Mobile Computing PDF
Mobile Computing PDF
Class: BE
Semester: VIII
Q1. Which of the following stores all the user-related data that is relevant for the
GSM system in mobile computing?
1. Sim
2. HLR
3. ELR
4. VLR
Answer 1
Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?
Answer 1
Q3. In which of the following Codes with specific characteristics can be applied to
the transmission?
1. GSM
2. GPRS
3. CDMA
4. None of the above
Answer 3
Q4. Which of the following allow the use of entire bandwidth simultaneously?
1. TDMA
2. FDMA
3. CDMA
4. None of the above
Answer 3
1. Cell
2. Tessellate
3. Mobile station
4. None of the above
Answer 1
1. Environmental conditions
2. Social conditions
3. Political conditions
4. None of the above
Answer 1
1. Handover
2. Infrastructure
3. Frequency planning
4. All of the above
Answer 4
Q8. In a cellular system, the same frequency is used for other users using the
technique ———-
1. Frequency planning
2. Frequency hopping
3. Frequency reuse
4. None of the above
Answer 3
Q9. Which of the following provides packet mode data transfer service over the
cellular network system?
1. GSM
2. GPRS
3. TCP
4. None of the above
Answer 2
Q10. Which of the following services/ services are defined by the GSM?
1. Bearer
2. Supplementary
3. Tele
4. All of the above
Answer 4
1. Piconet
2. Ad hoc piconet
3. Scatter net
4. All of the above
Answer 4
Q12. Which of the following wireless technology is used for exchanging data
between a variety of fixed and mobile devices over a very short diameter?
1. Mobile technology
2. Bluetooth technology
3. Ad hoc computing
4. None of the above
Answer 2
1. Master
2. Parked
3. Standby
4. Slave
Answer 1
Q14. In which of the following the total available bandwidth is split into many
channels of smaller bandwidth plus guard spaces between the channels?
1. FHSS
2. DSSS
3. Both a and b
4. None of the above
Answer 1
Q15. In which of the following a single data stream is split across several separate
narrowband channels at different frequencies to reduce interference and crosstalk.
1. OFDM
2. GSM
3. GPRS
4. UMTS
Answer 1
Q16. Which of the following uses high-frequency radio waves instead of cables for
connecting the devices in LAN?
1. Wired LAN
2. Wireless LAN
3. Fiber made LAN
4. None of the above
Answer 2
1. IEEE 802.2
2. IEEE 802.11
3. IEEE 802.5
4. IEEE 802.15
Answer 2
1. Flexibility
2. Ease of use
3. Robustness
4. All of the above
Answer 4
1. Slaves
2. Parked
3. Standby
4. None of the above
Answer 1
Answer 4
Q 22 In the distributed system a client gives the request, and the server provides—-
1. Data
2. Service
3. Information
4. All of the above
Answer 2
1. Migration of data
2. Concurrent access to data
3. Replication of data
4. All of the above
Answer 4
Q24. Features of CODA is/are
Answer 4
1. CODA
2. Ficus
3. Rover
4. None of the above
Answer 2
1. Connected
2. Loosely connected
3. Disconnected
4. All of the above
Answer 3
Q27. Which of the following are objects that can be dynamically loaded into a
client computer from a server (or vice-versa) to reduce client-server
communication?
Q28 Which of the following allows for non-blocking RPCs even when a host is
disconnected?
Answer 1
1. Consistency
2. Availability
3. ACID Property
4. All of the above
Answer 3
Q 30. The ability of a system to perform its function correctly even in the presence
of internal faults is called
1. Fault tolerance
2. Recovery
3. Both a and b
4. None of the above
Answer 3
1. congestion control
2. Flow control mechanisms
3. guarantees in-order delivery of data
4. All of the above
Answer 4
Q32. TCP supports many of the Internet’s most popular application protocols and
resulting applications, including
Answer 4
Q 33. Which of the following segments a TCP connection into a fixed part and a
wireless part?
1. Indirect TCP
2. Direct TCP
3. Both a and b
4. None of the above
Answer 1
1. Fast transmission
2. Congestion control
3. Error control
4. All of the above
Answer 4
1. To buffer data close to the mobile host to perform fast local retransmission
in case of packet loss.
2. Congestion control
3. Flow control
4. None of the above
Answer 1
Q 36. I-TCP and Snooping TCP does not help much if a mobile host gets
Answer 2
Answer 4
Answer 1
1. Buffering packets
2. Congestion control
3. Selective retransmission
4. All of the above
Answer 3
Q40. Which of the following combine packets for connection establishment and
connection release with user data packets?
Answer 1
1. Any device
2. Wired device
3. Wireless-enabled device
4. None of the above
Answer 3
1. Mobility
2. Portability
3. Wireless connectivity
4. All of the above
Answer 4
1. GSM
2. GPRS
3. CDMA
4. None of the above
Answer 1
Q44. Which of the following allow the use of only some part of bandwidth?
1. TDMA
2. FDMA
3. Both a and b
4. None of the above
Answer 3
1. Cell
2. Tessellate
3. Mobile station
4. None of the above
Answer 2
1. Hexagon
2. Circular
3. Square
4. None of the above
Answer 1
1. Education
2. Sports
3. Games
4. All of the above
Answer 4
Q48. Challenges of mobile computing include ———
1. Low Security
2. Ad hoc Networking
3. Shared medium
4. All of the above
Answer 4
1. Cell
2. Radius
3. Tessellate
4. None of the above
Answer 1
Q50. Which of the following services/service are defined within the bearer
services?
1. Data transmission
2. Forward error correction
3. Flow control
4. All of the above
Answer 4
1. Piconet
2. Ad hoc piconet
3. Scatter net
4. All of the above
Answer 3
Q52. Bluetooth technology is used for —-
Answer 4
Q53. In Bluetooth which of the following device follow the hopping sequence?
1. Master
2. Parked
3. Standby
4. Slave
Answer 4
Q54. Which of the following system takes a user bitstream and perform an (XOR)?
The result is either the sequence 0110101 (if the user bit equals 0) or its
complement 1001010 (if the user bit equals 1).
1. FHSS
2. DSSS
3. Both a and b
4. None of the above
Answer 2
1. FHSS
2. GSM
3. GPRS
4. UMTS
Answer 1
1. IEEE 802.11
2. WiFi
3. Both a and b
4. None of these
Answer 3
1. Flexibility
2. Robustness
3. Less cost
4. All of the above
Answer 4
1. Slow speed
2. Noise
3. More effort for Security
4. All of the above
Answer 4
1. Hopping pattern
2. Frequency reuse
3. Channels
4. All of the above
Answer 4
Q60. In a Distributed File System, clients access files provided by
1. Other clients
2. Server
3. Access point
4. None of these
Answer 2
Model Question Paper
Subject:-Mobile Computing
Branch:-Computer Engineering
Class:-B.E.
Semester:- VIII
Q1. Which of the following stores all the user-related data that is relevant for the GSM system in mobile
computing?
A. Sim
B. HLR
C. ELR
D. VLR
Answer A
Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?
Answer A
Q3. In which of the following Codes with specific characteristics can be applied to the transmission?
A. GSM
B. GPRS
C. CDMA
D. None of the above
Answer C
Q4. Which of the following allow the use of entire bandwidth simultaneously?
A. TDMA
B. FDMA
C. CDMA
D. None of the above
Answer C
Answer A
A. Environmental conditions
B. Social conditions
C. Political conditions
D. None of the above
Answer A
A. Handover
B. Infrastructure
C. Frequency planning
D. All of the above
Answer D
Q8. In a cellular system, the same frequency is used for other users using the technique ———-
A. Frequency planning
B. Frequency hopping
C. Frequency reuse
D. None of the above
Answer C
Q9. Which of the following provides packet mode data transfer service over the cellular network
system?
A. GSM
B. GPRS
C. TCP
D. None of the above
Answer B
Q10. Which of the following services/ services are defined by the GSM?
A. Bearer
B. Supplementary
C. Tele
D. All of the above
Answer D
A. Piconet
B. Ad hoc piconet
C. Scatter net
D. All of the above
Answer D
Q12. Which of the following wireless technology is used for exchanging data between a variety of fixed
and mobile devices over a very short diameter?
A. Mobile technology
B. Bluetooth technology
C. Ad hoc computing
D. None of the above
Answer B
A. Master
B. Parked
C. Standby
D. Slave
Answer A
Q14. In which of the following the total available bandwidth is split into many channels of smaller
bandwidth plus guard spaces between the channels?
A. FHSS
B. DSSS
C. Both a and b
D. None of the above
Answer A
Q15. In which of the following a single data stream is split across several separate narrowband channels
at different frequencies to reduce interference and crosstalk.
A. OFDM
B. GSM
C. GPRS
D. UMTS
Answer A
Q16. Which of the following uses high-frequency radio waves instead of cables for connecting the
devices in LAN?
A. Wired LAN
B. Wireless LAN
C. Fiber made LAN
D. None of the above
Answer B
A. IEEE 802.2
B. IEEE 802.11
C. IEEE 802.5
D. IEEE 802.15
Answer B
A. Flexibility
B. Ease of use
C. Robustness
D. All of the above
Answer D
Answer D
Q20. In piconet devices connected with the master is called
A. Slaves
B. Parked
C. Standby
D. None of the above
Answer A
Answer D
Q 22 In the distributed system a client gives the request, and the server provides—-
A. Data
B. Service
C. Information
D. All of the above
Answer B
A. Migration of data
B. Concurrent access to data
C. Replication of data
D. All of the above
Answer B
Answer D
A. CODA
B. Ficus
C. Rover
D. None of the above
Answer B
A. Connected
B. Loosely connected
C. Disconnected
D. All of the above
Answer C
Q27. Which of the following are objects that can be dynamically loaded into a client computer from a
server (or vice-versa) to reduce client-server communication?
Answer 1
Q28 Which of the following allows for non-blocking RPCs even when a host is disconnected?
Answer A
A. Consistency
B. Availability
C. ACID Property
D. All of the above
Answer C
Q 30. The ability of a system to perform its function correctly even in the presence of internal faults is
called
A. Fault tolerance
B. Recovery
C. Both a and b
D. None of the above
Answer C
Q 31. TCP is a reliable protocol that incorporates
A. congestion control
B. Flow control mechanisms
C. guarantees in-order delivery of data
D. All of the above
Answer D
Q32. TCP supports many of the Internet’s most popular application protocols and resulting
applications, including
Answer D
Q 33. Which of the following segments a TCP connection into a fixed part and a wireless part?
A. Indirect TCP
B. Direct TCP
C. Both a and b
D. None of the above
Answer A
A. Fast transmission
B. Congestion control
C. Error control
D. All of the above
Answer D
A. To buffer data close to the mobile host to perform fast local retransmission in case of packet
loss.
B. Congestion control
C. Flow control
D. None of the above
Answer A
Q 36. I-TCP and Snooping TCP does not help much if a mobile host gets
Answer B
Answer D
Answer A
A. Buffering packets
B. Congestion control
C. Selective retransmission
D. All of the above
Answer C
Q40. Which of the following combine packets for connection establishment and connection release
with user data packets?
Answer A
Q41. Mobile Computing allows transmission of data, from one wireless-enabled device to another —-
A. Any device
B. Wired device
C. Wireless-enabled device
D. None of the above
Answer C
A. Mobility
B. Portability
C. Wireless connectivity
D. All of the above
Answer D
A. GSM
B. GPRS
C. CDMA
D. None of the above
Answer A
Q44. Which of the following allow the use of only some part of bandwidth?
A. TDMA
B. FDMA
C. Both a and b
D. None of the above
Answer C
A. Cell
B. Tessellate
C. Mobile station
D. None of the above
Answer B
A. Hexagon
B. Circular
C. Square
D. None of the above
Answer A
Q47. Important mobile computing application/s is/are —–
A. Education
B. Sports
C. Games
D. All of the above
Answer D
A. Low Security
B. Ad hoc Networking
C. Shared medium
D. All of the above
Answer D
A. Cell
B. Radius
C. Tessellate
D. None of the above
Answer A
Q50. Which of the following services/service are defined within the bearer services?
A. Data transmission
B. Forward error correction
C. Flow control
D. All of the above
Answer D
1. Piconet
2. Ad hoc piconet
3. Scatter net
Answer C
Q52. Bluetooth technology is used for —-
Answer D
Q53. In Bluetooth which of the following device follow the hopping sequence?
A. Master
B. Parked
C. Standby
D. Slave
Answer D
Q54. Which of the following system takes a user bitstream and perform an (XOR)? The result is either
the sequence 0110101 (if the user bit equals 0) or its complement 1001010 (if the user bit equals 1).
A. FHSS
B. DSSS
C. Both a and b
D. None of the above
Answer B
A. FHSS
B. GSM
C. GPRS
D. UMTS
Answer A
A. IEEE 802.11
B. WiFi
C. Both a and b
D. None of these
Answer C
Q57. The advantages of WLANs are —–
A. Flexibility
B. Robustness
C. Less cost
D. All of the above
Answer D
A. Slow speed
B. Noise
C. More effort for Security
D. All of the above
Answer D
A. Hopping pattern
B. Frequency reuse
C. Channels
D. All of the above
Answer D
A. Other clients
B. Server
C. Access point
D. None of these
Answer B
Model Question Paper
Branch: CSE
Class: BE
Semester: VIII
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Q1. Which of the following stores all the user-related data that is relevant for
the GSM system in mobile computing?
a. Sim
b. HLR
c. ELR
d. VLR
Ans.: a
Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?
Ans.: a
Q3. In which of the following Codes with specific characteristics can be applied to
the transmission?
a. GSM
b. GPRS
c. CDMA
d. None of the above
Ans.: c
Q4. Which of the following allow the use of entire bandwidth simultaneously?
a. TDMA
b. FDMA
c. CDMA
d. None of the above
Ans.: c
a. Cell
b. Tessellate
c. Mobile station
d. None of the above
Ans.: a
a. Environmental conditions
b. Social conditions
c. Political conditions
d. None of the above
Ans.: a
a. Handover
b. Infrastructure
c. Frequency planning
d. All of the above
Ans.: d
Q8. In a cellular system, the same frequency is used for other users using the
technique ———-
a. Frequency planning
b. Frequency hopping
c. Frequency reuse
d. None of the above
Ans.: c
Q9. Which of the following provides packet mode data transfer service over
the cellular network system?
a. GSM
b. GPRS
c. TCP
d. None of the above
Ans.: b
Q10. Which of the following services/ services are defined by the GSM?
a. Bearer
b. Supplementary
c. Tele
d. All of the above
Ans.: d
a. Piconet
b. Ad hoc piconet
c. Scatter net
d. All of the above
Ans.: d
Q12. Which of the following wireless technology is used for exchanging data
between a variety of fixed and mobile devices over a very short diameter?
a. Mobile technology
b. Bluetooth technology
c. Ad hoc computing
d. None of the above
Ans.: b
a. Master
b. Parked
c. Standby
d. Slave
Ans.: a
Q14. Which of the following uses high-frequency radio waves instead of cables
for connecting the devices in LAN?
a. Wired LAN
b. Wireless LAN
c. Fiber made LAN
d. None of the above
Ans.: b
a. IEEE 802.2
b. IEEE 802.11
c. IEEE 802.5
d. IEEE 802.15
Ans.: b
a. Flexibility
b. Ease of use
c. Robustness
d. All of the above
Ans.: d
a. Slow speed
b. Noise
c. More effort for Security
d. All of the above
Ans.: d
Q18. In the distributed system a client gives the request, and the server provides—
-
a. Data
b. Service
c. Information
d. All of the above
Ans.: b
a. Slaves
b. Parked
c. Standby
d. None of the above
Ans.: a
a. Migration of data
b. Concurrent access to data
c. Replication of data
d. All of the above
Ans.: d
Q21. Bluetooth is the wireless technology for __________
a) local area network
b) personal area network
c) metropolitan area network
d) wide area network
Ans.: b
Ans.: a
Q23. The header length of an IPv6 datagram is ___________
a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes
Ans.: d
a. Swiss
b. English
c. German
d. Danish
Ans.: d
Q25. What is one of the features that make Bluetooth different from other wireless
technologies?
Ans.: d
Ans.: a
a. static
b. low
c. high
d. fixed
Ans.: b
Ans.: b
Ans.: c
Q30. Which of the following is NOT a device that is likely to use Bluetooth
technology?
a. toy
b. high-speed router
c. PDA
d. cell phone
Ans.: b
Q31. Which among the following features is present in IPv6 but not in IPv4?
a) Fragmentation
b) Header checksum
c) Options
d) Anycast address
Ans.: d
Ans.: b
Q33. Devices that provide the connectivity to a WiMAX network are known as
_________
a) subscriber stations
b) base stations
c) gateway
d) switch stations
Ans.: a
Ans.: b
Ans.: b
Q36. Which of the following frequencies is not used in WiMAX for communication?
a) 2.3 GHz
b) 2.4 GHz
c) 2.5 GHz
d) 3.5 GHz
Ans.: b
Ans.: b
a. Wireless fidelity
b. Wireless Flexibility
c. Wide Fidelity
d. WAN Flexibility
Ans.: a
Q40. Which of the following specifies a set of media access control (MAC) and
physical layer specifications for implementing WLANs?
a) IEEE 802.16
b) IEEE 802.3
c) IEEE 802.11
d) IEEE 802.15
Ans.: c
Q41. Which of the following is the world’s first cellular system to specify digital
modulation and network level architecture?
a) GSM
b) AMPS
c) CDMA
d) IS-54
Ans.: a
Ans.: b
Ans.: c
Q44. Which of the following does not come under the teleservices of GSM?
a) Standard mobile telephony
b) Mobile originated traffic
c) Base originated traffic
d) Packet switched traffic
Ans.: d
Ans.: c
Q46. Which of the following memory device stores information such as subscriber’s
identification number in GSM?
a) Register
b) Flip flop
c) SIM
d) SMS
Ans.: c
Q47. Which of the following feature makes impossible to eavesdrop on GSM radio
transmission?
