0% found this document useful (0 votes)
207 views373 pages

WMN Final

The document is a set of multiple choice questions about Wireless Mobile Networks for an upcoming MSBTE exam. It covers topics like GSM, UMTS, 4G LTE, WLAN, and other wireless networking concepts. There are 30 questions in total testing students' understanding of key aspects of wireless mobile networks.

Uploaded by

mohit more
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
207 views373 pages

WMN Final

The document is a set of multiple choice questions about Wireless Mobile Networks for an upcoming MSBTE exam. It covers topics like GSM, UMTS, 4G LTE, WLAN, and other wireless networking concepts. There are 30 questions in total testing students' understanding of key aspects of wireless mobile networks.

Uploaded by

mohit more
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 373

MSBTE

Wireless Mobile Network MCQ Book

BY
Apni University
India’s No.1 Digital Book Compay
Preface

The importance of Wireless Mobile Network is well known in various engineering


fields. Overwhelming response to our last year exam sutra series inspired us to create
this book. This book is structure to cover the key aspects of the subject WMN.

All the questions in the book are very important for the upcoming MSBTE summer
2020 exam. All care has beentaken tomake students comfortable in understanding the
basic concepts of the subject.

The most important part of this kit is, we are not only providing the books but the
exams too at three different levels (basic, intermediate & advanced). The students
only need to study the book and co-operate us till exam.

We wish to express our profound thanks to all those who helped in making this
book realty. Much needed moral support and encouragement is provided on
numerous occasions by our whole family. We wish to thank the entire team of Apni
University who has taken immense pain to get this book in time with this quality.

Any suggestion for the improvement of the books will be acknowledged and well
appreciated.
Question

Which of the following is the world’s first cellular system to specify digital

modulation and network level architecture?

a) GSM

b) AMPS

c) CDMA

d) IS-54

Question

Previously in 1980s, GSM stands for ____________

a) Global system for mobile

b) Groupe special mobile

c) Global special mobile

d) Groupe system mobile

Question

Who sets the standards of GSM?

a) ITU
b) AT & T

c) ETSI

d) USDC

Question

Which of the following does not come under the teleservices of GSM?

a) Standard mobile telephony

b) Mobile originated traffic

c) Base originated traffic

d) Packet switched traffic

Question

Which of the following comes under supplementary ISDN services?

a) Emergency calling

b) Packet switched protocols

c) Call diversion

d) Standard mobile telephony


Question

Which of the following memory device stores information such as subscriber’s

identification number in GSM?

a) Register

b) Flip flop

c) SIM

d) SMS

Question

Which of the following feature makes impossible to eavesdrop on GSM radio

transmission?

a) SIM

b) On the air privacy

c) SMS

d) Packet switched traffic

Question
Which of the following does not come under subsystem of GSM architecture?

a) BSS

b) NSS

c) OSS

d) Channel

Question

Which of the following subsystem provides radio transmission between mobile

station and MSC?

a) BSS

b) NSS

c) OSS

d) BSC

Question

___________ manages the switching function in GSM.

a) BSS

b) NSS

c) OSS

d) MSC
Question

__________ supports the operation and maintenance of GSM.

a) BSS

b) NSS

c) OSS

d) MSC

Question

__________ carries digitally encoded user data.

a) Traffic channels

b) Control channels

c) Signalling channels

d) Forward channels

Question

____________ carries signalling and synchronizing commands.

a) Traffic channels

b) Control channels
c) Signalling channels

d) Forward channels

Question

Which of the following is not a control channel of GSM?

a) BCH

b) CCCH

c) DCCH

d) TCH

Question

Which of the following is the forward control channel that is used to broadcast

information?

a) BCCH

b) CCCH

c) DCCH

d) TCH
Question

Which of the following channel does not come under CCCH?

a) PCH

b) RACH

c) DCCH

d) AGCH

Question

Which of the following channel provides paging signals from base station to all

mobiles in the cell?

a) RACH

b) AGCH

c) DCCH

d) PCH

Question
___________ is a reverse link channel used by a subscriber unit to acknowledge.

a) RACH

b) AGCH

c) DCCH

d) PCH

Question

Which of the following channel is used by base station to provide forward link

communication to mobile?

a) RACH

b) AGCH

c) DCCH

d) PCH

Question

Which of the following burst is used to broadcast the frequency and time

synchronization control messages?

a) FCCH and SCH

b) TCH and DCCH


c) RACH and TCH

d) FCCH and DCCH

Question

Which of the following burst is used to access service from any base station?

a) TCH

b) RACH

c) SCH

d) FCCH

Question

Group of superframes in GSM is called multiframe.

a) True

b) False

Question

PCS/PCN provides only wired communication.

a) True

b) False
Question

Concept of PCS/PCN is based on _________

a) Advanced intelligent network

b) Artificial intelligent network

c) CDPD

d) SS7

Question

AIN has different telephone numbers for both wireline and wireless services.

a) True

b) False

Question

Circuit switching has more advantage than packet switching for PCS.

a) True

b) False

Question
______ is used for transmission of packets in the cellular switched architecture.

a) Packet switching techniques

b) Circuit switching techniques

c) Packet and circuit switched technique

d) Datagram technique

Question

Which of the following has the function to accept information from PSTN?

a) TIU

b) WIU

c) BIU

d) CIU

Question

PTI is the address of ____________

a) TIU

b) WIU

c) BIU

d) CIU
Question

_______ is the information contained in the packet header of TIU.

a) PTI

b) VCI

c) PRMA

d) CDPD

Question

Transmission protocol, PRMA stands for _________

a) Pocket reservation multiple access

b) Packet register multiple access

c) Pocket register multiple access

d) Packet reservation multiple access

Question

UMTS stands for ____________

a) Universal mobile telecommunication system

b) Universal mobile telephone system


c) United multiplex telecommunication system

d) Universal mobile telecommunication system

Question

In a wireless communication, base station is connected to central hub called

_______

a) PSTN

b) MSC

c) CO

d) PBX

Question

PSTN stands for ________

a) Public switched telephone network

b) Personal switched telephone network

c) Personal switched telephone node

d) Public switched telephone node


Question

MSCs provide connectivity between PSTN and the base stations.

a) True

b) False

Question

Communication protocol, CAI stands for ___________

a) Common air interchange

b) Control air interchange

c) Common air interface

d) Control air interchange

Question

At the base station, the air interface portion of mobile transmission is passed to

MSC.

a) True

b) False
Question

PSTN is ___________ and wireless networks are ________

a) Highly dynamic, virtually static

b) Static, virtually static

c) Highly dynamic, virtually dynamic

d) Virtually static, highly dynamic

Question

In public switched telephone network, LATA stands for ______

a) Local access and transport area

b) Land area and transport area

c) Local access and telephone access

d) Local area and telephone access

Question

LATAs are connected by a company called _________

a) Land exchange carrier

b) Local exchange carrier


c) Local control exchange

d) Land area exchange

Question

A long distance telephone company that collects toll is called _________

a) LATA

b) LEC

c) PSTN

d) IXC

Question

Wireless networks are extremely hostile and random nature of radio channel.

a) True

b) False

Question

Which type of cell provides the best level of service for average subscribers?

a) Acceptance cell

b) Barred cell
c) Reserved cell

d) Suitable cell

Question

With the normal cyclic prefix, how many symbols are contained in 1 frame?

a) 7

b) 140

c) 12

d) 40

Question

What is the PBCH scrambled with?

a) Current frame number

b) Physical cell ID

c) UE’s CRNTI

d) Not scrambled
Question

What is the length of the shortest possible PDCCH in bits?

a) 144

b) 288

c) 72

d) 576

Question

What is the average uploading speed of 4G LTE network?

a) 1-3 Gbps

b) 2-5 Gbps

c) 1-3 Mbps

d) 2-5 Mbps
Question

Which of the following is not a part of the characteristic of 4G network?

a) Multirate management

b) Fully converged services

c) Software dependency

d) Diverse user devices

Question

What does SGSN stands for?

a) Serial Gateway Supporting Node

b) Supporting GGSN Support Node

c) Supporting GPRS Support Node

d) Supporting Gateway Support Node

Question

What location management feature is supported by 4G?

a) Concatenated Location Registration

b) Concurrent Location Register


c) Concatenated Management

d) Collated Location Registration

Question

In 2007 ____________ announced its plan to transmit its network to 4G standard

LTE with joint efforts of Vodafone group.

a) Verizon Wireless

b) AirTouch

c) Netflix

d) V Cast

Question

Hybrid ARQ is part of the ____________ layer.

a) PDCP

b) RLC

c) MAC

d) PHY

Question
What is the full form of WLAN?

a) Wide Local Area Network

b) Wireless Local Area Network

c) Wireless Land Access Network

d) Wireless Local Area Node

Question

WLANs use high power levels and generally require a license for spectrum use.

a) True

b) False

Question

What is the name of 300 MHz of unlicensed spectrum allocated by FCC in ISM

band?

a) UNII

b) Unlicensed PCS

c) Millimetre wave

d) Bluetooth
Question

Which of the following specifies a set of media access control (MAC) and physical

layer specifications for implementing WLANs?

a) IEEE 802.16

b) IEEE 802.3

c) IEEE 802.11

d) IEEE 802.15

Question

Which of the following is not a standard of WLAN?

a) HIPER-LAN

b) HIPERLAN/2

c) IEEE 802.11b

d) AMPS

Question

Which of the following is the 802.11 High Rate Standard?

a) IEEE 802.15
b) IEEE 802.15.4

c) IEEE 802.11g

d) IEEE 802.11b

Question

Which of the following spread spectrum techniques were used in the original IEEE

802.11 standard?

a) FHSS and DSSS

b) THSS and FHSS

c) THSS and DSSS

d) Hybrid technique

Question

Which of the following WLAN standard has been named Wi-Fi?

a) IEEE 802.6

b) IEEE 802.15.4

c) DSSS IEEE 802.11b

d) IEEE 802.11g
Question

Which of the following is developing CCK-OFDM?

a) IEEE 802.11a

b) IEEE 802.11b

c) IEEE 802.15.4

d) IEEE 802.11g

Question

What is the data rate of HomeRF 2.0?

a) 10 Mbps

b) 54 Mbps

c) 200 Mbps

d) 1 Mbps

Question

HIPER-LAN stands for ____________

a) High Precision Radio Local Area Network

b) High Performance Radio Local Area Network


c) High Precision Radio Land Area Network

d) Huge Performance Radio Link Access Node

Question

What is the range of asynchronous user data rates provided by HIPER-LAN?

a) 1-100 Mbps

b) 50-100 Mbps

c) 1-20 Mbps

d) 500 Mbps to 1 Gbps

Question

What is the name of the European WLAN standard that provides user data rate

upto 54 Mbps?

a) UNII

b) WISP

c) MMAC

d) HIPERLAN/2

Question
What is WISP?

a) Wideband Internet Service Protocol

b) Wireless Internet Service Provider

c) Wireless Instantaneous Source Provider

d) Wideband Internet Source Protocol

Question

The price of WLAN hardware is more than 3G telephones and fixed wireless

equipment.

a) True

b) False

Question

Which of the following is not an open standard?

a) Bluetooth

b) WWW

c) HTML

d) VPN
Question

What is the nominal range of Bluetooth?

a) 1 Km

b) 10 m

c) 1 m

d) 10 Km

Question

Bluetooth standard is named after ___________

a) King Ronaldo Bluetooth

b) Pope Vincent Bluetooth

c) King Herald Bluetooth

d) Pope Francis Bluetooth

Question

Bluetooth operates in which band?

a) Ka Band

b) L Band
c) Ku Band

d) 2.4 GHz ISM Band

Question

Which of the following scheme is used by Bluetooth?

a) Frequency hopping TDD scheme

b) Frequency hopping FDD scheme

c) DSSS TDD scheme

d) DSSS FDD scheme

Question

What is the range of time slot in Bluetooth?

a) 120 milliseconds

b) 625 microseconds

c) 577 microseconds

d) 5.7 seconds

Question
Which modulation scheme is used by Bluetooth?

a) DQPSK

b) MSK

c) GFSK

d) BPSK

Question

What is the channel symbol rate in Bluetooth for each user?

a) 270.833 Kbps

b) 1 Gbps

c) 100 Mbps

d) 1 Mbps

Question

What is the raw channel bit error rate of Bluetooth?

a) 10-3

b) 10-10

c) 103

d) 10-1
Question

Which of the following standard committee specifies Bluetooth and other Personal

Area Networks (PAN)?

a) IEEE 802.11b

b) IEEE 802.15

c) IEEE 802.11g

d) IEEE 802.16

Question

What is the access point (AP) in a wireless LAN?

a) device that allows wireless devices to connect to a wired network

b) wireless devices itself

c) both device that allows wireless devices to connect to a wired network and

wireless devices itself

d) all the nodes in the network

Question

In wireless ad-hoc network _________

a) access point is not required


b) access point is must

c) nodes are not required

d) all nodes are access points

Question

Which multiple access technique is used by IEEE 802.11 standard for wireless

LAN?

a) CDMA

b) CSMA/CA

c) ALOHA

d) CSMA/CD

Question

In wireless distribution system __________

a) multiple access point are inter-connected with each other

b) there is no access point

c) only one access point exists

d) access points are not required


Question

A wireless network interface controller can work in _______

a) infrastructure mode

b) ad-hoc mode

c) both infrastructure mode and ad-hoc mode

d) WDS mode

Question

In wireless network an extended service set is a set of ________

a) connected basic service sets

b) all stations

c) all access points

d) connected access points

Question

Mostly ________ is used in wireless LAN.

a) time division multiplexing

b) orthogonal frequency division multiplexing


c) space division multiplexing

d) channel division multiplexing

Question

Which one of the following event is not possible in wireless LAN?

a) collision detection

b) acknowledgement of data frames

c) multi-mode data transmission

d) connection to wired networks

Question

What is Wired Equivalent Privacy (WEP)?

a) security algorithm for ethernet

b) security algorithm for wireless networks

c) security algorithm for usb communication

d) security algorithm for emails

Question
What is WPA?

a) wi-fi protected access

b) wired protected access

c) wired process access

d) wi-fi process access

Question

Which of the following is not a characteristic of 3G network?

a) Communication over VoIP

b) Unparalleled network capacity

c) Multi-megabit Internet access

d) LTE based network

Question

What is the term used by ITU for a set of global standards of 3G systems?

a) IMT 2000

b) GSM

c) CDMA

d) EDGE
Question

Which of the following leads to evolution of 3G networks in CDMA systems?

a) IS-95

b) IS-95B

c) CdmaOne

d) Cdma2000

Question

Which of the following leads to the 3G evolution of GSM, IS-136 and PDC

systems?

a) W-CDMA

b) GPRS

c) EDGE

d) HSCSD

Question

What is 3GPP?

a) Project based on W-CDMA

b) Project based on cdma2000


c) Project based on 2G standards

d) Project based on 2.5G standards

Question

What is 3GPP2?

a) Project based on W-CDMA

b) Project based on cdma2000

c) Project based on 2G standards

d) Project based on 2.5G standards

Question

Which of the following is not a standard of 3G?

a) UMTS

b) Cdma2000

c) TD-SCDMA

d) LTE
Question

Which of the following 3G standard is used in Japan?

a) Cdma2000

b) TD-SCDMA

c) UMTS

d) UTRA

Question

What does the number 2000 in IMT-2000 signifies?

a) Year

b) Number of subscribers per cell

c) Number of cells

d) Area (Km)

Question

Which of the following is not an application of third generation network?

a) Global Positioning System (GPS)

b) Video conferencing
c) Mobile TV

d) Downloading rate upto 1 Gbps

Question

What is the full form of UMTS?

a) Universal Mobile Telephone System

b) Ubiquitous Mobile Telephone System

c) Ubiquitous Mobile Telemetry System

d) Universal Machine Telemedicine System

Question

UMTS use which multiple access technique?

a) CDMA

b) TDMA

c) FDMA

d) SDMA
Question

UMTS does not has backward compatibility with ____________

a) GSM

b) IS-136

c) IS-95

d) GPRS

Question

UMTS is also known as _____________

a) IS-95

b) GPRS

c) CdmaOne

d) W-CDMA

Question

What is the chip rate of W-CDMA?

a) 1.2288 Mcps

b) 3.84 Mcps
c) 270.833 Ksps

d) 100 Mcps

Question

W-CDMA works in FDD mode only.

a) True

b) False

Question

How much packet data rate per user is supported by W-CDMA if the user is

stationary?

a) 2.048 Kbps

b) 100 Mbps

c) 2.048 Mbps

d) 1 Gbps

Question

What is the minimum spectrum allocation required by W-CDMA?

a) 5 MHz
b) 20MHz

c) 1.25 MHz

d) 200 KHz

Question

W-CDMA requires a complete change of RF equipment at each base station.

a) True

b) False

Question

How much increase in spectral efficiency is provided by W-CDMA in comparison

to GSM?

a) Two times

b) Three times

c) No increase

d) Six times

Question
Several protocols for upper layers in bluetooth use _________

a) UDP

b) HSP

c) ITC

d) L2CAP

Question

Protocols are set of rules to govern _________

a) Communication

b) Standard

c) Metropolitan communication

d) Bandwidth

Question

An internet is a __________

a) Collection of WANS

b) Network of networks

c) Collection of LANS

d) Collection of identical LANS and WANS


Question

Checksum is used in Internet by several protocols although not at the _________

a) Session layer

b) Transport layer

c) Network layer

d) Data link layer

Question

In version field of IPv4 header, when machine is using some other version of IPv4

then datagram is __________

a) Discarded

b) Accepted

c) Interpreted

d) Interpreted incorrectly

Question

Network layer at source is responsible for creating a packet from data coming from

another ________

a) Station
b) Link

c) Node

d) Protocol

Question

Header of datagram in IPv4 has _________

a) 0 to 20 bytes

b) 20 to 40 bytes

c) 20 to 60 bytes

d) 20 to 80 bytes

Question

In IPv4 layer, datagram is of ________

a) Fixed length

b) Variable length

c) Global length

d) Zero length
Question

In IPv4, service type of service in header field, first 3 bits are called ______

a) Type of service

b) Code bits

c) Sync bits

d) Precedence bits

Question

Which is a link layer protocol?

a) ARP

b) TCP

c) UDP

d) HTTP

Question

Which protocol is commonly used to retrieve email from a mail server?

a) FTP

b) IMAP
c) HTML

d) TELNET

Question

The signals which are obtained by encoding each quantized signal into a digital

word is called as

a) PAM signal

b) PCM signal

c) FM signal

d) Sampling and quantization

Question

The length of the code-word obtained by encoding quantized sample is equal to

a) l=log(to the base 2)L

b) l=log(to the base 10)L

c) l=2log(to the base 2)L

d) l=log(to the base 2)L/2


Question

Quantization noise can be reduced by ________ the number of levels.

a) Decreasing

b) Increasing

c) Doubling

d) Squaring

Question

In PCM encoding, quantization level varies as a function of ________

a) Frequency

b) Amplitude

c) Square of frequency

d) Square of amplitude

Question

What is bit depth?

a) Number of quantization level

b) Interval between two quantization levels


c) Number of possible digital values to represent each sample

d) None of the mentioned

Question

Choosing a discrete value that is near but not exactly at the analog signal level

leads to

a) PCM error

b) Quantization error

c) PAM error

d) Sampling error

Question

Which of the following multiple access techniques are used by second generation

cellular systems?

a) FDMA/FDD and TDMA/FDD

b) TDMA/FDD and CDMA/FDD

c) FDMA/FDD and CDMA/FDD

d) FDMA/FDD only
Question

Which one is not a TDMA standard of second generation networks?

a) GSM

b) IS-136

c) AMPS

d) PDC

Question

Which of the following is a CDMA standard of second generation network?

a) IS-95

b) IS-136

c) ETACS

d) EDGE

Question

Popular 2G CDMA standard IS-95 is also known as ______________

a) CdmaOne

b) CdmaTwo
c) IS-136

d) IS-95B

Question

How many users or voice channels are supported for each 200 KHz channel in

GSM?

a) Eight

b) Three

c) Sixty four

d) Twelve

Question

How many voice channels are supported for each 30 KHz radio channel in IS-136?

a) Eight

b) Thirty

c) Three

d) Sixteen

Question
How many users are supported in IS-95 for each 1.25 MHz?

a) Eight

b) Sixty four

c) Sixteen

d) Twenty five

Question

Which modulation technique is used by GSM?

a) GMSK

b) BPSK

c) QPSK

d) GFSK

Question

IS-95 uses which modulation technique?

a) GMSK

b) BPSK

c) QAM

d) AFSK
Question

IS-136 uses which modulation technique?

a) π/4 DQPSK

b) BPSK

c) GMSK

d) AFSK

Question

Which is one of the disadvantages of 2G standards?

a) Short Messaging Service (SMS)

b) Digital modulation

c) Limited capacity

d) Limited Internet Browsing

Question

GSM (Global System for Mobile) was earlier also known as _____________

a) Group System Mobile

b) Global Special Meaning


c) Group Special Mobile

d) Global Special Mobile

Question

2G CDMA standard, IS-95, was proposed by which company?

a) Nippon Telephone and Telegraph (NTT)

b) Qualcomm

c) Bellcore and Motorola

d) AT&T Bell Laboratories

Question

Which one of the following 2G standard is used in Japan?

a) IS-136

b) GSM

c) PDC

d) AMPS
Question

The 2G GSM technology uses a carrier separation of _____________

a) 1.25 MHz

b) 200 KHz

c) 30 KHz

d) 300 KHz

Question

Which of the following has no backward compatibility with 3G Cdma2000?

a) IS-95

b) GPRS

c) IS-95A

d) IS-95B

Question

2G and 2.5G CDMA operators may selectively introduce 3G capabilities at each

cell without changing entire base stations and reallocate spectrums.


a) True

b) False

Question

Which of the following the first 3G CDMA air interface?

a) IS-95

b) IS-95B

c) Cdma2000 1xRTT

d) CdmaOne

Question

Within ITU IMT-2000 body, Cdma2000 1xRTT is also known as ____________

a) Cdma2000 1xEV-DO

b) Cdma2000 1xEV-DV

c) IS-95B

d) G3G-MC-CDMA-1X
Question

How many users are supported by Cdma2000 1X in comparison to 2G CDMA

standard?

a) Half

b) Twice

c) Six times

d) Ten times

Question

Cdma2000 works in TDD mode only.

a) True

b) False

Question

Which of the following is not a characteristic of Cdma2000?

a) Adaptable baseband signalling rates

b) Adaptable baseband chipping rates


c) Multicarrier technologies

d) OFDMA

Question

Cdma2000 1xEV was developed by ________

a) Motorola

b) AT&T Laboratories

c) Qualcomm

d) NTT

Question

How is bandwidth increased in Cdma2000?

a) Clubbing adjacent radio channels

b) Changing the hardware of base stations

c) Change of spectrum

d) Change of RF equipment
Question

What are the two options provided by Cdma2000 1xEV?

a) Cdma2000 1xRTT. Cdma2000 3xRTT

b) Cdma2000 1xEV-DO, Cdma2000 1xEV-DV

c) Cdma2000 1xEV-DT, Cdma2000 1xEV-DO

d) Cdma2000 1xRTT, Cdma2000 1xEV-DV

Question

Which of the following is not backward compatible with Cdma2000?

a) Cdma2000 1xRTT

b) Cdma2000 3xRTT

c) Cdma2000 1xEV-DO

d) Cdma2000 1xEV-DT
7/9/2021 Vidyalankar Polytechnic | VP

Online Exam Result 

Exam : WMN Chapter 5  Class : IF6I  Div : B

Student Name : CHAVAN SRUSHTI SUSHIL            Roll No. : 19202B1034            Enrollment


No. : 1905680410

Sr. Your Correct


Question Marks
No Answer Answer
What is the access point (AP) in a wireless LAN?

a) a) device that allows wireless


devices to connect to a wired b) b) wireless devices itself
network
1 a a 1
c) c) both device that allows
wireless devices to connect to a
d) d) all the nodes in the network
wired network and wireless
devices itself
Providers of certain types of services on a network are called?

2 a) Routing b) Database c c 1
c) Server d) CORBA
What does scalable mean?

a) It's a very large network b) It's heavy on the scales.


3 d d 1
c) Only Ad Hoc networks are d) More devices can be added
scalable. any time.
A wireless network interface controller can work in _______

a) a) infrastructure mode b) b) ad-hoc mode


4 c c 1
c) c) both infrastructure mode
d) d) WDS mode
and ad-hoc mode
Which of the following is/are essential components of a sensor
node?

