Objective Questions on Mobile Computing

Shivaji University Kolhapur M.Sc Semester-III Computer Science Paper March 2019

Which of the following algorithm is used for authentication in GSM?
(a) A1
(b) A5
(c) SERS
(d) A3
(e) A8

A television broadcast is an example of ______ transmission.
(a) Full-Duplex
(b) Automatic
(c) Simplex
(d) Half-duplex

Waves in the ______ range are used by submarines, because they can penetrate water and can follow the earth surface.
(a) High frequency
(b) Very high frequency
(c) Meidum frequency
(d) Low frequency

The ______ defines the current location of the MN from an IP point of view
(a) FOA
(b) MNA
(c) CAN
(d) COA

Several directed antennas can be combined on a single pole to construct a ______
(a) Sectorized antennna
(b) Omni-directional antenna
(c) Directional antenna
(d) Marconi antenna

MANET stands for _______
(a) Moible Application for network
(b) Mobiel Access network
(c) Mobile ad-hoc networking
(d) Mobile Advance network

______ is used to provide the data or to access the data by order application which is stored by itself.
(a) Activity
(b) Broadcast receiver
(c) Content-provider
(d) Service

API an android is _____
(a) Android programming interfaces
(b) Application programming interface
(c) Application provides interfaces
(d) Android provider interfaces

MAC sub layer is the part of _______
(a) Access control mechanism
(b) Physical layer
(c) Logical link control
(d) Data link layer

______ starts at serveral kHz, the very low frequency range
(a) Visible
(b) Infrared
(c) Radio transmission
(d) Microwave

IMSI number consists of _____
(a) MSIN
(b) Mobile Network Code
(c) Mobile country code
(d) All of the above

GSM stands for _____
(a) Global structure for mobile
(b) Global stystem for module communications
(c) Global segment for mobile
(d) Global system for mobile communications

______ is used for cellular phone, satellite, and wireless LAN communications.
(a) Infrared waves
(b) Microwaves
(c) Radio waves
(d) None of these

In mobile network layer, _____ protocol is used to send registration request
(a) Transmission Control Protocol (TCP)
(b) User Datagram Protocol (UDP)
(c) Internet Protocol (IP)
(d) Internet Control Message Protocol (ICMP)


Posted

in

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *