100% found this document useful (1 vote)
471 views

Mobile Computing PDF

The document is a model question paper for the subject of Mobile Computing. It contains 54 multiple choice questions testing various concepts related to mobile computing including GSM, GPRS, CDMA, Bluetooth, wireless LANs, distributed file systems, mobile TCP, and mobile applications. The questions cover topics such as cellular network architecture, wireless technologies, protocols, distributed system challenges, and mobile computing applications and security issues.

Uploaded by

sumit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
471 views

Mobile Computing PDF

The document is a model question paper for the subject of Mobile Computing. It contains 54 multiple choice questions testing various concepts related to mobile computing including GSM, GPRS, CDMA, Bluetooth, wireless LANs, distributed file systems, mobile TCP, and mobile applications. The questions cover topics such as cellular network architecture, wireless technologies, protocols, distributed system challenges, and mobile computing applications and security issues.

Uploaded by

sumit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 129

Model Question Paper

Subject: Mobile Computing

Branch: Computer Engineering

Class: BE

Semester: VIII

Q1. Which of the following stores all the user-related data that is relevant for the
GSM system in mobile computing?

1. Sim
2. HLR
3. ELR
4. VLR

Answer 1

Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?

1. Home location register


2. Visitor location register
3. Entity equipment register
4. None of the above

Answer 1

Q3. In which of the following Codes with specific characteristics can be applied to
the transmission?

1. GSM
2. GPRS
3. CDMA
4. None of the above

Answer 3
Q4. Which of the following allow the use of entire bandwidth simultaneously?

1. TDMA
2. FDMA
3. CDMA
4. None of the above

Answer 3

Q5. The base station covers a specific area that is called a ——

1. Cell
2. Tessellate
3. Mobile station
4. None of the above

Answer 1

Q6. In a cellular system, the shape of the cell depends on —–

1. Environmental conditions
2. Social conditions
3. Political conditions
4. None of the above

Answer 1

Q7. Cellular System or having small cells needs ——–

1. Handover
2. Infrastructure
3. Frequency planning
4. All of the above

Answer 4
Q8. In a cellular system, the same frequency is used for other users using the
technique ———-

1. Frequency planning
2. Frequency hopping
3. Frequency reuse
4. None of the above

Answer 3

Q9. Which of the following provides packet mode data transfer service over the
cellular network system?

1. GSM
2. GPRS
3. TCP
4. None of the above

Answer 2

Q10. Which of the following services/ services are defined by the GSM?

1. Bearer
2. Supplementary
3. Tele
4. All of the above

Answer 4

Q11. Bluetooth Technology supports

1. Piconet
2. Ad hoc piconet
3. Scatter net
4. All of the above
Answer 4

Q12. Which of the following wireless technology is used for exchanging data
between a variety of fixed and mobile devices over a very short diameter?

1. Mobile technology
2. Bluetooth technology
3. Ad hoc computing
4. None of the above

Answer 2

Q13. In Bluetooth which of the following device decides hopping sequence?

1. Master
2. Parked
3. Standby
4. Slave

Answer 1

Q14. In which of the following the total available bandwidth is split into many
channels of smaller bandwidth plus guard spaces between the channels?

1. FHSS
2. DSSS
3. Both a and b
4. None of the above

Answer 1

Q15. In which of the following a single data stream is split across several separate
narrowband channels at different frequencies to reduce interference and crosstalk.

1. OFDM
2. GSM
3. GPRS
4. UMTS

Answer 1

Q16. Which of the following uses high-frequency radio waves instead of cables for
connecting the devices in LAN?

1. Wired LAN
2. Wireless LAN
3. Fiber made LAN
4. None of the above

Answer 2

Q17. Most WLANs are based upon the standard—-

1. IEEE 802.2
2. IEEE 802.11
3. IEEE 802.5
4. IEEE 802.15

Answer 2

Q18. Which of the following is/are the advantages of a wireless LAN?

1. Flexibility
2. Ease of use
3. Robustness
4. All of the above

Answer 4

Q19. Disadvantages of WLANs include —–

1. Interference and noise


2. Slower than wired
3. Greater care is needed for encryption
4. All of the above
Answer 4

Q20. In piconet devices connected with the master is called

1. Slaves
2. Parked
3. Standby
4. None of the above

Answer 1

Q21 The general goal of a file system is to support———-

1. Transparent access to data


2. Efficient access to data
3. Consistent access to data
4. All of the above

Answer 4

Q 22 In the distributed system a client gives the request, and the server provides—-

1. Data
2. Service
3. Information
4. All of the above

Answer 2

Q 23. The important challenges of distributed systems apply to DFS are ——

1. Migration of data
2. Concurrent access to data
3. Replication of data
4. All of the above

Answer 4
Q24. Features of CODA is/are

1. A disconnected operation for mobile computing


2. Freely available under a liberal license
3. High performance through client-side persistent caching
4. All of the above

Answer 4

Q25. Which of the file system apply gossip protocols?

1. CODA
2. Ficus
3. Rover
4. None of the above

Answer 2

Q26. Mio-NFS supports following mode/modes ———-

1. Connected
2. Loosely connected
3. Disconnected
4. All of the above

Answer 3

Q27. Which of the following are objects that can be dynamically loaded into a
client computer from a server (or vice-versa) to reduce client-server
communication?

1. Relocatable dynamic objects


2. Locatable objects
3. Dynamic objects
4. None of the above
Answer 1

Q28 Which of the following allows for non-blocking RPCs even when a host is
disconnected?

1. Queued remote procedure calls


2. Remote procedure calls
3. Both a and b
4. None of the above

Answer 1

Q29. All transactions must satisfy the —–

1. Consistency
2. Availability
3. ACID Property
4. All of the above

Answer 3

Q 30. The ability of a system to perform its function correctly even in the presence
of internal faults is called

1. Fault tolerance
2. Recovery
3. Both a and b
4. None of the above

Answer 3

Q 31. TCP is a reliable protocol that incorporates

1. congestion control
2. Flow control mechanisms
3. guarantees in-order delivery of data
4. All of the above
Answer 4

Q32. TCP supports many of the Internet’s most popular application protocols and
resulting applications, including

1. World Wide Web


2. e-mail,
3. File Transfer Protocol
4. All of the above

Answer 4

Q 33. Which of the following segments a TCP connection into a fixed part and a
wireless part?

1. Indirect TCP
2. Direct TCP
3. Both a and b
4. None of the above

Answer 1

Q 34. Advantages of Indirect TCP includes

1. Fast transmission
2. Congestion control
3. Error control
4. All of the above

Answer 4

Q 35. The main function of snooping TCP is —-

1. To buffer data close to the mobile host to perform fast local retransmission
in case of packet loss.
2. Congestion control
3. Flow control
4. None of the above

Answer 1

Q 36. I-TCP and Snooping TCP does not help much if a mobile host gets

1. Out of coverage area


2. Disconnected
3. Battery power low
4. None of the above

Answer 2

Q 37. M-TCP wants to improve overall throughput to

1. to lower the delay


2. to maintain end-to-end semantics of TCP
3. to provide a more efficient handover
4. All of the above

Answer 4

Q 38. Disadvantages of Mobile TCP includes

1. Assuming low bit error rates


2. Lack of buffering
3. Lack of acknowledgment
4. None of the above

Answer 1

Q39. A very useful extension of TCP is the use of

1. Buffering packets
2. Congestion control
3. Selective retransmission
4. All of the above
Answer 3

Q40. Which of the following combine packets for connection establishment and
connection release with user data packets?

1. Transaction oriented TCP


2. Indirect TCP
3. Snooping TCP
4. None of the above

Answer 1

Q41. Mobile Computing allows transmission of data, from one wireless-enabled


device to another —-

1. Any device
2. Wired device
3. Wireless-enabled device
4. None of the above

Answer 3

Q42. The most important feature/s of mobile computing technology is/are —-

1. Mobility
2. Portability
3. Wireless connectivity
4. All of the above

Answer 4

Q43. Which of the following is the base of most mobile communications?

1. GSM
2. GPRS
3. CDMA
4. None of the above
Answer 1

Q44. Which of the following allow the use of only some part of bandwidth?

1. TDMA
2. FDMA
3. Both a and b
4. None of the above

Answer 3

Q45. Group of cells without overlapping gaps is called ——

1. Cell
2. Tessellate
3. Mobile station
4. None of the above

Answer 2

Q46. In a cellular system, the shape of the cell is generally —–

1. Hexagon
2. Circular
3. Square
4. None of the above

Answer 1

Q47. Important mobile computing application/s is/are —–

1. Education
2. Sports
3. Games
4. All of the above

Answer 4
Q48. Challenges of mobile computing include ———

1. Low Security
2. Ad hoc Networking
3. Shared medium
4. All of the above

Answer 4

Q49. The base station covers a specific area that is called a —-

1. Cell
2. Radius
3. Tessellate
4. None of the above

Answer 1

Q50. Which of the following services/service are defined within the bearer
services?

1. Data transmission
2. Forward error correction
3. Flow control
4. All of the above

Answer 4

Q51. The overlapping portion of two piconets is called——–

1. Piconet
2. Ad hoc piconet
3. Scatter net
4. All of the above

Answer 3
Q52. Bluetooth technology is used for —-

1. Connection of peripheral devices


2. Ad-hoc networking
3. Bridging network gaps
4. All of the above

Answer 4

Q53. In Bluetooth which of the following device follow the hopping sequence?

1. Master
2. Parked
3. Standby
4. Slave

Answer 4

Q54. Which of the following system takes a user bitstream and perform an (XOR)?
The result is either the sequence 0110101 (if the user bit equals 0) or its
complement 1001010 (if the user bit equals 1).

1. FHSS
2. DSSS
3. Both a and b
4. None of the above

Answer 2

Q55. Slow and fast hopping is used in —-

1. FHSS
2. GSM
3. GPRS
4. UMTS
Answer 1

Q56. The most WLANs are based upon —-

1. IEEE 802.11
2. WiFi
3. Both a and b
4. None of these

Answer 3

Q57. The advantages of WLANs are —–

1. Flexibility
2. Robustness
3. Less cost
4. All of the above

Answer 4

Q58. Disadvantages of WLANs are —–

1. Slow speed
2. Noise
3. More effort for Security
4. All of the above

Answer 4

Q59. In a piconet, the master device decides the —-

1. Hopping pattern
2. Frequency reuse
3. Channels
4. All of the above

Answer 4
Q60. In a Distributed File System, clients access files provided by

1. Other clients
2. Server
3. Access point
4. None of these

Answer 2
Model Question Paper
Subject:-Mobile Computing

Branch:-Computer Engineering

Class:-B.E.

Semester:- VIII

Q1. Which of the following stores all the user-related data that is relevant for the GSM system in mobile
computing?