5 d d 1
a) Sensing unit b) Processing unit
c) Transmitting unit d) All of the mentioned
WSN concept is the network of devices that connected together in
order to share and gather information

6 a a 1
a) 1 b) 0
c) d)
Sensor Network is

a) Heterogeneous system b) Homogeneous system used in


7 a a 1
consisting of tiny sensors wireless
c) Very important for security d) All of the mentioned
Which of the following are characteristics of MANET

a) Dynamic Topologies b) Autonomous Behavior


8 d d 1
c) Bandwidth constrained,
d) All of above
variable capacity links
Which amoung following is not a type of MANET

a) Vehicular Ad hoc Network b) Smart Phone Ad hoc Network


9 d d 1
c) Internet based Mobile Ad hoc
d) Super MANET
Network

https://mycollege.vpt.edu.in/student/end_practice_exam_new.php 1/2
7/9/2021 Vidyalankar Polytechnic | VP

Sr. Your Correct


Question Marks
No Answer Answer
What is Wired Equivalent Privacy (WEP)?

a) a) security algorithm for b) b) security algorithm for


10 ethernet wireless networks b b 1
c) c) security algorithm for usb d) d) security algorithm for
communication emails
 In wireless ad-hoc network _________

11 a) a) access point is not required b) b) access point is must a a 1


c) c) nodes are not required d) d) all nodes are access points
It is the application of the MANET, except :

a) Military applications and


12 b) Wireless Sensor Network b b 1
Emergency Operations
c) Wired Sensor Network d) A Wireless Mesh Network
Following are the types of routing on MANET, except:

13 a) Proactive Routing b) Hybrid Routing c c 1


c) HyperActive Routing d) Reactive Routing

14 a) b) b 0
c) d)

15 a) b) d 0
c) d)

16 a) b) c 0
c) d)

17 a) b) a 0
c) d)

18 a) b) b 0
c) d)

19 a) b) d 0
c) d)

20 a) b) b 0
c) d)

Total Marks : 20

Obtained : 13

Student Signature _____________________________

https://mycollege.vpt.edu.in/student/end_practice_exam_new.php 2/2
7/9/2021 Vidyalankar Polytechnic | VP

Online Exam Result 

Exam : WMN Chapter 4  Class : IF6I  Div : B

Student Name : CHAVAN SRUSHTI SUSHIL            Roll No. : 19202B1034            Enrollment


No. : 1905680410

Sr. Your Correct


Question Marks
No Answer Answer
 Advantages of using AMI

a) a) Needs least power as due to


b) b) prevents build-up of DC
1 opposite polarity d d 1
c) c) may be used for longer
d) d) all of the above
distance
In DPSK technique, the technique used to encode bits is

2 a) a) AMI b) b) Differential code b b 1


c) c) Uni polar RZ format d) d) Manchester format
The IEEE 802.11g, uses _________.

3 a)    DSSS b)    OFDM b b 1
c)    FHSS d)    either (a) or (c)
Examples of PCM waveforms are

4 a) Non return to zero b)  Phase encoded d d 1


c) Multilevel binary d) All of the mentioned
   DPCM is a technique

b) b. Where difference between


a) a. To convert analog signal successive samples of the analog
into digital signal signals are encoded into n-bit
5 d d 1
data streams
c) c. Where digital codes are the
quantized values of the predicted d) d. All of the above
value
One of the disadvantages of PCM is

6 a) a. It requires large bandwidth b) b. Very high noise a a 1


c) c. Cannot be decoded easily d) d. All of the above
Which of the following is most affected by noise?

7 a) a. PSK b) b. ASK b b 1
c) c. FSK d) d. QAM
In ________, the amplitude of the carrier signal is varied to create
signal elements. Both frequency and phase remain constant

8 a b 0
a) PSK b) ASK
c) FSK d) QAM
 PSK stands for _____________ .
9 a) Pulse Sum Keying b) Pulse Shift Keying b b 1
c) Per Shift key d) Pull Simple key
In a uni-polar RZ format,

a) a) The waveform has zero b) b) The waveform has A volts


value for symbol '0' for symbol '1'
10 d d 1
c) c) The waveform has positive
and negative values for '1' and '0' d) d) Both a) and b) are correct
symbol respectively

https://mycollege.vpt.edu.in/student/end_practice_exam_new.php 1/2
7/9/2021 Vidyalankar Polytechnic | VP

Sr. Your Correct


Question Marks
No Answer Answer
In Alternate Mark Inversion (AMI)

a) a) 0 is encoded as positive b) b) 0 is encoded as no pulse


pulse and 1 is encoded as and 1 is encoded as negative
11 negative pulse pulse d d 1
c) c) 0 is encoded as negative d) d) 0 is encoded as no pulse
pulse and 1 is encoded as and 1 is encoded as positive or
positive pulse negative pulse
In PCM, the parameter varied in accordance with the amplitude of
the modulating signal is

12 d d 1
a) a. Amplitude b) b. Frequency
c) c. Phase d) d. None of the above
In PCM, the parameter varied in accordance with the amplitude of
the modulating signal is

13 d d 1
a) a. Amplitude b) b. Frequency
c) c. Phase d) d. None of the above
The polarities in NRZ format use

a) a) Complete pulse duration b) b) Half duration


14 a a 1
c) c) Bothe positive as well as d) d) Each pulse is used for twice
negative value the duration
 ASK modulated signal has the bandwidth

a) Same as the bandwidth of b) Half the bandwidth of


15 baseband signal baseband signal a a 1
c) Double the bandwidth of
d) None of the above
baseband signal
BPSK system modulates at the rate of

16 a) a) 1 bit/symbol b) b)  2 bit/ symbol a a 1


c) c)  4 bit/ symbol d) d) None of the above
In Delta modulation,

a) a. One bit per sample is b) b. All the coded bits used for
17 d d 1
transmitted sampling are transmitted
c) c. The step size is fixed d) d. Both a and c are correct
Unipolar, bipolar, and polar encoding are types of ___________
encoding.

18 b a 0
a) a. Digital-to-digital b) b. Digital-to-analog
c) c. Analog-to-analog d) d. Analog-to-digital
In Binary FSK, mark and space respectively represent

19 a) a) 1 and 0 b) b) 0 and 1 a a 1
c) c) 11 and 00 d) d) 00 and 11
DSSS system spreads the baseband signal by ________ the
baseband pulses with a pseudo noise sequence.

20 c c 1
a) Adding b) Subtracting
c) Multiplying d) Dividing

Total Marks : 20

Obtained : 18

Student Signature _____________________________

https://mycollege.vpt.edu.in/student/end_practice_exam_new.php 2/2
7/9/2021 Vidyalankar Polytechnic | VP

Online Exam Result 

Exam : WMN Chapter 1  Class : IF6I  Div : B

Student Name : CHAVAN SRUSHTI SUSHIL            Roll No. : 19202B1034            Enrollment


No. : 1905680410

Sr. Your Correct


Question Marks
No Answer Answer

1 a) b) 1
c) d)
Which of the following subsystem provides radio transmission
between mobile station and MSC?

2 a a 1
a) a) BSS b) b) NSS
c) c) OSS d) d) BSC
Assertion (A): TMSI function is similar to IMSI i.e. it grants
services by VLR but also different at the same time.Reason (R):
TMSI will have numerous values for a mobile device, But IMSI
value never changes for a subscriber.

3 a a 1
a) 1. Both (A) and (R) are b) 2. (A) is correct, but (R) is
correct incorrect
c) 3. Both (A) and (R) are d) 4. (A) is incorrect, but (R) is
incorrect correct
What are the main parts of a Mobile Station in a GSM Network?

b) SIM - Subscriber Identity


4 a) MT - Mobile Terminal c c 1
Module
c) Both A and B d) None
 ____ manages the switching function in GSM.

5 a) a) BSS b) b) NSS b b 1
c) c) OSS d) d) MSC
How the Home Location Registry (HLR) is useful in mobile
forensic?

a) 1. One HLR is associated with b) 2. HLR stored permanent data


6 d d 1
one IMSI to pertain subscriber service.
c) 3. Current location of the
d) 4. All the above.
Subscriber
The handset along with SIM is called

a) Mobile Equipment (ME) b) User Equipment (UE)


7 d d 1
c) Communication Equipment
d) Both (1) and (2)
(CE)
1. Which of the following is the world’s first cellular system to
specify digital modulation and network level architecture?

8 a a 1
a) a) GSM b) b) AMPS
c) c) CDMA d) d) IS-54
Who sets the standards of GSM?

9 a) a) ITU b) b) AT & T c c 1
c) c) ETSI d) d) USDC

https://mycollege.vpt.edu.in/student/end_practice_exam_new.php 1/3
7/9/2021 Vidyalankar Polytechnic | VP

Sr. Your Correct


Question Marks
No Answer Answer
Which of the following memory device stores information such as
subscriber’s identification number in GSM?

10 c c 1
a) a) Register b) b) Flip flop
c) c) SIM d) d) SMS
Which of the following does not come under subsystem of GSM
architecture?

11 d d 1
a) a) BSS b) b) NSS
c) c) OSS d) d) Channel
Choose a Broadcast channel in GSM Architecture?
a) A) BCCH (Broadcast Control b) B) FCCH (Frequency
Channel) Correction Channel)
12 d d 1
c) C) SCH (Synchronization
Channel), CBCH (Cell d) D) All
Broadcast Channel)
 What is the full form of a VLR?

13 a) 1. Visual Location Router b) 2. Visited Local Reseller d d 1


c) 3. Visual Local Registry d) 4. Visitor Location Register
The process of transferring a mobile station from one base station
to another is

14 c c 1
a) a. MSC b) b. Roamer
c) c. Hand off d) d. Forward channel
 ______ supports the operation and maintenance of GSM.

15 a) a) BSS b) b) NSS c c 1
c) c) OSS d) d) MSC
What do you call an Equipment that Receives and Transmits radio
signals?

16 b b 1
a) A) BTS b) B) Transceiver
c) C) Transistor d) D) Controller
What is IMSI stands for?

a) 1. Internet Mobile Subscriber b) 2. International Mobile


17 Identifier Subscriber Identity b b 1
c) 3. Internet Machine d) 4. International Machine
Subscriber Identity Substitute Identifier
 In mobile networking, PSTN stands for

a) 1. Public Switch b) 2. Private Switch Telephone


18 Telecommunication Network Network c c 1
c) 3. Public Switch Telephone d) 4. Private Switch
Network Telecommunication Network
What is TRUE about a PCH (paging Channel) in a GSM
Network?

b) B) Paging alerts the MT


a) A) Paging works in a
(Mobile Terminal) about an
19 Downlink (BTS to Mobile) d d 1
incoming Call or SMS.
c) C) Paging is a One to One
communication initiated by NSS d) D) All
(Network Subsystem)

20 a) b) 1
c) d)

Total Marks : 20

Obtained : 20

https://mycollege.vpt.edu.in/student/end_practice_exam_new.php 2/3
7/9/2021 Vidyalankar Polytechnic | VP

Student Signature _____________________________

https://mycollege.vpt.edu.in/student/end_practice_exam_new.php 3/3
7/9/2021 Vidyalankar Polytechnic | VP

Online Exam Result 

Exam : WMN Chapter 3  Class : IF6I  Div : B

Student Name : CHAVAN SRUSHTI SUSHIL            Roll No. : 19202B1034            Enrollment


No. : 1905680410

Sr. Your Correct


Question Marks
No Answer Answer
AP is abbreviated as _____________

1 a) a) Access Point b) b) Access Port a a 1


c) c) Access Position d) d) Accessing Port
Which among the following is the least strong security encryption
standard?

2 a a 1
a) a) WEP b) b) WPA
c) c) WPA2 d) d) WPA3
The minimum spectrum allocation required for W-CDMA is

3 a) a. 5MHz b) b. 2MHz a a 1
c) c. 500KHz d) d. 100KHz
___________________ began to show up few years back on
wireless access points as a new way of adding or connecting new
4 devices.
c c 1
a) a) WPA2 b) b) WPA
c) c) WPS d) d) WEP
______________ is the central node of 802.11 wireless
operations.

5 b b 1
a) a) WPA b) b) Access Point
c) c) WAP d) d) Access Port
2G CDMA standard – cdma one supports up to

6 a) a. 8 users b) b. 64 users b b 1
c) c. 32 users d) d. 116 users
____________________ is the anticipation of unauthorized access
or break to computers or data by means of wireless networks.

7 b b 1
a) a) Wireless access b) b) Wireless security
c) c) Wired Security d) d) Wired device apps
Which location management feature is supported by 4G?

a) Concatenated Location
b) Concurrent Location Register
8 Registration a a 1
d) Collated Location
c) Concatenated Management
Registration
WPS stands for __________________

9 a) a) WiFi Protected System b) b) WiFi Protected Setup b b 1


c) c) WiFi Protocol Setup d) d) Wireless Protected Setup
What is the average uploading speed of 4G LTE network?

10 a) 1-3 Gbps b)  2-5 Gbps d d 1


c) 1-3 Mbps d)  2-5 Mbps
What is the term used by ITU for a set of global standards of 3G
systems?

11 a a 1
a) a) IMT 2000 b) b) GSM
c) c) CDMA d) d) EDGE

https://mycollege.vpt.edu.in/student/end_practice_exam_new.php 1/2
7/9/2021 Vidyalankar Polytechnic | VP

Sr. Your Correct


Question Marks
No Answer Answer
What does LTE stands for?

12 a) A) Level Telecom Advanced b) B) Long Terminal Advanced c c 1


c) C) Long Term Evolution d) D) Long Time Evolution
CDMA uses

13 a) a) Hard hand off b) b) Soft hand off b b 1


c) c) Hard & Soft hand off d) d) None of the mentioned
This is a specification for a set of communication protocols to
standardize the way that wireless devices can be used for Internet
14 access.
a a 1
a) WAP b) WAX
c) VSAT d) TETRA
UMTS uses which multiple access technique?

15 a) CDMA b) TDMA a a 1
c) FDMA d) SDMA
W-CDMA requires a complete change of RF equipment at each
base station.

16 a a 1
a) a) True b) b) False
c) d)
_________________ is alike as that of Access Point (AP) from
802.11, & the mobile operators uses it for offering signal
17 coverage.
c c 1
a) a) Base Signal Station b) b) Base Transmitter Station
c) c) Base Transceiver Station d) d) Transceiver Station
Which of the following leads to evolution of 3G networks in
CDMA systems?

18 d d 1
a) a) IS-95 b) b) IS-95B
c) c) CdmaOne d) d) Cdma2000
US digital cellular system based on CDMA was standardized as
________
19 c c 1
a) a) IS-54 b) b) IS-136
c) c) IS-95 d) d) IS-76
UMTS does not has backward compatibility with ____

20 a) a) GSM b) b) IS-136 c c 1
c) c) IS-95 d) d) GPRS

Total Marks : 20

Obtained : 20

Student Signature _____________________________

https://mycollege.vpt.edu.in/student/end_practice_exam_new.php 2/2
MCQ’S
COMPUTER + IT BRANCH
I – SCHEME
( 6TH SEMESTER )
WIRELESS & MOBILE NETWORK
By Prof KIRTI KARANDE
Q. 1 Who sets the standards of GSM?

A) ITU
B) AT & T
C) ETSI
D) USDC
Q. 2.F interface is used inbetween ………& ………?

A.MSC & EIR


B.MSC & ME
C.VLR & HLR
D.MSC & VLR
Q. 3. Which interface is used to transfer short
messages in GSM?

A. F Interface
B. G Interface
C. H Interface
D. I Interface
Q. 4. Which of the following protocol is used in D
interface?

A. MAP / D
B. BTS
C. MAP / C
D. VLR
Q. 5. What type of bandwidth is allocated in
cellular communication?
A. Broad bandwidth
B. Narrow bandwidth
C. Both type of bandwidth
D. Short bandwidth
Q. 6. What is downlink range of GSM 900?

A. 935 MHz to 975 MHz


B. 890 MHz to 960 MHz
C. 890 MHz to 915 MHz
D. 935MHz to 960 MHz
Q.7. Which GSM is listed for the uplink range of 890
MHz to 915 MHz

A.EGSM 900
B. GSM 1800
C. GSM 900
D. PCS 1900
Q.8. Each Carrier in GSM is divided into how many
time slots?

A. 8
B. 6
C. 4
D. 2
Q. 9. Specification of bit period in GSM is :……….

A. 3.692ms
B. 4.69 ms
C. 3.596ms
D. 4.615ms
Q. 10. GSM provides integrated services for……
A. Voice
B. Data
C. Voice & data
D. video
Q. 11 Multiparty also refers as…...

A. Teleconferencing
B. Videoconferencing
C. Messaging
D. Cross connection
Q. 12 What is length for short messaging service?

A. 160-7 ASCII character


B. 180 – 9 ASCII character
C. 165- 8 ASCII character
D. 190-5 ASCII character
Q. 13. Which of the following is not belonging to GSM
channel types ?

A. TCH
B. CCH
C. MCH
D. DCCH
Q. 14. Which of the following is not related with
message in GSM?

A. Application message header


B. Optical variable parameter
C. Mandatory fixed parameter
D. Optical fixed parameter
Q.15. System access step is type of

A. Calling process
B. Message process
C. Mobile call origination
D. Network process
Q.16. If the call is allowed ,……

A. The BSS routes the call to GMSC


B. The MSC routes the call to GMSC
C. The GMSC routes the call to MSC
D. The GMSC routes the call to BSS
Q. 17. In Mobile call termination, the HLR passes…

A. the MSRN to theHLR


B. the HLR to the GMSC
C. the MSRN to the GMSC
D. The HLR to the MSRN
Q. 18. Which of the following network allows mobile
phone to work?

A. BTS network
B. UMTS network
C. MTS network
D. MSRN network
Q.19. For GSM , a base station is called……?

A. BTS
B. UMTS
C. Node B
D. LAC
Q.20. TMSI stands for

A. Temporary Mobility Subscriber Identity


B. Telephony Mobilily Subscriber Identity
C. Telephony Mobile Subscriber Identity
D. Temporary Mobile Subscriber Identity
Q. 21. Odd man out?

A. Routing area
B. Location area
C. Tracing area
D. Tracking area
Q.22. Which of the following are aspects of mobility
in PCS network?
A. Roaming & handoff
B. message & data
C. Roaming & messages
D. Handoff & data
Q. 23. Which of the following is not strategy have been
proposed to detect the need of handoff ?

A. MCHO
B. NCHO
C. MAHO
D. NAHO
Q.24. VLR stand for…?

A. Visitor Location Register


B. Video Location Register
C. Visitor Live Register
D. Visitor Location Router
MCQ’S
COMPUTER + IT BRANCH
I – SCHEME
( 6TH SEMESTER )
WIRELESS & MOBILE NETWORK
By Prof KIRTI KARANDE
Q. 1 First access point to external data network in
GPRS is :……?

A) GGSN
B) PDU
C) SGSN
D)MGSN
Q. 2. SGSN is used for?

A. Accessing data at first point


B.Establises mobile management
C. Keep record of active mobile
D. Create networking between GPRS & other external
devices
Q. 3. who is responsible for authentication of GPRS in
mobile?

A. MIS
B. PDU
C. SGSN
D. GGSN
Q. 4. The main task of mobility management is-

A. Keep record of accessing with other devices


B. Keep record of authentication
C. keep users all records of every activity
D. To keep the track of user’s current location
Q. 5. in the state model of GPRS mobile station,
which of the following is not state?
A. Idle
B. Ready
C. Standby
D. running
Q. 6. RAI stands for….

A. Routing area identity


B. Routing area interface
C. Rural area identity
D. Rural area interface
Q.7. How many cases are possible in in routing area
update?
A. 1
B. 2
C. 3
D. 4
Q.8. Which of the following is not routing schemes?

A. Mobile oriented message


B. n/w initiated message
C. Mobility management
D. Enter in active state
Q. 9. PSPDN stands for…

A. Packed switched public data network


B. Packed switching public data network
C. Packed switched private data network
D. Pack switched public data network
Q. 10. out of which of the following is used for
broadcast control?
A. PDTCH
B. PBCCH
C. PNCH
D. PTCCH
Q. 11 PCCCH group does not perfom …..

A. Random access
B. Paging
C. Notification
D. Data traffic
Q. 12 dedicated control channel contains

A. PNCH & PCCCH


B. PTCCH & PACCH
C. PCCCH & PTCCH
D. PNCH & PTCCH
Q. 13.which of the following is used instead of
PCCCII to initiate packet transfer?
A. CCCH
B. CCCII
C. PTCCH
D. BCCH
Q. 14. standard for wifi5

A. IEEE 802.11
B. IEEE 802.11a
C. IEEE 802.11g
D. IEEE 802.11b
Q.15. physical layer of OSI model of WLAN provides
how many layer of functionality?

A. One
B. Two
C. Three
D. Four
Q.16. What is used for performing Spreading in
physical layer?
A. 11-bit baker code
B. 8- bit baker code
C. 20-bit baker code
D. 16- bit baker code
Q. 17. OFDM stands for..
A. Orthogona frequency division multiplier
B. Oriental frequency division multiplexing
C. Original frequency division multiplexing
D. Orthogonal frequency division multiplexing
Q. 18. data link layer is divided into
A. LLC & MAC
B. LLC & CSMA
C. CSMA & MAC
D. MSDU & MAC
Q.19. MIMO divides

A. Spatial streams into a bit streams


B. Bit streams into spatial streams
C. Only spatial dtreams
D. Only bit streams
Q.20. SDM stands for

A. Space division multiplexing


B. Size division multiplexing
C. Space division multiplier
D. Size division multiplier
Q. 21. beam forming & diversity are two
technique supported by ….?

A. 802.11a
B. 802.11b
C. 802.11n
D. 802.11g
Q.22. Which of the following IEEE 802.11
specification has maximum data rate?
A. 802.11a
B. 802.11b
C. 802.11n
D. 802.11g
Q. 23. modulation done in 802.11a is done by……?

A. OFDM
B. DSSS
C. CCK
D. FHSS
Q.24. in RFID, data is stored on & retrieved with
A. RFID tags
B. RFID number
C. RFID Antenna
D. RFID data
Q.25. RFID id also known as………
A. DSRP
B. DSRC
C. FHSS
D. DSSS
Q.26. Which component is used to detect the
reader’s activation signal ?

A. Tags
B. Transponder
C. Interrogator
D. Reader
Q.27. Bluetooth technology standards is based
on…….

A. 802.15.1
B. 802.15.2
C. 802.15.3
D. 802.15.4
Q.28. which of the following device in piconet
is time synchronized ?

A. Master unit
B. Parked units
C. Slave units
D. sctternet
Q.29. Bluetooth packet consists of ?

A. 72 bit access code


B. 36 bit access code
C. 16 bit access code
D. 8 bit access code
Q.30. Header part of the Bluetooth packet is
used by..?

A. Link control
B. AM ADDR
C. MAC
D. ACO
Q.31. which of the following is not component of
mobile IP?

A. Node
B. Home agent
C. Foreign agent
D. IP datagram
MCQ’S- session 3
COMPUTER + IT BRANCH
I – SCHEME
( 6TH SEMESTER )
WIRELESS & MOBILE NETWORK
(chapters 3 & 4)
By Prof KIRTI KARANDE
Q. 1 WML is the application of….

A) XML
B) HTML
C) CSS
D)JAVA
Q. 2. FPLMTS is used for?

A. Future Private Land Mobile telecommunication


System
B. Future Private Land Mobile telecommunication Source
C. Future Public Land Mobile telecommunication System
D. Future Public Land Mobile telecommunication Source
Q. 3. which of the following technology is used to
provide efficient wireless access to the internet?

A. Web proxy
B. Http
C. TCP /IP
D. UDP
Q. 4. which of the following is internet protocol stack
which translate request from WAP protocol stack?
A. TCP/IP & UDP
B. HTTP & TCP/IP
C. TCP/IP & TELNET
D. HTTP & UDP
Q. 5. Nokia’s WAP gateways are developed in

A. Unix & windows NT


B. Windows NT only
C. Unix Only
D. Linux & Unix
Q. 6. which of the following layers can be
accessed by external applications directly?

A. Session
B. Transaction
C. Transport
D. Network
Q.7. WDP provides application addressing by

A. Port numbers
B. WTLS
C. WSP
D. USSD
Q.8. Which of the following is not functionality
of WAP proxy ?

A. WAP proxy
B. Protocol gateway
C. Content encoders & decoders
D. transport protocol
Q. 9. DS-WCDMA stands for?

A. Direct – Serial code division multiple access


B. Direct – Sequence code division multiple access
C. Direct – Sequence code division multiple authority
D. Direct – Sequence code duplication multiple access
Q. 10. IMT – 2000 framework includes
A. 2 3G standrads
B. 3 3G standards
C. 4 3G standards
D. 5 3G standards
Q. 11 WCDMA features -

A. FDD & TDD


B. FDMA & TDMA
C. FDA & TDA
D. ONLY TDD
Q. 12 which of the following is not standard of CDMA
2000?
A. CDMA 2000 1xRTT
B. CDMA 2000 1xEV
C. CDMA 2000 EV- DV
D. CDMA 2000 1xET
Q. 13.the 3G evolution of GSM is also called

A. UMTS
B. WCDMA
C. CDMA 2000
D. CDMA 2000 3x
Q. 14. which of the following is component of CDMA
2000?

A. PSTN
B. BSS
C. Packet core interface node
D. UDP
Q.15. is there need of synchronized base station in
WCDMA?
A. Yes
B. No
C. Maybe
D. None
Q.16. the bandwidth require in UMTS is :

A. 5 MHz
B. 1.25 MHz
C. 4.5 MHz
D. A & B
Q. 17. In UMTS network , Radio access Network is
also as?
A. UTRAN
B. RNC
C. NODE B
D. RANSs
Q. 18. In UMTS network , node b is responsible for ?

A. Provide function equivalent to base station


B. For air interfacing
C. Control radio sources
D. none
Q.19. How many UMTS interfaces are in there in architechture

A. 2
B. 4
C. 6
D. 8
Q.20. 4G is

A. High speed data rate plus voice system


B. High speed data rate only
C. High speed voice system only
D. High speed data rate over voice system
Q. 21. VoLTE stands for?

A. Voice over load term evolution


B. Voice over long term evolution
C. Video over load term evolution
D. Video over load term evolution
Q.22. which of the following is used to provide the
ability to handle cellular voice calls over LTE?

A. 3G
B. 4G
C. VoLTE
D. VoIP
Q.23. which of the following technology is not used in
4G?
A. MIMO
B. VoIP
C. VoLTE
D. SDR
Q. 24. which of the following is not a component of
4G - LTE
A. UE
B. EPC
C. E-UTRAN
D. VoLTE
Q.25. UICC stands for
A. Universal integrated circuit card
B. Unique integrated circuit card
C. Universal integral circuit card
D. Unique integral circuit card
Q.26. who is responsible to handle the radio
communication between the mobile & evolved packet
core ?
A. UTRN
B. E-UTRN
C. UICC
D. UE
Q.27. which of the following is not a
component of EPC architecture?

A. HSS
B. PDN
C. S-GW
D. USIM
Q.28. WLL is also known as

A. FWA
B. TWA
C. FSS
D. FPA
Q.29. WANU stands for…..

A. Wireless Authorized Network Unit


B. Wireless Access Network Unit
C. Wireless Access Node Unit
D. Wireless Accessed Network Unit
Q.30. Which of the following is not part of
WANU?

A. BTS
B. RPCU
C. HLR
D. PSDN
Q.31. In wireless Local loop , AM/HLR
handles

A. Authentication
B. Privacy
C. Intigrity
D. A & B
Q.32. which of the following algorithm is
used in digital switch of AM ?

A. ISDN Algo
B. PSDN algo
C. A & C
D. Works digitally , no algo is required
Q.33. which of the following is not major part
of technology in WLL?

A. Satellite Based tech


B. Cellular based tech
C. Fixed wireless access system
D. Fiber optics wireless system
Q.34. which of the following system is used to
provide telephony services for rural communities &
isolated areas?

A. Satellite Based tech


B. Cellular based tech
C. Fixed wireless access system
D. Microcellular based system
Q.35. which of the following system is used to
expand telephony services?

A. Satellite Based tech


B. Cellular based tech
C. Fixed wireless access system
D. Microcellular based system
Q.36. which of the following system is used to
facilitate rapid market entry & to expand capacity of
existing infra?

A. Satellite Based tech


B. Cellular based tech
C. Fixed wireless access system
D. Microcellular based system
Q.37. FWT & WT with mobility are types of ?

A. WLL
B. WASU
C. SF
D. WANU
Q.38. which of the following system is used to
connect short distance subscriber by radio?

A. FWT
B. WT with mobility
C. A & B
D. Cellular connectiivity
Q.39. the process of converting binary data to a
suitable format for transmission through channel is
known as ?
A. Line coding
B. LEC
C. LATA
D. NRZ
Q.40. which of the following Is not property
of line code?

A. DC component
B. Error control
C. Bandwidth compression
D. Maximum Crosstalk
Q.41. clock recovery of unipolar NRZ is

A. Poor
B. Good
C. There is no clock recovery
D. None of these
Q.42. which of the following guideline is in which
one is presented by 10 & zero is represented by 01?

A. Biploar level
B. Biphase mark
C. Biphase space
D. Dicode NRZ
Q.43. which of the following is carrier in ASK?

A. Sine wave of frequency


B. Cosine wave of frequency
C. Tan wave of frequency
D. No carrier is required in ASK
Q.44. BPSK stands for..

A. Bipolar Phase Shift Keying


B. Binary Phase Shift Keying
C. Biphase Phase Shift Keying
D. Bidirectional Phase Shift Keying
Q.45. which of the following is not operaton
related in the conversion of analog to digital?

A. Sampling
B. Quantization
C. Encoding
D. Decoding
Q.46.Due to channel noise, …….. ?

A. Symbol 0 appears as 1
B. Symbol 1 appears as 0
C. Ther is no effect
D. A & B
Q.47.Slope over load distortion is the
limitation of ?

A. DM
B. DPCM
C. PCM
D. ENCODING
Q.48. out of which of the following have less
number of quantization levels?

A. DM
B. DPCM
C. PCM
D. ENCODING
Q.49. DSSS stands for …….

A. Direct sequence spread spectra


B. Double sequence spread spectrum
C. Direct sequence spread spectrum
D. Direct serial spread spectrum
Q.50. which of the following is used to
provide security against jamming?

A. DSSS
B. PSK
C. DM
D. DPCM
Q.51. which of the following is used to combine
spread spectrum modulation with MFSK?

A. DSSS
B. FHSS
C. FSK
D. DM
Q.52. which of the following modulation
technique is used in FHSS?

A. BPSK
B. M-ary FSK
C. FSK
D. No modulation technique is used
Q.53. processing gain in DSSS is……?

A. Less
B. Higher
C. Zero
D. invalid
Q.54. chip rate in DSSS is……?

A. TC
B. 1/TC
C. Max(Rh,Rs)
D. Min(Rh,Rs)
MSBTE
Wireless Mobile Network MCQ Book

BY
Apni University
India’s No.1 Digital Book Compay
Preface

The importance of Wireless Mobile Network is well known in various engineering


fields. Overwhelming response to our last year exam sutra series inspired us to create
this book. This book is structure to cover the key aspects of the subject WMN.

All the questions in the book are very important for the upcoming MSBTE summer
2020 exam. All care has beentaken tomake students comfortable in understanding the
basic concepts of the subject.

The most important part of this kit is, we are not only providing the books but the
exams too at three different levels (basic, intermediate & advanced). The students
only need to study the book and co-operate us till exam.

We wish to express our profound thanks to all those who helped in making this
book realty. Much needed moral support and encouragement is provided on
numerous occasions by our whole family. We wish to thank the entire team of Apni
University who has taken immense pain to get this book in time with this quality.

Any suggestion for the improvement of the books will be acknowledged and well
appreciated.
Question

Which of the following is the world’s first cellular system to specify digital

modulation and network level architecture?

a) GSM

b) AMPS

c) CDMA

d) IS-54

Question

Previously in 1980s, GSM stands for ____________

a) Global system for mobile

b) Groupe special mobile

c) Global special mobile

d) Groupe system mobile

Question

Who sets the standards of GSM?

a) ITU
b) AT & T

c) ETSI

d) USDC

Question

Which of the following does not come under the teleservices of GSM?

a) Standard mobile telephony

b) Mobile originated traffic

c) Base originated traffic

d) Packet switched traffic

Question

Which of the following comes under supplementary ISDN services?

a) Emergency calling

b) Packet switched protocols

c) Call diversion

d) Standard mobile telephony


Question

Which of the following memory device stores information such as subscriber’s

identification number in GSM?

a) Register

b) Flip flop

c) SIM

d) SMS

Question

Which of the following feature makes impossible to eavesdrop on GSM radio

transmission?

a) SIM

b) On the air privacy

c) SMS

d) Packet switched traffic

Question
Which of the following does not come under subsystem of GSM architecture?

a) BSS

b) NSS

c) OSS

d) Channel

Question

Which of the following subsystem provides radio transmission between mobile

station and MSC?

a) BSS

b) NSS

c) OSS

d) BSC

Question

___________ manages the switching function in GSM.

a) BSS

b) NSS

c) OSS

d) MSC
Question

__________ supports the operation and maintenance of GSM.

a) BSS

b) NSS

c) OSS

d) MSC

Question

__________ carries digitally encoded user data.

a) Traffic channels

b) Control channels

c) Signalling channels

d) Forward channels

Question

____________ carries signalling and synchronizing commands.

a) Traffic channels

b) Control channels
c) Signalling channels

d) Forward channels

Question

Which of the following is not a control channel of GSM?

a) BCH

b) CCCH

c) DCCH

d) TCH

Question

Which of the following is the forward control channel that is used to broadcast

information?

a) BCCH

b) CCCH

c) DCCH

d) TCH
Question

Which of the following channel does not come under CCCH?

a) PCH

b) RACH

c) DCCH

d) AGCH

Question

Which of the following channel provides paging signals from base station to all

mobiles in the cell?

a) RACH

b) AGCH

c) DCCH

d) PCH

Question
___________ is a reverse link channel used by a subscriber unit to acknowledge.

a) RACH

b) AGCH

c) DCCH

d) PCH

Question

Which of the following channel is used by base station to provide forward link

communication to mobile?

a) RACH

b) AGCH

c) DCCH

d) PCH

Question

Which of the following burst is used to broadcast the frequency and time

synchronization control messages?

a) FCCH and SCH

b) TCH and DCCH


c) RACH and TCH

d) FCCH and DCCH

Question

Which of the following burst is used to access service from any base station?

a) TCH

b) RACH

c) SCH

d) FCCH

Question

Group of superframes in GSM is called multiframe.

a) True

b) False

Question

PCS/PCN provides only wired communication.

a) True

b) False
Question

Concept of PCS/PCN is based on _________

a) Advanced intelligent network

b) Artificial intelligent network

c) CDPD

d) SS7

Question

AIN has different telephone numbers for both wireline and wireless services.

a) True

b) False

Question

Circuit switching has more advantage than packet switching for PCS.

a) True

b) False

Question
______ is used for transmission of packets in the cellular switched architecture.

a) Packet switching techniques

b) Circuit switching techniques

c) Packet and circuit switched technique

d) Datagram technique

Question

Which of the following has the function to accept information from PSTN?

a) TIU

b) WIU

c) BIU

d) CIU

Question

PTI is the address of ____________

a) TIU

b) WIU

c) BIU

d) CIU
Question

_______ is the information contained in the packet header of TIU.

a) PTI

b) VCI

c) PRMA

d) CDPD

Question

Transmission protocol, PRMA stands for _________

a) Pocket reservation multiple access

b) Packet register multiple access

c) Pocket register multiple access

d) Packet reservation multiple access

Question

UMTS stands for ____________

a) Universal mobile telecommunication system

b) Universal mobile telephone system


c) United multiplex telecommunication system

d) Universal mobile telecommunication system

Question

In a wireless communication, base station is connected to central hub called

_______

a) PSTN

b) MSC

c) CO

d) PBX

Question

PSTN stands for ________

a) Public switched telephone network

b) Personal switched telephone network

c) Personal switched telephone node

d) Public switched telephone node


Question

MSCs provide connectivity between PSTN and the base stations.

a) True

b) False

Question

Communication protocol, CAI stands for ___________

a) Common air interchange

b) Control air interchange

c) Common air interface

d) Control air interchange

Question

At the base station, the air interface portion of mobile transmission is passed to

MSC.

a) True

b) False
Question

PSTN is ___________ and wireless networks are ________

a) Highly dynamic, virtually static

b) Static, virtually static

c) Highly dynamic, virtually dynamic

d) Virtually static, highly dynamic

Question

In public switched telephone network, LATA stands for ______

a) Local access and transport area

b) Land area and transport area

c) Local access and telephone access

d) Local area and telephone access

Question

LATAs are connected by a company called _________

a) Land exchange carrier

b) Local exchange carrier


c) Local control exchange

d) Land area exchange

Question

A long distance telephone company that collects toll is called _________

a) LATA

b) LEC

c) PSTN

d) IXC

Question

Wireless networks are extremely hostile and random nature of radio channel.

a) True

b) False

Question

Which type of cell provides the best level of service for average subscribers?

a) Acceptance cell

b) Barred cell
c) Reserved cell

d) Suitable cell

Question

With the normal cyclic prefix, how many symbols are contained in 1 frame?

a) 7

b) 140

c) 12

d) 40

Question

What is the PBCH scrambled with?

a) Current frame number

b) Physical cell ID

c) UE’s CRNTI

d) Not scrambled
Question

What is the length of the shortest possible PDCCH in bits?

a) 144

b) 288

c) 72

d) 576

Question

What is the average uploading speed of 4G LTE network?

a) 1-3 Gbps

b) 2-5 Gbps

c) 1-3 Mbps

d) 2-5 Mbps
Question

Which of the following is not a part of the characteristic of 4G network?

a) Multirate management

b) Fully converged services

c) Software dependency

d) Diverse user devices

Question

What does SGSN stands for?

a) Serial Gateway Supporting Node

b) Supporting GGSN Support Node

c) Supporting GPRS Support Node

d) Supporting Gateway Support Node

Question

What location management feature is supported by 4G?

a) Concatenated Location Registration

b) Concurrent Location Register


c) Concatenated Management

d) Collated Location Registration

Question

In 2007 ____________ announced its plan to transmit its network to 4G standard

LTE with joint efforts of Vodafone group.

a) Verizon Wireless

b) AirTouch

c) Netflix

d) V Cast

Question

Hybrid ARQ is part of the ____________ layer.

a) PDCP

b) RLC

c) MAC

d) PHY

Question
What is the full form of WLAN?

a) Wide Local Area Network

b) Wireless Local Area Network

c) Wireless Land Access Network

d) Wireless Local Area Node

Question

WLANs use high power levels and generally require a license for spectrum use.

a) True

b) False

Question

What is the name of 300 MHz of unlicensed spectrum allocated by FCC in ISM

band?

a) UNII

b) Unlicensed PCS

c) Millimetre wave

d) Bluetooth
Question

Which of the following specifies a set of media access control (MAC) and physical

layer specifications for implementing WLANs?

a) IEEE 802.16

b) IEEE 802.3

c) IEEE 802.11

d) IEEE 802.15

Question

Which of the following is not a standard of WLAN?

a) HIPER-LAN

b) HIPERLAN/2

c) IEEE 802.11b

d) AMPS

Question

Which of the following is the 802.11 High Rate Standard?

a) IEEE 802.15
b) IEEE 802.15.4

c) IEEE 802.11g

d) IEEE 802.11b

Question

Which of the following spread spectrum techniques were used in the original IEEE

802.11 standard?

a) FHSS and DSSS

b) THSS and FHSS

c) THSS and DSSS

d) Hybrid technique

Question

Which of the following WLAN standard has been named Wi-Fi?

a) IEEE 802.6

b) IEEE 802.15.4

c) DSSS IEEE 802.11b

d) IEEE 802.11g
Question

Which of the following is developing CCK-OFDM?

a) IEEE 802.11a

b) IEEE 802.11b

c) IEEE 802.15.4

d) IEEE 802.11g

Question

What is the data rate of HomeRF 2.0?

a) 10 Mbps

b) 54 Mbps

c) 200 Mbps

d) 1 Mbps

Question

HIPER-LAN stands for ____________

a) High Precision Radio Local Area Network

b) High Performance Radio Local Area Network


c) High Precision Radio Land Area Network

d) Huge Performance Radio Link Access Node

Question

What is the range of asynchronous user data rates provided by HIPER-LAN?

a) 1-100 Mbps

b) 50-100 Mbps

c) 1-20 Mbps

d) 500 Mbps to 1 Gbps

Question

What is the name of the European WLAN standard that provides user data rate

upto 54 Mbps?

a) UNII

b) WISP

c) MMAC

d) HIPERLAN/2

Question
What is WISP?

a) Wideband Internet Service Protocol

b) Wireless Internet Service Provider

c) Wireless Instantaneous Source Provider

d) Wideband Internet Source Protocol

Question

The price of WLAN hardware is more than 3G telephones and fixed wireless

equipment.

a) True

b) False

Question

Which of the following is not an open standard?

a) Bluetooth

b) WWW

c) HTML

d) VPN
Question

What is the nominal range of Bluetooth?

a) 1 Km

b) 10 m

c) 1 m

d) 10 Km

Question

Bluetooth standard is named after ___________

a) King Ronaldo Bluetooth

b) Pope Vincent Bluetooth

c) King Herald Bluetooth

d) Pope Francis Bluetooth

Question

Bluetooth operates in which band?

a) Ka Band

b) L Band
c) Ku Band

d) 2.4 GHz ISM Band

Question

Which of the following scheme is used by Bluetooth?

a) Frequency hopping TDD scheme

b) Frequency hopping FDD scheme

c) DSSS TDD scheme

d) DSSS FDD scheme

Question

What is the range of time slot in Bluetooth?

a) 120 milliseconds

b) 625 microseconds

c) 577 microseconds

d) 5.7 seconds

Question
Which modulation scheme is used by Bluetooth?

a) DQPSK

b) MSK

c) GFSK

d) BPSK

Question

What is the channel symbol rate in Bluetooth for each user?

a) 270.833 Kbps

b) 1 Gbps

c) 100 Mbps

d) 1 Mbps

Question

What is the raw channel bit error rate of Bluetooth?

a) 10-3

b) 10-10

c) 103

d) 10-1
Question

Which of the following standard committee specifies Bluetooth and other Personal

Area Networks (PAN)?

a) IEEE 802.11b

b) IEEE 802.15

c) IEEE 802.11g

d) IEEE 802.16

Question

What is the access point (AP) in a wireless LAN?

a) device that allows wireless devices to connect to a wired network

b) wireless devices itself

c) both device that allows wireless devices to connect to a wired network and

wireless devices itself

d) all the nodes in the network

Question

In wireless ad-hoc network _________

a) access point is not required


b) access point is must

c) nodes are not required

d) all nodes are access points

Question

Which multiple access technique is used by IEEE 802.11 standard for wireless

LAN?

a) CDMA

b) CSMA/CA

c) ALOHA

d) CSMA/CD

Question

In wireless distribution system __________

a) multiple access point are inter-connected with each other

b) there is no access point

c) only one access point exists

d) access points are not required


Question

A wireless network interface controller can work in _______

a) infrastructure mode

b) ad-hoc mode

c) both infrastructure mode and ad-hoc mode

d) WDS mode

Question

In wireless network an extended service set is a set of ________

a) connected basic service sets

b) all stations

c) all access points

d) connected access points

Question

Mostly ________ is used in wireless LAN.

a) time division multiplexing

b) orthogonal frequency division multiplexing


c) space division multiplexing

d) channel division multiplexing

Question

Which one of the following event is not possible in wireless LAN?

a) collision detection

b) acknowledgement of data frames

c) multi-mode data transmission

d) connection to wired networks

Question

What is Wired Equivalent Privacy (WEP)?

a) security algorithm for ethernet

b) security algorithm for wireless networks

c) security algorithm for usb communication

d) security algorithm for emails

Question
What is WPA?

a) wi-fi protected access

b) wired protected access

c) wired process access

d) wi-fi process access

Question

Which of the following is not a characteristic of 3G network?

a) Communication over VoIP

b) Unparalleled network capacity

c) Multi-megabit Internet access

d) LTE based network

Question

What is the term used by ITU for a set of global standards of 3G systems?

a) IMT 2000

b) GSM

c) CDMA

d) EDGE
Question

Which of the following leads to evolution of 3G networks in CDMA systems?

a) IS-95

b) IS-95B

c) CdmaOne

d) Cdma2000

Question

Which of the following leads to the 3G evolution of GSM, IS-136 and PDC

systems?

a) W-CDMA

b) GPRS

c) EDGE

d) HSCSD

Question

What is 3GPP?

a) Project based on W-CDMA

b) Project based on cdma2000


c) Project based on 2G standards

d) Project based on 2.5G standards

Question

What is 3GPP2?

a) Project based on W-CDMA

b) Project based on cdma2000

c) Project based on 2G standards

d) Project based on 2.5G standards

Question

Which of the following is not a standard of 3G?

a) UMTS

b) Cdma2000

c) TD-SCDMA

d) LTE
Question

Which of the following 3G standard is used in Japan?

a) Cdma2000

b) TD-SCDMA

c) UMTS

d) UTRA

Question

What does the number 2000 in IMT-2000 signifies?

a) Year

b) Number of subscribers per cell

c) Number of cells

d) Area (Km)

Question

Which of the following is not an application of third generation network?

a) Global Positioning System (GPS)

b) Video conferencing
c) Mobile TV

d) Downloading rate upto 1 Gbps

Question

What is the full form of UMTS?

a) Universal Mobile Telephone System

b) Ubiquitous Mobile Telephone System

c) Ubiquitous Mobile Telemetry System

d) Universal Machine Telemedicine System

Question

UMTS use which multiple access technique?

a) CDMA

b) TDMA

c) FDMA

d) SDMA
Question

UMTS does not has backward compatibility with ____________

a) GSM

b) IS-136

c) IS-95

d) GPRS

Question

UMTS is also known as _____________

a) IS-95

b) GPRS

c) CdmaOne

d) W-CDMA

Question

What is the chip rate of W-CDMA?

a) 1.2288 Mcps

b) 3.84 Mcps
c) 270.833 Ksps

d) 100 Mcps

Question

W-CDMA works in FDD mode only.

a) True

b) False

Question

How much packet data rate per user is supported by W-CDMA if the user is

stationary?

a) 2.048 Kbps

b) 100 Mbps

c) 2.048 Mbps

d) 1 Gbps

Question

What is the minimum spectrum allocation required by W-CDMA?

a) 5 MHz
b) 20MHz

c) 1.25 MHz

d) 200 KHz

Question

W-CDMA requires a complete change of RF equipment at each base station.

a) True

b) False

Question

How much increase in spectral efficiency is provided by W-CDMA in comparison

to GSM?

a) Two times

b) Three times

c) No increase

d) Six times

Question
Several protocols for upper layers in bluetooth use _________

a) UDP

b) HSP

c) ITC

d) L2CAP

Question

Protocols are set of rules to govern _________

a) Communication

b) Standard

c) Metropolitan communication

d) Bandwidth

Question

An internet is a __________

a) Collection of WANS

b) Network of networks

c) Collection of LANS

d) Collection of identical LANS and WANS


Question

Checksum is used in Internet by several protocols although not at the _________

a) Session layer

b) Transport layer

c) Network layer

d) Data link layer

Question

In version field of IPv4 header, when machine is using some other version of IPv4

then datagram is __________

a) Discarded

b) Accepted

c) Interpreted

d) Interpreted incorrectly

Question

Network layer at source is responsible for creating a packet from data coming from

another ________

a) Station
b) Link

c) Node

d) Protocol

Question

Header of datagram in IPv4 has _________

a) 0 to 20 bytes

b) 20 to 40 bytes

c) 20 to 60 bytes

d) 20 to 80 bytes

Question

In IPv4 layer, datagram is of ________

a) Fixed length

b) Variable length

c) Global length

d) Zero length
Question

In IPv4, service type of service in header field, first 3 bits are called ______

a) Type of service

b) Code bits

c) Sync bits

d) Precedence bits

Question

Which is a link layer protocol?

a) ARP

b) TCP

c) UDP

d) HTTP

Question

Which protocol is commonly used to retrieve email from a mail server?

a) FTP

b) IMAP
c) HTML

d) TELNET

Question

The signals which are obtained by encoding each quantized signal into a digital

word is called as

a) PAM signal

b) PCM signal

c) FM signal

d) Sampling and quantization

Question

The length of the code-word obtained by encoding quantized sample is equal to

a) l=log(to the base 2)L

b) l=log(to the base 10)L

c) l=2log(to the base 2)L

d) l=log(to the base 2)L/2


Question

Quantization noise can be reduced by ________ the number of levels.

