0% found this document useful (0 votes)
198 views5 pages

Sem VI - TYCS - Ensor Network and Mobile Computing

1. The document contains 40 multiple choice questions related to wireless communication technologies and sensor networks. The questions cover topics like multiple access techniques, wireless network protocols, satellite components, sensor network architectures and energy saving techniques. 2. The MCQs assess knowledge of wireless networking standards and protocols like UMTS, DECT, GSM, Bluetooth, TCP/IP layers and wireless network topologies including star, mesh and multi-hop networks. 3. Questions also test understanding of sensor network optimization criteria such as energy efficiency, quality of service and scalability. Protocols like LEACH for clustering and applications of sensor networks for detection, tracking and classification are discussed.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
198 views5 pages

Sem VI - TYCS - Ensor Network and Mobile Computing

1. The document contains 40 multiple choice questions related to wireless communication technologies and sensor networks. The questions cover topics like multiple access techniques, wireless network protocols, satellite components, sensor network architectures and energy saving techniques. 2. The MCQs assess knowledge of wireless networking standards and protocols like UMTS, DECT, GSM, Bluetooth, TCP/IP layers and wireless network topologies including star, mesh and multi-hop networks. 3. Questions also test understanding of sensor network optimization criteria such as energy efficiency, quality of service and scalability. Protocols like LEACH for clustering and applications of sensor networks for detection, tracking and classification are discussed.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