A. Sim
B. HLR
C. ELR
D. VLR

Answer A

Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?

A. Home location register


B. Visitor location register
C. Entity equipment register
D. None of the above

Answer A

Q3. In which of the following Codes with specific characteristics can be applied to the transmission?

A. GSM
B. GPRS
C. CDMA
D. None of the above

Answer C

Q4. Which of the following allow the use of entire bandwidth simultaneously?

A. TDMA
B. FDMA
C. CDMA
D. None of the above

Answer C

Q5. The base station covers a specific area that is called a ——


A. Cell
B. Tessellate
C. Mobile station
D. None of the above

Answer A

Q6. In a cellular system, the shape of the cell depends on —–

A. Environmental conditions
B. Social conditions
C. Political conditions
D. None of the above

Answer A

Q7. Cellular System or having small cells needs ——–

A. Handover
B. Infrastructure
C. Frequency planning
D. All of the above

Answer D

Q8. In a cellular system, the same frequency is used for other users using the technique ———-

A. Frequency planning
B. Frequency hopping
C. Frequency reuse
D. None of the above

Answer C

Q9. Which of the following provides packet mode data transfer service over the cellular network
system?

A. GSM
B. GPRS
C. TCP
D. None of the above

Answer B
Q10. Which of the following services/ services are defined by the GSM?

A. Bearer
B. Supplementary
C. Tele
D. All of the above

Answer D

Q11. Bluetooth Technology supports

A. Piconet
B. Ad hoc piconet
C. Scatter net
D. All of the above

Answer D

Q12. Which of the following wireless technology is used for exchanging data between a variety of fixed
and mobile devices over a very short diameter?

A. Mobile technology
B. Bluetooth technology
C. Ad hoc computing
D. None of the above

Answer B

Q13. In Bluetooth which of the following device decides hopping sequence?

A. Master
B. Parked
C. Standby
D. Slave

Answer A

Q14. In which of the following the total available bandwidth is split into many channels of smaller
bandwidth plus guard spaces between the channels?

A. FHSS
B. DSSS
C. Both a and b
D. None of the above

Answer A
Q15. In which of the following a single data stream is split across several separate narrowband channels
at different frequencies to reduce interference and crosstalk.

A. OFDM
B. GSM
C. GPRS
D. UMTS

Answer A

Q16. Which of the following uses high-frequency radio waves instead of cables for connecting the
devices in LAN?

A. Wired LAN
B. Wireless LAN
C. Fiber made LAN
D. None of the above

Answer B

Q17. Most WLANs are based upon the standard—-

A. IEEE 802.2
B. IEEE 802.11
C. IEEE 802.5
D. IEEE 802.15

Answer B

Q18. Which of the following is/are the advantages of a wireless LAN?

A. Flexibility
B. Ease of use
C. Robustness
D. All of the above

Answer D

Q19. Disadvantages of WLANs include —–

A. Interference and noise


B. Slower than wired
C. Greater care is needed for encryption
D. All of the above

Answer D
Q20. In piconet devices connected with the master is called

A. Slaves
B. Parked
C. Standby
D. None of the above

Answer A

Q21 The general goal of a file system is to support———-

A. Transparent access to data


B. Efficient access to data
C. Consistent access to data
D. All of the above

Answer D

Q 22 In the distributed system a client gives the request, and the server provides—-

A. Data
B. Service
C. Information
D. All of the above

Answer B

Q 23. The important challenges of distributed systems apply to DFS are ——

A. Migration of data
B. Concurrent access to data
C. Replication of data
D. All of the above

Answer B

Q24. Features of CODA is/are

A. A disconnected operation for mobile computing


B. Freely available under a liberal license
C. High performance through client-side persistent caching
D. All of the above

Answer D

Q25. Which of the file system apply gossip protocols?

A. CODA
B. Ficus
C. Rover
D. None of the above
Answer B

Q26. Mio-NFS supports following mode/modes ———-

A. Connected
B. Loosely connected
C. Disconnected
D. All of the above

Answer C

Q27. Which of the following are objects that can be dynamically loaded into a client computer from a
server (or vice-versa) to reduce client-server communication?

A. Relocatable dynamic objects


B. Locatable objects
C. Dynamic objects
D. None of the above

Answer 1

Q28 Which of the following allows for non-blocking RPCs even when a host is disconnected?

A. Queued remote procedure calls


B. Remote procedure calls
C. Both a and b
D. None of the above

Answer A

Q29. All transactions must satisfy the —–

A. Consistency
B. Availability
C. ACID Property
D. All of the above

Answer C

Q 30. The ability of a system to perform its function correctly even in the presence of internal faults is
called

A. Fault tolerance
B. Recovery
C. Both a and b
D. None of the above

Answer C
Q 31. TCP is a reliable protocol that incorporates

A. congestion control
B. Flow control mechanisms
C. guarantees in-order delivery of data
D. All of the above

Answer D

Q32. TCP supports many of the Internet’s most popular application protocols and resulting
applications, including

A. World Wide Web


B. e-mail,
C. File Transfer Protocol
D. All of the above

Answer D

Q 33. Which of the following segments a TCP connection into a fixed part and a wireless part?

A. Indirect TCP
B. Direct TCP
C. Both a and b
D. None of the above

Answer A

Q 34. Advantages of Indirect TCP includes

A. Fast transmission
B. Congestion control
C. Error control
D. All of the above

Answer D

Q 35. The main function of snooping TCP is —-

A. To buffer data close to the mobile host to perform fast local retransmission in case of packet
loss.
B. Congestion control
C. Flow control
D. None of the above

Answer A
Q 36. I-TCP and Snooping TCP does not help much if a mobile host gets

A. Out of coverage area


B. Disconnected
C. Battery power low
D. None of the above

Answer B

Q 37. M-TCP wants to improve overall throughput to

A. to lower the delay


B. to maintain end-to-end semantics of TCP
C. to provide a more efficient handover
D. All of the above

Answer D

Q 38. Disadvantages of Mobile TCP includes

A. Assuming low bit error rates


B. Lack of buffering
C. Lack of acknowledgment
D. None of the above

Answer A

Q39. A very useful extension of TCP is the use of

A. Buffering packets
B. Congestion control
C. Selective retransmission
D. All of the above

Answer C

Q40. Which of the following combine packets for connection establishment and connection release
with user data packets?

A. Transaction oriented TCP


B. Indirect TCP
C. Snooping TCP
D. None of the above

Answer A

Q41. Mobile Computing allows transmission of data, from one wireless-enabled device to another —-

A. Any device
B. Wired device
C. Wireless-enabled device
D. None of the above

Answer C

Q42. The most important feature/s of mobile computing technology is/are —-

A. Mobility
B. Portability
C. Wireless connectivity
D. All of the above

Answer D

Q43. Which of the following is the base of most mobile communications?

A. GSM
B. GPRS
C. CDMA
D. None of the above

Answer A

Q44. Which of the following allow the use of only some part of bandwidth?

A. TDMA
B. FDMA
C. Both a and b
D. None of the above

Answer C

Q45. Group of cells without overlapping gaps is called ——

A. Cell
B. Tessellate
C. Mobile station
D. None of the above

Answer B

Q46. In a cellular system, the shape of the cell is generally —–

A. Hexagon
B. Circular
C. Square
D. None of the above

Answer A
Q47. Important mobile computing application/s is/are —–

A. Education
B. Sports
C. Games
D. All of the above

Answer D

Q48. Challenges of mobile computing include ———

A. Low Security
B. Ad hoc Networking
C. Shared medium
D. All of the above

Answer D

Q49. The base station covers a specific area that is called a —-

A. Cell
B. Radius
C. Tessellate
D. None of the above

Answer A

Q50. Which of the following services/service are defined within the bearer services?

A. Data transmission
B. Forward error correction
C. Flow control
D. All of the above

Answer D

Q51. The overlapping portion of two piconets is called——–

1. Piconet

2. Ad hoc piconet

3. Scatter net

4. All of the above

Answer C
Q52. Bluetooth technology is used for —-

A. Connection of peripheral devices


B. Ad-hoc networking
C. Bridging network gaps
D. All of the above

Answer D

Q53. In Bluetooth which of the following device follow the hopping sequence?

A. Master
B. Parked
C. Standby
D. Slave

Answer D

Q54. Which of the following system takes a user bitstream and perform an (XOR)? The result is either
the sequence 0110101 (if the user bit equals 0) or its complement 1001010 (if the user bit equals 1).

A. FHSS
B. DSSS
C. Both a and b
D. None of the above

Answer B

Q55. Slow and fast hopping is used in —-

A. FHSS
B. GSM
C. GPRS
D. UMTS

Answer A

Q56. The most WLANs are based upon —-

A. IEEE 802.11
B. WiFi
C. Both a and b
D. None of these

Answer C
Q57. The advantages of WLANs are —–

A. Flexibility
B. Robustness
C. Less cost
D. All of the above

Answer D

Q58. Disadvantages of WLANs are —–

A. Slow speed
B. Noise
C. More effort for Security
D. All of the above

Answer D

Q59. In a piconet, the master device decides the —-

A. Hopping pattern
B. Frequency reuse
C. Channels
D. All of the above

Answer D

Q60. In a Distributed File System, clients access files provided by

A. Other clients
B. Server
C. Access point
D. None of these

Answer B
Model Question Paper

Subject: Mobile Computing

Branch: CSE

Class: BE

Semester: VIII

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Q1. Which of the following stores all the user-related data that is relevant for
the GSM system in mobile computing?

a. Sim
b. HLR
c. ELR
d. VLR

Ans.: a

Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?

a. Home location register


b. Visitor location register
c. Entity equipment register
d. None of the above

Ans.: a

Q3. In which of the following Codes with specific characteristics can be applied to
the transmission?

a. GSM
b. GPRS
c. CDMA
d. None of the above

Ans.: c

Q4. Which of the following allow the use of entire bandwidth simultaneously?

a. TDMA
b. FDMA
c. CDMA
d. None of the above

Ans.: c

Q5. The base station covers a specific area that is called a ——

a. Cell
b. Tessellate
c. Mobile station
d. None of the above

Ans.: a

Q6. In a cellular system, the shape of the cell depends on —–

a. Environmental conditions
b. Social conditions
c. Political conditions
d. None of the above

Ans.: a

Q7. Cellular System or having small cells needs ——–

a. Handover
b. Infrastructure
c. Frequency planning
d. All of the above

Ans.: d

Q8. In a cellular system, the same frequency is used for other users using the
technique ———-

a. Frequency planning
b. Frequency hopping
c. Frequency reuse
d. None of the above

Ans.: c
Q9. Which of the following provides packet mode data transfer service over
the cellular network system?

a. GSM
b. GPRS
c. TCP
d. None of the above

Ans.: b

Q10. Which of the following services/ services are defined by the GSM?