a) SIM
b) On the air privacy
c) SMS
d) Packet switched traffic
Ans.: b
Q48. Which of the following does not come under subsystem of GSM architecture?
a) BSS
b) NSS
c) OSS
d) Channel
Ans.: d
Q49. Which of the following subsystem provides radio transmission between mobile
station and MSC?
a) BSS
b) NSS
c) OSS
d) BSC
Ans.: a
Ans.: b
Ans.: c
A) BTS
B) BSS
C) NSS
D) VLR
Ans.: c
A) ANSI
B) ETSI
C) 3GPP
D) UMTS
Ans.: c
A) 2G
B) 3G
C) 2G and /or 3G
D) 4G
Ans.: c
A) MAP
B) CAP
C) Frame Relay
Ans.: D
D) None
Ans.: b
A) 56-115kbps
B) 9-256kbps
C) 64-128kbps
D) None
Ans.: a
A) 1G
B) 2G
C) 3G
D) 4G
Ans.: b
C) IP - Internet Protocol
D) All
Ans.: D
A) False
B) True
Ans.: a
Name of College: Gangamai College of Engineering, Nagaon Dist Dhule
Subject: Mobile Computing
Branch: Computer
Class: BE
Semester: VIII
Q1. Which of the following stores all the user-related data that is relevant for
the GSM system in mobile computing?
A. Sim
B. HLR
C. VLR
D. ELR
Ans.: A
Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?
A. GSM
B. GPRS
C. CDMA
D. None of the above
Ans.: C
Q4. Which of the following allow the use of entire bandwidth simultaneously?
A. TDMA
B. FDMA
C. CDMA
D. None of the above
Ans.: C
Q5. Cellular System or having small cells needs ——–
A. Handover
B. Infrastructure
C. Frequency planning
D. All of the above
Ans.: D
Q6. Which of the following provides packet mode data transfer service over
the cellular network system?
A. GSM
B. GPRS
C. TCP
D. None of the above
Ans.: B
Q7. Which of the following services/ services are defined by the GSM?
A. Bearer
B. Supplementary
C. Tele
D. All of the above
Ans.: D
Q8. Bluetooth Technology supports
A. Piconet
B. Ad hoc piconet
C. Scatter net
D. All of the above
Ans.: D
Q9. Which of the following wireless technology is used for exchanging data
between a variety of fixed and mobile devices over a very short diameter?
A. Mobile technology
B. Bluetooth technology
C. Ad hoc computing
D. None of the above
Ans.: B
Q10. In Bluetooth which of the following device decides hopping sequence?
A. Master
B. Parked
C. Standby
D. Slave
Ans.: A
Q11. Most WLANs are based upon the standard—-
A. IEEE 802.2
B. IEEE 802.11
C. IEEE 802.5
D. IEEE 802.15
Ans.: B
Q12. Which of the following is/are the advantages of a wireless LAN?
A. Flexibility
B. Ease of use
C. Robustness
D. All of the above
Ans.: D
Q13. Disadvantages of WLANs include —–
A. Slaves
B. Parked
C. Standby
D. None of the above
Ans.: A
Q15. Mobile Computing allows transmission of data, from one wireless-
enabled device to another —-
A. Any device
B. Wired device
C. Wireless-enabled device
D. None of the above
Ans.: C
Q16. The most important feature/s of mobile computing technology is/are —-
A. Mobility
B. Portability
C. Wireless connectivity
D. All of the above
Ans.: D
Q17. Which of the following is the base of most mobile communications?
A. GSM
B. GPRS
C. CDMA
D. None of the above
Ans.: A
Q18. Which of the following allow the use of only some part of bandwidth?
A. TDMA
B. FDMA
C. Both a and b
D. None of the above
Ans.: C
Q19. Important mobile computing application/s is/are —–
A. Education
B. Sports
C. Games
D. All of the above
Ans.: D
Q20. Challenges of mobile computing include ———
A. Low Security
B. Ad hoc Networking
C. Shared medium
D. All of the above
Ans.: D
Q21. Which of the following services/service are defined within the bearer
services?
A. Data transmission
B. Forward error correction
C. Flow control
D. All of the above
Ans.: D
Q22. The overlapping portion of two piconets is called——–
A. Piconet
B. Ad hoc piconet
C. Scatter net
D. All of the above
Ans.: C
Q23. Bluetooth technology is used for —-
A. Flexibility
B. Robustness
C. Less cost
D. All of the above
Ans.: D
Q.26. Which of the following is the world’s first cellular system to specify
digital modulation and network level architecture?
A. GSM
B.AMPS
C.CDMA
D.IS-54
Ans.: A
Ans.: B
Q.33 Which of the following does not come under subsystem of GSM
architecture?
A. BSS
B. NSS
C. OSS
D. Channel
Ans.: D
Ans.: A
Ans.: B
Q.36 __________ supports the operation and maintenance of GSM.
A. BSS
B. NSS
C. OSS
D. MSC
Ans.: C
Ans.: A
A. MSC
B. Roamer
C. Hand off
D. Forward channel
Ans.: C
Q.54 In Handoff
Ans.: D
Q.55 In a wireless communication, base station is connected to central hub
called _______
A. PSTN
B. MSC
C. CO
D. PBX
Ans.: B
Q.56 PSTN stands for ________
A. Public switched telephone network
B. Personal switched telephone network
C. Personal switched telephone node
D. Public switched telephone node
Ans.: A
Q.57 In public switched telephone network, LATA stands for ______
A. Local access and transport area
B. Land area and transport area
C. Local access and telephone access
D. Local area and telephone access
Ans.: A
Q.58 Connection oriented services are also called __________
A. Datagram services
B. Virtual circuit routing
C. Connectionless services
D. Routing service
Ans.: B
Q.59 ISDN is based on the concept of __________
A. SS7
B. CCS
C. ARDIS
D. CDPD
Ans.: B
Q.60 ______ is used for transmission of packets in the cellular switched
architecture.
