Shivaji University Kolhapur M.Sc Semester-III Computer Science Paper March 2019
Which of the following algorithm is used for authentication in GSM?
(a) A1
(b) A5
(c) SERS
(d) A3
(e) A8
A television broadcast is an example of ______ transmission.
(a) Full-Duplex
(b) Automatic
(c) Simplex
(d) Half-duplex
Waves in the ______ range are used by submarines, because they can penetrate water and can follow the earth surface.
(a) High frequency
(b) Very high frequency
(c) Meidum frequency
(d) Low frequency
The ______ defines the current location of the MN from an IP point of view
(a) FOA
(b) MNA
(c) CAN
(d) COA
Several directed antennas can be combined on a single pole to construct a ______
(a) Sectorized antennna
(b) Omni-directional antenna
(c) Directional antenna
(d) Marconi antenna
MANET stands for _______
(a) Moible Application for network
(b) Mobiel Access network
(c) Mobile ad-hoc networking
(d) Mobile Advance network
______ is used to provide the data or to access the data by order application which is stored by itself.
(a) Activity
(b) Broadcast receiver
(c) Content-provider
(d) Service
API an android is _____
(a) Android programming interfaces
(b) Application programming interface
(c) Application provides interfaces
(d) Android provider interfaces
MAC sub layer is the part of _______
(a) Access control mechanism
(b) Physical layer
(c) Logical link control
(d) Data link layer
______ starts at serveral kHz, the very low frequency range
(a) Visible
(b) Infrared
(c) Radio transmission
(d) Microwave
IMSI number consists of _____
(a) MSIN
(b) Mobile Network Code
(c) Mobile country code
(d) All of the above
GSM stands for _____
(a) Global structure for mobile
(b) Global stystem for module communications
(c) Global segment for mobile
(d) Global system for mobile communications
______ is used for cellular phone, satellite, and wireless LAN communications.
(a) Infrared waves
(b) Microwaves
(c) Radio waves
(d) None of these
In mobile network layer, _____ protocol is used to send registration request
(a) Transmission Control Protocol (TCP)
(b) User Datagram Protocol (UDP)
(c) Internet Protocol (IP)
(d) Internet Control Message Protocol (ICMP)
Leave a Reply