a. Bearer
b. Supplementary
c. Tele
d. All of the above

Ans.: d

Q11. . Bluetooth Technology supports

a. Piconet
b. Ad hoc piconet
c. Scatter net
d. All of the above

Ans.: d

Q12. Which of the following wireless technology is used for exchanging data
between a variety of fixed and mobile devices over a very short diameter?

a. Mobile technology
b. Bluetooth technology
c. Ad hoc computing
d. None of the above

Ans.: b

Q13. In Bluetooth which of the following device decides hopping sequence?

a. Master
b. Parked
c. Standby
d. Slave

Ans.: a

Q14. Which of the following uses high-frequency radio waves instead of cables
for connecting the devices in LAN?

a. Wired LAN
b. Wireless LAN
c. Fiber made LAN
d. None of the above

Ans.: b

Q15. Most WLANs are based upon the standard—-

a. IEEE 802.2
b. IEEE 802.11
c. IEEE 802.5
d. IEEE 802.15

Ans.: b

Q16. . Which of the following is/are the advantages of a wireless LAN?

a. Flexibility
b. Ease of use
c. Robustness
d. All of the above

Ans.: d

Q17. Disadvantages of WLANs are —–

a. Slow speed
b. Noise
c. More effort for Security
d. All of the above

Ans.: d
Q18. In the distributed system a client gives the request, and the server provides—
-

a. Data
b. Service
c. Information
d. All of the above

Ans.: b

Q19. In piconet devices connected with the master is called

a. Slaves
b. Parked
c. Standby
d. None of the above

Ans.: a

Q20. The important challenges of distributed systems apply to DFS are ——

a. Migration of data
b. Concurrent access to data
c. Replication of data
d. All of the above

Ans.: d
Q21. Bluetooth is the wireless technology for __________
a) local area network
b) personal area network
c) metropolitan area network
d) wide area network

Ans.: b

Q22. Bluetooth uses __________


a) frequency hopping spread spectrum
b) orthogonal frequency division multiplexing
c) time division multiplexing
d) channel division multiplexing

Ans.: a
Q23. The header length of an IPv6 datagram is ___________
a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes

Ans.: d

Q24. Bluetooth is named after a(n) ____________ king.

a. Swiss
b. English
c. German
d. Danish

Ans.: d

Q25. What is one of the features that make Bluetooth different from other wireless
technologies?

a. inability to transfer voice and data between battery-operated mobile devices


b. long-distance wireless capabilities
c. high bandwidth wireless capabilities
d. low power consumption

Ans.: d

Q26. IPv6 does not use _________ type of address.


a) broadcast
b) multicast
c) anycast
d) unicast

Ans.: a

Q27. Bluetooth devices communicate at ____________ bandwidths.

a. static
b. low
c. high
d. fixed

Ans.: b

Q28. WiMAX stands for ___________


a) wireless maximum communication
b) worldwide interoperability for microwave access
c) worldwide international standard for microwave access
d) wireless internet maximum communication

Ans.: b

Q29. WiMAX provides ________


a) simplex communication
b) half duplex communication
c) full duplex communication
d) no communication

Ans.: c

Q30. Which of the following is NOT a device that is likely to use Bluetooth
technology?

a. toy
b. high-speed router
c. PDA
d. cell phone

Ans.: b

Q31. Which among the following features is present in IPv6 but not in IPv4?
a) Fragmentation
b) Header checksum
c) Options
d) Anycast address

Ans.: d

Q32. What is the full form of WLAN?


a) Wide Local Area Network
b) Wireless Local Area Network
c) Wireless Land Access Network
d) Wireless Local Area Node

Ans.: b

Q33. Devices that provide the connectivity to a WiMAX network are known as
_________
a) subscriber stations
b) base stations
c) gateway
d) switch stations

Ans.: a

Q34. The size of an IP address in IPv6 is _________


a) 4 bytes
b) 128 bits
c) 8 bytes
d) 100 bits

Ans.: b

Q35. IPv6 has a larger address space of _________


a) 216
b) 2128
c) 232
d) 28

Ans.: b

Q36. Which of the following frequencies is not used in WiMAX for communication?
a) 2.3 GHz
b) 2.4 GHz
c) 2.5 GHz
d) 3.5 GHz

Ans.: b

Q37. RFID stands for?

a. Random frequency identification

b. Radio frequency identification

c. Random frequency information

d. Radio frequency information

Ans.: b

Q38. Which of the following is NOT true about Bluetooth?

a. Bluetooth is considered to be low bandwidth wireless technology.


b. Bluetooth has a range of about 30 feet.
c. Bluetooth has a bandwidth of 720 kbps.
d. Bluetooth is considered to be a long-distance wireless technology.
Ans.: d

Q39. Wi-Fi stands for?

a. Wireless fidelity

b. Wireless Flexibility

c. Wide Fidelity

d. WAN Flexibility

Ans.: a

Q40. Which of the following specifies a set of media access control (MAC) and
physical layer specifications for implementing WLANs?
a) IEEE 802.16
b) IEEE 802.3
c) IEEE 802.11
d) IEEE 802.15

Ans.: c

Q41. Which of the following is the world’s first cellular system to specify digital
modulation and network level architecture?
a) GSM
b) AMPS
c) CDMA
d) IS-54

Ans.: a

Q42. . Previously in 1980s, GSM stands for ____________


a) Global system for mobile
b) Groupe special mobile
c) Global special mobile
d) Groupe system mobile

Ans.: b

Q43. Who sets the standards of GSM?


a) ITU
b) AT & T
c) ETSI
d) USDC

Ans.: c

Q44. Which of the following does not come under the teleservices of GSM?
a) Standard mobile telephony
b) Mobile originated traffic
c) Base originated traffic
d) Packet switched traffic

Ans.: d

Q45. Which of the following comes under supplementary ISDN services?


a) Emergency calling
b) Packet switched protocols
c) Call diversion
d) Standard mobile telephony

Ans.: c

Q46. Which of the following memory device stores information such as subscriber’s
identification number in GSM?
a) Register
b) Flip flop
c) SIM
d) SMS

Ans.: c

Q47. Which of the following feature makes impossible to eavesdrop on GSM radio
transmission?
a) SIM
b) On the air privacy
c) SMS
d) Packet switched traffic

Ans.: b

Q48. Which of the following does not come under subsystem of GSM architecture?
a) BSS
b) NSS
c) OSS
d) Channel
Ans.: d

Q49. Which of the following subsystem provides radio transmission between mobile
station and MSC?
a) BSS
b) NSS
c) OSS
d) BSC

Ans.: a

Q50. ___________ manages the switching function in GSM.


a) BSS
b) NSS
c) OSS
d) MSC

Ans.: b

Q51. . __________ supports the operation and maintenance of GSM.


a) BSS
b) NSS
c) OSS
d) MSC

Ans.: c

Q52. A GPRS Network is a part of ____ in GSM network.

A) BTS

B) BSS

C) NSS

D) VLR

Ans.: c

Q53. Which is the organization providing standards for GPRS network?

A) ANSI

B) ETSI

C) 3GPP
D) UMTS

Ans.: c

Q54. A GPRS Network works same in _____.

A) 2G

B) 3G

C) 2G and /or 3G

D) 4G

Ans.: c

Q55. The Ga interface in a GRPS network uses which protocol?

A) MAP

B) CAP

C) Frame Relay

D) GTP (GPRS Tunneling Protocol)

Ans.: D

Q56. GPRS stands for?

A) General Packet Repair Service

B) General Packet Radio Service

C) Graphics Packet Radio Service

D) None

Ans.: b

Q57. What is the data rate or speed offered by a GPRS connection?

A) 56-115kbps

B) 9-256kbps

C) 64-128kbps

D) None
Ans.: a

Q58. GPRS services belong to which generation?

A) 1G

B) 2G

C) 3G

D) 4G

Ans.: b

Q59. Choose a correct abbreviation below.

A) SGSN - Serving GPRS Support Node

B) GGSN - Gateway GPRS Support Node

C) IP - Internet Protocol

D) All

Ans.: D

Q60. GPRS is a Connection Oriented service. True/False?

A) False

B) True

Ans.: a
Name of College: Gangamai College of Engineering, Nagaon Dist Dhule
Subject: Mobile Computing
Branch: Computer
Class: BE
Semester: VIII

Q1. Which of the following stores all the user-related data that is relevant for
the GSM system in mobile computing?

A. Sim
B. HLR
C. VLR
D. ELR
Ans.: A
Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?

A. Home location register


B. Visitor location register
C. Entity equipment register
D. None of the above
Ans.: A
Q3. In which of the following Codes with specific characteristics can be applied
to the transmission?

A. GSM
B. GPRS
C. CDMA
D. None of the above
Ans.: C
Q4. Which of the following allow the use of entire bandwidth simultaneously?

A. TDMA
B. FDMA
C. CDMA
D. None of the above
Ans.: C
Q5. Cellular System or having small cells needs ——–

A. Handover
B. Infrastructure
C. Frequency planning
D. All of the above
Ans.: D
Q6. Which of the following provides packet mode data transfer service over
the cellular network system?

A. GSM
B. GPRS
C. TCP
D. None of the above
Ans.: B

Q7. Which of the following services/ services are defined by the GSM?

A. Bearer
B. Supplementary
C. Tele
D. All of the above
Ans.: D
Q8. Bluetooth Technology supports

A. Piconet
B. Ad hoc piconet
C. Scatter net
D. All of the above
Ans.: D
Q9. Which of the following wireless technology is used for exchanging data
between a variety of fixed and mobile devices over a very short diameter?

A. Mobile technology
B. Bluetooth technology
C. Ad hoc computing
D. None of the above
Ans.: B
Q10. In Bluetooth which of the following device decides hopping sequence?

A. Master
B. Parked
C. Standby
D. Slave
Ans.: A
Q11. Most WLANs are based upon the standard—-

A. IEEE 802.2
B. IEEE 802.11
C. IEEE 802.5
D. IEEE 802.15
Ans.: B
Q12. Which of the following is/are the advantages of a wireless LAN?

A. Flexibility
B. Ease of use
C. Robustness
D. All of the above
Ans.: D
Q13. Disadvantages of WLANs include —–

A. Interference and noise


B. Slower than wired
C. Greater care is needed for encryption
D. All of the above
Ans.: D
Q14. In piconet devices connected with the master is called

A. Slaves
B. Parked
C. Standby
D. None of the above
Ans.: A
Q15. Mobile Computing allows transmission of data, from one wireless-
enabled device to another —-

A. Any device
B. Wired device
C. Wireless-enabled device
D. None of the above
Ans.: C
Q16. The most important feature/s of mobile computing technology is/are —-

A. Mobility
B. Portability
C. Wireless connectivity
D. All of the above
Ans.: D
Q17. Which of the following is the base of most mobile communications?