A. Packet switching techniques
B. Circuit switching techniques
C. Packet and circuit switched technique
D. Datagram technique
Ans.: A
Model Question Paper
Subject: Mobile Computing
Class: BE
Semester: VIII
Q1. “Mr. Watson, come here, I want to see you” was a first ever voice call by
A) Joseph Henry
B) F. B. Morse
C) Alexander G. Bell
D) Harald Blatand
Ans. C
A) Parallel Computing
B) Genetic Computing
C) Nomadic Computing
D) All of these
Ans. C
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. D
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. D
Q5. PDA is a
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. D
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. A
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. A
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. A
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. B
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. B
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. B
Q12. Rendering is a
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. C
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. C
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. C
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. C
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) Content Service
Ans. D
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) Content Service
Ans. D
B) Bearer Gateway
C) Middleware Gateway
D) Content Service
Ans. D
A) Bank Transactions
B) Wallet
D) News
Ans. B
A) Wallet
B) Diary
D) News
Ans. C
A) One
B) Two
C) Three
D) Four
Ans. C
A) One
B) Two
C) Three
D) Four
Ans. C
A) Tire1
B) Tire2
C) Tire3
D) Tire4
Ans. A
A) Tire1
B) Tire2
C) Tire3
D) Tire4
Ans. B
A) Tire1
B) Tire2
C) Tire3
D) Tire4
Ans. B
A) Tire1
B) Tire2
C) Tire3
D) Tire4
Ans. C
B) Tire2
C) Tire3
D) Tire4
Ans. C
A) Presentation Tier
B) Application Tier
C) Data Tier
D) None of these
Ans. A
A) Presentation Tier
B) Application Tier
C) Data Tier
D) None of these
Ans. A
A) Presentation Tier
B) Application Tier
C) Data Tier
D) None of these
Ans. A
A) Identity
B) Security
C) Activity
D) Social Situation
Ans. B
A) URI
B) URL
C) A & B
D) None of these
Ans. A
A) WiFi
B) GSM
C) CDMA
D) All of these
Ans. D
A) Joseph Henry
B) F. B. Morse
C) Alexander G. Bell
D) Harald Blatand
Ans. D
A) 2.2 GHz
B) 2.4 GHz
C) 2.6 GHz
D) 2.8 GHz
Ans. B
B) 512 KBps
C) 1 Mbps
D) 1 MBps
Ans. C
A) Two
B) Four
C) Six
D) Eight
Ans. C
B) Animal Tagging
C) Retail Store
D) Matchmaking
Ans. D
A) 802.3
B) 802.11
C) 802.16
D) 802.22
Ans.C
A) Discovery
B) Registration
C) Tunnelling
D) None of these
Ans. C
A) 1982
B) 1987
C) 1989
D) 1990
Ans. A
A) FDMA
B) TDMA
C) A & B
D) None of these
Ans. C
A) BSC
B) MSC
C) PLMN
D) LA
Ans. C
A) MS
B) BSC
C) MSC
D) LA
Ans. D
B) BSC
C) MSC
D) OMC
Ans. C
A) IMEI
B) IMSI
C) TMSI
D) MSRN
Ans. A
D) None of these
Ans. C
A) EIR
B) SIM Card
C) Memory Card
D) None of these
Ans. A
A) EIR
B) SIM Card
C) Memory Card
D) None of these
Ans. B
Q50. In the Mobile phone handset, one can type.......to see the IMEI number(s).
A) #*06*
B) *#06#*
C) *#06#
D) #*06*#
Ans. C
A) 120
B) 125
C) 130
D) 132
Ans. B
A) 12
B) 14
C) 15
D) 16
Ans. C
A) 12
B) 14
C) 15
D) 16
Ans. C
B) A5
C) A8
D) None of these
Ans. A
A) A3
B) A5
C) A8
D) None of these
Ans. C
A) A3
B) A5
C) A8
D) None of these
Ans. B
A) Reliability
B) Security
C) Delay
D) Throughput
Ans. B
A) MS
B) BSS
C) SGSN
D) LA
Ans. D
A) GSM
B) CDMA
C) A & B
D) None of these
Ans. A
A) 1G
B) 2G
C) 2.5G
D) 3G
Ans. C
Model Question Paper
Subject: MOBILE COMPUTING
Semester: VIII
A. Bearer Mobility.
B. Session Mobility
C. Host mobility.
D. All
Ans.: D
A. Interface.
B. Mobility.
C. Network.
D. All
Ans.: A
A.Cell
B. Tessellate
C. Mobile station
D. None of the above
Answer A.
B. Software Quality.
C. Frequency.
D. All
Answer B.
D. Physical Location.
Answer C.
A. Software.
B. Equipment.
D. None.
Answer A
B.TRAI
C.ICT
D.CEPT
Answer B
A. Physical office
B. Mobile office
C. Both A and B
D. None
Answer B
Q.9 Standards is a
A. Guideline
B. Rules
C. Criteria
D All
Answer D
B. FDMA
D. UMTS
Answer C
Q.11 Mobile Computing allows transmission of data, from one wireless-enabled device to
another —-
A. Any device
B. Wired device
C. Wireless-enabled device
D. None of the above
Answer C
A. Mobility
B. Portability
C . Wireless connectivity
D. All of the above
Answer D
A.Hexagon
B.Circular
C. Square
D.None of the above
Answer A
Q.14 Which of the following stores Mobile Subscriber ISDN number – MSISDN?
Answer A
Q.15 In which of the following Codes with specific characteristics can be applied to the
transmission?
A. GSM
B. GPRS
C. CDMA
D. None of the above
Answer C
A. End User.
B. Security.
C. Memory.
D . All
Answer A
A. Distribution of Traffic.
B. Local switching.
C. Exchanges.
D .All
Answer D.
C. Format
D. None
Answer B
Q.19 Three Tier architecture for mobile computing these tiers are Presentation Tier, application
Tier and
A. Session Tier
B. Physical Tier
C. Data Tier
D None
Answer C
Q.20 Which of the following uses high-frequency radio waves instead of cables for connecting
the devices in LAN?
A. Wired LAN
B. Wireless LAN
C. Fiber made LAN
D. None of the above
Answer B
Q.21 EIR is a
D None.
A. Piconet
C .Scatter net
Answer D
Q.23. Which of the following wireless technology is used for exchanging data between a variety
of fixed and mobile devices over a very short diameter?