a) Decreasing

b) Increasing

c) Doubling

d) Squaring

Question

In PCM encoding, quantization level varies as a function of ________

a) Frequency

b) Amplitude

c) Square of frequency

d) Square of amplitude

Question

What is bit depth?

a) Number of quantization level

b) Interval between two quantization levels


c) Number of possible digital values to represent each sample

d) None of the mentioned

Question

Choosing a discrete value that is near but not exactly at the analog signal level

leads to

a) PCM error

b) Quantization error

c) PAM error

d) Sampling error

Question

Which of the following multiple access techniques are used by second generation

cellular systems?

a) FDMA/FDD and TDMA/FDD

b) TDMA/FDD and CDMA/FDD

c) FDMA/FDD and CDMA/FDD

d) FDMA/FDD only
Question

Which one is not a TDMA standard of second generation networks?

a) GSM

b) IS-136

c) AMPS

d) PDC

Question

Which of the following is a CDMA standard of second generation network?

a) IS-95

b) IS-136

c) ETACS

d) EDGE

Question

Popular 2G CDMA standard IS-95 is also known as ______________

a) CdmaOne

b) CdmaTwo
c) IS-136

d) IS-95B

Question

How many users or voice channels are supported for each 200 KHz channel in

GSM?

a) Eight

b) Three

c) Sixty four

d) Twelve

Question

How many voice channels are supported for each 30 KHz radio channel in IS-136?

a) Eight

b) Thirty

c) Three

d) Sixteen

Question
How many users are supported in IS-95 for each 1.25 MHz?

a) Eight

b) Sixty four

c) Sixteen

d) Twenty five

Question

Which modulation technique is used by GSM?

a) GMSK

b) BPSK

c) QPSK

d) GFSK

Question

IS-95 uses which modulation technique?

a) GMSK

b) BPSK

c) QAM

d) AFSK
Question

IS-136 uses which modulation technique?

a) π/4 DQPSK

b) BPSK

c) GMSK

d) AFSK

Question

Which is one of the disadvantages of 2G standards?

a) Short Messaging Service (SMS)

b) Digital modulation

c) Limited capacity

d) Limited Internet Browsing

Question

GSM (Global System for Mobile) was earlier also known as _____________

a) Group System Mobile

b) Global Special Meaning


c) Group Special Mobile

d) Global Special Mobile

Question

2G CDMA standard, IS-95, was proposed by which company?

a) Nippon Telephone and Telegraph (NTT)

b) Qualcomm

c) Bellcore and Motorola

d) AT&T Bell Laboratories

Question

Which one of the following 2G standard is used in Japan?

a) IS-136

b) GSM

c) PDC

d) AMPS
Question

The 2G GSM technology uses a carrier separation of _____________

a) 1.25 MHz

b) 200 KHz

c) 30 KHz

d) 300 KHz

Question

Which of the following has no backward compatibility with 3G Cdma2000?

a) IS-95

b) GPRS

c) IS-95A

d) IS-95B

Question

2G and 2.5G CDMA operators may selectively introduce 3G capabilities at each

cell without changing entire base stations and reallocate spectrums.


a) True

b) False

Question

Which of the following the first 3G CDMA air interface?

a) IS-95

b) IS-95B

c) Cdma2000 1xRTT

d) CdmaOne

Question

Within ITU IMT-2000 body, Cdma2000 1xRTT is also known as ____________

a) Cdma2000 1xEV-DO

b) Cdma2000 1xEV-DV

c) IS-95B

d) G3G-MC-CDMA-1X
Question

How many users are supported by Cdma2000 1X in comparison to 2G CDMA

standard?

a) Half

b) Twice

c) Six times

d) Ten times

Question

Cdma2000 works in TDD mode only.

a) True

b) False

Question

Which of the following is not a characteristic of Cdma2000?

a) Adaptable baseband signalling rates

b) Adaptable baseband chipping rates


c) Multicarrier technologies

d) OFDMA

Question

Cdma2000 1xEV was developed by ________

a) Motorola

b) AT&T Laboratories

c) Qualcomm

d) NTT

Question

How is bandwidth increased in Cdma2000?

a) Clubbing adjacent radio channels

b) Changing the hardware of base stations

c) Change of spectrum

d) Change of RF equipment
Question

What are the two options provided by Cdma2000 1xEV?

a) Cdma2000 1xRTT. Cdma2000 3xRTT

b) Cdma2000 1xEV-DO, Cdma2000 1xEV-DV

c) Cdma2000 1xEV-DT, Cdma2000 1xEV-DO

d) Cdma2000 1xRTT, Cdma2000 1xEV-DV

Question

Which of the following is not backward compatible with Cdma2000?

a) Cdma2000 1xRTT

b) Cdma2000 3xRTT

c) Cdma2000 1xEV-DO

d) Cdma2000 1xEV-DT
1. Current PCS systems are referred to as:

a. first-generation

b. second-generation

c. third-generation

d. digital-generation

View Answer:
Answer: Option B
Solution:
2. The frequency band designated for PCS in North America is:

a. 800 MHz

b. 900 MHz

c. 1.9 GHz

d. 12 GHz

View Answer:
Answer: Option C
Solution:
3. The “forward” PCS channel is:

a. from the base to the mobile

b. from the mobile to the base

c. from mobile to mobile

d. same as the uplink

View Answer:
Answer: Option A
Solution:
4. Compared to AMPS, PCS cell sites are:

a. bigger

b. smaller
c. distributed

d. higher-power

View Answer:
Answer: Option B
Solution:
5. AMPS was designed for:

a. POTS

b. voice

c. use built into an automobile

d. all of the above

View Answer:
Answer: Option D
Solution:
6. The number of competing PCS systems in North America is:

a. 2

b. 3

c. 4

d. many

View Answer:
Answer: Option B
Solution:
7. CDMA technology was invented by:

a. AT&T

b. Lucent

c. Bell Labs

d. Qualcomm

View Answer:
Answer: Option D
Solution:
8. GSM is used in:

a. Asia

b. Europe

c. North America

d. all of the above

View Answer:
Answer: Option D
Solution:
9. In GSM, voice channels are called:

a. traffic channels

b. voice channels

c. bearer channels

d. talking channels

View Answer:
Answer: Option A
Solution:
10. AMPS uses:

a. CDMA

b. TDMA

c. spread-spectrum

d. none of the above

View Answer:
Answer: Option D
Solution:
11. Other things being equal, battery life in a GSM phone should be:

a. less than in a TDMA phone

b. no better than in an AMPS phone


c. greater than in a TDMA phone

d. no better than a TDMA phone

View Answer:
Answer: Option C
Solution:
12. It is necessary to send control information on traffic channels in:

a. no PCS system

b. GSM only

c. TDMA only

d. both GSM and TDMA

View Answer:
Answer: Option D
Solution:
13. GSM uses:

a. frequency hopping

b. direct-sequence modulation

c. CDMA

d. all of the above

View Answer:
Answer: Option A
Solution:
14. In GSM, SIM stands for:

a. Short Inbound Message

b. Subscriber-Initiated Message

c. Subscriber ID Module

d. Subscriber ID Method

View Answer:
Answer: Option C
Solution:
15. IMSI stands for:

a. Integrated Mobile Subscriber Identification

b. International Mobile Subscriber Identification

c. Interim Mobile Subscriber Identification

d. Intermodulation System Interference

View Answer:
Answer: Option B
Solution:
16. IS-95 uses:

a. frequency hopping

b. TDMA

c. CDMA

d. all of the above

View Answer:
Answer: Option C
Solution:
17. IS-136 uses:

a. frequency hopping

b. TDMA

c. CDMA

d. all of the above

View Answer:
Answer: Option B
Solution:
18. In CDMA:

a. all frequencies are used in all cells

b. each cell uses half the available frequencies


c. each cell is assigned a frequency by the base

d. the frequency is selected by the mobile phone

View Answer:
Answer: Option A
Solution:
19. CDMA uses a set of PN sequences that are:

a. common

b. unique

c. rotating

d. orthogonal

View Answer:
Answer: Option D
Solution:
20. The next generation of PCS is expected to have:

a. faster data rates

b. Internet access

c. wider roaming area

d. all of the above

View Answer:
Answer: Option D
Solution:
COMPLETION
1. PCS stands for ____________________ Communications System.

View Answer:
Answer: personal
Solution:
2. Current PCS systems are called ____________________-generation
systems.

View Answer:
Answer: second
Solution:
3. In North America, PCS is assigned the ____________________-MHz
band.

View Answer:
Answer: 1900
Solution:
4. Compared to AMPS, PCS cells are ____________________ in size.

View Answer:
Answer: smaller
Solution:
5. Besides TDMA and CDMA, ____________________ is also used in
North America for PCS.

View Answer:
Answer: GSM
Solution:
6. The spread-spectrum technique used in IS-95 PCS is
____________________.

View Answer:
Answer:
CDMA
direct sequence

Solution:
7. The spread-spectrum technique used in GSM is
_________________________.

View Answer:
Answer: frequency hopping
Solution:
8. Unlike AMPS, CDMA allows for a ____________________ handoff.

View Answer:
Answer: soft
Solution:
9. The orthogonal PN sequences used in CDMA are called a
____________________ code.

View Answer:
Answer: Walsh
Solution:
10. Unlike other systems, in CDMA ____________________ frequencies
are used in all cells.

View Answer:
Answer: all
Solution:
11. PN stands for Pseudo-____________________ Noise.

View Answer:
Answer: random
Solution:
12. ____________________ diversity is inherent in any spread-spectrum
system.

View Answer:
Answer: Frequency
Solution:
13. RF channel S/N ratios ____________________ than zero are typical
in CDMA systems.

View Answer:
Answer: less
Solution:
14. CDMA uses a ____________________-rate vocoder.

View Answer:
Answer: variable
Solution:
15. A phone user typically talks less than ____________________% of
the time during a conversation.

View Answer:
Answer: 50
Solution:
16. CDMA requires ____________________-loop power control to work
properly.

View Answer:
Answer: closed
Solution:
17. GPRS stands for General ____________________ Radio Service.

View Answer:
Answer: Packet
Solution:
18. IMT stands for International ____________________
Telecommunications.

View Answer:
Answer: Mobile
Solution:
19. UPT stands for ____________________ Personal
Telecommunications.

View Answer:
Answer: Universal
Solution:
20. UWT stands for Universal ____________________
Telecommunications.

View Answer:
Answer: Wireless
Solution:
21. W-CDMA stands for ____________________ CDMA.

View Answer:
Answer: Wideband
Solution:
SHORT ANSWER
1. What is the advantage of a “soft” handoff?

View Answer:
Answer: No calls are dropped.
Solution:
2. If CDMA receivers hear all frequencies all the time, how do they pick a
specific frequency?

View Answer:
Answer: Each frequency is modulated using a separate orthogonal PN sequence.
To demodulate, the receiver uses the PN sequence specific to the channel it wants.
Solution:
3. What is the effect of cochannel interference in CDMA?

View Answer:
Answer: It increases the background noise level, but CDMA can tolerate a lot of
such noise.
Solution:
4. How does GSM achieve frequency diversity?

View Answer:
Answer: It uses limited frequency hopping.
Solution:
5. Why was PCS assigned to 1.9 GHz instead of the 800-MHz band used
for AMPS?

View Answer:
Answer: The 800 MHz band was already overcrowded.
Solution:
6. Why would a battery in a GSM phone be expected to last longer than a
battery in a TDMA phone?

View Answer:
Answer: A TDMA phone is active during one out of every three time slots. A GSM
phone is active during one out of every eight.
Solution:
7. What is the advantage of using offset QPSK over standard QPSK?

View Answer:
Answer: With standard QPSK, the transmitted power repeatedly goes to zero.
With offset QPSK, it never goes to zero. Linearity requirements are less strict for
offset QPSK transmitters.
Solution:
8. What is the “near/far” effect in CDMA, and what causes it?

View Answer:
Answer: A stronger station farther away can “drown out” a weaker station that is
near. This happens when the power transmitted by mobile units is not well
controlled by the base.
Solution:
1). The first generation cellular systems provide ___________ services for
communication.
Analog
Digital
Hybrid
All the above
2). 1G technology uses _______ for the division of channels.
TDMA
FDMA
CDMA
SDMA
3). ____________ is a cellular system uses FDMA and follows analog medium
for communication.
GSM
AMPS
D-AMPS
None of the above
4). Cellular services utilizes ________ transmitters.
High power
Ultra-highPower
Low power
Both low and high power
5). GSM is a secure _______ system.
WiredWirelessSimpleComplex
6). Firstly GSM was deployed in _________.
FinlandRussiaNorwaySweden
7). The standard for GSM was developed by ____________.
Telecommunications Industry Association (TIA)International Telecommunications
Union (ITU)European Telecommunications Standards Institute (ETSI)None of the
above
8). In which year the frequency standard band for the GSM network was
extended from 900 MHz to the 1800 MHz?
1990199119921993
9). The first person to make call on network of GSM was ________.
Pehr Evind SvinhufvudPaavo LipponenHarri HolkeriJuha Sipila
10). The first call of GSM was made on the ________ network.
AlcomDNATeliaRadiolinja
11). First network operator of mobile to shut down GSM is ________.
AlcomElisaTelstraDNA
12). The second network operator to shut GSM is __________.
AlcomElisaTelstraAT & T
13). GSM in Asia and Europe is operated at __________ MHz band of
frequency.
80090010001100
14). In United States GSM is operated at _______ MHz frequency band.
8501900Both a and bNone of the above
15). The separation of carrier in GSM 2G technologies is __________.
20 KHz30 KHz200 KHz300 KHz
16). Which windowing technique is used by the GSM codec for coding
speech?
Blackman WindowWelch WindowCosine WindowHamming Window
17). Which filter is used at the decoder of GSM to pass the received signal?
LTP filterSTP filterQuantizerPLL
18). The cryptography algorithms used in GSM are__________.
A5/1A5/2A5/3All the above
19). How many different types of cell sizes present in the GSM network?
3456
20). The type of cell in which the height of antenna is above the average level
of roof top is ______.
Macro cellMicro cellPico cellUmbrella cell
21). In the GSM system the type of cell whose antenna height is under the
average level of roof top is ______.
Umbrella cellFemto cellPico cellMicro cell
22). The type of cell sizes preferred in the urban locations is ________.
Femto cellsPico cellsMicro cellsMacro cells
23). A _________ is a cell in the network of mobile phones which provides
radio coverage from the cell site with high power.
Femto cellPico cellMicro cellMacro cell
24). The type of cell sizes preferred for the indoor locations is _________.
Femto cellsPico cellsMicro cellsMacro cells
25). The connection between the service providers through a broadband is
made possible by ______ cells.
Femto cellsPico cellsMicro cellsMacro cells
26). In practical the longest distance supported by the GSM system is ______
(Kilo meters).
25354555
27). SIM in the GSM network stands for _______.
Subscriber Identity ModuleSubscriber Investigation MobileSubscriber Identification
MobileSmart Identification Module
28). Other than GSM _______ provides a great security with the key for longer
authentication amid user and the network.
SIMUSIMUMTSFPGAs
29). SIM card is protected by using _________.
Personal Identification Number (PIN)Mobile Identification Number (MIN)International
Mobile Subscriber Identity (IMSI)Mobile Subscription Identification Number (MSIN)
30). A PIN used to protect SIM card has _____ digits.
3456
31). Mobility management and the call out functions for the mobile phone
roaming are carried out by __________.
Base Station SubsystemNetwork Switching Subsystem (NSS)GPRS Core
NetworkOperations Support System
32). ________ used by the service providers of telecommunications to manage
networks.
Base Station SubsystemNetwork Switching SubsystemGPRS Core
NetworkOperations Support System (OSS)
33). In GSM system customer care service is a part of __________.
Base Station SubsystemNetwork Switching SubsystemGPRS Core
NetworkOperations Support System
34). The voice codec used in GSM follows a system of _________.
Huffman codingLinear Predictive codingLine codingCryptographic coding
35). The frequency in the GSM is selected by the operator. Further it is divided
into ________.
FramePacketTimeslotsBits
36). GSM system consists of eight ________ speech channels for each radio
frequency.
Full rateDuplexHalf rateFull duplex
37). GSM system consists of sixteen ________ speech channels for each radio
frequency.
Full rateDuplexHalf rateFull duplex
38). The timeslots in the GSM are grouped to form a _______ frame.
CDMATDMAOFDMASDMA
39). The duration of the frame of GSM carrier frequencies is ________ (ms).
3.6153.6264.5154.615
40). The user in the GSM system can change the operator by changing the
_____.
MobileSIMNetworkBattery
41). USIM is introduced due to the development of _______.
SIMCipher textUMTSEDGE
42). USIM stands for _____________.
Universal Subscriber Identity ModuleUniversal Subscriber Investigation
MobileUniversal Smart Identification ModuleUniversal Smart Investigation Mobile
43). Mobile phones with GSM are ______ and ______ carriers.
Unlocked, switchedLocked, switchedUnlocked, protectedSwitched, protected
44). SIM cards can be used on ________ phones.
CDMAGSMBoth CDMA and GSMWCDMA
45). GSM is a cellular network with a group of cell in it known as
____________.
NodeClusterBridgeHub
46). GSM offers services like _________.
voiceDataRoamingAll the above
47). The traffic amid mobile phone and the NSS is handled by __________.
Base Station SubsystemNetwork Switching SubsystemGPRS Core
NetworkOperations Support System (OSS)
48). A GSM network is based upon _________ channels of traffic.
Connection lessConnection orientedCircuit switchedPacket switched
49). In the GSM network ___________ allows the user to alternate amid data
and speech among the same conversation.
Message centerMobile service nodeGateway Mobile Services Switching CenterGSM
interworking unit (GIWU)
50). Each cell in the GSM network is identified by the __________ number
designated to it.
Integrated circuit card ID (ICCID)International Mobile subscriber Identity
(IMSI)International Mobile Equipment Identity (IMEI)Cell Global Identity (CGI)
51). Cell phones during manufacturing possess ________ number that will be
permanent and unique.
Integrated circuit card ID (ICCID)International Mobile subscriber Identity
(IMSI)International Mobile Equipment Identity (IMEI)Cell Global Identity (CGI)
52). Location area is a group of _____ in wireless communication.
CellsMSCsMobile phonesBatteries
53). Which of these doesn’t come under the category of telephone services
and are not supported by GSM?
Voice mailFax mailCall waitingDual-tone multi frequency (DTMF)
54). ___________ in the GSM network the database required for managing and
storing the subscriptions.
Home Location Register (HLR)Visitor Location Register (VLR)Authentication Center
(AUC)Equipment Identity Register (EIR)
55). The permanent data of the subscriber is stored in _______.
Home Location Register (HLR)Visitor Location Register (VLR)Authentication Center
(AUC)Equipment Identity Register (EIR)
56). When the subscription is bought from the PCS operators the subscribers
registered in _______ of the operator.
Visitor Location Register (VLR)Home Location Register (HLR)Authentication Center
(AUC)Equipment Identity Register (EIR)
57). _________ is always attached with MSC.
Visitor Location Register (VLR)Home Location Register (HLR)Authentication Center
(AUC)Equipment Identity Register (EIR)
58). ____________ stores the data about subscribers temporarily.
Visitor Location Register (VLR)Equipment Identity Register (EIR)Authentication
Center (AUC)Home Location Register (HLR)
59). __________ protects the operators from the frauds occur in this world of
cellular technology.
Visitor Location Register (VLR)Home Location Register (HLR)Authentication Center
(AUC)Equipment Identity Register (EIR)
60). _________ and _________ are either enforced as free-standing nodes or
forms a combine node.
VLR and HLRHLR and AUCAUC and VLRAUC and EIR
61). A Base Station System (BSS) consists of __________.
Base Station Controllers (BSCs)Base Transceiver Stations (BTSs)Both a and bNone
of the above
62). A group formed by BTSs is controlled by a ________.
MSCBSCAUCMobile phone
63). The maximum transceivers handled by BTS are ________.
481632
64). In telecommunications OMC stands for ___________.
Operations and Maintenance CenterOpen Method of CoordinationOperational
Method for CoordinationNone of the Above
65). OSS stands for __________.
Open-Source SoftwareOpen Source SystemOperator services SystemOperation and
Support System
66). ___________ is a node that interconnects two networks.
ExclusionExpulsionGatewayDeparture
67). GMSC stands for _________.
Gateway Mobile Switching CenterGateway Mobile Service CenterGlobal Mobile
Satellite CommunicationGlobal Mobile Service Center
68). ____________ is known as controlling center of NSS.
Base Station SubsystemOperations Support SystemGPRS Core NetworkMobile
Switching Center (MSC)
69). In GSM the area under a single transmitter is known as ________.
GatewayNodeCellHexagon
70). __________ node provides intelligent services of network.
Message center (MXE)Mobile Service Node (MSN)Gateway Mobile Services
Switching CenterGSM interworking unit (GIWU)
71). The traffic in between of mobile phone and the NSS is handled by
_________.
Base Station Subsystem (BSS)Network Switching SubsystemGPRS Core
NetworkOperations Support System (OSS)
72). ___________ is referred to as the core network part of GSM.
Base Station Subsystem (BSS)Network Switching Subsystem (NSS)GPRS Core
NetworkOperations Support System (OSS)
73). GSM operators possess _____ agreements with the operators in the
foreign countries.
Voice mailFax mailCall waitingRoaming
74). To make processor or any other computer to communicate with a network
________ device is used.
GSM ModemRepeatersBridgesSIM
75). In the GSM network GPRS is a part present in ____________.
BTSBSSNSSHLR
76). A BTS commonly in public is referred to as __________.
GatewayNodeCellMobile Tower
77). GSM facilitates the cell phones to connect to a network by searching
_________.
CellsCryptographic AlgorithmsBoth a & bNone of the above
78). The list of queries a subscriber made is charged by the network can be
defined as _________.
Call barringCalling number identificationClosed User Group (CUG)Advice of Charge
(AoC)
79). ____________ service is used by the network providers to recover the
dues.
Call barringCalling number identificationCall conferencingAdvice of Charge
80). Which service is not extra charged by the service providers?
Call barringCalling number identificationCall conferencingAdvice of Charge
81). If the calls are made to specified subscribers in a group and based on that
special concession is provided to the users. This terminology is referred to as
_________.
Call barringCalling number identificationClosed User Group (CUG)Advice of Charge
(AoC)
82). The charges in the GPRS service depends upon per ___________ data
uploaded or downloaded.
Kilo ByteMega ByteGiga ByteTera Byte
83). TMSI stands for _____________.
Temporary Mobile Servicing IndustryTemporary Mobile Subscriber IdentityTerminal
Mobile Subscription IdentificationTemporary Mobile Service Identification
84). How many nodes were introduced to the existing core network of GSM?
OneTwoThreeFour
85). Data transmission in GSM is done through ________.
Voice mailEDGEGPRSUMTS
86). ___________ service in GSM utilizes the spectrum on need.
UDIUMTSGPRSNone of the Above
87). A _____ node is the supporting node for GPRS in GSM.
GSNGGSNSGSNAll the Above
88). The node variants of GSN in GPRS are ___________.
GGSNSGSNBoth a & bNone of the above
89). In GPRS the ciphering is performed between MS and ___________.
GGSNSGSNBoth a & bBTS
90). GPRS transfers the data in ______ format.
BitsPacketFrameSegment
91). EDGE service belongs to__________ generation.
1G2G2.5G3G
92). Due to interference or some other reasons if it is necessary to make a
change in the slot or the frequency utilized by a user results in handover. This
type of the handover in GSM is known as ________.
Intra-BTS handoverInter-BTS Intra BSC handoverInter-BSC handoverInter MSC
handover
93). The handoff occurred when the cell phone moves out from the coverage
offered by one of the BTS to another one but the BSC shared for both BTS is
the same known as________.
Intra-BTS handoverInter-BSC handoverInter-BTS Intra BSC handoverInter MSC
handover
94). ___________ handover is under the control of MSC.
Intra-BTS handoverInter-BTS Intra BSC handoverInter-BSC handoverInter MSC
handover
95). The handover occurred due to the change in between the networks is
________.
Intra-BTS handoverInter-BTS Intra BSC handoverInter-BSC handoverInter MSC
handover
96). The handovers occurred in between various accessing radio technologies
is ___________.
Intra-BTS handoverInter-BTS Intra BSC handoverInter-BSC handoverInter-system
handover
97). The base station handovers cell phone with the details of the new cell
without providing any synchronization and linking results in
________handover.
Inter-system handoverInter MSC handoverBlind handoverCompressed mode
handover
98). __________ handover utilizes the list of neighboring base stations to
select a suitable one.
Inter-system handoverInter MSC handoverBlind handoverCompressed mode
handover
99). In which handover mobile transmits the bursts on the latest channel to
access the new base station?
Inter-system handoverInter MSC handoverBlind handoverNon-Synchronized
handover
100). MSC in which the handover gets initiated is known as ______.
Gateway MSCVisited MSCAnchor MSCNone of the above
1) GPRS stands for?
A) General Packet Repair Service
B) General Packet Radio Service
C) Graphics Packet Radio Service
D) None
Answer [=]
B
2) What is the data rate or speed offered by a GPRS
connection?
A) 56-115kbps
B) 9-256kbps
C) 64-128kbps
D) None
Answer [=]
A
Explanation:
115kbps is the maximum. Minimum can be anything in
reality based on many parameters.
3) GPRS services belong to which generation?
A) 1G
B) 2G
C) 3G
D) 4G
Answer [=]
B
4) Choose a correct abbreviation below.
A) SGSN - Serving GPRS Support Node
B) GGSN - Gateway GPRS Support Node
C) IP - Internet Protocol
D) All
Answer [=]
D
5) Choose a correct Abbreviation below.
A) PCU - Packet Control Unit
B) CG - Charging Gateway
C) BG - Border Gateway
D) All
Answer [=]
D
6) Choose a correct Abbreviation below.
A) PCU - Packet Control Unit
B) CCU - Channel Codec Unit
C) GTP - GPRS Tunneling Protocol
D) All
Answer [=]
D
7) GPRS is a Connection Oriented service. True/False?
A) False
B) True
C) -
D) -
Answer [=]
A
Explanation:
GPRS is a connection less service. It is a Packet data
service. No continuous connection from Start to End is
required.