A. GSM
B. GPRS
C. CDMA
D. None of the above
Ans.: A
Q18. Which of the following allow the use of only some part of bandwidth?

A. TDMA
B. FDMA
C. Both a and b
D. None of the above
Ans.: C
Q19. Important mobile computing application/s is/are —–

A. Education
B. Sports
C. Games
D. All of the above
Ans.: D
Q20. Challenges of mobile computing include ———

A. Low Security
B. Ad hoc Networking
C. Shared medium
D. All of the above
Ans.: D
Q21. Which of the following services/service are defined within the bearer
services?

A. Data transmission
B. Forward error correction
C. Flow control
D. All of the above
Ans.: D
Q22. The overlapping portion of two piconets is called——–

A. Piconet
B. Ad hoc piconet
C. Scatter net
D. All of the above
Ans.: C
Q23. Bluetooth technology is used for —-

A. Connection of peripheral devices


B. Ad-hoc networking
C. Bridging network gaps
D. All of the above
Ans.: D
Q24. The most WLANs are based upon —-
A. IEEE 802.11
B. WiFi
C. Both a and b
D. None of these
Ans.: C
Q25. The advantages of WLANs are —–

A. Flexibility
B. Robustness
C. Less cost
D. All of the above
Ans.: D
Q.26. Which of the following is the world’s first cellular system to specify
digital modulation and network level architecture?
A. GSM
B.AMPS
C.CDMA
D.IS-54
Ans.: A

Q.27 Previously in 1980s, GSM stands for ____________


A. Global system for mobile
B. Groupe special mobile
C. Global special mobile
D. Groupe system mobile
Ans.: B
Q.28 who sets the standards of GSM?
A. ITU
B. AT & T
C. ETSI
D. USDC
Ans.: C
Q.29 Which of the following does not come under the tele-services of GSM?
A. Standard mobile telephony
B. Mobile originated traffic
C. Base originated traffic
D. Packet switched traffic
Ans.: D
Q.30 Which of the following comes under supplementary ISDN services?
A. Emergency calling
B. Packet switched protocols
C. Call diversion
D. Standard mobile telephony
Ans.: C
Q.31 Which of the following memory device stores information such as
subscriber’s identification number in GSM?
A. Register
B. Flip flop
C. SIM
D. SMS
Ans.: C

Q.32 Which of the following feature makes impossible to eavesdrop on GSM


radio transmission?
A. SIM
B. On the air privacy
C. SMS
D. Packet switched traffic

Ans.: B

Q.33 Which of the following does not come under subsystem of GSM
architecture?
A. BSS
B. NSS
C. OSS
D. Channel

Ans.: D

Q.34 Which of the following subsystem provides radio transmission between


mobile station and MSC?
A. BSS
B. NSS
C. OSS
D. BSC

Ans.: A

Q.35 ___________ manages the switching function in GSM.


A. BSS
B. NSS
C. OSS
D. MSC

Ans.: B
Q.36 __________ supports the operation and maintenance of GSM.
A. BSS
B. NSS
C. OSS
D. MSC

Ans.: C

Q.37 __________ carries digitally encoded user data.


A. Traffic channels
B. Control channels
C. Signaling channels
D. Forward channels6

Ans.: A

Q.38 ____________ carries signalling and synchronizing commands.


A. Traffic channels
B. Control channels
C. Signaling channels
D. Forward channels
Ans.: B
Q.39 Several protocols for upper layers in bluetooth use _________
A. UDP
B. HSP
C. ITC
D. L2CAP
Ans.: D
Q.40 Network layer at source is responsible for creating a packet from data
coming from another ________
A. Station
B. Link
C. Node
D. Protocol
Ans.: D
Q.41 Header of datagram in IPv4 has _________
A. 0 to 20 bytes
B. 20 to 40 bytes
C. 20 to 60 bytes
D. 20 to 80 bytes
Ans.: C
Q.42 In IPv4 layer, datagram is of ________
A. Fixed length
B. Variable length
C. Global length
D. Zero length
Ans.: B
Q.43 Which protocol is commonly used to retrieve email from a mail server?
A. FTP
B. IMAP
C. HTML
D. TELNET
Ans.: B
Q.44 A packet in Transmission Control Protocol (TCP) is called a ____________
A. Transmittable slots
B. Packet
C. Segment
D. Source Slots
Ans.: C
Q.45 IEEE 802.11 defines basic service set as building block of a wireless
___________
A. LAN
B. WAN protocol
C. MAN
D. ALOHA
Ans.: A
Q.46 Wireless transmission is divided into ___________
A. 3 broad groups
B. 6 broad groups
C. 9 broad groups
D. 8 broad groups
Ans.: A
Q.47 Transmission Control Protocol/Internet Networking Protocol have
___________
A. Four Layers
B. Five Layers
C. Six Layers
D. Seven Layers
Ans.: A
Q.48 Packets of data that is transported by IP is called __________
A. Datagram
B. Frames
C. Segments
D. Encapsulate message
Ans.: A
Q.49 IPv6 has a larger address space of _________
A. 216
B. 2128
C. 232
D. 28
Ans.: B
Q.50 In practical IPv6 application, a technology encapsulates IPv6 packets
inside IPv4 packets, this technology is called _______
A. Tunneling
B. Hashing
C. Routing
D. NAT
Ans.: A
Q.51 Which one of the following descriptions about IPv6 is correct?
A. Addresses are not hierarchical and are assigned at random
B. Broadcasts have been eliminated and replaced with multicasts
C. There are 2.7 billion available addresses
D. An interface can only be configured with one IPv6 address
Ans.: B
Q.52 MIN stands for_____________________
A. Mobile Identification Number
B. Mobile Internet
C. Mobility In Network
D. None of the above
Ans.: A
Q.53 The process of transferring a mobile station from one base station to
another is_________________

A. MSC
B. Roamer
C. Hand off
D. Forward channel

Ans.: C

Q.54 In Handoff

A. Process of transferring the call to the new base station


B. Transfers the call
C. New channel allocation is done
D. All of the above

Ans.: D
Q.55 In a wireless communication, base station is connected to central hub
called _______
A. PSTN
B. MSC
C. CO
D. PBX
Ans.: B
Q.56 PSTN stands for ________
A. Public switched telephone network
B. Personal switched telephone network
C. Personal switched telephone node
D. Public switched telephone node
Ans.: A
Q.57 In public switched telephone network, LATA stands for ______
A. Local access and transport area
B. Land area and transport area
C. Local access and telephone access
D. Local area and telephone access
Ans.: A
Q.58 Connection oriented services are also called __________
A. Datagram services
B. Virtual circuit routing
C. Connectionless services
D. Routing service
Ans.: B
Q.59 ISDN is based on the concept of __________
A. SS7
B. CCS
C. ARDIS
D. CDPD
Ans.: B
Q.60 ______ is used for transmission of packets in the cellular switched
architecture.
A. Packet switching techniques
B. Circuit switching techniques
C. Packet and circuit switched technique
D. Datagram technique
Ans.: A
Model Question Paper
Subject: Mobile Computing

Branch: Computer Engineering

Class: BE

Semester: VIII

Q1. “Mr. Watson, come here, I want to see you” was a first ever voice call by

A) Joseph Henry

B) F. B. Morse

C) Alexander G. Bell

D) Harald Blatand

Ans. C

Q2. Mobile Computing is also known as

A) Parallel Computing

B) Genetic Computing

C) Nomadic Computing

D) All of these

Ans. C

Q3. Fixed telephone is a

A) Bearer Network

B) Bearer Gateway

C) Middleware Gateway

D) User/Device

Ans. D

Q4. CDMA Mobile Phone is a

A) Bearer Network

B) Bearer Gateway

C) Middleware Gateway

D) User/Device
Ans. D

Q5. PDA is a

A) Bearer Network

B) Bearer Gateway

C) Middleware Gateway

D) User/Device

Ans. D

Q6. Analog exchange is a

A) Bearer Network

B) Bearer Gateway

C) Middleware Gateway

D) User/Device

Ans. A

Q7. Mobile exchange WAP is a

A) Bearer Network

B) Bearer Gateway

C) Middleware Gateway

D) User/Device

Ans. A

Q8. ISP Internet Gateway is a

A) Bearer Network

B) Bearer Gateway

C) Middleware Gateway

D) User/Device

Ans. A

Q9. Digital IVR is a


A) Bearer Network

B) Bearer Gateway

C) Middleware Gateway

D) User/Device

Ans. B

Q10. SMS Gateway is a

A) Bearer Network

B) Bearer Gateway

C) Middleware Gateway

D) User/Device

Ans. B

Q11. Web Server is a

A) Bearer Network

B) Bearer Gateway

C) Middleware Gateway

D) User/Device

Ans. B

Q12. Rendering is a

A) Bearer Network

B) Bearer Gateway

C) Middleware Gateway

D) User/Device

Ans. C

Q13. HTTP Server is a

A) Bearer Network

B) Bearer Gateway

C) Middleware Gateway
D) User/Device

Ans. C

Q14. User Hooks are

A) Bearer Network

B) Bearer Gateway

C) Middleware Gateway

D) User/Device

Ans. C

Q15. Connectors are

A) Bearer Network

B) Bearer Gateway

C) Middleware Gateway

D) User/Device

Ans. C

Q16. Mail Server is a

A) Bearer Network

B) Bearer Gateway

C) Middleware Gateway

D) Content Service

Ans. D

Q17. Mainframe Server is a

A) Bearer Network

B) Bearer Gateway

C) Middleware Gateway

D) Content Service

Ans. D

Q18. PIM Server is a


A) Bearer Network

B) Bearer Gateway

C) Middleware Gateway

D) Content Service

Ans. D

Q19. ............ is a personal Mobile Computing application

A) Bank Transactions

B) Wallet

C) Utility Bill Payment

D) News

Ans. B

Q20. ............ is a transaction oriented Mobile Computing application

A) Wallet

B) Diary

C) Utility Bill Payment

D) News

Ans. C

Q21. A Network can be divided into.......segments

A) One

B) Two

C) Three

D) Four

Ans. C

Q22. The Mobile Computing architecture has.......tiers

A) One

B) Two

C) Three
D) Four

Ans. C

Q23. In Mobile Computing architecture, User Interface is

A) Tire1

B) Tire2

C) Tire3

D) Tire4

Ans. A

Q24. In Mobile Computing architecture, Process Management is

A) Tire1

B) Tire2

C) Tire3

D) Tire4

Ans. B

Q25. In Mobile Computing architecture, Business Tasks are

A) Tire1

B) Tire2

C) Tire3

D) Tire4

Ans. B

Q26. In Mobile Computing architecture, Database Management is

A) Tire1

B) Tire2

C) Tire3

D) Tire4

Ans. C

Q27. In Mobile Computing architecture, Data Store is


A) Tire1

B) Tire2

C) Tire3

D) Tire4

Ans. C

Q28. The Google Chrome browser comes under

A) Presentation Tier

B) Application Tier

C) Data Tier

D) None of these

Ans. A

Q29. Lynx comes under

A) Presentation Tier

B) Application Tier

C) Data Tier

D) None of these

Ans. A

Q30. Apache comes under

A) Presentation Tier

B) Application Tier

C) Data Tier

D) None of these

Ans. A

Q31. The Client Context manager does not deal with

A) Identity

B) Security

C) Activity
D) Social Situation

Ans. B

Q32. Semantic Web is based on

A) URI

B) URL

C) A & B

D) None of these

Ans. A

Q33. Mobile Computing through Internet will be through

A) WiFi

B) GSM

C) CDMA

D) All of these

Ans. D

Q34. Bluetooth was the nickname of

A) Joseph Henry

B) F. B. Morse

C) Alexander G. Bell

D) Harald Blatand

Ans. D

Q35. Bluetooth operates in .......frequency band.

