in mobile computing?

    SIM

    1
  • Which of the following stores Mobile Subscriber ISDN number – MSISDN?

    Home location register

    1
  • The original GSM allows data rates up to ___ bit/s for non-voice services.

    9600

    2
  • The database for all IMEIs is ___.

    EIR

    3
  • TCP is a reliable protocol that incorporates

    All of the above

    4
  • Which of the following is the base of most mobile communications?

    GSM

    1
  • TCP supports many of the Internet’s most popular application protocols and resulting applications, including

    All of the above

    4
  • Which of the following services/service are defined within the bearer services?

    All of the above

    4
  • The overlapping portion of two piconets is called——–

    Scatter net

    3
  • Identify the correct services from the following usecase:Imagine you wanted to print a document sitting in the lobby of a hotel using your laptop. If you drop the document over the printer icon, where would you expect the document to be printed?

    Location aware services

    2
  • As a very simple receiver, a __________ can only display short text messages, has a tiny display, and cannot send any messages

    Pager

    1
  • The main tasks of this layer include accessing the medium, multiplexing of different data streams, correction of transmission errors, and synchronization

    Data link layer

    2
  • The mobile station has to perform a __________ when changing from one cell to another

    Handover

    1
  • used for allocating a separated space to users in wireless networks.

    Space Division Multiple Access

    1
  • Assigning different slots for uplink and downlink using the same frequency is called

    Time Division Duplex

    1
  • Expansion of DAMC is

    Demand Assigned Multiple Access

    2
  • DAMA is an _________ scheme

    Explicit Reservation

    2
  • The same number can be used throughout location. This service is mandatory for all providers and free of charge. It is called

    emergency number

    1
  • The call management (CM) layer contains which entities

    All the above

    4
  • ______________take place within the network of one provider, between two providers in one country.

    Roaming

    3
  • To hide the IMSI, which would give away the exact identity of the user signaling over the air interface

    Temporary mobile subscriber identity

    1
  • Standard TCP is used between _________ and ___________

    Fixed computer, Access point

    1
  • Which tunnelling protocol is used to encapsulate all packets (e.g., IP, PPP) destined for the UE?

    GPRS Tunnelling Protocol (GTP)

    1
  • Which of the following is/are the example/s of WPANs?

    Bluetooth & Zigbee

    4
  • This term defines the current location of the MN from an IP point of view.

    Care-of address (COA)

    1
  • One of the following mechanisms allows the encapsulation of packets of one protocol suite into the payload portion of a packet of another protocol suite.

    Generic Routing Encapsulation

    3
  • At what level does TCP uses flow and error control mechanisms?

    Transport level

    4
  • A TCP connection is identified by which of the following tuple

    socket pair

    4
  • Identify the requirements accompanied the development of the standard Mobile Ip:

    All of the Above

    4
  • What is Foregin Network?

    The foreign network is the current subnet the MN visits and which is not the home network.

    1
  • How does the MN discover that it has moved?

    For this purpose mobile IP describes two methods: agent advertisement and agent solicitation

    1
  • Choose correct Definition of Tunneling :

    Tunnelling is sending a packet through a tunnel, is achieved by using encapsulation.

    3
  • Identify the purpose of Dynamic Host Configuration Protocol

    Simplifiy the installation and maintenance of networked computers

    1
  • Checksums use _________ arithmetic.

    one's complement arithmetic

    2
  • How does a DHCP server dynamically assign IP address to host?

    Addresses are leased to host. A host will usually keep the same address by periodically contacting the DHCP sever to renew the lease.

    3
  • When we need Mobile Ad-Hoc Network?

    All of the Above

    4
  • The mobile nodes (devices) add or leave a Mobile Ad-hoc Network, changing the _____ of this network over time.

    Topology

    2
  • Mobile Ad-hoc Networks are less secure because _____.

    The nodes are autonomous.

    2
  • Which of the following correctly describes an advantage of a Mobile Ad-hoc Network?

    Autonomous nodes that can act as both a host and a router.

    1
  • The Open Shortest Path First(OSPF) protocol is an intra domain routing protocol based on …….. routing.