8) GPRS is a Circuit Switched Data (CSD) service.


True/False?
A) False
B) True
C) -
D) -
Answer [=]
A
Explanation:
No, GPRS is a PSD device. P is for Packet.
9) GPRS uses which unused channels for transportation
of Data in general?
A) SDCCH
B) BCCH
C) TCH
D) SCH
Answer [=]
C
Explanation:
Yes, TCH (Traffic Channel).
10) Type-A Mobile Station supports ________.
A) Only Speech
B) Only Data
C) Speech and Data Simultaneously
D) Speech or Data one at a time.
Answer [=]
C
11) Type-B Mobile Station supports _______.
A) Speech only
B) GPRS only
C) GPRS or Speech One at a time
D) GPRS and Speech simultaneously
Answer [=]
C
12) Type-C Mobile Station supports _______.
A) Speech only
B) Data only
C) Speech and Data simultaneously
D) Speech or Data automatically
Answer [=]
B
Explanation:
Data Dongles.
13) What is the abbreviation of EDGE?
A) Enhanced Digital Generation Gap
B) Enhanced Data rate for GSM Evolution
C) Encryption Data rate for GSM Evolution
D) None
Answer [=]
B
14) What is the maximum speed offered by an EDGE
connection?
A) 64kbps
B) 128kbps
C) 256kbps
D) 236 kbps
Answer [=]
D

15) An EDGE connection is ______?


A) CS data
B) PS data
C) CS and PS data
D) None
Answer [=]
C
Explanation:
CS - Circuit Switched
PS - Packet Switched
16) A PCU separates Packet Switched and Circuit
Switched traffic and passes PSD to _______?
A) MSS
B) SGSN
C) GGSN
D) None
Answer [=]
B
17) In a GPRS network, SGSN is the equivalent of
______ system in GSM.
A) BSC
B) MSC
C) VLR
D) GMSC
Answer [=]
B
18) What are the functions of a CCU?
A) Power Control
B) Timing Advance
C) Coding algorithms
D) All
Answer [=]
D
19) GPRS Roaming from one SGSN to another SGSN is
offered by ?
A) GMSC
B) GGSN
C) HLR
D) VLR
Answer [=]
B
Explanation:
GGSN queries the subscriber location time to time and
sends data the respective SGSN and then to the user.
20) Which is the system in GPRS that connects to
External Networks using GTP?
A) SGSN
B) HLR
C) GGSN
D) GMSC
Answer [=]
C
21) What are the functions of SGSN in a GPRS
Architecture?
A) Authentication, Authorization, Ciphering
B) GTP tunneling to GGSN, Charging (Billing), Session management
C) Mobility manage, interaction with HLR, MSC/VLR, NMS interface
D) All
Answer [=]
D

22) What are the functions of GGSN of a GPRS network?


A) Charging (Billing), Filter user traffic
B) Routing mobile originated traffic, GTP Tunneling to SGSN
C) Interface external networks
D) All
Answer [=]
D
23) A DNS (Domain Name Server) converts Host Name or
Website name to _____?
A) Packets
B) Bytes
C) IP address
D) None
Answer [=]
C
24) A BG(Border Gateway) connects to ______ using
Tunneling.
A) Same operator's GPRS network
B) Different operator's GPRS network
C) Same or different operator GPRS N/W
D) None
Answer [=]
B
25) Which system in a GPRS architecture collects all
Charging (Billing) records for final processing?
A) SGSN
B) GGSN
C) CH (Charging Gateway)
D) None
Answer [=]
C
26) A GPRS network contains Firewalls to _______?
A) Hack phones
B) Intercept phones
C) Protection from Virus
D) None
Answer [=]
C
27) An LIG(Legal Interception Gateway) in a GPRS
network provides ________ .
A) Parallel access to law agencies
B) Eavesdrop user sessions
C) Sample packets to get information
D) All
Answer [=]
D

1) What are the three main parts of a GSM Architecture


or Structure?
A) Mobile Station
B) BSS - Base Station Subsystem
C) NSS - Network and Switching Subsystem
D) All the above
Answer [=]
D
2) What are the main parts of a Mobile Station in a
GSM Network?
A) MT - Mobile Terminal
B) SIM - Subscriber Identity Module
C) Both A and B
D) None
Answer [=]
C
3) What are the main parts of a BSS (Base Station
Subsystem) in a GSM network?
A) BTS - Base Transceiver Station
B) BSC - Base Station Controller
C) A and B
D) None
Answer [=]
C
4) What are the main parts of a NSS (Network and
Switching Subsystem) of a GSM Architecture?
A) MSC - Mobile Switching Center
B) HLR & AuC
C) VLR, EIR
D) All the above
Answer [=]
D
5) What are the main parts of an MSC (Mobile Switching
Center) system in a GSM structure?
A) MGW - Media Gateway
B) MSC Server
C) Both A and B
D) None
Answer [=]
C
6) A GPRS Core network is part of System in a GSM
Network Structure?
A) Mobile Station
B) BSS
C) MSS
D) NSS
Answer [=]
D
7) A BTS is also called _____ by general public?
A) Mobile tower
B) Exchange
C) Charging Point
D) None
Answer [=]
A

8) Each Mobile Terminal is identified by a unique


______ number?
A) IMEI
B) SIM
C) IMSI
D) None
Answer [=]
A
9) IMEI stands for?
A) Internal Mobile Equipment Identity
B) International Mobile Equipment Identity
C) Intra Mobile Enable Identity
D) None
Answer [=]
B
10) Each SIM is identified by a unique _____ number?
A) IMSI
B) IMEI
C) MSDN
D) None
Answer [=]
A
11) IMSI stands for?
A) Internal Mobile Subscriber Identity
B) International Mobile Subscriber Identity
C) Investigating Mobile Subscriber Identity
D) None
Answer [=]
B
12) Your mobile number is actually called ______
number.
A) IMSI
B) SIM
C) MSISDN
D) None
Answer [=]
C
Explanation:
MSISDN - Mobile Station International Subscriber Directory
Number
13) IMSI number of a SIM is also called?
A) MSISDN
B) IMEI
C) ICCID
D) None
Answer [=]
C
Explanation:
ICCID - Integrated Circuit Card Identifier
14) What controller a group of BTS or Cell Towers?
A) BSC
B) MSC
C) HLR
D) VLR
Answer [=]
A
Explanation:
First, a group of BTS are attached to a BSC and then to
MSC.

15) How many digits of PIN (Personal Identification


Number) is allowed to protect a SIM card?
A) 4
B) 8
C) 10
D) None
Answer [=]
A
16) What is PUK code of a SIM?
A) PIN Unlock Key
B) 4 digit code
C) It is like a password to enter after inserting SIM in a mobile for
the first time. It prevents misuse.
D) All
Answer [=]
D
17) The only element that personalises a Mobile
Station is _______?
A) Back cover
B) SIM
C) Screen guard
D) None
Answer [=]
B
18) What is the maximum number of Transceivers a BTS
can handle is ?
A) 8
B) 12
C) 16
D) 22
Answer [=]
C
19) What are the functions of a BSC?
A) Handovers, exchange functions
B) Frequency hopping
C) Control of radio frequency power level of BTS
D) All
Answer [=]
D
20) What is the main function of NSS?
A) Establishing communication between mobile and landline
numbers.
B) Providing eligible services to the subscriber
C) Providing parameters for Authentication and Encryption
D) All
Answer [=]
D
1) What is the name of the database that stores
subscriber information under an MSC and his eligible
services?
A) MSC
B) HLR
C) EIR
D) AuC
Answer [=]
B
Explanation:
HLR also stores the location of a customer.
2) What is the name of a database used mainly that
stores information of a subscriber along with eligible
services under roaming or another MSC area?
A) HLR
B) VLR
C) EIR
D) AuC
Answer [=]
B
3) Covering area of an MSC is also called ____ ?
A) VLR
B) HLR
C) EIR
D) AUC
Answer [=]
B
4) Usually, VLR contains a copy of data of ______ ?
A) HLR
B) EIR
C) AUC
D) none
Answer [=]
A
5) Between VLR and HLR, which one is used mostly allow
or bar services to the user?
A) VLR
B) HLR
C) Both are used equally
D) None
Answer [=]
A
6) State true or false. The area under one MSC or HLR
is also the area under one VLR.
A) True
B) False
C) -
D) -
Answer [=]
A
7) Usually, VLR is part of _____ ?
A) HLR
B) EIR
C) AUC
D) MSC
Answer [=]
D
8) As VLR is fast to access, VLR avoids frequent
accessing of ________ ?
A) EIR
B) AUC
C) HLR
D) None
Answer [=]
C
9) In a GSM architecture, which system provides
Authentication and Encryption services?
A) HLR
B) VLR
C) EIR
D) AUC
Answer [=]
D
Explanation:
AUC - Authentication Center
10) In a GSM architecture, which system stores the
IMEI numbers of all working mobile phones under the
network?
A) HLR
B) VLR
C) EIR
D) AUC
Answer [=]
C
Explanation:
EIR - Equipment Identity Register
11) What are the types of lists maintained by EIR
(Equipment Identification Register)?
A) Whitelist
B) Grey List
C) Black List
D) All
Answer [=]
D
12) Choose a correct statement about EIR list of
IMEIs.
A) Whitelist - List of allowed IMEIs or Mobile Devices
B) Grey List - List of IMEIs with limited allowed services
C) Blacklist - List of forbidden IMEIs or mobiles
D) All
Answer [=]
D
13) Mobile calls to or from Fixed Networks (Landlines)
are handled by ________ ?
A) MSC
B) GMSC (Gateway MSC)
C) HLR
D) VLR
Answer [=]
B
14) Each cell in a GSM network has ?
A) Cell number
B) Cell Global number
C) Cell Global Identity number
D) None
Answer [=]
C
Explanation:
CGI number.

15) A group of cells in a GSM network has a _________


number.
A) Location number
B) Location Area number
C) Location Area Identity number
D) None
Answer [=]
C
16) A single MSC or VLR can have many ______ ?
A) HLR
B) Location Areas (LA)
C) CGI - Cell Global Index
D) None
Answer [=]
B
17) Total area served by one network operator is
called ______ ?
A) PSTN
B) PLMN
C) LA
D) CGI
Answer [=]
B
Explanation:
PLMN - Public Land Mobile Network
18) What is DTX or Discontinuous Transmission in a GSM
network?
A) DTC stops transmitter when the person is not talking. So less
number of voice signals reach BTS with less noise.
B) With the help of VAD (Voice Activity Detection), mobile identifies
conversation and noise to turn off transmission.
C) On the opposite end, the receiver produces a noise called
Comfort Noise. With out this, DTX makes the opposite person think
that the line or call is cut.
D) All
Answer [=]
D
19) Which technique of GSM Architecture tells the
mobile to advance it's transmission bursts (data) so
that overlap with other bursts may be avoided at
channel?
A) DTX
B) TA - Timing Advance
C) Power Control
D) None
Answer [=]
B
20) Timing Advance (TA) deals with?
A) The distance between the BTS and Mobile
B) Time delay of bursts from mobile
C) Time advance of bursts from mobile
D) All
Answer [=]
D
1) What are the three main parts of a GSM Architecture
or Structure?
A) Mobile Station
B) BSS - Base Station Subsystem
C) NSS - Network and Switching Subsystem
D) All the above
Answer [=]
D
2) What are the main parts of a Mobile Station in a
GSM Network?
A) MT - Mobile Terminal
B) SIM - Subscriber Identity Module
C) Both A and B
D) None
Answer [=]
C
3) What are the main parts of a BSS (Base Station
Subsystem) in a GSM network?
A) BTS - Base Transceiver Station
B) BSC - Base Station Controller
C) A and B
D) None
Answer [=]
C
4) What are the main parts of a NSS (Network and
Switching Subsystem) of a GSM Architecture?
A) MSC - Mobile Switching Center
B) HLR & AuC
C) VLR, EIR
D) All the above
Answer [=]
D
5) What are the main parts of an MSC (Mobile Switching
Center) system in a GSM structure?
A) MGW - Media Gateway
B) MSC Server
C) Both A and B
D) None
Answer [=]
C
6) A GPRS Core network is part of System in a GSM
Network Structure?
A) Mobile Station
B) BSS
C) MSS
D) NSS
Answer [=]
D
7) A BTS is also called _____ by general public?
A) Mobile tower
B) Exchange
C) Charging Point
D) None
Answer [=]
A

8) Each Mobile Terminal is identified by a unique


______ number?
A) IMEI
B) SIM
C) IMSI
D) None
Answer [=]
A
9) IMEI stands for?
A) Internal Mobile Equipment Identity
B) International Mobile Equipment Identity
C) Intra Mobile Enable Identity
D) None
Answer [=]
B
10) Each SIM is identified by a unique _____ number?
A) IMSI
B) IMEI
C) MSDN
D) None
Answer [=]
A
11) IMSI stands for?
A) Internal Mobile Subscriber Identity
B) International Mobile Subscriber Identity
C) Investigating Mobile Subscriber Identity
D) None
Answer [=]
B
12) Your mobile number is actually called ______
number.
A) IMSI
B) SIM
C) MSISDN
D) None
Answer [=]
C
Explanation:
MSISDN - Mobile Station International Subscriber Directory
Number
13) IMSI number of a SIM is also called?
A) MSISDN
B) IMEI
C) ICCID
D) None
Answer [=]
C
Explanation:
ICCID - Integrated Circuit Card Identifier
14) What controller a group of BTS or Cell Towers?
A) BSC
B) MSC
C) HLR
D) VLR
Answer [=]
A
Explanation:
First, a group of BTS are attached to a BSC and then to
MSC.

15) How many digits of PIN (Personal Identification


Number) is allowed to protect a SIM card?
A) 4
B) 8
C) 10
D) None
Answer [=]
A
16) What is PUK code of a SIM?
A) PIN Unlock Key
B) 4 digit code
C) It is like a password to enter after inserting SIM in a mobile for
the first time. It prevents misuse.
D) All
Answer [=]
D
17) The only element that personalises a Mobile
Station is _______?
A) Back cover
B) SIM
C) Screen guard
D) None
Answer [=]
B
18) What is the maximum number of Transceivers a BTS
can handle is ?
A) 8
B) 12
C) 16
D) 22
Answer [=]
C
19) What are the functions of a BSC?
A) Handovers, exchange functions
B) Frequency hopping
C) Control of radio frequency power level of BTS
D) All
Answer [=]
D
20) What is the main function of NSS?
A) Establishing communication between mobile and landline
numbers.
B) Providing eligible services to the subscriber
C) Providing parameters for Authentication and Encryption
D) All
Answer [=]
D
. Pseudorandom signal ________ predicted.
a) Can be
b) Cannot be
c) maybe
d) None of the mentioned
Answer: a
Explanation: Random signals cannot be predicted whereas
pseudorandom sequence can be predicted.

2. The properties used for pseudorandom sequence are


a) Balance
b) Run
c) Correlation
d) All of the mentioned
Answer: d
Explanation: The three basic properties that can be applied for
pseudorandom sequence are balance, run and correlation
properties.

3. The shift register needs to be controlled by clock pulses.


a) True
b) False
Answer: a
Explanation: The shift register operation is controlled by clock
pulses.

4. A linear feedback shift register consists of


a) Feedback path
b) Modulo 2 adder
c) Four stage register
d) All of the mentioned
Answer: d
Explanation: A linear feedback shift register consists of four stage
register for storage and shifting, modulo 2 adder and feedback
path.
5. If the initial pulse of 1000 is fed to shift register, after how many
clock pulses does the sequence repeat?
a) 15
b) 16
c) 14
d) 17
Answer: a
Explanation: If the initial pulse 1000 is given to shift register, the
foregoing sequence repeats after 15 clock pulses.

6. The sequences produced by shift register depends on


a) Number of stages
b) Feedback tap connections
c) Initial conditions
d) All of the mentioned
Answer: d
Explanation: The sequences produced by shift register depends on
the number of stages, the feedback tap connections and initial
conditions.

7. For maximal length sequence, the sequence repetition clock


pulses p is given by
a) 2n + 1
b) 2n -1
c) 2n
d) None of the mentioned
Answer: b
Explanation: For maximal length sequence, produced by n stage
linear feedback shift register the sequence repetition clock pulses
p is given by 2n -1 .

8. For any cyclic shift, the auto-correlation function is equal to


a) 1/p
b) -1/p
c) –p
d) p
Answer: b
Explanation: For any cyclic shift the auto-correlation function is
equal to -1/p.

9. Which method is better?


a) To share same bandwidth
b) To share different bandwidth
c) To share same & different bandwidth
d) None of the mentioned
Answer: b
Explanation: If the jammer noise shares the same bandwidth, the
result could be destructive.

10. Pulse jammer consists of


a) Pulse modulated excess band noise
b) Pulse modulated band-limited noise
c) Pulse width modulated excess band noise
d) Pulse width modulated band-limited noise
Answer: b
Explanation: Pulse jammer consists of pulse modulated band-
limited noise.

11. Which are the design options for anti jam communicator?
a) Time diversity
b) Frequency diversity
c) Special discrimination
d) All of the mentioned
Answer: d
Explanation: The design options for anti-jam communicator are
time diversity, frequency diversity and special discrimination.

12. The ratio (J/S)reqd gives the measure of


a) Vulnerability to interference
b) Invulnerability to interference
c) All of the mentioned
d) None of the mentioned
Answer: b
Explanation: The ratio (J/S)reqd gives the measure of how
invulnerable the system is to interference.

13. The system should have


a) Larger (J/S)reqd
b) Greater system’s noise rejection capability
c) Larger (J/S)reqd & Greater system’s noise rejection capability
d) None of the mentioned
Answer: c
Explanation: The system will be efficient if it has greater (J/S)reqd
and larger system’s noise rejection capability.

14. The broadband jammer jams the entire


a) W
b) Wss
c) W & Wss
d) None of the mentioned
Answer: b
Explanation: The broadband jammer or wide-band jammer is the
one which jams the entire Wss with its fixed power.

15. To increase error probability, the processing gain should be


a) Increased
b) Decreased
c) Exponentially increased
d) Exponentially decreased
Answer: a
Explanation: In a system, to increase the error probability the
processing gain should be increased.

16. Which jamming method produces greater degradation?


a) Broadband jamming
b) Partial jamming
c) Broadband & Partial jamming
d) None of the mentioned
Answer: b
Explanation: Greater degradation is possible more with partial
jamming than broadband jamming.

17. The jammer which monitors a communicator’s signal is known


as
a) Frequency follower jammers
b) Repeat back jammers
c) Frequency follower & Repeat back jammers
d) None of the mentioned
Answer: c
Explanation: The smart jammers which monitor a communicator’s
signals is known as frequency follower or repeat back jammers.

Direct Sequence and Frequency Hopping


1. DS/BPSK includes
a) Despreading
b) Demodulation
c) Despreading & Demodulation
d) None of the mentioned
Answer: c
Explanation: DS/BPSK is a two step precess which includes
despreading and demodulation.

2. In direct sequence process which step is performed first?


a) De-spreading
b) Demodulation
c) Despreading & Demodulation
d) None of the mentioned
Answer: a
Explanation: In direct sequence process, De-spreading correlator
is followed by a modulator.
3. The processing gain is given as
a) Wss/R
b) R/Wss
c) Wss/2R
d) R/2Wss
Answer: a
Explanation: The processing gain is given by the ratio of the
minimum bandwidth of the data to data rate.

4. Chip is defined as
a) Shortest uninterrupted waveform
b) Largest uninterrupted waveform
c) Shortest diversion
d) None of the mentioned
Answer: a
Explanation: A chip is defined as the shortest uninterrupted
waveform in the system.

5. Processing gain is given as


a) Wss/R
b) Rch/R
c) Wss/R & Rch/R
d) None of the mentioned
Answer: c
Explanation: Processing gain is given as both as the ratio of the
minimum bandwidth of the data to data rate and also the by the
ratio of code chip rate and data rate as minimum bandwidth is
approximately equal to code chip rate.

6. Which modulation scheme is preferred for direct sequence


spread spectrum process?
a) BPSK
b) QPSK
c) BPSK & QPSK
d) None of the mentioned
Answer: c
Explanation: Both the modulation scheme BPSK and QPSK can be
used for direct sequence spread spectrum process.

7. The frequency hopping system uses ______ modulation scheme.


a) FSK
b) BPSK
c) MFSK
d) MPSK
Answer: c
Explanation: The frequency hopping spread spectrum system uses
M-ary frequency shift keying modulation scheme.

8. The minimum spacing between consecutive hop positions gives


the
a) Minimum number of chips necessary
b) Maximum number of chips necessary
c) Chip rate
d) None of the mentioned
Answer: a
Explanation: The minimum spacing between consecutive hop
positions given the minimum number of chips necessary in the
frequency word.

9. Which system allows larger processing gain?


a) Direct sequence
b) Frequency hopping
c) Direct sequence & Frequency hopping
d) None of the mentioned
Answer: b
Explanation: Frequency hopping spread spectrum system allows
greater processing gain than direct sequence spread spectrum
technique.

10. In which technique is phase coherence hard to maintain?


a) Direct sequence
b) Frequency hopping
c) Direct sequence & Frequency hopping
d) None of the mentioned
Answer: b
Explanation: In frequency hopping spread spectrum phase
coherence is hard to maintain from hop to hop.

11. Which type of demodulator is used in the frequency hopping


technique?
a) Coherent
b) Non coherent
c) Coherent & Non coherent
d) None of the mentioned
Answer: b
Explanation: As it is difficult to maintain phase coherence, non
coherent demodulator is used.

12. Robustness gives the inability of a signal to withstand the


impairments.
a) True
b) False
Answer: b
Explanation: Robustness gives the ability of a signal to withstand
the impairments such as noise, jamming etc.

13. Chips are the


a) Repeated symbols
b) Non repeated symbols
c) Smallest length symbols
d) None of the mentioned
Answer: a
Explanation: The repeated symbols are called as chips.

14. Slow frequency hopping is


a) Several hops per modulation
b) Several modulations per hop
c) Several symbols per modulation
d) None of the mentioned
Answer: b
Explanation: Slow frequency hopping is several modulation per
frequency hop.

15. Fast frequency hopping is


a) Several modulations per hop
b) Several modulations per symbol
c) Several symbols per modulation
d) None of the mentioned
Answer: d
Explanation: Fast frequency hopping is several frequency hops per
modulation.

16. Which duration is shorter?


a) Hop duration
b) Symbol duration
c) Chip duration
d) None of the mentioned
Answer: a
Explanation: In frequency hopping technique hop duration is
shorter than the symbol duration.

Acquisition and Tracking


1. Acquisition is a process of bringing two spreading signals into
_______ alignment.
a) Fine
b) Coarse
c) Fine & Coarse
d) None of the mentioned
Answer: b
Explanation: Acquisition is a process of bringing two spreading
signals into coarse alignment with one another.
2. Tracking maintains the possible waveform ______ alignment
using a feedback loop.
a) Fine
b) Coarse
c) Fine & Coarse
d) None of the mentioned
Answer: a
Explanation: Tracking continuously maintains the best possible
waveform fine alignment by means of a feedback loop.