A) 2.2 GHz

B) 2.4 GHz

C) 2.6 GHz

D) 2.8 GHz

Ans. B

Q36. Bluetooth can transfer data at maximum speed of


A) 512 Kbps

B) 512 KBps

C) 1 Mbps

D) 1 MBps

Ans. C

Q37. RFID operates on.......basic frequncies

A) Two

B) Four

C) Six

D) Eight

Ans. C

Q38. ........is not currently identified application area of RFID.

A) Transportation and Logistics

B) Animal Tagging

C) Retail Store

D) Matchmaking

Ans. D

Q39. The WiMax technical standard is

A) 802.3

B) 802.11

C) 802.16

D) 802.22

Ans.C

Q40. The Home Agent in Mobile IP is used in

A) Discovery

B) Registration

C) Tunnelling
D) None of these

Ans. C

Q41. GSM was established in

A) 1982

B) 1987

C) 1989

D) 1990

Ans. A

Q42. GSM uses

A) FDMA

B) TDMA

C) A & B

D) None of these

Ans. C

Q43. In GSM System hierarchy, ........is at the top.

A) BSC

B) MSC

C) PLMN

D) LA

Ans. C

Q44. ........is not a GSM entity.

A) MS

B) BSC

C) MSC

D) LA

Ans. D

Q45. In GSM, HLR & VLR are connected to


A) BTS

B) BSC

C) MSC

D) OMC

Ans. C

Q46. .........is not used in GSM call routing.

A) IMEI

B) IMSI

C) TMSI

D) MSRN

Ans. A

Q47. IMEI is the acronym for

A) Internet Mobile Equipment Identity

B) International Mobile Equivalent Identity

C) International Mobile Equipment Identity

D) None of these

Ans. C

Q48. IMEI is stored in

A) EIR

B) SIM Card

C) Memory Card

D) None of these

Ans. A

Q49. IMSI is stored in

A) EIR

B) SIM Card

C) Memory Card
D) None of these

Ans. B

Q50. In the Mobile phone handset, one can type.......to see the IMEI number(s).

A) #*06*

B) *#06#*

C) *#06#

D) #*06*#

Ans. C

Q51. GSM has ........number of channels.

A) 120

B) 125

C) 130

D) 132

Ans. B

Q52. The IMEI number is of ........digits.

A) 12

B) 14

C) 15

D) 16

Ans. C

Q53. . The IMSI number is of ........digits.

A) 12

B) 14

C) 15

D) 16

Ans. C

Q54. In GSM, ....... Algorithm is used for Authentication.


A) A3

B) A5

C) A8

D) None of these

Ans. A

Q55. In GSM, ....... Algorithm is used for Key Generation.

A) A3

B) A5

C) A8

D) None of these

Ans. C

Q56. In GSM, ....... Algorithm is used for Privacy.

A) A3

B) A5

C) A8

D) None of these

Ans. B

Q57. .........is not a GPRS QoS requirement.

A) Reliability

B) Security

C) Delay

D) Throughput

Ans. B

Q58. .........is not used in GPRS

A) MS

B) BSS

C) SGSN
D) LA

Ans. D

Q59. GPRS works with

A) GSM

B) CDMA

C) A & B

D) None of these

Ans. A

Q60. GPRS is a ..........standard.

A) 1G

B) 2G

C) 2.5G

D) 3G

Ans. C
Model Question Paper
Subject: MOBILE COMPUTING

Branch: COMPUTER ENGINEERING

Class: FINAL YEAR BE COMPUTER

Semester: VIII

Q1. Which of the following is a mobile computingcharacteristic?

A. Bearer Mobility.

B. Session Mobility

C. Host mobility.

D. All

Ans.: D

Q2. Gateway is:

A. Interface.

B. Mobility.

C. Network.

D. All

Ans.: A

Q.3.The base station covers a specific area that is called a ——

A.Cell

B. Tessellate
C. Mobile station
D. None of the above

Answer A.

Q.4 ISO 9000 related to …


A. Connection.

B. Software Quality.

C. Frequency.

D. All

Answer B.

Q.5 Session Mobility is a

A. One bearer to another.

B. One device to another.

C. One user-agent environment to another.

D. Physical Location.

Answer C.

Q.6. User Agent (UA) in the Mobile Computing is

A. Software.

B. Equipment.

C. Software and Equipment.

D. None.

Answer A

Q.7 In India the regulatory authority is


A. FCC

B.TRAI

C.ICT

D.CEPT

Answer B

Q.8 Virtual Office is

A. Physical office

B. Mobile office

C. Both A and B

D. None

Answer B

Q.9 Standards is a

A. Guideline

B. Rules

C. Criteria

D All

Answer D

Q. 10 second generation or 2G Technology uses


A. AMPS

B. FDMA

C. TDMA AND FDMA

D. UMTS

Answer C

Q.11 Mobile Computing allows transmission of data, from one wireless-enabled device to
another —-

A. Any device
B. Wired device
C. Wireless-enabled device
D. None of the above

Answer C

Q.12The most important feature/s of mobile computing technology is/are —-

A. Mobility

B. Portability
C . Wireless connectivity
D. All of the above

Answer D

Q.13 In a cellular system, the shape of the cell is generally —–

A.Hexagon

B.Circular

C. Square
D.None of the above

Answer A

Q.14 Which of the following stores Mobile Subscriber ISDN number – MSISDN?

A. Home location register


B. Visitor location register
C. Entity equipment register
D. None of the above

Answer A

Q.15 In which of the following Codes with specific characteristics can be applied to the
transmission?

A. GSM
B. GPRS
C. CDMA
D. None of the above

Answer C

Q.16 Presentation Tiers responsible for presenting the information to the

A. End User.

B. Security.

C. Memory.

D . All

Answer A

Q.17 Edge is responsible for

A. Distribution of Traffic.
B. Local switching.

C. Exchanges.

D .All

Answer D.

Q.18. In Application Tier-2 MOM is a

A. Memory Oriented Management

B. Message –Oriented Middleware

C. Format

D. None

Answer B

Q.19 Three Tier architecture for mobile computing these tiers are Presentation Tier, application
Tier and

A. Session Tier

B. Physical Tier

C. Data Tier

D None

Answer C

Q.20 Which of the following uses high-frequency radio waves instead of cables for connecting
the devices in LAN?
A. Wired LAN
B. Wireless LAN
C. Fiber made LAN
D. None of the above

Answer B

Q.21 EIR is a

A. Equipment Identity Register

B. Equipment Identity Rules

C. Equipment information Registration

D None.

Q.22 Bluetooth Technology supports

A. Piconet

B .Ad hoc piconet

C .Scatter net

D. All of the above

Answer D

Q.23. Which of the following wireless technology is used for exchanging data between a variety
of fixed and mobile devices over a very short diameter?

A. Mobile technology
B. Bluetooth technology
C. Ad hoc computing
D. None of the above

Answer B

Q.24. In Bluetooth which of the following device decides hopping sequence?

A. Master
B. Parked
C. Standby
D. Slave

Answer A

Q.25 Peripheral devices can communicate though a small network known as

A. Bluetooth

B. Wifi

C. Lifi

D. None

Answer A

Q.26 Bluetooth is the wireless technology for __________


a) local area network
b) personal area network
c) metropolitan area network
d) wide area network

Answer B
Q.27 Bluetooth transceiver devices operate in ______ band.
a) 2.4 GHz ISM
b) 2.5 GHz ISM
c) 2.6 GHz ISM
d) 2.7 GHz ISM

Answer A

Q.28. RFID stands for?


a) Random frequency identification
b) Radio frequency identification
c) Random frequency information
d) Radio frequency information

Answer B

Q.29. which of the following statement about radio frequency Identification (RFID) is not true?

A.RFID systems transmit radio signals over long distances

B. RFID systems use tiny tags with embedded microchips containing data about an item and its
location

C. RFID systems provide a powerful technology for tracking the movement of goods throughout
the supply chain

D .Companies may be required to upgrade hardware and software to accommodate the massive
amounts data that are being produced by RFID systems.

Answer A.

Q.30 1 WiMAX stands for ___________


a) wireless maximum communication
b) worldwide interoperability for microwave access
c) worldwide international standard for microwave access
d) wireless internet maximum communication

Answer B

Q.31 WiMAX uses the _________


a) orthogonal frequency division multiplexing
b) time division multiplexing
c) space division multiplexing
d) channel division multiplexing

Answer A

Q.32 WiMAX is mostly used for __________


a) local area network
b) metropolitan area network
c) personal area network
d) wide area network

Answer B

Q.33. Which of the following is the world’s first cellular system to specify digital modulation
and network level architecture?
a) GSM
b) AMPS
c) CDMA
d) IS-54

Answer A

Q.34 Previously in 1980s, GSM stands for ____________


a) Global system for mobile
b) Groupe special mobile
c) Global special mobile
d) Groupe system mobile

Answer B

Q.35 Previously in 1980s, GSM stands for ____________


a) Global system for mobile
b) Groupe special mobile
c) Global special mobile
d) Groupe system mobile

Answer C

Q.36 Which of the following feature makes impossible to eavesdrop on GSM radio
transmission?
a) SIM
b) On the air privacy
c) SMS
d) Packet switched traffic
Answer B

Q.37 ___________ manages the switching function in GSM.


a) BSS
b) NSS
c) OSS
d) MSC

Answer B

Q.38 Which of the following memory device stores information such as subscriber’s
identification number in GSM?
a) Register
b) Flip flop
c) SIM
d) SMS

Answer C

Q.39 The process of transferring a mobile station from one base station to another is
a. MSC
b. Roamer
c. Hand off
d. Forward channel
Answer C

Q.40 Hexagon shape is used for radio coverage for a cell because
a. It uses the maximum area for coverage
b. Fewer number of cells are required
c. It approximates circular radiation pattern
d. All of the above
Answer D