A. Mobile technology
B. Bluetooth technology
C. Ad hoc computing
D. None of the above
Answer B
A. Master
B. Parked
C. Standby
D. Slave
Answer A
A. Bluetooth
B. Wifi
C. Lifi
D. None
Answer A
Answer B
Q.27 Bluetooth transceiver devices operate in ______ band.
a) 2.4 GHz ISM
b) 2.5 GHz ISM
c) 2.6 GHz ISM
d) 2.7 GHz ISM
Answer A
Answer B
Q.29. which of the following statement about radio frequency Identification (RFID) is not true?
B. RFID systems use tiny tags with embedded microchips containing data about an item and its
location
C. RFID systems provide a powerful technology for tracking the movement of goods throughout
the supply chain
D .Companies may be required to upgrade hardware and software to accommodate the massive
amounts data that are being produced by RFID systems.
Answer A.
Answer B
Answer A
Answer B
Q.33. Which of the following is the world’s first cellular system to specify digital modulation
and network level architecture?
a) GSM
b) AMPS
c) CDMA
d) IS-54
Answer A
Answer B
Answer C
Q.36 Which of the following feature makes impossible to eavesdrop on GSM radio
transmission?
a) SIM
b) On the air privacy
c) SMS
d) Packet switched traffic
Answer B
Answer B
Q.38 Which of the following memory device stores information such as subscriber’s
identification number in GSM?
a) Register
b) Flip flop
c) SIM
d) SMS
Answer C
Q.39 The process of transferring a mobile station from one base station to another is
a. MSC
b. Roamer
c. Hand off
d. Forward channel
Answer C
Q.40 Hexagon shape is used for radio coverage for a cell because
a. It uses the maximum area for coverage
b. Fewer number of cells are required
c. It approximates circular radiation pattern
d. All of the above
Answer D
Q.41 Which of the following does not come under subsystem of GSM architecture?
a) BSS
b) NSS
c) OSS
d) Channel
Answer D
Answer: d
Q.43 What is handoff?
a) Forward channel
b) Switching technique
c) Roamer
d) Guard channel
Answer: B
Q.44 who has the responsibility of billing and system maintenance function in cellular system?
a) Base Station
b) PSTN
c) MSC
d) Mobile system
Answer: C
Answer:D
D. NONE
Answer: B
Q.47Main reasons for a handover in GSM are
D.ALL
Answer:A
D.NONE
Answer:C
Answer:A
Answer:B
Answer:D
Answer:D
Answer:C
Answer:A
Q.55 Bluetooth uses __________
a) frequency hopping spread spectrum
b) orthogonal frequency division multiplexing
c) time division multiplexing
d) channel division multiplexing
Answer:A
Answer:C
Answer:C
Q.58Which of the following priority handoff method decrease the probability of forced
termination of a call due to lack of available channels?
a) Queuing
b) Guard channel
c) Cell dragging
d) Near far effect
Answer:A
Answer:A
Q.60 Which of the following comes under supplementary ISDN services?
a) Emergency calling
b) Packet switched protocols
c) Call diversion
d) Standard mobile telephony
Answer: C
Model Question Paper
Branch: Computer
Class: BE
Semester: VIII
Q1. Which of the following stores all the user-related data that is relevant for
the GSM system in mobile computing?
A. Sim
B. HLR
C. VLR
D. ELR
Ans.: A
Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?
Ans.: A
Q3. In which of the following Codes with specific characteristics can be applied
to the transmission?
A. GSM
B. GPRS
C. CDMA
D. None of the above
Ans.: C
Q4. Which of the following allow the use of entire bandwidth simultaneously?
A. TDMA
B. FDMA
C. CDMA
D. None of the above
Ans.: C
A. Handover
B. Infrastructure
C. Frequency planning
D. All of the above
Ans.: D
Q6. Which of the following provides packet mode data transfer service over
the cellular network system?
A. GSM
B. GPRS
C. TCP
D. None of the above
Ans.: B
Q7. Which of the following services/ services are defined by the GSM?
A. Bearer
B. Supplementary
C. Tele
D. All of the above
Ans.: D
A. Piconet
B. Ad hoc piconet
C. Scatter net
D. All of the above
Ans.: D
Q9. Which of the following wireless technology is used for exchanging data
between a variety of fixed and mobile devices over a very short diameter?
A. Mobile technology
B. Bluetooth technology
C. Ad hoc computing
D. None of the above
Ans.: B
Q10. In Bluetooth which of the following device decides hopping sequence?
A. Master
B. Parked
C. Standby
D. Slave
Ans.: A
A. IEEE 802.2
B. IEEE 802.11
C. IEEE 802.5
D. IEEE 802.15
Ans.: B
A. Flexibility
B. Ease of use
C. Robustness
D. All of the above
Ans.: D
Ans.: D
A. Slaves
B. Parked
C. Standby
D. None of the above
Ans.: A
A. Any device
B. Wired device
C. Wireless-enabled device
D. None of the above
Ans.: C
A. Mobility
B. Portability
C. Wireless connectivity
D. All of the above
Ans.: D
A. GSM
B. GPRS
C. CDMA
D. None of the above
Ans.: A
Q18. Which of the following allow the use of only some part of bandwidth?
A. TDMA
B. FDMA
C. Both a and b
D. None of the above
Ans.: C
A. Education
B. Sports
C. Games
D. All of the above
Ans.: D
A. Low Security
B. Ad hoc Networking
C. Shared medium
D. All of the above
Ans.: D
Q21. Which of the following services/service are defined within the bearer
services?
A. Data transmission
B. Forward error correction
C. Flow control
D. All of the above
Ans.: D
A. Piconet
B. Ad hoc piconet
C. Scatter net
D. All of the above
Ans.: C
A. IEEE 802.11
B. WiFi
C. Both a and b
D. None of these
Ans.: C
A. Flexibility
B. Robustness
C. Less cost
D. All of the above
Ans.: D
Q.26. Which of the following is the world’s first cellular system to specify
digital modulation and network level architecture?
A. GSM
B.AMPS
C.CDMA
D.IS-54
Ans.: A
Ans.: C
Q.29 Which of the following does not come under the tele-services of GSM?