    Link state

    2
  • In ………. a route is selected for each destination pair of nodes in the network.

    Fixed routing

    2
  • Identify the correct choice of Route maintenance:

    If a node is continuously sending packets via a route, it has to make sure that the route is held upright

    2
  • Which of these is not a feature of VANET?

    Stable Connectivity

    3
  • How to avoid looping issues in DSDV?

    Sequence Numbers

    1
  • How can we optimized route discovery?

    All of the Above

    4
  • Inefficient behavior of a nonoptimized mobile IP is called?

    Triangular Routing

    1
  • Which of the following protocols are Reactive Protocols?

    DSR, AODV

    1
  • Expansion of RREQ and RREP

    Route Request and Route Reply

    1
  • Select the security attacks in AODV

    All of the Above

    4
  • What is TTL?

    Refers to the amount of time or “hops” that a packet is set to exist inside a network before being discarded by a router.

    1
  • MANET nodes life depend on

    Power Resources

    3
  • Movement of the nodes affects the operation of a MANET as node movement MANETs need to rely on robust routing protocols.And this MANET have random node movement.

    1
  • If the packet loss due to transmission error the sender can now retransmit the missing packet(s) before the timer expires. This behavior is called

    Fast retransmit

    1
  • The Wireless Application Environment, provides an architecture for communication between

    wireless devices and Web servers

    2
  • WAP allows the devices to view pages from

    Internet

    2
  • Which of the following segments a TCP connection into a fixed part and a wireless part?

    Indirect TCP

    1
  • M-TCP wants to improve overall throughput to

    All of the above

    4
  • TCP supports the most popular application protocols and resulting applications, including

    All of the above

    4
  • Which protocol is used in transport layer of WAP Architecture?

    Wireless Datagram Protocol

    3
  • Which Protocol provides error handling mechanism of WDP

    WCMP

    2
  • Which class of WTP provides reliable message transfer with one reliable result message

    Class 2

    3
  • In WML images are stored in which format?

    WBMP

    1
  • WML user agent in WTA will be running on

    Client

    4
  • In fast retransmit the RTO is calculated based on

    Round trip time

    2
  • Which language is used for developing the applications of mobile devices

    HDML

    1
  • Pages in WAP are converted to the http and TCP protocol at the _________

    Gateway

    4
  • In slow start mechanism the transmission is started with

    Lowest Window size

    2
  • The exponential growth of the congestion window in the slow start mechanism refers to

    Doubles the congestion window every time the acknowledgments come back

    2
  • Advantages of Indirect TCP includes

    All of the above

    4
  • The main function of snooping TCP is

    To buffer data close to the mobile host to perform fast local retransmission in case of packet loss.

    1
  • Which of the following combine packets for connection establishment and connection release with user data packets?

    Transaction oriented TCP

    1
  • Indirect TCP segments a TCP connection into a wireless and a—

    Fixed part

    1
  • Check summing over user data and multiplexing/de-multiplexing of data from/to applications are the important functions of _________

    Transport Layer

    1
  • The behavior TCP shows after the detection of congestion is called

    Slow start

    1
  • The parameters of class 0 WTP are:

    SA, SP, DA, DP, A, UD, C=0, H

    2
  • The functionalities of HTTP/1.1 in WSP are

    All the above

    4
  • WTP achieves reliability using

    Duplicate removal

    2
  • Android OS based on the following Operating System

    Linux

    2
  • SDK Means

    None of the above

    4
  • Wich of the following is best example for emergency notification?

    Amber Alert

    1
  • Which of these Virtual Assistants is designed for Android

    Google

    1
  • Which of the following controls the orientation of your phone?

    Accelerometer

    2
  • What mobile payment service uses the physical phone?

    NFC

    3
  • Which of these mobile operating system are open source?

    Android

    3
  • What technology makes WiFi calling possible?

    VOIP

    1
  • What format is an Android Application gonna be created as?

    APK

    2
  • What are the constraints of Mobile OS?

    All the above

    4
Which of the following devices display short text messages, has a tiny display, and cannot send any messages?Single choice.

Pager (option 1)

Post a Comment

Previous Post Next Post