Q.41 Which of the following does not come under subsystem of GSM architecture?
a) BSS
b) NSS
c) OSS
d) Channel
Answer D

Q.42 Which one is not an advantage of using frequency reuse?


a) Increased capacity
b) Limited spectrum is required
c) Same spectrum may be allocated to other network
d) Number of base stations is reduced

Answer: d
Q.43 What is handoff?
a) Forward channel
b) Switching technique
c) Roamer
d) Guard channel

Answer: B
Q.44 who has the responsibility of billing and system maintenance function in cellular system?
a) Base Station
b) PSTN
c) MSC
d) Mobile system

Answer: C

Q.45Which is one of the disadvantages of 2G standards?


a) Short Messaging Service (SMS)
b) Digital modulation
c) Limited capacity
d) Limited Internet Browsing

Answer:D

Q.46VLR and HLR in GSM systems are

A. Gateways for outer connectivity

B. Databases of registered users

C. Routers and call management servers

D. NONE

Answer: B
Q.47Main reasons for a handover in GSM are

A. Weak signal in cell and heavy cell load

B. Heavy cell load

C. Mobile station moves from cell to cell

D.ALL

Answer:A

Q.48GPRS needs the following parts of a typical GSM

A. Does not need any part of GSM

B. The packet-switched core for data transmission

C. The circuit-switched core for localization and authentication

D.NONE

Answer:C

Q.49 MIN stands for


a. Mobile Identification Number
b. Mobile Internet
c. Mobility In Network
d. None of the above

Answer:A

Q.50 Centre excited hexagonal cells use


a. Sectored directional antennas
b. Omni directional antennas
c. Yagiuda antennas
d. None of the above

Answer:B

Q.51 The strategies acquired for channel assignment are


a. Fixed
b. Dynamic
c. Regular
d. Both a andb
e. Both b and c

Answer:D

Q.52 Delay in handoffs is caused due to


a. Week signal conditions
b. High traffic conditions
c. Un availability of the channel
d. All of the above

Answer:D

Q.53. Trunking in a cellular network refers to


a. Termination of a call
b. Spectrum unavailability
c. Accommodating large number of users in limited spectrum
d. All of the above

Answer:C

Q.542. RFID is a part of IoT.


a) True
b) False

Answer:A
Q.55 Bluetooth uses __________
a) frequency hopping spread spectrum
b) orthogonal frequency division multiplexing
c) time division multiplexing
d) channel division multiplexing

Answer:A

Q.56 Bluetooth supports _______


a) point-to-point connections
b) point-to-multipoint connection
c) both point-to-point connections and point-to-multipoint connection
d) multipoint to point connection

Answer:C

Q.57In a piconet, there can be up to ________ parked nodes in the network.


a) 63
b) 127
c) 255
d) 511

Answer:C

Q.58Which of the following priority handoff method decrease the probability of forced
termination of a call due to lack of available channels?
a) Queuing
b) Guard channel
c) Cell dragging
d) Near far effect

Answer:A

Q.59What is frequency reuse?


a) Process of selecting and allocating channels
b) Process of selection of mobile users
c) Process of selecting frequency of mobile equipment
d) Process of selection of number of cells

Answer:A
Q.60 Which of the following comes under supplementary ISDN services?
a) Emergency calling
b) Packet switched protocols
c) Call diversion
d) Standard mobile telephony

Answer: C
Model Question Paper

Subject: Mobile Computing

Branch: Computer

Class: BE

Semester: VIII

Q1. Which of the following stores all the user-related data that is relevant for
the GSM system in mobile computing?

A. Sim

B. HLR

C. VLR

D. ELR

Ans.: A

Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?

A. Home location register


B. Visitor location register
C. Entity equipment register
D. None of the above

Ans.: A

Q3. In which of the following Codes with specific characteristics can be applied
to the transmission?

A. GSM
B. GPRS
C. CDMA
D. None of the above

Ans.: C

Q4. Which of the following allow the use of entire bandwidth simultaneously?

A. TDMA
B. FDMA
C. CDMA
D. None of the above

Ans.: C

Q5. Cellular System or having small cells needs ——–

A. Handover
B. Infrastructure
C. Frequency planning
D. All of the above

Ans.: D

Q6. Which of the following provides packet mode data transfer service over
the cellular network system?

A. GSM
B. GPRS
C. TCP
D. None of the above
Ans.: B

Q7. Which of the following services/ services are defined by the GSM?

A. Bearer
B. Supplementary
C. Tele
D. All of the above

Ans.: D

Q8. Bluetooth Technology supports

A. Piconet
B. Ad hoc piconet
C. Scatter net
D. All of the above

Ans.: D

Q9. Which of the following wireless technology is used for exchanging data
between a variety of fixed and mobile devices over a very short diameter?

A. Mobile technology
B. Bluetooth technology
C. Ad hoc computing
D. None of the above

Ans.: B
Q10. In Bluetooth which of the following device decides hopping sequence?

A. Master
B. Parked
C. Standby
D. Slave

Ans.: A

Q11. Most WLANs are based upon the standard—-

A. IEEE 802.2
B. IEEE 802.11
C. IEEE 802.5
D. IEEE 802.15

Ans.: B

Q12. Which of the following is/are the advantages of a wireless LAN?

A. Flexibility
B. Ease of use
C. Robustness
D. All of the above

Ans.: D

Q13. Disadvantages of WLANs include —–

A. Interference and noise


B. Slower than wired
C. Greater care is needed for encryption
D. All of the above

Ans.: D

Q14. In piconet devices connected with the master is called

A. Slaves
B. Parked
C. Standby
D. None of the above

Ans.: A

Q15. Mobile Computing allows transmission of data, from one wireless-


enabled device to another —-

A. Any device
B. Wired device
C. Wireless-enabled device
D. None of the above

Ans.: C

Q16. The most important feature/s of mobile computing technology is/are —-

A. Mobility
B. Portability
C. Wireless connectivity
D. All of the above
Ans.: D

Q17. Which of the following is the base of most mobile communications?

A. GSM
B. GPRS
C. CDMA
D. None of the above

Ans.: A

Q18. Which of the following allow the use of only some part of bandwidth?

A. TDMA
B. FDMA
C. Both a and b
D. None of the above

Ans.: C

Q19. Important mobile computing application/s is/are —–

A. Education
B. Sports
C. Games
D. All of the above

Ans.: D

Q20. Challenges of mobile computing include ———

A. Low Security
B. Ad hoc Networking
C. Shared medium
D. All of the above

Ans.: D

Q21. Which of the following services/service are defined within the bearer
services?

A. Data transmission
B. Forward error correction
C. Flow control
D. All of the above

Ans.: D

Q22. The overlapping portion of two piconets is called——–

A. Piconet
B. Ad hoc piconet
C. Scatter net
D. All of the above

Ans.: C

Q23. Bluetooth technology is used for —-

A. Connection of peripheral devices


B. Ad-hoc networking
C. Bridging network gaps
D. All of the above
Ans.: D

Q24. The most WLANs are based upon —-

A. IEEE 802.11
B. WiFi
C. Both a and b
D. None of these

Ans.: C

Q25. The advantages of WLANs are —–

A. Flexibility
B. Robustness
C. Less cost
D. All of the above

Ans.: D

Q.26. Which of the following is the world’s first cellular system to specify
digital modulation and network level architecture?
A. GSM
B.AMPS
C.CDMA
D.IS-54
Ans.: A

Q.27 Previously in 1980s, GSM stands for ____________


A. Global system for mobile
B. Groupe special mobile
C. Global special mobile
D. Groupe system mobile
Ans.: B
Q.28 who sets the standards of GSM?
A. ITU
B. AT & T
C. ETSI
D. USDC

Ans.: C

Q.29 Which of the following does not come under the tele-services of GSM?
A. Standard mobile telephony
B. Mobile originated traffic
C. Base originated traffic
D. Packet switched traffic

Ans.: D

Q.30 Which of the following comes under supplementary ISDN services?


A. Emergency calling
B. Packet switched protocols
C. Call diversion
D. Standard mobile telephony

Ans.: C

Q.31 Which of the following memory device stores information such as


subscriber’s identification number in GSM?
A. Register
B. Flip flop
C. SIM
D. SMS

Ans.: C

Q.32 Which of the following feature makes impossible to eavesdrop on GSM


radio transmission?
A. SIM
B. On the air privacy
C. SMS
D. Packet switched traffic

Ans.: B

Q.33 Which of the following does not come under subsystem of GSM
architecture?
A. BSS
B. NSS
C. OSS
D. Channel

Ans.: D

Q.34 Which of the following subsystem provides radio transmission between


mobile station and MSC?
A. BSS
B. NSS
C. OSS
D. BSC

Ans.: A

Q.35 ___________ manages the switching function in GSM.


A. BSS
B. NSS
C. OSS
D. MSC

Ans.: B

Q.36 __________ supports the operation and maintenance of GSM.


A. BSS
B. NSS
C. OSS
D. MSC

Ans.: C

Q.37 __________ carries digitally encoded user data.


A. Traffic channels
B. Control channels
C. Signaling channels
D. Forward channels6

Ans.: A

Q.38 ____________ carries signalling and synchronizing commands.


A. Traffic channels
B. Control channels
C. Signaling channels
D. Forward channels
Ans.: B
Q.39 Several protocols for upper layers in bluetooth use _________

A. UDP
B. HSP
C. ITC
D. L2CAP

Ans.: D

Q.40 Network layer at source is responsible for creating a packet from data
coming from another ________
A. Station
B. Link
C. Node
D. Protocol

Ans.: D

Q.41 Header of datagram in IPv4 has _________


A. 0 to 20 bytes
B. 20 to 40 bytes
C. 20 to 60 bytes
D. 20 to 80 bytes

Ans.: C

Q.42 In IPv4 layer, datagram is of ________


A. Fixed length
B. Variable length
C. Global length
D. Zero length
Ans.: B

Q.43 Which protocol is commonly used to retrieve email from a mail server?
A. FTP
B. IMAP
C. HTML
D. TELNET

Ans.: B

Q.44 A packet in Transmission Control Protocol (TCP) is called a ____________


A. Transmittable slots
B. Packet
C. Segment
D. Source Slots

Ans.: C

Q.45 IEEE 802.11 defines basic service set as building block of a wireless
___________
A. LAN
B. WAN protocol
C. MAN
D. ALOHA

Ans.: A

Q.46 Wireless transmission is divided into ___________


A. 3 broad groups
B. 6 broad groups
C. 9 broad groups
D. 8 broad groups
Ans.: A

Q.47 Transmission Control Protocol/Internet Networking Protocol have


___________
A. Four Layers
B. Five Layers
C. Six Layers
D. Seven Layers

Ans.: A

Q.48 Packets of data that is transported by IP is called __________


A. Datagram
B. Frames
C. Segments
D. Encapsulate message

Ans.: A

Q.49 IPv6 has a larger address space of _________

A. 216
B. 2128
C. 232
D. 28

Ans.: B

Q.50 In practical IPv6 application, a technology encapsulates IPv6 packets


inside IPv4 packets, this technology is called _______
A. Tunneling
B. Hashing
C. Routing
D. NAT

Ans.: A

Q.51 Which one of the following descriptions about IPv6 is correct?