A. Standard mobile telephony
B. Mobile originated traffic
C. Base originated traffic
D. Packet switched traffic
Ans.: D
Ans.: C
Ans.: C
Ans.: B
Q.33 Which of the following does not come under subsystem of GSM
architecture?
A. BSS
B. NSS
C. OSS
D. Channel
Ans.: D
Ans.: A
Ans.: B
Ans.: C
Ans.: A
A. UDP
B. HSP
C. ITC
D. L2CAP
Ans.: D
Q.40 Network layer at source is responsible for creating a packet from data
coming from another ________
A. Station
B. Link
C. Node
D. Protocol
Ans.: D
Ans.: C
Q.43 Which protocol is commonly used to retrieve email from a mail server?
A. FTP
B. IMAP
C. HTML
D. TELNET
Ans.: B
Ans.: C
Q.45 IEEE 802.11 defines basic service set as building block of a wireless
___________
A. LAN
B. WAN protocol
C. MAN
D. ALOHA
Ans.: A
Ans.: A
Ans.: A
A. 216
B. 2128
C. 232
D. 28
Ans.: B
Ans.: A
Ans.: B
Q.53 The process of transferring a mobile station from one base station to
another is_________________
A. MSC
B. Roamer
C. Hand off
D. Forward channel
Ans.: C
Q.54 In Handoff
A. Process of transferring the call to the new base station
B. Transfers the call
C. New channel allocation is done
D. All of the above
Ans.: D
Ans.: B
Ans.: A
Ans.: B
Ans.: B
Ans.: A
MODEL QUESTION PAPER
Class: BE
Semester: VIII
Q1. In 1997, researchers in AT&T Bell Labs conceived the idea of ________ phones.
A Cellular.
B Mobile.
C CDMA.
D GSM.
Ans.: A
A CDMA.
B Spread Spectrum.
C GPRS.
D GSM.
Ans.: B
A Computing.
B Data.
C Address Book.
D Information.
Ans.: A
Q4. The device for mobile computing can be either computing or a _________device.
A Mobile.
B Computing.
C Communication.
D Computer
Ans.: C
A Two.
B Three.
C One.
D Four.
Ans.: A
Q6. Wireline networks are generally _________ network and cover wide areas.
A Public.
B Private
C Gobal.
D Network.
Ans.: A
A Wired.
B Wireless.
C Co-axial.
D Fibre.
Ans.: B
Q8. Any software layered between a user application and operating system is a __________.
A Middleware.
B Database Middleware.
D RPC Middleware.
Ans.: A
Q9. Which of the following is the world's first cellular system to specify digital modulation
and network level architecture.
A GSM.
B AMPS.
C CDMA.
D IS-54.
Ans.: A
Ans.: B
A ITU.
B AT&T.
C ETSI.
D USDC
Ans.: C
Q. 12 Which of the following does not come under the teleservices of GSM.
Ans.: D
A Emergency calling.
B Packet switched protocols.
C Call diversion.
Ans.: C
A Register.
B Flip flop.
C SIM.
D SMS.
Ans.: C
A SIM.
C SMS.
Ans.: B
Q. 16 Which of the following does not come under subsystem of GSM architecture.
A BSS
B NSS
C OSS
D Channel
Ans.: D
A BSS
B NSS
C OSS
D MSC
Ans.: B
Q. 18 Which of the following subsystem provides radio transmission between mobile station
and MSC.
A BSS
B NSS
C OSS
D BSC
Ans.: A
A TDMA.
B CDMA.
C FDMA.
D None of these.
Ans.: B
A Cell.
B Tessellate.
C Mobile Station.
D None of these.
Ans.: A
A Environmental condition.
B Social conditions
C Political condition.
D None of these.
Ans.: A
Q. 22 World’s first cellular system was developed by__________
D Qualcomm
Ans.: A
A Piconet.
B Adhoc piconet.
C Scatter net.
Ans.: D
Q. 24 Which of the following wireless technology is used for exchanging data between a
variety of fixed and mobile devices over a very short diameter?
A An Mobile technology.
B Bluetooth technology.
C Ad hoc Computing
Ans.: B
A Slaves.
B Parked.
C Standby.
D None of these.
Ans.: A
A Mobility.
B Portability.
C Wireless connectivity.
Ans.: D
A Hexagon.
B Circular.
C Square.
D None of these.
Ans.: A
A Education.
B Sports.
C Games.
Ans.: D
A Low Security.
B Ad hoc Networking.
C Shared Medium.
Ans.: D
A FHSS.
B GSM.
C GPRS.
D UMTS.
Ans.: A
Ans.: B
A simplex communication
D no communication
Ans.: C
Ans.: A
Ans.: D
Ans.: B
B 2128
C 232
D 28
Ans.: B
Q. 37 In IPv6, real-time audio or video, particularly in digital form, requires resources such
as __________
A Fixed Bandwidth
B Variable Bandwidth
C High Bandwidth
D Low Bandwidth
Ans.: C
A 10 bytes.
B 25 bytes.
C 30 bytes.
D 40 bytes.
Ans.: D
A display()
B paint()
C displayApplet()
D PrintApplet()
Ans.: B
D None of these.
Ans.: B
A GSM only
B IS-136 only
D PDC
Ans.: C
B Mobile Internet
C Mobility In Network
Ans.: A
Q. 43 The process of transferring a mobile station from one base station to another
is___________
A MSC
B Roamer
C Hand off
D Forward channel
Ans.: C
B CDMA/FDD
Ans.: D
A UMTS
B DECT
C DCS-1800
D ETACS
Ans.: A
A TDMA
B FDMA
C FDD
D TDD
Ans.: C
Ans.: D
A Cross talk
B Missed calls
C Blocked calls
D All of the above
Ans.: D
C Obstacles
Ans.: D
Ans.: A
B Large bandwidth
C Multiple users
Ans.: D
A DPSK
B FSK
C ASK
D QPSK
Ans.: A
B ASK
C BPSK
D QPSK
Ans.: C
Q. 54 WAP is a _______.
B Common Protocol.
C Both A and B.
D Transport protocol.