3. Acquisition can be of ______ type.


a) Coherent
b) Non coherent
c) Coherent & Non coherent
d) None of the mentioned
Answer: c
Explanation: Acquisition can be categorized as two types coherent
and non coherent.

4. Uncertainty in the distance between transmitter and receiver


translates into uncertainty in
a) Frequency
b) Propagation delay
c) Efficiency
d) None of the mentioned
Answer: b
Explanation: uncertainty in the distance between the transmitter
and the receiver translates into uncertainty in the propagation
delay.

5. Acquisition uses ______ likelihood algorithm for acquiring the


code.
a) Minimum
b) Maximum
c) Minimum & Maximum
d) None of the mentioned
Answer: b
Explanation: It considers all possible code positions in parallel
and maximum likelihood algorithm is used to acquire the code.

6. Acquisition can be accomplished ________ as all possible codes are


examined ______
a) Slowly, one by one
b) Rapidly, simultaneously
c) Slowly, simultaneously
d) Rapidly, one by one
Answer: b
Explanation: Acquisition can be accomplished rapidly as all
possible codes are examined simultaneously.

7. Matched filter does ______ search.


a) Serial
b) Parallel
c) Serial & Parallel
d) None of the mentioned
Answer: a
Explanation: A single correlator or matched filter does serial
search.

8. How many correlators are used for despreading and code


tracking function?
a) One
b) Two
c) Three
d) None of the mentioned
Answer: a
Explanation: The design of code tracking function or despreading
function needs only one correlator.

Communication Link Analysis MCQs


9. Which has worse signal to noise performance?
a) Delay locked loop
b) Tau-dither loop
c) Delay locked & Tau-dither loop
d) None of the mentioned
Answer: b
Explanation: The signal to noise performance of TDL is a bit worse
than DDL.

Cellular Systems
1. In the case of direct CDMA, interference will occur if the PN
codes are
a) Orthogonal to each other
b) Non orthogonal to each other
c) Orthogonal & Non orthogonal to each other
d) None of the mentioned
Answer: b
Explanation: If the PN codes are not purely orthogonal in direct
CDMA interference will occur.

2. If the active users using a cell doubles, the required Eb/I0


a) Doubles
b) Halves
c) Remains the same
d) None of the mentioned
Answer: b
Explanation: If the active users were to double, then the received
Eb/I0 would essentially be halved.

3. In CDMA ______ frequency reuse is possible.


a) No
b) 50%
c) 90%
d) 100%
Answer: d
Explanation: In CDMA, 100% frequency reuse can be employed.
4. Bandwidth efficiency improvement involves
a) Dividing the geographical region into cells
b) Allowing frequency allocation
c) Dividing the geographical region into cells & Allowing
frequency allocation
d) None of the mentioned
Answer: c
Explanation: The idea of dividing the geographical region into
cells and allowing frequency allocation of one cell can be reused
represents bandwidth efficiency improvement methods.

5. Which has more user capacity?


a) CDMA
b) AMPS
c) TDMA
d) None of the mentioned
Answer: a
Explanation: CDMA has more user capacity compared to AMPS and
TDMA.

6. Which technique is interference limited?


a) TDMA
b) CDMA
c) AMPS
d) None of the mentioned
Answer: b
Explanation: CDMA technique capacity is interference limited.

7. Which technique is dimension limited?


a) TDMA
b) FDMA
c) TDMA & FDMA
d) None of the mentioned
Answer: c
Explanation: TDMA and FDMA capacity is dimension limited.

8. Which type of channel does the forward link contain?


a) Paging
b) Pilot
c) Traffic
d) All of the mentioned
Answer: d
Explanation: The forward link contains different types of channels
such as paging, pilot, synchronization and traffic.

9. The types of channels that reverse channel contains are


a) Traffic
b) Access
c) Traffic & Access
d) None of the mentioned
Answer: c
Explanation: The reverse channel contains two types of channels
– traffic and access.

10. The steps followed in forward channel CDMA includes


a) Modulo 2 addition
b) Channelization
c) Modulo 2 addition & Channelization
d) None of the mentioned
Answer: c
Explanation: Forward channel CDMA includes steps like modulo 2
addition, channelization, and base station identification.

11. Walsh cover technique is used for


a) Channelization
b) Spreading
c) Channelization & Spreading
d) None of the mentioned
Answer: c
Explanation: Walsh cover is used for channelization plus
spreading.

12. Short code is configured using ______ shift register.


a) 4-stage
b) 2-stage
c) 12-stage
d) 15-stage
Answer: d
Explanation: The code in the forward direction, short code is
designed using 15 stage shift register.

13. How many channels are transmitted in the forward and


reverse direction?
a) 1,64
b) 64,1
c) 2,32
d) 32,2
Answer: b
Explanation: In forward direction 64 channels are transmitter and
in reverse direction, only one channel is transmitted.

14. Which channel is more robust?


a) Forward channel
b) Reverse channel
c) Forward & Reverse channel
d) None of the mentioned
Answer: a
Explanation: Forward channel is more robust than the reverse
channel.

15. Which serves the hard hand-off process?


a) Base station
b) Mobile switching center
c) Mobile
d) None of the mentioned
Answer: b
Explanation: Mobile unit continuously scans for stronger pilot and
provides and serves hand off process.

16. Which serves the soft hand-off process?


a) Base station
b) Mobile switching center
c) Mobile
d) None of the mentioned
Answer: c
Explanation: Soft hand off process is served by the mobile. It scans
for stronger pilot and requests handoff to base station.

Cipher Systems and Secrecy of Cipher Systems


1. Cryptosystems are used for
a) Privacy
b) Authentication
c) Privacy & Authentication
d) None of the mentioned
Answer: c
Explanation: Cryptosystems which includes the process of
encryption and decryption is used for both privacy and
authentication.

2. The key also contains a


a) Plaintext
b) Ciphertext
c) Plaintext & Ciphertext
d) None of the mentioned
Answer: c
Explanation: The key is supplied along with a plaintext message
for encryption and cipher text message for decryption.

3. The system which has insufficient information available to


crypt-analyst is
a) One-time pad
b) Unconditionally secure
c) One-time pad & Unconditionally secure
d) None of the mentioned
Answer: c
Explanation: Unconditionally secure system is the one which has
insufficient information available to crypt-analyst. One such
system is one-time pad.

4. Caesar cipher was a mono alphabetic cipher.


a) True
b) False
Answer: a
Explanation: An earliest example of a mono alphabetic cipher was
the Caesar cipher.

5. In Caesar cipher, each plain text is replaced by


a) Alphabet shift
b) Numerals
c) Symbols
d) None of the mentioned
Answer: a
Explanation: In Caesar cipher each plain text is replaced with a
new letter obtained by an alphabetic shift.

6. The trithemius cipher is a mono alphabetical cipher.


a) True
b) False
Answer: b
Explanation: The Trithemius cipher is a poly alphabetical cipher.

7. In auto key method


a) Feedback is necessary
b) Feedback is not necessary
c) Can be either necessary or not
d) None of the mentioned
Answer: a
Explanation: In auto key method feedback is necessary for the
encryption process.

8. In Vigenere method ______ is provided.


a) Priming key
b) Feedback
c) Priming key & Feedback
d) None of the mentioned
Answer: c
Explanation: Vigenere method which is also called as vigenere
auto method priming key and feedback are used.

9. A cipher system is said to have perfect secrecy if


a) Posteriori probability is equal to priori probability
b) Posteriori probability is greater than priori probability
c) Posteriori probability is less than priori probability
d) None of the mentioned
Answer: a
Explanation: A cipher system is said to have perfect secrecy if for
every message and cipher text the posteriori probability is equal
to priori probability.

10. The conditions for perfect secrecy are


a) Only one key transforming message should exist
b) All keys should be equally likely
c) One key transforming message to each cipher text & all keys
should be equally likely
d) None of the mentioned
Answer: c
Explanation: The conditions for perfect secrecy are, there is only
one key transforming message to each cipher text and all keys
should be equally likely.
11. The _____ the uncertainty, the ______ is the information content.
a) Lesser, greater
b) Greater, lesser
c) Lesser, lesser
d) Greater, greater
Answer: d
Explanation: The more uncertainty there is in predicting the
occurrence of a message, the greater the information content.

12. Equivocation is the


a) Joint probability of X and Y
b) Conditional probability of X given Y
c) Conditional probability of Y given X
d) None of the mentioned
Answer: b
Explanation: Equivocation is defined as the conditional
probability of X given Y.

13. The maximum number of message bits contained in each


character is called as
a) True rate
b) Absolute rate
c) Optimum rate
d) None of the mentioned
Answer: b
Explanation: Absolute rate is the maximum number of message
bits contained in each character.

14. When the key size is finite, equivocation approaches


a) Unity
b) Zero
c) Infinity
d) None of the mentioned
Answer: b
Explanation: With a finite key size, equivocation approaches zero.
15. When a system is called as unbreakable?
a) When unique solution is available
b) When unique solution is not available
c) All of the mentioned
d) None of the mentioned
Answer: b
Explanation: A system is said to be unbreakable when unique
solution is not available because of the number of equations being
smaller than the number of unknown key bits.

Stream Encryption and Commercial Applications


1. Which are called as substitution encryption techniques?
a) Caesar cipher
b) Trithemius cipher
c) Caesar & Trithemius cipher
d) None of the mentioned
Answer: c
Explanation: Examples of substitution encryption techniques are
Caesar cipher and Trithemius cipher.

2. In substitution technique encryption protection is more.


a) True
b) False
Answer: b
Explanation: The substitution techniques have less encryption
protection.

3. The standard building block uses _______ of a key to transform 64-


bit input into 64-bit output.
a) 32 bit
b) 48 bit
c) 64 bit
d) 128 bit
Answer: b
Explanation: The standard building block uses 48 bit keys to
transform 64 bit input data into 64 bit output.
4. The 64 bit block input key has _____ number of parity bits.
a) 4
b) 6
c) 8
d) 16
Answer: c
Explanation: The 64 bit input key has 8 parity bits placed in
8,16…..64 bit positions.

5. One-time pad has


a) Random key
b) Unconditional security
c) Can be used only once
d) All of the mentioned
Answer: d
Explanation: One time pad is an encryption system with random
key, used one time only, that exhibits unconditional security.

6. Perfect secrecy can be achieved for


a) Finite number of messages
b) Infinite number of messages
c) Finite & Infinite number of messages
d) None of the mentioned
Answer: b
Explanation: Perfect secrecy can be achieved for infinite number
of messages since each message would be encrypted with different
portion of random key.

7. The segment of the key-stream of plaintext is obtained by _____


of two sequences together.
a) ANDing
b) ORing
c) Addition
d) Modulo 2 addition
Answer: d
Explanation: The crypt-analyst performs modulo 2 addition of two
sequences together to get the sequence of key-stream of plaintext.

8. In which method the key-stream is generated independently of


the message?
a) Synchronous encryption method
b) Self synchronous encryption method
c) All of the mentioned
d) None of the mentioned
Answer: a
Explanation: In Synchronous encryption method, the key-stream
is generated independently of message.

9. In which method cipher feedback is used?


a) Synchronous encryption method
b) Self synchronous encryption method
c) All of the mentioned
d) None of the mentioned
Answer: b
Explanation: In self synchronous encryption technique, cipher
feedback is used and the key-stream is related to the messages.

10. Spread spectrum multiple access techniques allows the


multiple signal to be transmitted
a) One after the other
b) Simultaneously
c) All of the mentioned
d) None of the mentioned
Answer: b
Explanation: Spread spectrum multiple access technique allows
multiple signals occupying the same RF bandwidth to be
transmitted simultaneously without interfering with one and
another.
11. In CDMA, the users share the bandwidth
a) Synchronously
b) Asynchronously
c) Synchronously & Asynchronously
d) None of the mentioned
Answer: b
Explanation: In CDMA system, all participants can share the entire
bandwidth asynchronously.

12. Multi paths may be because of


a) Reflections from buildings
b) Refraction
c) Atmospheric reflections
d) All of the mentioned
Answer: d
Explanation: Multi paths may be caused by atmospheric
reflections, refraction, reflections from buildings or other objects
and may result in fluctuation in the received signal level.

13. For direct sequence systems what is the minimum required


processing gain?
a) 3db
b) 10db
c) 12db
d) 20db
Answer: b
Explanation: For a direct sequence systems, the minimum
required processing gain is 10db.

14. For hybrid systems the minimum required processing gain is


a) 5db
b) 10db
c) 17db
d) 25db
Answer: c
Explanation: For hybrid systems employing both direct sequence
and frequency hopping, the minimum required processing gain is
17db.

15. Frequency hopping system can provide reliable mitigation


only if
a) Hopping rate is greater than the symbol rate
b) Hopping bandwidth is large
c) Hopping rate is greater than the symbol rate & its bandwidth is
large
d) None of the mentioned
Answer: c
Explanation: The frequency hopping system can provide reliable
mitigation only if its hopping rate is faster than the symbol rate
and the hopping bandwidth is large.

16. Direct system allows detection of signals whose psd level is


a) Below noise level
b) Above noise level
c) All of the mentioned
d) None of the mentioned
Answer: a
Explanation: Direct sequence spread spectrum techniques allow
for the detection of signals whose psd is below noise level.

Spread Spectrum
1. Spread spectrum is a ______ technique.
a) Encoding
b) Decoding
c) Encoding & Decoding
d) None of the mentioned
Answer: a
Explanation: Spread spectrum is an important encoding technique
for a wireless communication system.

2. Spread spectrum can be used to transmit


a) Analog data
b) Digital data
c) Analog & Digital data
d) None of the mentioned
Answer: c
Explanation: Spread spectrum is used to transmit analog data and
digital data using analog signal.

3. Spread spectrum makes ______ difficult.


a) Jamming
b) Interception
c) Jamming & Interception
d) None of the mentioned
Answer: c
Explanation: Spread spectrum makes jamming and interception
difficult and provides improved reception.

4. Spread spectrum has immunity from


a) Noise
b) Multi-path distortion
c) Noise & Multi-path distortion
d) None of the mentioned
Answer: c
Explanation: Spread spectrum has immunity to noise and multi-
path distortion.

5. The width of each channel in frequency hopping spread


spectrum corresponds to
a) Bandwidth of input signal
b) Pseudorandom sequence used
c) Carrier frequency
d) None of the mentioned
Answer: a
Explanation: The width of the channel in frequency hopping
spread spectrum corresponds to bandwidth of the input signal.
6. The transmitter of frequency hopping system is fed with
encoding scheme such as
a) Frequency shift keying
b) Binary phase shift keying
c) Frequency & Binary phase shift keying
d) None of the mentioned
Answer: c
Explanation: For transmission, the binary data is fed into
modulator using modulation scheme such as frequency shift
keying or binary phase shift keying.

7. Which filter is used to get the final FHSS signal?


a) Low pass filter
b) High pass filter
c) Band pass filter
d) Band stop filter
Answer: c
Explanation: Band pass filter is used to block difference frequency
and allow the sum frequency to yield final FHSS signal.

8. In CDMA the incoming signal is _____ with the spreading code.


a) Added
b) Multiplied
c) XOR-ed
d) None of the mentioned
Answer: b
Explanation: In CDMA, the incoming signal is multiplied with the
spreading code.

9. The original bandwidth of the unspread signal in spread


spectrum is ____ to data rate.
a) Proportional
b) Inversely proportional
c) Not related
d) None of the mentioned
Answer: a
Explanation: In spread spectrum, the original bandwidth of the
unspread signal is proportional to the data rate.

10. In DSSS the signal is recovered using


a) Low pass filter
b) High pass filter
c) Band pass filter
d) Band stop filter
Answer: c
Explanation: In direct sequence spread spectrum, band pass signal
at the demodulator can be used to recover the original signal.
.Nodes must be scheduled in a distributed fashion for gaining access to
the channel because
a. There is no centralized coordinators
b. Nodes are not communicating with each other
c. Exposed terminal problem
d. Power level of the receiving data is very weak
Answer a
There is no centralized coordinators
2.Identify the network for which the following statement is most suitable. “
The bandwidth reservation requires complex medium access control protocols”
a. Cellular network
b. dhoc wireless network
c. Fixed line network
d. Bluetooth network
Answer b
dhoc wireless network
3.Identify the network with the following characteristics .” Fixed
infrastructure based, single hop wireless links, guaranteed bandwidth for
voice based traffic, circuit switched ,seamless connectivity”
a. dhoc wireless network
b. Cellular network
c. Fixed land line network
d. Bluetooth network
Answer b
Cellular network
4.Which of the following network is using ISM band in the following networks
a. Fixed landline
b. Optical fibre network
c. Microwave network
d. Adhoc wireless network
Answer d
Adhoc wireless network
5.Identify the topic which is not a primary responsibility of MC protocol in adhoc
wireless network
a. Distributed arbitration for the shared channel for transmission of packets
b. Time synchronization
c. Hidden and exposed terminal problem
d.It must converge to optimal routes once the network topology becomes
stable. the convergence must be quick
Answer d
It must converge to optimal routes once the network topology becomes stable. the
convergence must be quick
6. “MC – By Invitation “is an example for M
a. Sender -initiated protocol
b. Receiver –initiated protocol
c. synchronous protocols
d. Synchronous protocol
Answer b
Receiver –initiated protocol
7. Multichannel protocols are example for M
a. Contention based protocol
b. Contention based protocol with reservation mechanism
c. Contention based protocol with scheduling mechanism
d. Other M C protocol
Answer a
Contention based protocol
7.In M C which of the following packet avoids hidden terminal problem
a. CTS
b. RTS
c. D T
d. DS
Answer a
CTS
8.In M C protocol, a neighboring node near sender which receives the RTS packet
a. Will not transmit till it receives data packet
b. Will transmit RTS-CTS packet as per the requirement
c. Will delay the transmission for long enough period so that sender could receive CTS
packet
d. Will delay the transmission it receives CTS packet
Answer c
Will delay the transmission for long enough period so that sender could receive CTS
packet
9.In a M C protocol, a node near the receiver upon hearing the CTS packet
a. Will differs its transmission till the receiver receives the data packet
b. may initiates its data transmission process as per the requirement
c.Wait for the sender stops transmission
d.will send RTS packet to the transmitter
Answer a
Will differs its transmission till the receiver receives the data packet
10.The binary exponential back off algorithm (BEB) is used when
a. The packet transmitted by the node is lost
b. The packet is too big in size
c. Faster transmission is required
d. When CTS packet is not received by the sender
Answer a
The packet transmitted by the node is lost
11 .which of the statement is not valid for the floor cquisition Multiple access (F M
) protocols
a.It is based on a channel access discipline which consists of a carrier
sensing operation and collision avoidance dialog between the sender and
intended receiver of the packet
b.Carrier sensing by the sender followed by RTS- CTS packet exchange
,enables the protocol to perform as efficiently as M C in the presence
of hidden terminals , and as efficiently as CSM otherwise
c. t any given point of time ,control of the channel is assigned to only one
node and this node is guaranteed to transmit one or more data packets
to different destination without suffering from packet collision
d. ccording to the F M principle ,in order for data transmission to be
collision free ,the duration of an RTS must be at the most equal to the
maximum channel propagation delay
Answer d
ccording to the F M principle ,in order for data transmission to be
collision free ,the duration of an RTS must be at the most equal to the
maximum channel propagation delay
12.Which of the following statement is not valid for Busy Tone Multiple ccess (BTM
) protocol
a.BTM protocol is one of the earliest protocols proposed for overcoming
the hidden terminal problem in wireless environment
b.The transmission channel is split into data channel and control channel
c.When a node is ready for transmission it senses the channel whether the
busy tone is active or not
d.When a node is transmitting data ,at the most other nodes within the
transmission range of this node is not allowed to transmit.
Answer d
When a node is transmitting data ,at the most other nodes within the
transmission range of this node is not allowed to transmit.
13.Which of the statement is not valid for Dual Busy tone Multiple access (DBTM
)Protocol
a.The transmission channel is divided into two data channel and control channel
b.The DBTM exhibits worse network utilization compared to M C and M C W
c.The control channel is used for control packet transmissions (RTS and CTS) and also for
transmitting busy tones
d. The DBTM uses two busy tones on the control channel
Answer b
The DBTM exhibits worse network utilization compared to M C and M C W
14.For controlled protocol RI-DBTM the following statement is not correct
a. It can’t retransmit packet that suffer collisions
b. The nodes does have backlog buffers
c.When a node in back logged mode receives a packet from its higher
d.layers , the packet put into buffer and transmitted later
e. node is said to be in the backlogged mode if its backlogged buffer is nonempty
Answer a
It can’t retransmit packet that suffer collisions
15.Multiple access collision avoidance -by invitation (M C -BI) Protocol is an
example for
a. Receiver initiated protocol
b. Sender initiated protocol
c. Synchronous protocol
d. synchronous protocol
Answer a
Receiver initiated protocol
16.which of the following statement about Medium access collision
voidance-by invitation(M C -BI) not correct M
a.The receiver node initiates data transmission by transmitting a ready to
receive (RTR) packet to the sender
b.Uses CTS packet to avoid the hidden terminal problem
c.The efficiency of M C –BI scheme is mainly depends on the ability of
the receiver node to predict accurately the arrival rates o traffic at the
sender nodes
d.The D T packets are modified to carry control information regarding
backlogged flows at the transmitter node, number of packets queued,
and packet length
Answer b
Uses CTS packet to avoid the hidden terminal problem
17.which of the following features are not part of The MC protocol that
uses directional antenna
a. Increase in the system throughput
b. Increase in signal interference
c. Increase in channel reuse
d. Increase in overall capacity of the channel
Answer b
Increase in signal interference
1.Nodes must be scheduled in a distributed fashion for gaining access to the
channel because
a. There is no centralized coordinators
b. Nodes are not communicating with each other
c. Exposed terminal problem
d. Power level of the receiving data is very weak
Answer a
There is no centralized coordinators
2.Identify the network for which the following statement is most suitable. “ The
bandwidth reservation requires complex medium access control protocols”
a. Cellular network
b. dhoc wireless network
c. Fixed line network
d. Bluetooth network
Answer b
dhoc wireless network
3.Identify the network with the following characteristics .” Fixed infrastructure
based, single hop wireless links, guaranteed
bandwidth for voice based traffic, circuit switched ,seamless connectivity”
a. adhoc wireless network
b. Cellular network
c. Fixed land line network
d. Bluetooth network
Answer b
Cellular network
4.Which of the following network is using ISM band in the following networks
a. Fixed landline
b. Optical fiber network
c. Microwave network
d. dhoc wireless network
Answer d
dhoc wireless network
5.Identify the topic which is not a primary responsibility of M C protocol in dhoc
wireless network
a.Distributed arbitration for the shared channel for transmission of packets
b. Time synchronization
c. Hidden and exposed terminal problem
d.It must converge to optimal routes once the network topology becomes stable. the
convergence must be quick
Answer d
It must converge to optimal routes once the network topology becomes stable. the
convergence must be quick
6.“M C – By Invitation “is an example for
a. Sender -initiated protocol
b. Receiver –initiated protocol
c. synchronous protocols
d. Synchronous protocol
Answer b
Receiver –initiated protocol
7.Multichannel protocols are example for
a. Contention based protocol
b. Contention based protocol with reservation mechanism
c. Contention based protocol with scheduling mechanism
d. Other M C protocol
Answer a
Contention based protocol
8.In M C which of the following packet avoids hidden terminal problem
a. CTS
b. RTS
c. D
d. DS
Answer a
CTS
9.In M C protocol, a neighboring node near sender which receives the RTS packet
a. Will not transmit till it receives data packet
b. Will transmit RTS-CTS packet as per the requirement
c.Will delay the transmission for long enough period so that sender could receive CTS
packet
d. Will delay the transmission it receives CTS packet
Answer c
Will delay the transmission for long enough period so that sender could receive CTS
packet
10 .In a M C protocol, a node near the receiver upon hearing the CTS packet
a.Will differs its transmission till the receiver receives the data packet
b.may initiates its data transmission process as per the requirement
c. Wait for the sender stops transmission
d. will send RTS packet to the transmitter
Answer a
Will differs its transmission till the receiver receives the data packet
11. The binary exponential back off algorithm (BEB) is used when
a. The packet transmitted by the node is lost
b. The packet is too big in size
c. Faster transmission is required
d. When CTS packet is not received by the sender
Answer a
The packet transmitted by the node is lost
12.which of the statement is not valid for the floor cquisition Multiple access (F M )
protocols
a.It is based on a channel access discipline which consists of a carrier sensing operation
and collision avoidance dialog between
the sender and intended receiver of the packet
b.Carrier sensing by the sender followed by RTS- CTS packet exchange ,enables the
protocol to perform as efficiently as M C
in the presence of hidden terminals , and as efficiently as CSM otherwise
c. t any given point of time ,control of the channel is assigned to
only one node and this node is guaranteed to transmit one or more data packets to
different destination without suffering from packet collision
d. ccording to the F M principle ,in order for data transmission to be collision free ,the
duration of an RTS must be at the most
equal to the maximum channel propagation delay
Answer d
ccording to the F M principle ,in order for data transmission to be collision free ,the
duration of an RTS must be at the most
equal to the maximum channel propagation delay
13.Which of the following statement is not valid for Busy Tone Multiple ccess (BTM
)protocol
a.BTM protocol is one of the earliest protocols proposed for
overcoming the hidden terminal problem in wireless environment
b.The transmission channel is split into data channel and control channel
c.When a node is ready for transmission it senses the channel whether the busy tone is
active or not
d.When a node is transmitting data ,at the most other nodes within the transmission
range of this node is not allowed to transmit. 1
Answer d
When a node is transmitting data ,at the most other nodes within the transmission range
of this node is not allowed to transmit.
14.Which of the statement is not valid for Dual Busy tone Multiple
access (DBTM )Protocol
a.The transmission channel is divided into two data channel and control channel
b.The DBTM exhibits worse network utilization compared to M C and M C W
c.The control channel is used for control packet transmissions (RTS and CTS) and also for
transmitting busy tones
d.The DBTM uses two busy tones on the control channel
Answer b
The DBTM exhibits worse network utilization compared to M C and M C W
15.For controlled protocol RI-DBTM the following statement is not correct
a. It can’t retransmit packet that suffer collisions 1
b. The nodes does have backlog buffers
c.When a node in back logged mode receives a packet from its higher layers , the packet
put into buffer and transmitted later
d. node is said to be in the backlogged mode if its backlogged buffer is nonempty
Answer a
It can’t retransmit packet that suffer collisions
16.Multiple access collision avoidance -by invitation (M C -BI) Protocol is an
example for
a. Receiver initiated protocol
b. Sender initiated protocol
c. Synchronous protocol
d. synchronous protocol
Answer a
Receiver initiated protocol
16.which of the following statement about Medium access collision voidance-by
invitation(M C -BI) not correct
a.The receiver node initiates data transmission by transmitting a ready to receive (RTR)
packet to the sender
b.Uses CTS packet to avoid the hidden terminal problem 1
c.The efficiency of M C –BI scheme is mainly depends on the ability of the receiver node
to predict accurately the arrival rates o traffic at the sender nodes
d.The D T packets are modified to carry control information regarding backlogged flows
at the transmitter node, number of packets queued, and packet length
Answer b
Uses CTS packet to avoid the hidden terminal problem
17.which of the following features are not part of The M C protocol that uses
directional ntenna
a. Increase in the system throughput
b. Increase in signal interference
c. Increase in channel reuse
d. Increase in overall capacity of the channel
answer b
Increase in signal interference