A. Addresses are not hierarchical and are assigned at random
B. Broadcasts have been eliminated and replaced with multicasts
C. There are 2.7 billion available addresses
D. An interface can only be configured with one IPv6 address

Ans.: B

Q.52 MIN stands for_____________________


A. Mobile Identification Number
B. Mobile Internet
C. Mobility In Network
D. None of the above
Ans.: A

Q.53 The process of transferring a mobile station from one base station to
another is_________________

A. MSC
B. Roamer
C. Hand off
D. Forward channel

Ans.: C

Q.54 In Handoff
A. Process of transferring the call to the new base station
B. Transfers the call
C. New channel allocation is done
D. All of the above

Ans.: D

Q.55 In a wireless communication, base station is connected to central hub


called _______
A. PSTN
B. MSC
C. CO
D. PBX

Ans.: B

Q.56 PSTN stands for ________


A. Public switched telephone network
B. Personal switched telephone network
C. Personal switched telephone node
D. Public switched telephone node

Ans.: A

Q.57 In public switched telephone network, LATA stands for ______


A. Local access and transport area
B. Land area and transport area
C. Local access and telephone access
D. Local area and telephone access
Ans.: A

Q.58 Connection oriented services are also called __________


A. Datagram services
B. Virtual circuit routing
C. Connectionless services
D. Routing service

Ans.: B

Q.59 ISDN is based on the concept of __________


A. SS7
B. CCS
C. ARDIS
D. CDPD

Ans.: B

Q.60 ______ is used for transmission of packets in the cellular switched


architecture.
A. Packet switching techniques
B. Circuit switching techniques
C. Packet and circuit switched technique
D. Datagram technique

Ans.: A
MODEL QUESTION PAPER

Subject: Mobile Computing ()

Branch: Computer Science and Engineering,

Class: BE

Semester: VIII
Q1. In 1997, researchers in AT&T Bell Labs conceived the idea of ________ phones.

A Cellular.

B Mobile.

C CDMA.

D GSM.

Ans.: A

Q2. 3G uses__________ techniques for media access and encoding.

A CDMA.

B Spread Spectrum.

C GPRS.

D GSM.

Ans.: B

Q3. Mobile computing is defined as a ____________environment of physical mobility.

A Computing.

B Data.

C Address Book.

D Information.

Ans.: A

Q4. The device for mobile computing can be either computing or a _________device.

A Mobile.

B Computing.
C Communication.

D Computer

Ans.: C

Q5. In any communication there are_______types of user dialogue.

A Two.

B Three.

C One.

D Four.

Ans.: A

Q6. Wireline networks are generally _________ network and cover wide areas.

A Public.

B Private

C Gobal.

D Network.

Ans.: A

Q7. Mobile network are called_________ network.

A Wired.

B Wireless.

C Co-axial.

D Fibre.

Ans.: B

Q8. Any software layered between a user application and operating system is a __________.

A Middleware.

B Database Middleware.

C Behaviour Management Middleware.

D RPC Middleware.

Ans.: A
Q9. Which of the following is the world's first cellular system to specify digital modulation
and network level architecture.

A GSM.

B AMPS.

C CDMA.

D IS-54.

Ans.: A

Q. 10 Previously in 1980s, GSM stands for__________.

A Global system for mobile.

B Groupe special mobile.

C Global special mobile.

D Groupe system mobile.

Ans.: B

Q. 11 Who set the standards of GSM

A ITU.

B AT&T.

C ETSI.

D USDC

Ans.: C

Q. 12 Which of the following does not come under the teleservices of GSM.

A Standard mobile telephony.

B Mobile originated traffic.

C Base originated traffic.

D Packet switched traffic.

Ans.: D

Q. 13 Which of the following comes under supplementary ISDN services.

A Emergency calling.
B Packet switched protocols.

C Call diversion.

D Standard mobile telephony.

Ans.: C

Q. 14 Which of the following memory device stores information such as subscriber's


identification number in GSM

A Register.

B Flip flop.

C SIM.

D SMS.

Ans.: C

Q. 15 Which of the following feature makes impossible to eavesdrop on GSM radio


transmission.

A SIM.

B On the air privacy.

C SMS.

D Packet switched traffic.

Ans.: B

Q. 16 Which of the following does not come under subsystem of GSM architecture.

A BSS

B NSS

C OSS

D Channel

Ans.: D

Q. 17 ___________ manages the switching function in GSM.

A BSS

B NSS

C OSS
D MSC

Ans.: B

Q. 18 Which of the following subsystem provides radio transmission between mobile station
and MSC.

A BSS

B NSS

C OSS

D BSC

Ans.: A

Q. 19 Which of the following allow the use of entire bandwidth simultaneously?

A TDMA.

B CDMA.

C FDMA.

D None of these.

Ans.: B

Q. 20 The base station covers a specific area that is called a ——

A Cell.

B Tessellate.

C Mobile Station.

D None of these.

Ans.: A

Q. 21 In a cellular system, the shape of the cell depends on —–

A Environmental condition.

B Social conditions

C Political condition.

D None of these.

Ans.: A
Q. 22 World’s first cellular system was developed by__________

A Nippon Telephone and Telegraph (NTT)

B Bellcore and Motorola

C AT&T Bell Laboratories

D Qualcomm

Ans.: A

Q. 23 Bluetooth technology support__________.

A Piconet.

B Adhoc piconet.

C Scatter net.

D All of the above.

Ans.: D

Q. 24 Which of the following wireless technology is used for exchanging data between a
variety of fixed and mobile devices over a very short diameter?

A An Mobile technology.

B Bluetooth technology.

C Ad hoc Computing

D None of the above.

Ans.: B

Q. 25 In piconet devices connected with the master is called___________.

A Slaves.

B Parked.

C Standby.

D None of these.

Ans.: A

Q. 26 The most important feature/s of mobile computing technology is/are —--------.

A Mobility.
B Portability.

C Wireless connectivity.

D All of the above.

Ans.: D

Q. 27 In a cellular system, the shape of the cell is generally —-------

A Hexagon.

B Circular.

C Square.

D None of these.

Ans.: A

Q.28 Important mobile computing application/s is/are —–

A Education.

B Sports.

C Games.

D All of the above.

Ans.: D

Q. 29 Challenges of mobile computing include ———

A Low Security.

B Ad hoc Networking.

C Shared Medium.

D All of the above.

Ans.: D

Q. 30 Slow and fast hopping is used in —-

A FHSS.

B GSM.

C GPRS.

D UMTS.
Ans.: A

Q. 31 WiMAX stands for ___________

A wireless maximum communication

B worldwide interoperability for microwave access

C worldwide international standard for microwave access

D wireless internet maximum communication

Ans.: B

Q. 32 WiMAX provides ________

A simplex communication

B half duplex communication

C full duplex communication

D no communication

Ans.: C

Q.33 WiMAX uses the _________

A orthogonal frequency division multiplexing

B time division multiplexing

C space division multiplexing

D channel division multiplexing

Ans.: A

Q. 34 Which of the following modulation schemes is supported by WiMAX?


A binary phase shift keying modulation.

B quadrature phase shift keying modulation.

C quadrature amplitude modulation.

D All of the above.

Ans.: D

Q. 35 WiMAX is mostly used for __________

A local area network


B metropolitan area network

C personal area network

D wide area network

Ans.: B

Q. 36 IPv6 has a larger address space of _________


A 216

B 2128
C 232

D 28

Ans.: B

Q. 37 In IPv6, real-time audio or video, particularly in digital form, requires resources such
as __________
A Fixed Bandwidth

B Variable Bandwidth

C High Bandwidth

D Low Bandwidth

Ans.: C

Q. 38 The header length of an IPv6 datagram is ___________

A 10 bytes.

B 25 bytes.

C 30 bytes.

D 40 bytes.

Ans.: D

Q. 39 Which of these functions is called to display the output of an applet?

A display()

B paint()

C displayApplet()

D PrintApplet()
Ans.: B

Q. 40 GPRS stands for?

A General Packet Repair Service

B General Packet Radio Service

C Graphics Packet Radio Service

D None of these.

Ans.: B

Q. 41 GPRS and EDGE supports which 2G standard?

A GSM only

B IS-136 only

C GSM and IS-136 both

D PDC

Ans.: C

Q. 42 MIN stands for_______

A Mobile Identification Number

B Mobile Internet

C Mobility In Network

D None of the above

Ans.: A

Q. 43 The process of transferring a mobile station from one base station to another
is___________

A MSC

B Roamer

C Hand off

D Forward channel

Ans.: C

Q. 44 The 2G cellular network uses__________


A TDMA/FDD

B CDMA/FDD

C Digital modulation formats

D All of the above

Ans.: D

Q. 45 3G W-CDMA is also known as__________

A UMTS

B DECT

C DCS-1800

D ETACS

Ans.: A

Q. 46 Commonly used mode for 3G networks is_______

A TDMA

B FDMA

C FDD

D TDD

Ans.: C

Q. 47 The advantage of using frequency reuse is_____


A Increased capacity

B Limited spectrum is required

C Same spectrum may be allocated to other network

D All of the above

Ans.: D

Q. 48 Interference in frequency bands may lead to_______

A Cross talk

B Missed calls

C Blocked calls
D All of the above

Ans.: D

Q. 49 Fading is caused due to _____


A Multi path propagation

B Variation in amplitude and phase at receiver

C Obstacles

D All of the above

Ans.: D

Q. 50 Doppler spread refers to________

A Signal fading due to Doppler shift in the channel

B Temporary failure of message transfer

C Large coherence time of the channel as compared to the delay constraints

D All of the above

Ans.: A

Q. 51 Spread spectrum modulation involves________

A PN sequence for modulation

B Large bandwidth

C Multiple users

D All of the above

Ans.: D

Q. 52 Direct sequence spread spectrum demodulation uses_______

A DPSK

B FSK

C ASK

D QPSK

Ans.: A

Q. 53 The digital modulation technique used in frequency selective channels is________


A FSK

B ASK

C BPSK

D QPSK

Ans.: C

Q. 54 WAP is a _______.

A Application Environment for mobile device.

B Common Protocol.

C Both A and B.

D Transport protocol.