SAMPLE MCQs

Q.No Questions
1 UMTS use which multiple access technique?
A. CDMA
B. TDMA
C. FDMA
D. SDMA
2 __________ is the main signalling layer of DECT as well as ________ supports the call
completion facility in a multi handset environment.
A. Physical Layer, Cordless controller
B. Data link layer, Radio fixed part
C. Network layer, Network Specific Interface Unit
D. Mac layer, Portable headset
3 What kind of battery panels are used in some advanced satellites?
A. Gallium Arsenide solar panel array
B. Gallium Phosphate solar panel array
C. Silicon
D. Titanium
4 In _________ , each mobile node is an independent node, which act as a host and a router.
A. Wireless Sensor Network
B. Mobile Ad-hoc Network
C. Computer Ad-hoc Network
D. Wired Sensor Network
5 Multihop network operates on ______________ principle.
A. Store Packet
B. Forward Packet
C. Store and Forward Packet
D. Receive and Update Packet
6 In ____________ we can transmit signals from a series of independent sources at the same
time over the same frequency band.
A. Frequency Division Multiplexing
B. Time Division Multiplexing
C. Space Division Multiplexing
D. Code Division Multiplexing
7 Garuda comes under the downstream reliability group based on a ________________
architecture.
A. One Tier
B. Two Tier
C. Three Tier
D. Four Tier
8 In a sensor node architecture, ____________ is used a power saving policy due to its ability to
conserve power by shutting down parts of the network which are not currently active or in
usage.
A. Dynamic Voltage Scaling
B. Auto Power Save Mode
C. Critical Usage Algorithm
D. Dynamic Power Management
9 Which MAC protocol is used in WSN to reduce energy consumption and support self-
configuration?
A. Sensor MAC Protocol
B. Leach Protocol
C. Y-MAC Protocol
D. CSMA/CD
10 Two components make up DECT in WSN, a _______ and a base station called a________, which
is connected to a telephone network.
A. Antenna, radio fixed part
B. Mobile handset, antenna
C. Mobile handset, radio fixed part
D. Sensors, radio fixed part
11 DECT applications provides supervision in two ways, _____________ using handshake
mechanism and ____________ by decryption at intended user.
A. Authorization, Decryption
B. Authentication, Encryption
C. Authentication, Decryption
D. Authorization, Encryption
12 Which part of GSM is also known as core network?
A. Network and Switching Subsystem
B. Base Station Subsystem
C. GPRS Network
D. Operation Support System.
13 A desirable modulation scheme provides _________ bit error rates at __________ received
signal to noise ratios.
A. Low, Low
B. Low, High
C. High, High
D. High, Low
14 The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is
equivalent to the Network layer of the OSI model?
A. Application
B. Host to Host
C. Internet
D. Network Access
15 IEEE 802.11 defines basic service set as building block of a wireless ___________
A. LAN
B. WAN protocol
C. MAN
D. ALOHA
16 A Sensor network is designed to perform a set of high-level information processing task such as
_____
A. Detection
B. Dtection & Tracking
C. Detection & Classification
D. Detection, Tracking & Classification
17 Because of the unique attenuation characteristics of RF signals ____________ network provide
a significant energy saving over ______________ network for the same distance.
A. Single Hop, Multi Hop
B. Multi Hop, Single Hop
C. Single Hop, Single Hop
D. Multi Hop, Multi Hop
18 It is more appropriate to address nodes in a sensor network by _________ than by _________
A. Physical Layer, IP Address
B. IP Address, Physical Properties
C. Data Link Layer, MAC Address
D. MAC Address, Data Link Properties
19 A packet in Transmission Control Protocol (TCP) is called a ____________
A. Transmittable Slots
B. Packet
C. Segment
D. Source Slots
20 Which protocol assigns an IP address to the client connected to the internet?
A. DHCP
B. IP
C. RFC
D. RSVP
21 While designing new routing protocols, _________ and _________ should be fulfilled by a
network engineer.
A. Node Centric, Data Centric
B. Energy Efficiency, Complexity
C. Dynamic Source Routing, Proactive Protocols
D. Directed Diffusion, Delay
22 The transmitter-receiver combination in the satellite is known as a ____
A. Relay
B. Repeater
C. Transponder
D. Duplexer
23 Equalization techniques can be categorised into__________and_____________ techniques
A. Active, Passive
B. Linear, Non-linear
C. Slow, Fast
D. Direct, Indirect
24 What is a cluster in a cellular system?
A. Group of frequencies
B. Group of cells
C. Group of subscribers
D. Group of mobile systems
25 Which are the features present in IPv4 but not in IPv6?
A. Fragmentation
B. Header Checksum
C. Fragmentation & Header Checksum
D. Compression
26 The DECT system is based on __________ principles.
A. TCP
B. IP
C. OSI
D. AMPS
27 Optimization of wireless sensor network is based on _____
A. Quality of Service
B. Quality of Service & Energy Efficiency
C. Quality of Service & Scalability
D. Quality of Service, Energy Efficiency & Scalability
28 LEACH is ________based protocol.
A. Star
B. Clustering
C. Area
D. Data
29 ___________is a process of simultaneously transmitting two or more individual signal over a
signal over a single communication channel’
A. Multiplexing
B. Duplexing
C. Overpassing
D. Sending
30 Wireless Sensor Network can be designed with______ topology.
A. Star
B. Star & Mesh
C. Star & Tree
D. Star, Mesh & Tree
31 1KHz=______Hz
A. 100Hz
B. 1000Hz
C. 10000Hz
D. 10Hz
32 ________ topology overcomes the drawback of single hop network
A. Start
B. Mesh
C. Multihop
D. Tree
33 Wireless communication means communication by ______ waves.
A. Radio
B. Sound
C. Noise
D. Vacuum
34 What is the normal range of Bluetooth?
A. 1 Km
B. 10 mtr
C. 1 mtr
D. 10 Km
35 What is the name of the protocol that can classified as either connection-oriented and
connectionless?
A. UDP
B. TCP
C. MAC
D. TCDM
36 Who provides reliability and congestion control, belongs to the upstream reliability guarantee
group?
A. CODA
B. ESRT
C. RMST
D. PSFQ
37 _____has defined three different categories of services: bearer, tele, and supplementary
services?
A. ISDN
B. TDMA
C. GSM
D. FDMA
38 TinyOs supports _____ and _____by the concept of components.
A. Mobility, Data-based Programming
B. Modularity, Event-based Programming
C. Mobility, Event-based Programming
D. Modularity, Data-based Programming
39 ___________ is an interdisciplinary research area that draws on contributions from signal
processing, networking and protocols, databases and information management, distributed
algorithms, and embedded systems and architecture.
A. Wireless Network
B. Sensor Network
C. Wired Network
D. Satellite Network
40 Which Multiplexing Technique used to transmit digital signals?
A. FDM
B. TDM
C. WDM
D. FDM & WDM

You might also like