1.What type of routing protocols are used for inter-zone routing in ZRP?
a. Hybrid protocols are used for inter-zone routing in ZRP
b. Reactive protocols are used for inter-zone routing in ZRP
c.Proactive protocols and Reactive protocols are used for interzone routing in ZRP
d. Proactive protocols are used for inter-zone routing in ZRP
Answer b
Reactive protocols are used for inter-zone routing in ZRP
2.Given a node S with ZRP zone setting of d=2, which nodes included in the zone
of S participate in the inter-zone routing and using what type of routing protocols?
a.Only the fixed nodes participate in the inter-zone routing using a reactive routing
protocol for route discovery to the destination node.
b.Only the middle nodes participate in the inter-zone routing using a reactive routing
protocol for route discovery to the destination node.
c.Only the border nodes participate in the inter-zone routing using a reactive routing
protocol for route discovery to the destination node.
d.Only the BGP nodes participate in the inter-zone routing using a reactive routing
protocol for route discovery to the destination node.
Answer c
Only the border nodes participate in the inter-zone routing using a reactive routing
protocol for route discovery to the destination node.
3.How does Flooding differ from the route discovery phase used in other reactive
routing protocols such as DSR and ODV?
a.Flooding involves unicasting of data packet P itself and every node in the network
(other than the destination node) participates in the data packet forwarding process.
b.Flooding involves broadcasting of data packet P itself and every node in the network
(other than the destination node) participates in the data packet forwarding process.
c.Flooding involves multicasting of data packet P itself and every node in the network
(other than the destination node) participates in the data packet forwarding process.
d.Flooding involves Sening of data packet P itself and every node in the network (other
than the destination node) participates in the data packet forwarding process.
Answer c
Flooding involves multicasting of data packet P itself and every node in the network
(other than the destination node) participates in the data packet forwarding process.
4.Which routing algorithm used in NETs?
a. Shortest Path First
b. Routing Information Protocol
c. Distance Vector Protocol
d. d hoc On -demand Distance Vector Protocol
Answer d
d hoc On -demand Distance Vector Protocol
5.In ODV routing algorithm for NETs, the route is discovered at time
a. only when the network is established
b. in middle of the transmission
c. when there is a need for route by the host
d. when there is no need for route by the host
Answer b
when there is a need for route by the host
6. Challenge for routing protocol in ad-hoc networks.
a. Reliability
c. obility
d. vailability
d. Security
Answer c
obility
7.When a group of nodes are required to contact, which type of the following
routing is useful?
a. ulticast
b. Unicast
c. Broadcast
d. Forecast
Answer a
ulticast
8.Hybrid Routing Protocol is a network routing protocol that combines
a.Proactive Routing protocol and on-demand routing protocol features.
b.Distance Vector Routing Protocol and Link state Routing Protocol features.
c.dhoc on-demand Routing Protocol and Link state Routing Protocol features.
d.Distance Vector Routing Protocol and Link state Routing Protocol features.
Answer b
Distance Vector Routing Protocol and Link state Routing Protocol features.
9. Proactive Routing protocol is——–
a. Distance Vector Routing Protocol
b. Link state Routing Protocol
c. table driven routing protocol.
d. on-demand routing protocol
Answer c
table driven routing protocol.
10. The Clusters in Hierarchical routing are grouped in to ………………
a. Clusters
b. Zones
c. Blocks
d. Cells
Answer b
Zones
11.If a router sends every incoming packet out only on those lines that are going
approximately in the right direction is known as……………..
a. Random flooding
b. Static flooding
c. Selective flooding
d. Early flooding
Answer c
Selective flooding
12.Which of the following ad hoc protocol updates the topology dynamically (on-
demand)?
a. Distance Vector protocol
b. Fisheye State Routing protocol
c.Dynamic Source Routing protocol
d. Destination Sequenced Distance Vector protocol
Answer a
Distance Vector protocol
13.In Dynamic Source Routing each source determines the route to be used in
a. transmitting its packets to selected destinations.
b. receiving its packets to selected destinations.
c. transmitting its packets to selected source.
d. receiving its packets to selected source.
Answer a
transmitting its packets to selected destinations.
14.n/ ……….routing scheme is designed to enable switches to react to changing
traffic patterns on the network.
a. static routing
b. fixed alternative routing
c. standard routing
d. dynamic routing
Answer d
dynamic routing
15. protocol which report routing information only when there is a change in the
topology of the network.
a. d-hoc On-demand Distance Vector
b. Distance-vectors Routing
c. Zone Routing Protocol
d. Dynamic Source Routing
Answer b
Distance-vectors Routing
16.DSDV is a table-driven routing scheme for ad hoc mobile networks based on
a. The Bellman-Ford algorithm.
b. Dijkstra lgorithm
c. Path vector
d. Link state
Answer a
The Bellman-Ford algorithm.
17. normal Flooding technique in anet is an example of ………………
a. ulticasting
b. Unicasting
c. Telecasting
d. Broadcasting
Answer d
Broadcasting
18.What type of routing protocols are used for intra-zone routing in ZRP?
a. Proactive protocols are used for intra-zone routing in ZRP
b. Hybrid protocols are used for intra-zone routing in ZRP
c. Reactive protocols are used for intra-zone routing in ZRP
d.Proactive protocols and Reactive protocols are used for intrazone routing in ZRP
Answer a
Proactive protocols are used for intra-zone routing in ZRP

1.____________ is sent to TCP-F sender, If the broken links rejoins or intermediate


node obtains a new path to destination
a.A Route reestablishment notification (RRN)
b.A Route Failure Notification(RFN)
c.A explicit route disconnection notification (ERDN)
d.A explicit route successful notification packet (ERSN)
Answer a
Route reestablishment notification (RRN)
2. TCP-BUS is Abbreviated as________
a.A TCP with buffering capacity and sequence information
b.A TCP with buffering capability and sending information
c.A TCP with buffering capability and sequence information
d.A TCP with buffering capacity and sending information
Answer c
TCP with buffering capability and sequence information
3.TCP-BUS makes use of some of the special messages such as _______, defined as
part of ABR for finding a partial path.
a.A DUR and ECN
b.A localized query (LQ) and REPLY
c.A DUR and ICMPDUR
d.A ERDN and ERSN
Answer b
localized query (LQ) and REPLY
4.In TCP_BUS,upon the detection of a path break, an intermediate node called
the____
a.Pivot node (PN)
b.Failure node (FN)
c.Active node(N)
d. Distributing node(DN)
Answer c
Active node(N)
5. RTT is Abbreviated as________
a.A Round trip time
b.A Rest trip time
c.A Read track time
d.A Round track time
Answer b
Rest trip time
6. The aim of TCP-F is________
a.A minimize the throughput degradation resulting from path breaks.
b.A to treat path breaks independently from congestion situations.
c.A congestion control
d.A end-to-end reliability.
Answer a
minimize the throughput degradation resulting from path breaks
7.Which one of the option is false about following statement:-
According to TCP-ELFN an explicit link failure notification is used.
a.A When an intermediate node detects a link failure
b.A Once the TCP-ELFN sender receives the ELFN packet
c.A Being in standby state the TCP-ELFN sender
d.A Being in Connected state the TCP-ELFN sender
Answer d
Being in Connected state the TCP-ELFN sender
8. What is it goal of congestion control?
a.A Making sure that subnet is not able to carry the offered traffic
b.A Making sure that subnet will allowmore than the offered packets
c.A Making sure that subnet is able to carry the offered traffic
d.A Making sure that subnet will not allow any traffic
Answer c
Making sure that subnet is able to carry the offered traffic
9. Time out determination policy is used in ………………….
a.A Network layer
b.A Data link layer
c.A Transport layer
d.A Application layer
Answer c
Transport layer
10.Congestion window reaches the receiver window (which is advertised by the
TCP receiver and carries the information about the receiver’s buffer size), is
called___
a.A slow-start
b.A congestion avoidance
c.A exponential start
d.A congestion detection
Answer b
congestion avoidance
11.The slow start phase of the TCP congestion control algorithm, the size of the
congestion window_____
a.A does not increase
b.A increases linearly
c.A increases quadratically
d.A increases exponentially
Answer d
increases exponentially
12.TCP-F is Abbreviated as________
a.A TCP fact
b.A TCP feedback 1
c.A TCP field
d.A TCP flag
Answer b
feedback
13.In TCP-F,the intermediate node that originates the RFN packet is called the_____
M
a.A failure point (FP)
b.A failure node (FN)
c.A Active point(AP)
d.A Active node(AN)
Answer a
failure point (FP)
14.In TCP-ELFN, CWND = 1 causes No significant change, because –
a.A Optimal window is relatively small
b.A It is similar to No change
c.A Default value of RTO is small
d.A Optimal window is relatively large
Answer a
Optimal window is relatively small
15.When ATCP encounters 3 duplicate ACKs, it puts TCP in ______________.
a.A Active state
b.A Persist state
c.A Idle state
d.A Waiting state
Answer b
Persist state
1.For Jamming attack targeted layer in the protocol stack is ?
a. Physical and Mac layers
b. Network Layer
c. application Layer
d. Multi Layer
Answer a
Physical and Mac layers
2. For wormhole attack Targeted layer in the protocol stack is ?
a. Physical and Mac layers
b. Network Layer
c. application Layer
d. Multi Layer
Answer b
Network Layer
3. For routing attack targeted layer in the protocol stack is:
a. Physical and Mac layers
b. Network Layer
c. application Layer
d. Multi Layer
Answer b
Network Layer
4.For Denial of Service attack Targeted layer in the protocol stackis:
a. Physical and Mac layers
b. Network Layer
c. application Layer
d. Multi Layer
Answer d
Multi Layer
5. For Byzantine attack Targeted layer in the protocol stack is: M
a. Physical and Mac layers
b. Network Layer
c. application Layer
d. Multi Layer
Answer b
Network Layer
6. following is not a types of Spoofing :
a. Email Spoofing
b. Website Spoofing
c. IP Spoofing
d. hit and Run DDOS
Answer d
hit and Run DDOS
7. Which is not data traffic attack?
a. Blackhole attack
b. grayhole
c. jellifish
d. Rushing
Answer d
Rushing
8. Which is the control traffic attack?
a. Corporative blackhole
b. jellyfish
c. Dos attack
d. Man in the middle attack
Answer d
Man in the middle attack
9.Which one is the mitigation techniques in Blackmailing & Cooperative
Blackmailing attack?
a. authenticated Routing protocol
b. Dynamic Trust based, Distributed IDs
c. Sybil ttack
d. Secure Neighbor Routing protocol
Answer b
Dynamic Trust based, Distributed IDs
10 . What is in mean by Man in Middle attack?
a.Its an active attack in which an attacker disguises itself as another node either by
sending stolen beacon or generating such false beacons to register himself with a node
as a neighbor.
b.This attack is manifests itslf by faking multiple nodes in the network.
c.In this attack, the attacker node creeps into a valid route and tries to sniff packets
flowing through it. 1
d.In Cosmological term, connects two distant points in space via a shortcut route.
Answer c
In this attack, the attacker node creeps into a valid route and tries to sniff packets
flowing through it.
11. Which one is the not a charatcteristics of d Hoc Network?
a. No fixed infrastructure
b. Dynamic changing topology
c. Energy-constrained
d. fixed infrastructure 1
Answer d
fixed infrastructure
12.The layer who protecting the ad hoc routing and forwarding protocols?
a. Transport Layer
b. application Layer
c. Link Layer
d. Network Layer 1
Answer d
Network Layer
13.The layer that protecting the wireless MC protocol and providing link-layer
security support
a. Transport Layer
b. application Layer
c. Link Layer 1
d. Network Layer
Answer c
Link Layer
14.The layer that preventing signal jamming denial-of-service attacks?
a. Physical Layer 1
b. Network Layer
c. Link Layer
d. pplication Layer
Answer a
Physical Layer
15. IDSs stands for
a. Improve Detection System
b. Information Detection System
c. Intrusion Detection Systems 1
d. Intrusion Discovery Systems
Answer c
Intrusion Detection Systems
16. M NETS stands for
a. Mobile Adhoc Network 1
b. Man in middle Network
c. Mobility access Network
d. Minor attack Network
Answer a
Mobile Adhoc Network

1._________gives out some of its self organizing behaviour to VANET?


a.MANET
b.Personal Area Network
c.Wireless Sensor Network
d.LAN
Answer a
MANET
2.Which one is not a characteristic of VANET?
a.High Node Mobility
b.Active Road safety
c.Geographical Position
d.Mobility Model.
Answer b
Active Road safety
3.___________ which can be help for vehicles in providing the location information
for routing purpose. M
a.Geographical Position System
b.Global Positioning System
c.Country Side
d.Highway
Answer b
Global Positioning System
4. Which one is VANETs application?
a.Different QoS Requirement
b.No energy Constraint
c.Comfort and Information Applications
d.Mobility Model.
Answer c
Comfort and Information Applications
5. Routing Protocol in VANET is :
a.Topology Based Routing Protocol
b.Interior Gateway Protocol
c.Distance Vector Protocol
d.Link State Protocol
Answer a
Topology Based Routing Protocol
6. Which is not challenging in VANET?
a.Quality of Service
b.Standards
c.No energy Constraint
d.Routing
Answer c
No energy Constraint
7.____ hybrid simulator is used to achieve bidirectional coupled simulation in
VANET. M
a.VEINS(Vehicle in Network Simulator)
b.NS2
c.NS3
d.OPNET
Answer a
VEINS(Vehicle in Network Simulator)
8. VANETs are a key part of the _________ framework. M
a.Intelligent travel Systems
b.Intelligent transportation Systems
c.Information Transport Systems
d.Intelligent transport Secure
Answer b
Intelligent Transportation Systems
9. What is the full form of MANET?
a.Metropolitan Area Network
b.Mobile Adhoc Network
c.Man in Middle Network
d.Mobile Access Network
Answer b
Mobile Adhoc Network
10.The standarization is not used for vehicular communication in VANET is M
a.DSRC
b.IEEE 82.11p
c.IEE 83.33
d.Wave
Answer c
IEE 83.33
11. Dedicated Short Range Communication (DSRC) was introduce in :
a.199
b.1993
c.1999
d.1998
Answer c
1999
12.The frequency Band of Dedicated Short Range Communication (DSRC) is
divided into _________ channels of 1MHz.
a.7
b.4
c.6
d.8
Answer a
7
13.Dedicated Short Range Communication (DSRC) supported vehicles speed upto
______ .
a.18kmph
b.19kmph
c.16kmph
d.14kmph
14.Dedicated Short Range Communication (DSRC) supports data rate upto
___________
a.27 Mbps
b.25 Mbps
c.23 Mbps
d.22 Mbps
Answer a
27 Mbps
15.Dedicated Short Range Communication (DSRC) supports transmission range
upto ___________
a.1 m
b.125 m
c.13 m
d.15 m
Answer a
1m
1. Military vehicles on a battlefield with no existing infrastructure will deploy ............... network.
(A) MANET (B) Cell Network
(C) LAN (D) Wi-Fi
Answer: A
2. The network in which all the nodes are symmetric and there is no central control or hierarchy is
.................
(A) MANET (B) Client -Server Technology
(C) Peer-to-Peer (D) None of these
Answer: C
3. What is the type of network in which the topology change from time to time?
(A) Wi-Fi (B) Cell Network
(C) LAN (D) MANET
Answer: D
4. The processes that keep track of all mobile hosts visiting the area is .................
(A) Home agent (B) Mobile agent
(C) Foreign agent (D) User agent
Answer: C
5. The hosts which are basically stationary hosts who move from one fixed site to another from time
to time but use the network only when they are physically connected to it are called ................
(A) Migratory hosts (B) Stationary hosts
(C) Mobile hosts (D) Random hosts
Answer: A

6. The hosts who compute on the run and want to maintain their connections as they move around
...............
(A) Migratory hosts (B) Stationary hosts
(C) Mobile hosts (D) Random hosts
Answer: C
7. What is the type of network in which the routers themselves are mobile?
(A) Wide Area Network (B) Mobile Ad hoc Network
(C) Mobile Network (D) Local Area Network
Answer: B
8. What is the routing algorithm used in MANETs?
(A) Shortest Path First
(B) Routing Information Protocol
(C) Distance Vector Protocol
(D) Ad hoc On -demand Distance Vector Protocol
Answer: D
9. Why probe packets are transmitted in the network?
(A) to know about the capacity of the channel
(B) to count the number of host in the network
(C) to know about efficiency of the routing algorithm
(D) to know about the congestion
Answer: D
10. If the source deduces the existence of congestion by making local observations, such as the time
needed for acknowledgements to come back is called as .................
(A) Explicit feedback algorithm (B) Implicit feedback algorithm
(C) Explicit forward algorithm (D) Implicit forward algorithm
Answer: B

The address field of a frame in HDLC protocol contains the address of the .................. station.
(A) primary (B) secondary
(C) tertiary (D) a station
Answer: B
2. In ................... transmission, the channel capacity is shared by both communicating devices at all
times.
(A) Simplex (B) half-duplex
(C) full-duplex (D) automatic
Answer: C
3. The DNS name space is divided into non overlapping ......................
(A) regions (B) blocks
(C) divisions (D) zones
Answer: D
4. Source routing bridges in the same LANs must have ............... bridge Number.
(A) Same (B) Different
(C) Source (D) Destination
Answer: B
5. Repeater function in the ...................... layer.
(A) Physical (B) Data link
(C) Network (D) None of these
Answer: A

6. A repeater takes a weakened or corrupted signal and ............... it.


(A) Amplifies (B) Regenerates
(C) Resample (D) Reroute
Answer: B
7. The PSTN is an example of ................. network.
(A) packet-switched (B) circuit-switched
(C) message-switched (D) TSI
Answer: B
8. In a time division switch, a .................. governs the destination of a packet stored in RAM.
(A) TDM bus (B) cross bar
(C) cross point (D) control unit
Answer: D
9. How many cross points are needed in a single stage switch with 40 inputs and 50 outputs.
(A) 40 (B) 50
(C) 90 (D) 2000
Answer: D
10. The ................. of A TSI controls the order of delivering of slot values that are stored in RAM.
(A) cross bar (B) cross point
(C) control unit (D) transceiver
Answer: D
The receive equalizer reduces delay distortions using a ...............
(A) tapped delay lines (B) gearshift
(C) descrambler (D) difference engine
Answer: A
2. While transmitting odd-parity coded symbols, the number of zeros in each symbol is:
(A) odd (B) even
(C) Both (A) and (B) (D) unknown
Answer: D
3. The program that accepts the commands for composing, receiving and replying to messages, as
well as for manipulating mail boxes is .....................
(A) user agent (B) browser agent
(C) message transfer agent (D) server agent
Answer: A
4. A file is being transferred. The time required actually is 6- hours. The mean time between crashes
is 2-hours. The time required for the transfer is hours if synchronization is not provided.
(A) 12 hours (B) 3 hours
(C) Zero hours (D) Infinite
Answer: D
5. The parameter which gives the probability of the transport layer itself spontaneously terminating a
connection due to internal problems is called ...............
(A) protection (B) resilience
(C) option negotiation (D) transfer failure
Answer: B

6. .................... type of multiplexing are used by transport layer to improve transmission efficiency.
(A) upward (B) downward
(C) horizontal (D) vertical
Answer: A
7. Multiplexing of different transport connections onto the same network connection is called
................
(A) Upward multiplexing (B) Downward multiplexing
(C) Congestion control (D) Flow control
Answer: A
8. Window size in TCP header indicates ................
(A) number of bytes the receiver is willing to accept
(B) number of bytes the sender is willing to accept
(C) number of bytes the sender transmitting in each segment
(D) number of bytes in the receiver
Answer: B
9. The size of the TCP congestion window depends on .................
(A) bandwidth (B) retransmission time
(C) threshold parameter (D) traffic
Answer: C
10. The FIN bit in the TCP header represents .................
(A) establish connection (B) release a connection
(C) data transfer (D) None of these
Answer: B
1. The mean delay of static channel allocation in LANS and MANS using FDM is ...............
(A) T=1/A (B) T=1/pc
(C) T=1/(pc-A) (D) T=1/p
Answer: C
2. What is the port number for (File Transfer Protocol - Control) FTP?
(A) 20 (B) 21
(C) 22 (D) 35
Answer: B
3. Port number for (Secure Shell) SSH?
(A) 20 (B) 21
(C) 25 (D) 22
Answer: D
4. Busy Waiting is found in ..............
(A) ALOHA (B) Slotted ALOHA
(C) 1-persistent CSMA (D) non-persistent CSMA
Answer: C
5. Contention Slots are not found in .......................
(A) non-persistent CSMA (B) CSMA/CD
(C) Bitmap (D) None of these
Answer: A

6. A problem with Bitmap protocols is an overhead of ..................... bit(s) per station.


(A) 0 (B) 1
(C) 2 (D) 3
Answer: B
7. In adaptive tree walk protocol we use ...................... and ..................... searching.
(A) Graph and Breadth First (B) Tree and Breadth First
(C) Graph and Depth First (D) Tree and Depth First
Answer: D
8. A hub is used in ......................... Ethernet.
(A) 10Base 5 (B) 10Base 2
(C) 10Base – T (D) 10Base - F
Answer: C
9. A transceiver cable is used in ......................... Ethernet.
(A) 10Base 5 (B) 10Base 2
(C) 10Base - T (D) 10Base - F
Answer: A
10. The protocol used in ETHERNET?
(A) ALOHA (B) Binary Count down
(C) CSMA/CD (D) Multiple Access Protocol
Answer: C
1 MIN stands for

a. Mobile Identification Number


b. Mobile Internet
c. Mobility In Network
d. None of the above

ANSWER: Mobile Identification Number

The process of transferring a mobile station from one base station to another is

MSC
b. Roamer

c. Hand off

d. Forward channel

ANSWER: Hand off

15) The 2G cellular network uses


a. TDMA/FDD
b. CDMA/FDD
c. Digital modulation formats
d. All of the above
ANSWER: All of the above

2G standards support
a. Limited internet browsing
b. Short Messaging Service
c. Both a & b
d. None of the above

ANSWER: Both a & b

19) The 2G GSM technology uses a carrier separation of

a. 1.25 MHz
b. 200 KHz
c. 30 KHz
d. 300 KHz

ANSWER: 200 KHz

The shape of the cellular region for maximum radio coverage is

a. Circular
b. Square
c. Oval
d. Hexagon

ANSWER: Hexagon

The advantage of using frequency reuse is

a. Increased capacity
b. Limited spectrum is required
c. Same spectrum may be allocated to other network
d. All of the above

ANSWER: All of the above

In Handoff

a. Process of transferring the call to the new base station


b. Transfers the call
c. New channel allocation is done
d. All of the above

ANSWER: All of the above


1. Which of the following is the world’s first cellular system to specify digital modulation and
network level architecture?
a) GSM
b) AMPS
c) CDMA
d) IS-54
View Answer
Answer: a
Previously in 1980s, GSM stands for ____________
a)Global system for mobile
b)Groupe special mobile
c)Global special mobile
d) Groupe system mobile
B

What is the type signalling between Mobile Station and


Base Transceiver Station in a 2G technology?
A) Analog
B) Digital
C) Discrete
D) Dampened
Answer(B)
Digital

GSM technology was a standard developed by ?