Ans.: A

Q. 55 Which of the following is not a property of spread spectrum techniques?

A Interference rejection capability

B Multipath fading

C Frequency planning elimination

D Multiple user, multiple access interface

Ans.: B

Q. 56 Frequency hopping involves a periodic change of transmission _______

A Signal

B Frequency

C Phase

D Amplitude

Ans.: B

Q. 57 DSSS system spreads the baseband signal by ________ the baseband pulses with a
pseudo noise sequence.

A Adding

B Subtracting
C Multiplying

D Dividing

Ans.: C

Q. 58 In cellular telephony, Interim Standard 95 (IS-95), produces data at a basic rate


of_____________.

A 9.6 KBPS

B 9.7 KBPS

C 9.8 KBPS

D 9.9 KBPS

Ans.: A

Q. 59 In cellular telephony, Interim Standard 95 (IS-95), the forward channel uses the
technique___________.

A CDMA

B DSSS

C FHSS

D FDMA

Ans.: A

Q. 60 In Interim Standard 95 forward transmission, the output of the decimator is used


for__________.

A Signaling

B Scrambling

C Framing

D Searching

Ans.: B
Model Question Paper
Subject: Mobile Computing

Branch: Computer Engineering

Class: BE

Semester: VIII

Q1. Which of the following stores all the user-related data that is relevant for
the GSM system in mobile computing?

A.SIM

B. HLR

C. ELR

D. VLR

Ans.: A

Q2. Which of the following stores Mobile Subscriber ISDN number –


MSISDN?

A. Home location register

B. Visitor location register

C. Entity equipment register

D. None of the above

Ans.: A

Q3. The base station covers a specific area that is called a ——

A. Cell

B. Tessellate

C. Mobile station

D. None of the above


Ans.: A

Q4. In a cellular system, the shape of the cell depends on —–

A. Environmental conditions

B. Social conditions

C. Political conditions

D. None of the above

Ans.: A

Q5. Cellular System or having small cells needs ——–

A. Handover

B. Infrastructure

C. Frequency planning

D. All of the above

Ans.: D

Q6. Which of the following provides packet mode data transfer service over
the cellular network system?

A. GSM

B. GPRS

C. TCP

D. None of the above

Ans.: B

Q7. Which of the following services/ services are defined by the GSM?

A. Bearer

B. Supplementary

C. Telephony
D. All of the above

Ans.: D

Q8. Bluetooth Technology supports

A. Piconet

B. Ad hoc piconet

C. Scatter net

D. All of the above

Ans.: D

Q9. Which of the following wireless technology is used for exchanging data
between a variety of fixed and mobile devices over a very short diameter?

A. Mobile technology

B. Bluetooth Technology

C Ad hoc computing

D. None of the above

Ans.: B

Q10. In Bluetooth which of the following device decides hopping sequence?

A. Master

B. Parked

C. Standby

D. Slave

Ans.: A

Q11. Which of the following uses high-frequency radio waves instead of


cables for connecting the devices in LAN?

A. Wired LAN
B. Wireless LAN

C. Fiber made LAN

D. None of the above

Ans.: B

Q12. Most WLANs are based upon the standard—-

A. IEEE 802.2

B. IEEE 802.11

C. IEEE 802.5

D. IEEE 802.15

Ans.: B

Q13. Which of the following is/are the advantages of a wireless LAN?

A. Flexibility

B. Ease of use

C. Robustness

D. All of the above

Ans.: D

Q14. Disadvantages of WLANs include —–

A. Interference and noise

B. Slower than wired

C. Greater care is needed for encryption

D. All of the above

Ans.: D

Q15. In piconet devices connected with the master is called


A. Slaves

B. Parked

C. Standby

D. None of the above

Ans.: A

Q16. The most important feature/s of mobile computing technology is/are —

A. Mobility

B. Portability

C. Wireless connectivity

D. All of the above

Ans.: D

Q17. Which of the following is the base of most mobile communications?

A. GSM

B. GPRS

C. CDMA

D. None of the above

Ans.: A

Q18. Which of the following allow the use of only some part of bandwidth?

A. TDMA

B. FDMA

C. Both a and b

D. None of the above

Ans.: C
Q19. Group of cells without overlapping gaps is called ——

A. Cell

B. Tessellate

C. Mobile station

D. None of the above

Ans.: B

Q20. In a cellular system, the shape of the cell is generally —–

A. Hexagon

B. Circular

C. Square

D. None of the above

Ans.: A

Q21. Important mobile computing application/s is/are —–

A. Education

B. Sports

C. Games

D. All of the above

Ans.: D

Q22. Challenges of mobile computing include ———

A. Low Security

B. Ad hoc Networking

C. Shared medium

D. All of the above


Ans.: D

Q23. The overlapping portion of two piconets is called——–

A. Piconet

B. Ad hoc piconet

C. Scatter net

D. All of the above

Ans.: C

Q24. Bluetooth technology is used for —-

A. Connection of peripheral devices

B. Ad-hoc networking

C. Bridging network gaps

D. All of the above

Ans.: D

Q25. In Bluetooth which of the following device follow the hopping


sequence?

A. Master

B. Parked

C. Standby

D. Slave

Ans.: D

Q26. Electronic commerce transactions that are conducted with a mobile


device are

A. Mobile Commerce (M-Commerce)

B. Mobile Portal
C. Location-Based Commerce (L-Commerce)

D. Mobile Computing

Ans.: A

Q27. A wireless technology that allows manufacturers to attach tags with


antennas and computer chips to goods and then track their movement
through radio signals

A. Near-Field Communication (NFC)

B. Wireless Sensor Networks (WSN)

C. Wireless Fidelity (WiFi)

D. Radio-Frequency Identification (RFID) Technology

Ans.: D

Q28. Chip technology that enables shirt-range connections between wireless


devices

A. Wireless

B. Hotspot

C. Voice Portal

D. Bluetooth

Ans.: D

Q29.A real-time connection between a mobile decide and other computing


environments, such as the Internet and an intranet

A. Mobile Wallet

B. Mobile Computing

C. Pervasive Computing

D. Mobile Portal

Ans.: B
Q30.Phones the provide two-way radio communications over a cellular
network of base stations with seamless handoffs

A. Bluetooth

B. Infrared

C. Cellular Phones

D. Mobile Wallet

Ans.: C

Q31. 3G W-CDMA is also known as

A. UMTS

B. DECT

C. DCS-1800

D. ETACS

Ans.: A

Q32. Which of the following is the world’s first cellular system to specify
digital modulation and network level architecture?

A.GSM

B. AMPS

C. CDMA

D. IS-54

Ans.: A

Q33. Previously in 1980s, GSM stands for ____________

A. Global system for mobile

B. Groupe special mobile

C. Global special mobile


D .Groupe system mobile

Ans.: B

Q34. Who sets the standards of GSM?

A. ITU

B. AT & T

C. ETSI

D. USDC

Ans.: C

Q35. Which of the following comes under supplementary ISDN services?

A. Emergency calling

B. Packet switched protocols

C. Call diversion

D. Standard mobile telephony

Ans.: C

Q36. Which of the following memory device stores information such as


subscriber’s identification number in GSM?
A. Register

B. Flip flop
C. SIM

D. SMS

Ans.: C

Q37. Which of the following does not come under subsystem of GSM
architecture?

A. BSS
B. NSS

C. OSS

D. Channel

Ans.: D

Q38. Which of the following subsystem provides radio transmission between


mobile station and MSC?

A. BSS

B. NSS

C. OSS

D. BSC

Ans.: A

Q39. ___________ manages the switching function in GSM.

A. BSS

B. NSS

C. OSS

D. BSC

Ans.: B

Q40. __________ supports the operation and maintenance of GSM.

A. BSS

B. NSS

C. OSS

D. BSC

Ans.: C

Q41. A GPRS Network is a part of ____ in GSM network.


A. BTS

B. BSS

C. NSS

D. VLR

Ans.: C

Q42. Which is the organization providing standards for GPRS network?

A. ANSI

B. ETSI

C. 3GPP

D. UMTS
Ans.: C
Q43. Which is the main protocol that transfers packets in a GPRS Core
network?

A. GTP

B. SSTP

C. SCTP

D. None

Ans.: A

Q44. A GPRS Network works same in _____.


A.2G
B.3G
C.2G and /or 3G
D. 4G
Ans.: C
Q45.What is the interface between BSC and SGSN in a GPRS Network
Structure?

A. Ga

B. Gb

C. Gc

D. Gd

Ans.: B

Q46. What is the interface between SGSN and GGSN in a GPRS network?

A. Ga

B. Gb

C. Gn

D. Gd

Ans.: C

Q47. What is the interface between GGSN and Inter-PLMN GPRS network?

A. Ga

B. Gb

C. Gp

D. Gd

Ans.: C

Q48. What is the interface between GGSN and External Packet Network(
Internet ) in a GPRS structure?

A. Ga

B. Gb

C. Gp
D. Gi

Ans.: D

Q49. What is the interface between SGSN and MSC/VLR in a GPRS network?

A. Gs

B. Gb

C. Gp

D. Gd

Ans.: A

Q50. The Gb interface in a GRPS network uses which protocol?


A. Frame Relay

B. IP

C. Frame Realy or IP protocol

D.None

Ans.: C

Q51. The Gd interface in a GPRS network uses which protocol?


A.MAP 1 (MAP- Message Application Protocol)
B.MAP 2
C.MAP 3
D. All MAP1, MAP2 and MAP3
Ans.: D

Q52. GPRS stands for?

A. General Packet Repair Service

B. General Packet Radio Service

C. Graphics Packet Radio Service


D. None

Ans.: B

Q53. What is the data rate or speed offered by a GPRS connection?

A.56-115kbps

B.9-256kbps

C.64-128kbps

D.None

Ans.: A

Q54. GPRS services belong to which generation?


A.1G
B.2G
C.3G
D.4G
Ans.: B

Q55. Choose a correct abbreviation below.

A. SGSN - Serving GPRS Support Node

B. GGSN - Gateway GPRS Support Node

C. IP - Internet Protocol

D. All

Ans.: D

Q56. GPRS uses which unused channels for transportation of Data in general?
A.SDCCH
B.BCCH
C.TCH
D.SCH
Ans.: C

Q57. Which system in a GPRS architecture collects all Charging (Billing)


records for final processing?

A.SGSN

B.GGSN

C.CH (Charging Gateway)

D.None

Ans.: C

Q58. What are the main parts of a Mobile Station in a GSM Network?

A.MT - Mobile Terminal

B.SIM - Subscriber Identity Module

C.Both A and B

D.None

Ans.: C

Q59. What are the three main parts of a GSM Architecture or Structure?

A. Mobile Station

B.BSS - Base Station Subsystem

C.NSS - Network and Switching Subsystem

D.All the above

Ans.: D

Q60. Each Mobile Terminal is identified by a unique ______ number?

A.IMEI

B.SIM
C.IMSI

D.None

Ans.: A

You might also like