Ans.: A
B Multipath fading
Ans.: B
A Signal
B Frequency
C Phase
D Amplitude
Ans.: B
Q. 57 DSSS system spreads the baseband signal by ________ the baseband pulses with a
pseudo noise sequence.
A Adding
B Subtracting
C Multiplying
D Dividing
Ans.: C
A 9.6 KBPS
B 9.7 KBPS
C 9.8 KBPS
D 9.9 KBPS
Ans.: A
Q. 59 In cellular telephony, Interim Standard 95 (IS-95), the forward channel uses the
technique___________.
A CDMA
B DSSS
C FHSS
D FDMA
Ans.: A
A Signaling
B Scrambling
C Framing
D Searching
Ans.: B
Model Question Paper
Subject: Mobile Computing
Class: BE
Semester: VIII
Q1. Which of the following stores all the user-related data that is relevant for
the GSM system in mobile computing?
A.SIM
B. HLR
C. ELR
D. VLR
Ans.: A
Ans.: A
A. Cell
B. Tessellate
C. Mobile station
A. Environmental conditions
B. Social conditions
C. Political conditions
Ans.: A
A. Handover
B. Infrastructure
C. Frequency planning
Ans.: D
Q6. Which of the following provides packet mode data transfer service over
the cellular network system?
A. GSM
B. GPRS
C. TCP
Ans.: B
Q7. Which of the following services/ services are defined by the GSM?
A. Bearer
B. Supplementary
C. Telephony
D. All of the above
Ans.: D
A. Piconet
B. Ad hoc piconet
C. Scatter net
Ans.: D
Q9. Which of the following wireless technology is used for exchanging data
between a variety of fixed and mobile devices over a very short diameter?
A. Mobile technology
B. Bluetooth Technology
C Ad hoc computing
Ans.: B
A. Master
B. Parked
C. Standby
D. Slave
Ans.: A
A. Wired LAN
B. Wireless LAN
Ans.: B
A. IEEE 802.2
B. IEEE 802.11
C. IEEE 802.5
D. IEEE 802.15
Ans.: B
A. Flexibility
B. Ease of use
C. Robustness
Ans.: D
Ans.: D
B. Parked
C. Standby
Ans.: A
A. Mobility
B. Portability
C. Wireless connectivity
Ans.: D
A. GSM
B. GPRS
C. CDMA
Ans.: A
Q18. Which of the following allow the use of only some part of bandwidth?
A. TDMA
B. FDMA
C. Both a and b
Ans.: C
Q19. Group of cells without overlapping gaps is called ——
A. Cell
B. Tessellate
C. Mobile station
Ans.: B
A. Hexagon
B. Circular
C. Square
Ans.: A
A. Education
B. Sports
C. Games
Ans.: D
A. Low Security
B. Ad hoc Networking
C. Shared medium
A. Piconet
B. Ad hoc piconet
C. Scatter net
Ans.: C
B. Ad-hoc networking
Ans.: D
A. Master
B. Parked
C. Standby
D. Slave
Ans.: D
B. Mobile Portal
C. Location-Based Commerce (L-Commerce)
D. Mobile Computing
Ans.: A
Ans.: D
A. Wireless
B. Hotspot
C. Voice Portal
D. Bluetooth
Ans.: D
A. Mobile Wallet
B. Mobile Computing
C. Pervasive Computing
D. Mobile Portal
Ans.: B
Q30.Phones the provide two-way radio communications over a cellular
network of base stations with seamless handoffs
A. Bluetooth
B. Infrared
C. Cellular Phones
D. Mobile Wallet
Ans.: C
A. UMTS
B. DECT
C. DCS-1800
D. ETACS
Ans.: A
Q32. Which of the following is the world’s first cellular system to specify
digital modulation and network level architecture?
A.GSM
B. AMPS
C. CDMA
D. IS-54
Ans.: A
Ans.: B
A. ITU
B. AT & T
C. ETSI
D. USDC
Ans.: C
A. Emergency calling
C. Call diversion
Ans.: C
B. Flip flop
C. SIM
D. SMS
Ans.: C
Q37. Which of the following does not come under subsystem of GSM
architecture?
A. BSS
B. NSS
C. OSS
D. Channel
Ans.: D
A. BSS
B. NSS
C. OSS
D. BSC
Ans.: A
A. BSS
B. NSS
C. OSS
D. BSC
Ans.: B
A. BSS
B. NSS
C. OSS
D. BSC
Ans.: C
B. BSS
C. NSS
D. VLR
Ans.: C
A. ANSI
B. ETSI
C. 3GPP
D. UMTS
Ans.: C
Q43. Which is the main protocol that transfers packets in a GPRS Core
network?
A. GTP
B. SSTP
C. SCTP
D. None
Ans.: A
A. Ga
B. Gb
C. Gc
D. Gd
Ans.: B
Q46. What is the interface between SGSN and GGSN in a GPRS network?
A. Ga
B. Gb
C. Gn
D. Gd
Ans.: C
Q47. What is the interface between GGSN and Inter-PLMN GPRS network?
A. Ga
B. Gb
C. Gp
D. Gd
Ans.: C
Q48. What is the interface between GGSN and External Packet Network(
Internet ) in a GPRS structure?
A. Ga
B. Gb
C. Gp
D. Gi
Ans.: D
Q49. What is the interface between SGSN and MSC/VLR in a GPRS network?
A. Gs
B. Gb
C. Gp
D. Gd
Ans.: A
B. IP
D.None
Ans.: C
Ans.: B
A.56-115kbps
B.9-256kbps
C.64-128kbps
D.None
Ans.: A
C. IP - Internet Protocol
D. All
Ans.: D
Q56. GPRS uses which unused channels for transportation of Data in general?
A.SDCCH
B.BCCH
C.TCH
D.SCH
Ans.: C
A.SGSN
B.GGSN
D.None
Ans.: C
Q58. What are the main parts of a Mobile Station in a GSM Network?
C.Both A and B
D.None
Ans.: C
Q59. What are the three main parts of a GSM Architecture or Structure?
A. Mobile Station
Ans.: D
A.IMEI
B.SIM
C.IMSI
D.None
Ans.: A