A) United Kingdom
B) United States
C) Europe
D) Australia
Answer(C)
Europe.
Data service started or offered by 2G GSM technology
is?
A) GPRS
B) EDGE
C) H
D) A and B
Answer(D)
GPRS and EDGE

GPRS stands for ?


A) General Packet Radio Service
B) General Packet Radio Pilot
C) Generation Pilot Radio Service
D) None of the above
Answer(A)
General Packet Radio Service

Choose a correct abbreviation below.


A) SGSN - Serving GPRS Support Node
B) GGSN - Gateway GPRS Support Node
C) IP - Internet Protocol
D) All
Answer [=]
D

GPRS is a Connection Oriented service. True/False?


A) False
B) True
C) -
D) -
A

Type-A Mobile Station supports ________.


A) Only Speech
B) Only Data
C) Speech and Data Simultaneously
D) Speech or Data one at a time.
Answer [=]
C
Q1. Which of the following stores all the user-related data that is relevant
for the GSM system in mobile computing?

1. Sim
2. HLR
3. ELR
4. VLR

Answer 1

. Which of the following stores Mobile Subscriber ISDN number –


MSISDN?

1. Home location register


2. Visitor location register
3. Entity equipment register
4. None of the above

Answer 1

You are here: Home / Mobile Computing Notes / Online Mcqs Test – Mobile Computing
MCQ with Answers

Online Mcqs Test – Mobile Computing


MCQ with Answers
Dated: September 24, 2020Filed Under: Mobile Computing Notes

Online Mcqs Test – Mobile Computing MCQ with


Answers
Online Mcqs Test – Mobile Computing MCQ with Answers -All these are very important
MCQ questions related to mobile computing and mobile and wireless communication to get
success in written as well as interview examinations.
Gsm in mobile computing
Q1. Which of the following stores all the user-related data that is relevant for the GSM
system in mobile computing?

1. Sim
2. HLR
3. ELR
4. VLR

Answer 1

Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?

1. Home location register


2. Visitor location register
3. Entity equipment register
4. None of the above

Answer 1

Q3. In which of the following Codes with specific characteristics can be applied to the
transmission?

1. GSM
2. GPRS
3. CDMA
4. None of the above

Answer 3

4. Which of the following allow the use of entire bandwidth simultaneously?

1. TDMA
2. FDMA
3. CDMA
4. None of the above

Answer 3

. The base station covers a specific area that is called a ——

1. Cell
2. Tessellate
3. Mobile station
4. None of the above

Answer 1

5. In a cellular system, the shape of the cell depends on —–

Environmental conditions

Social conditions

Political conditions
None of the above

Answer 1

9. Which of the following provides packet mode data transfer service over
the cellular network system?

1. GSM
2. GPRS
3. TCP
4. None of the above

Answer 2

Q10. Which of the following services/ services are defined by the GSM?

1. Bearer
2. Supplementary
3. Tele
4. All of the above

Answer 4

Q16. Which of the following uses high-frequency radio waves instead of


cables for connecting the devices in LAN?

1. Wired LAN
2. Wireless LAN
3. Fiber made LAN
4. None of the above

Answer 2

Q17. Most WLANs are based upon the standard—-

1. IEEE 802.2
2. IEEE 802.11
3. IEEE 802.5
4. IEEE 802.15
Answer 2

Q18. Which of the following is/are the advantages of a wireless LAN?

1. Flexibility
2. Ease of use
3. Robustness
4. All of the above

Answer 4

You are here: Home / Mobile Computing Notes / Online Mcqs Test – Mobile Computing
MCQ with Answers

Online Mcqs Test – Mobile Computing


MCQ with Answers
Dated: September 24, 2020Filed Under: Mobile Computing Notes

Online Mcqs Test – Mobile Computing MCQ with


Answers
Online Mcqs Test – Mobile Computing MCQ with Answers -All these are very important
MCQ questions related to mobile computing and mobile and wireless communication to get
success in written as well as interview examinations.
Gsm in mobile computing
Q1. Which of the following stores all the user-related data that is relevant for the GSM
system in mobile computing?

1. Sim
2. HLR
3. ELR
4. VLR

Answer 1

Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?

1. Home location register


2. Visitor location register
3. Entity equipment register
4. None of the above
Answer 1

Q3. In which of the following Codes with specific characteristics can be applied to the
transmission?

1. GSM
2. GPRS
3. CDMA
4. None of the above

Answer 3

Q4. Which of the following allow the use of entire bandwidth simultaneously?

1. TDMA
2. FDMA
3. CDMA
4. None of the above

Answer 3

Q5. The base station covers a specific area that is called a ——

1. Cell
2. Tessellate
3. Mobile station
4. None of the above

Answer 1

Q6. In a cellular system, the shape of the cell depends on —–

1. Environmental conditions
2. Social conditions
3. Political conditions
4. None of the above

Answer 1

Q7. Cellular System or having small cells needs ——–

1. Handover
2. Infrastructure
3. Frequency planning
4. All of the above

Answer 4

Q8. In a cellular system, the same frequency is used for other users using the technique ——
—-

1. Frequency planning
2. Frequency hopping
3. Frequency reuse
4. None of the above

Answer 3

Q9. Which of the following provides packet mode data transfer service over the cellular
network system?

1. GSM
2. GPRS
3. TCP
4. None of the above

Answer 2

Q10. Which of the following services/ services are defined by the GSM?
1. Bearer
2. Supplementary
3. Tele
4. All of the above

Answer 4

Bluetooth Technology
Online Mcqs Test – Mobile Computing MCQ with
Answers
Q11. Bluetooth Technology supports

1. Piconet
2. Ad hoc piconet
3. Scatter net
4. All of the above
Answer 4

Q12. Which of the following wireless technology is used for exchanging data between a
variety of fixed and mobile devices over a very short diameter?

1. Mobile technology
2. Bluetooth technology
3. Ad hoc computing
4. None of the above

Answer 2

Q13. In Bluetooth which of the following device decides the hopping sequence?

1. Master
2. Parked
3. Standby
4. Slave

Answer 1

Q14. In which of the following the total available bandwidth is split into many channels of
smaller bandwidth plus guard spaces between the channels?

1. FHSS
2. DSSS
3. Both a and b
4. None of the above

Answer 1

Q15. In which of the following a single data stream is split across several separate
narrowband channels at different frequencies to reduce interference and crosstalk.

1. OFDM
2. GSM
3. GPRS
4. UMTS

Answer 1

Q16. Which of the following uses high-frequency radio waves instead of cables for
connecting the devices in LAN?

1. Wired LAN
2. Wireless LAN
3. Fiber made LAN
4. None of the above

Answer 2

Q17. Most WLANs are based upon the standard—-

1. IEEE 802.2
2. IEEE 802.11
3. IEEE 802.5
4. IEEE 802.15

Answer 2

Q18. Which of the following is/are the advantages of a wireless LAN?

1. Flexibility
2. Ease of use
3. Robustness
4. All of the above

Answer 4

Q19. Disadvantages of WLANs include —–


1. Interference and noise
2. Slower than wired
3. Greater care is needed for encryption
4. All of the above

Answer 4

In piconet devices connected with the master is called

1. Slaves
2. Parked
3. Standby
4. None of the above

Answer 1

You are here: Home / Mobile Computing Notes / Online Mcqs Test – Mobile Computing
MCQ with Answers

Online Mcqs Test – Mobile Computing


MCQ with Answers
Dated: September 24, 2020Filed Under: Mobile Computing Notes

Online Mcqs Test – Mobile Computing MCQ with


Answers
Online Mcqs Test – Mobile Computing MCQ with Answers -All these are very important
MCQ questions related to mobile computing and mobile and wireless communication to get
success in written as well as interview examinations.
Gsm in mobile computing
Q1. Which of the following stores all the user-related data that is relevant for the GSM
system in mobile computing?

1. Sim
2. HLR
3. ELR
4. VLR

Answer 1

Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?

1. Home location register


2. Visitor location register
3. Entity equipment register
4. None of the above
Answer 1

Q3. In which of the following Codes with specific characteristics can be applied to the
transmission?

1. GSM
2. GPRS
3. CDMA
4. None of the above

Answer 3

Q4. Which of the following allow the use of entire bandwidth simultaneously?

1. TDMA
2. FDMA
3. CDMA
4. None of the above

Answer 3

Q5. The base station covers a specific area that is called a ——

1. Cell
2. Tessellate
3. Mobile station
4. None of the above

Answer 1

Q6. In a cellular system, the shape of the cell depends on —–

1. Environmental conditions
2. Social conditions
3. Political conditions
4. None of the above

Answer 1

Q7. Cellular System or having small cells needs ——–

1. Handover
2. Infrastructure
3. Frequency planning
4. All of the above

Answer 4

Q8. In a cellular system, the same frequency is used for other users using the technique ——
—-

1. Frequency planning
2. Frequency hopping
3. Frequency reuse
4. None of the above

Answer 3

Q9. Which of the following provides packet mode data transfer service over the cellular
network system?

1. GSM
2. GPRS
3. TCP
4. None of the above

Answer 2

Q10. Which of the following services/ services are defined by the GSM?
1. Bearer
2. Supplementary
3. Tele
4. All of the above

Answer 4

Bluetooth Technology
Online Mcqs Test – Mobile Computing MCQ with
Answers
Q11. Bluetooth Technology supports

1. Piconet
2. Ad hoc piconet
3. Scatter net
4. All of the above
Answer 4

Q12. Which of the following wireless technology is used for exchanging data between a
variety of fixed and mobile devices over a very short diameter?

1. Mobile technology
2. Bluetooth technology
3. Ad hoc computing
4. None of the above

Answer 2

The overlapping portion of two piconets is called——–

1. Piconet
2. Ad hoc piconet
3. Scatter net
4. All of the above

Answer 3

Q52. Bluetooth technology is used for —-

1. Connection of peripheral devices


2. Ad-hoc networking
3. Bridging network gaps
4. All of the above

Answer 4

Q53. In Bluetooth which of the following device follow the hopping


sequence?

1. Master
2. Parked
3. Standby
4. Slave

Answer 4

The most WLANs are based upon —-

1. IEEE 802.11
2. WiFi
3. Both a and b
4. None of these

Answer 3

You are here: Home / Mobile Computing Notes / Online Mcqs Test – Mobile Computing
MCQ with Answers

Online Mcqs Test – Mobile Computing


MCQ with Answers
Dated: September 24, 2020Filed Under: Mobile Computing Notes

Online Mcqs Test – Mobile Computing MCQ with


Answers
Online Mcqs Test – Mobile Computing MCQ with Answers -All these are very important
MCQ questions related to mobile computing and mobile and wireless communication to get
success in written as well as interview examinations.
Gsm in mobile computing
Q1. Which of the following stores all the user-related data that is relevant for the GSM
system in mobile computing?

1. Sim
2. HLR
3. ELR
4. VLR

Answer 1

Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?

1. Home location register


2. Visitor location register
3. Entity equipment register
4. None of the above
Answer 1

Q3. In which of the following Codes with specific characteristics can be applied to the
transmission?

1. GSM
2. GPRS
3. CDMA
4. None of the above

Answer 3

Q4. Which of the following allow the use of entire bandwidth simultaneously?

1. TDMA
2. FDMA
3. CDMA
4. None of the above

Answer 3

Q5. The base station covers a specific area that is called a ——

1. Cell
2. Tessellate
3. Mobile station
4. None of the above

Answer 1

Q6. In a cellular system, the shape of the cell depends on —–

1. Environmental conditions
2. Social conditions
3. Political conditions
4. None of the above

Answer 1

Q7. Cellular System or having small cells needs ——–

1. Handover
2. Infrastructure
3. Frequency planning
4. All of the above

Answer 4

Q8. In a cellular system, the same frequency is used for other users using the technique ——
—-

1. Frequency planning
2. Frequency hopping
3. Frequency reuse
4. None of the above

Answer 3

Q9. Which of the following provides packet mode data transfer service over the cellular
network system?

1. GSM
2. GPRS
3. TCP
4. None of the above

Answer 2

Q10. Which of the following services/ services are defined by the GSM?
1. Bearer
2. Supplementary
3. Tele
4. All of the above

Answer 4

Bluetooth Technology
Online Mcqs Test – Mobile Computing MCQ with
Answers
Q11. Bluetooth Technology supports

1. Piconet
2. Ad hoc piconet
3. Scatter net
4. All of the above
Answer 4

Q12. Which of the following wireless technology is used for exchanging data between a
variety of fixed and mobile devices over a very short diameter?

1. Mobile technology
2. Bluetooth technology
3. Ad hoc computing
4. None of the above

Answer 2

Q13. In Bluetooth which of the following device decides the hopping sequence?

1. Master
2. Parked
3. Standby
4. Slave

Answer 1

Q14. In which of the following the total available bandwidth is split into many channels of
smaller bandwidth plus guard spaces between the channels?

1. FHSS
2. DSSS
3. Both a and b
4. None of the above

Answer 1

Q15. In which of the following a single data stream is split across several separate
narrowband channels at different frequencies to reduce interference and crosstalk.

1. OFDM
2. GSM
3. GPRS
4. UMTS

Answer 1

Q16. Which of the following uses high-frequency radio waves instead of cables for
connecting the devices in LAN?

1. Wired LAN
2. Wireless LAN
3. Fiber made LAN
4. None of the above

Answer 2

Q17. Most WLANs are based upon the standard—-

1. IEEE 802.2
2. IEEE 802.11
3. IEEE 802.5
4. IEEE 802.15

Answer 2

Q18. Which of the following is/are the advantages of a wireless LAN?

1. Flexibility
2. Ease of use
3. Robustness
4. All of the above

Answer 4

Q19. Disadvantages of WLANs include —–


1. Interference and noise
2. Slower than wired
3. Greater care is needed for encryption
4. All of the above

Answer 4

Q20. In piconet devices connected with the master is called

1. Slaves
2. Parked
3. Standby
4. None of the above

Answer 1

Online Mcqs Test – Mobile Computing MCQ with


Answers
Q21 The general goal of a file system is to support———-

1. Transparent access to data


2. Efficient access to data
3. Consistent access to data
4. All of the above

Answer 4

Q 22 In the distributed system a client gives the request, and the server provides—-

1. Data
2. Service
3. Information
4. All of the above

Answer 2

Q 23. The important challenges of distributed systems apply to DFS are ——

1. Migration of data
2. Concurrent access to data
3. Replication of data
4. All of the above

Answer 4

Q24. Features of CODA is/are

1. A disconnected operation for mobile computing


2. Freely available under a liberal license
3. High performance through client-side persistent caching
4. All of the above

Answer 4
Q25. Which of the file system apply gossip protocols?

1. CODA
2. Ficus
3. Rover
4. None of the above

Answer 2

Q26. Mio-NFS supports the following mode/modes ———-

1. Connected
2. Loosely connected
3. Disconnected
4. All of the above

Answer 3

Q27. Which of the following are objects that can be dynamically loaded into a client
computer from a server (or vice-versa) to reduce client-server communication?

1. Relocatable dynamic objects


2. Locatable objects
3. Dynamic objects
4. None of the above

Answer 1

Q28 Which of the following allows for non-blocking RPCs even when a host is
disconnected?

1. Queued remote procedure calls


2. Remote procedure calls
3. Both a and b
4. None of the above
Answer 1

Q29. All transactions must satisfy the —–

1. Consistency
2. Availability
3. ACID Property
4. All of the above

Answer 3

Q 30. The ability of a system to perform its function correctly even in the presence of internal
faults is called

1. Fault tolerance
2. Recovery
3. Both a and b
4. None of the above

Answer 3
TCP IP MCQ
Online Mcqs Test – Mobile Computing MCQ with
Answers

Q 31. TCP is a reliable protocol that incorporates

1. congestion control
2. Flow control mechanisms
3. guarantees in-order delivery of data
4. All of the above

Answer 4
Q32. TCP supports many of the Internet’s most popular application protocols and resulting
applications, including

1. World Wide Web


2. e-mail,
3. File Transfer Protocol
4. All of the above

Answer 4

Q 33. Which of the following segments a TCP connection into a fixed part and a wireless
part?

1. Indirect TCP
2. Direct TCP
3. Both a and b
4. None of the above

Answer 1

Q 34. Advantages of Indirect TCP includes

1. Fast transmission
2. Congestion control
3. Error control
4. All of the above

Answer 4

Q 35. The main function of snooping TCP is —-

1. To buffer data close to the mobile host to perform fast local retransmission in case of packet loss.
2. Congestion control
3. Flow control
4. None of the above

Answer 1
Q 36. I-TCP and Snooping TCP does not help much if a mobile host gets

1. Out of coverage area


2. Disconnected
3. Battery power low
4. None of the above

Answer 2

Q 37. M-TCP wants to improve overall throughput to

1. to lower the delay


2. to maintain end-to-end semantics of TCP
3. to provide a more efficient handover
4. All of the above

Answer 4

Q 38. Disadvantages of Mobile TCP includes

1. Assuming low bit error rates


2. Lack of buffering
3. Lack of acknowledgment
4. None of the above

Answer 1

Q39. A very useful extension of TCP is the use of

1. Buffering packets
2. Congestion control
3. Selective retransmission
4. All of the above

Answer 3
Q40. Which of the following combine packets for connection establishment and connection
release with user data packets?

1. Transaction oriented TCP


2. Indirect TCP
3. Snooping TCP
4. None of the above

Answer 1

Online Mcqs Test – Mobile Computing MCQ with


Answers

Q41. Mobile Computing allows transmission of data, from one wireless-enabled device to
another —-
1. Any device
2. Wired device
3. Wireless-enabled device
4. None of the above

Answer 3

Q42. The most important feature/s of mobile computing technology is/are —-

1. Mobility
2. Portability
3. Wireless connectivity
4. All of the above

Answer 4

Q43. Which of the following is the base of most mobile communications?

1. GSM
2. GPRS
3. CDMA
4. None of the above

Answer 1

Q44. Which of the following allow the use of only some part of bandwidth?

1. TDMA
2. FDMA
3. Both a and b
4. None of the above

Answer 3

Q45. A group of cells without overlapping gaps is called ——


1. Cell
2. Tessellate
3. Mobile station
4. None of the above

Answer 2

Q46. In a cellular system, the shape of the cell is generally —–

1. Hexagon
2. Circular
3. Square
4. None of the above

Answer 1

Q47. Important mobile computing application/s is/are —–

1. Education
2. Sports
3. Games
4. All of the above

Answer 4

Q48. Challenges of mobile computing include ———

1. Low Security
2. Ad hoc Networking
3. Shared medium
4. All of the above

Answer 4

Q49. The base station covers a specific area that is called a —-


1. Cell
2. Radius
3. Tessellate
4. None of the above

Answer 1

Online Mcqs Test – Mobile Computing MCQ with


Answers

Q50. Which of the following services/service are defined within the bearer services?

1. Data transmission
2. Forward error correction
3. Flow control
4. All of the above

Answer 4
Q51. The overlapping portion of two piconets is called——–

1. Piconet
2. Ad hoc piconet
3. Scatter net
4. All of the above

Answer 3

Q52. Bluetooth technology is used for —-

1. Connection of peripheral devices


2. Ad-hoc networking
3. Bridging network gaps
4. All of the above

Answer 4

Q53. In Bluetooth which of the following device follow the hopping sequence?

1. Master
2. Parked
3. Standby
4. Slave

Answer 4

Q54. Which of the following system takes a user bitstream and perform an (XOR)? The result
is either the sequence 0110101 (if the user bit equals 0) or its complement 1001010 (if the
user bit equals 1).

1. FHSS
2. DSSS
3. Both a and b
4. None of the above
Answer 2

Q55. Slow and fast hopping is used in —-

1. FHSS
2. GSM
3. GPRS
4. UMTS

Answer 1

Q56. The most WLANs are based upon —-

1. IEEE 802.11
2. WiFi
3. Both a and b
4. None of these

Answer 3

Q57. The advantages of WLANs are —–

1. Flexibility
2. Robustness
3. Less cost
4. All of the above

Answer 4

Q58. Disadvantages of WLANs are —–

1. Slow speed
2. Noise
3. More effort for Security
4. All of the above
Answer 4
MULTIPLE CHOICE QUESTIONS – WIRELESS COMMUNICATION

1. Which of the following is/are the main part(s) of basic cellular system.
A) A mobile Unit
B) A cell Site
C) A mobile Telephone Switching Office
D) All of the above

2. Fading of the received radio signals in a mobile communication environment occurs because of .....
A) Direct propagation
B) Multipath Propagation
C) Bi-path Propagation
D) None of the above

3.State whether True of False.


i) The cells or subdivisions of a geographical area are always hexagonal.
ii) A land to Mobile call originates through the Telephone exchange.
A) True, False
B) False, True
C) False, False
D) True, True

4. In .............. Frequency Spectrum is divided into smaller spectra and is allocated to each user.
A) TDMA
B) CDMA
C) FDMA
D) FGMA

5. In ................ multiple access is achieved by allocating different time slots for the different users.
A) TDMA
B) CDMA
C) FDMA
D) FGMA

6. State whether True of False.


i) In GSM only TDMA is used.
ii) There is zero inter-channel interference in CDMA.
A) True, False
B) False, True
C) False, False
D) True, True
7. The basic GSM is based on ____________________ traffic channels.
A) connection oriented.
B) connection less.
C) packet switching.
D) circuit switching.

8. ..................... are typically characterized by very small cells, especially in densely populated areas.
A) 2G system.
B) 3G system.
C) 2.5G system.
D) 3.5G system.

9. A antenna which attempts to direct all its energy in a particular direction is called as a .............
A) Directional Antenna
B) One to One Antenna
C) Propagation Antenna
D) Single Direction Antenna

10. Which mode is used for installing networks in wireless communication device characteristics?
A) Fixed and wired.
B) Mobile and wired.
C) Fixed and wired.
D) Mobile and wireless.

11. Wireless LANs implement security measures in the


A. System Layers.
B. Data Link Layers.
C. Sub Layers.
D. Multi Layers.

12. Specifications for a wireless LAN are called


A. Standard 802.3z.
B. Standard 802.3u.
C. Project 802.3.
D. IEEE 802.11.

13. In wireless LAN, there are many hidden stations so we cannot detect the
A. Frames.
B. Collision.
C. Signal.
D. Data.
14. Term that is used for stationary or mobile wireless station and also have optional central base
station is called
A. Point to point.
B. Multi point.
C. Network point.
D. Access point.

15. Wireless communication is started in


A. 1869.
B. 1895.
C. 1879.
D. 1885.

Answers:
1. D) 2. B) 3.B) 4. C) 5. A) 6. C) 7. A) 8. C) 9. A) 10. C) 11. B) 12. D) 13. B) 14. D) 15. B)

You might also like