Mobile Computing Important MCQs

Multiple Choice Questions 15 Pages
SKM

Contributed by

Samir Kumar Master
Loading
  • KDK College of Engineering Nagpur
    Department of Information Technology
    7
    th
    Sem BE IT
    Elective-1 Mobile Computing
    Objective Questions _ Set_I
    ______________________________________________________________________________
    1) For 802.11 System Architecture Which of the following is true c
    I. An association between a station and a BSS is dynamic.
    II. Stations may turn off, come within range, and go out of range.
    a) I Only
    b) II Only
    c) Both I & II
    d) None of this
    2. For 802.11 System Architecture ,Distribution System can be a d
    a) Switch
    b) Wired network
    c) Wireless network
    d) All of the above
    3. Which of the following is not a component of 802.11 - Architecture of an infrastructure
    network a
    a) Independent Basic service set
    b) Portal
    c) Distribution system
    d) Access point
    4. 802.11 - Architecture of an ad-hoc network is useful for- b
    a) Direct communication within a unlimited range
    b) Direct communication within a limited range
    c) Indirect communication within a limited range
    d) None of mentioned
    5. Which of the following is not a MAC Layer Functions d
    a) On transmission, assemble data into a frame with address and
    error detection fields.
    b) On reception, disassemble frame, and perform address recognition
    and error detection.
    c) Govern access to the LAN transmission medium.
    d) Provide an interface to higher layers and perform flow and error control
    6. Which of the following is not a function associated with MAC Management c
    a) Synchronization
    b) Roaming
    c) fragmentation
    d) power management
    7. PLCP stands for- b

    Page 1

  • a) Physical Layer Control Protocol
    b) Physical Layer Convergence Protocol
    c) Physical Layer Congestion Protocol
    d) None of above
    8. Which of the following is a functionality associated with PMD Physical Medium
    Dependent layer in WLAN protocol architecture a
    a) modulation, coding
    b) channel selection, MIB
    c) coordination of all management functions
    d) access mechanisms, fragmentation, encryption
    9. Which of the following is a functionality associated with Station Management in 802.11
    protocol architecture c
    a) modulation, coding
    b) channel selection, MIB
    c) coordination of all management functions
    d) access mechanisms, fragmentation, encryption
    10. DCF in MAC layer of IEEE 802.11 WLAN uses ______technique. c
    a) CSMA/CD
    b) Physical channel sensing
    c) CSMA/CA
    d) All of mentioned
    11. Which of the following is not a Distribution System Services (DSS) ? c
    a) Association
    b) Disassociation
    c) Authentication
    d) Integration
    12. In IEEE 802.11, which of the following is a service initiated by station? d
    a) privacy
    b) Distribution
    c) Integration
    d) Reassociation
    13. In IEEE 802.11 Services, which service is not used to support MSDU delivery? b
    a) Integration
    b) Authentication
    c) Disassociation
    d) Distribution

    Page 2

  • 14. Which of the MAC Management function allow the station to switch the system to low
    power or to turn off the power?
    b
    a) Synchronization
    b) Power Management
    c) Roaming
    d) None of mentioned
    15. In IEEE 802.11 - Frame format, which of the following is not a type of frame? a
    a) Sequence frame
    b) control frames,
    c) management frames,
    d) data frames
    16. Authentication service is a service provided by b
    a. Distribution system
    b. Station
    c. Both
    d. None
    17. MIB in WLAN stands for a
    a. Management Information Base
    b. Management Internet Band
    c. Machine Information Band
    d. Machine Information Base
    18. In WLAN, a special frame CTS is _____ byte long c
    a. 10
    b. 20
    c. 14
    d. 24
    19. In WLAN, a special frame RTS is _____ byte long b
    a. 10
    b. 20
    c. 14
    d. 24
    20. sending a probe on each channel and waiting for a response is called as b
    a. passive scanning
    b. active scanning
    c. roaming
    d. none of above
    21. Mobility between BSSs and within ESS is- b
    a. Basic mobility
    b. Micro mobility
    c. Macro mobility
    d. None
    22. Mobility between two ESS is called as c

    Page 3

  • a. Basic mobility
    b. Micro mobility
    c. Macro mobility
    d. None
    23. When device is capable of moving within service area of AP while remains connected
    with the network is - a
    a. Basic mobility
    b. Micro mobility
    c. Macro mobility
    d. None
    24. Authentication in IEEE 802.11 are- a,c
    a. open system
    b. Closed System
    c. shared key
    d. All of mentioned
    25. Open system authentication simply provides a way for two parties to agree to exchange
    data and provides no security benefits. Identify whether the statement is true or false
    a
    a. True
    b. False
    c. Cannot say
    d. None
    26. Which of the following is not a component of Mobile agent? b
    a) Code
    b) Process
    c) Attributes
    d) State
    27. Mobile agent is _________ that can migrate from system to system within a network
    environment to improve performance. a
    a) Software program
    b) Hardware
    c) Firmware
    d) malware
    28. Information describing the agent, its origin and owner, its movement history, resource
    requirements, authentication keys etc. means- d
    a) code
    b) State
    c) Behavior

    Page 4

  • d) Attribute
    29. Behavioral aspect of Mobile code System contains the types- d
    a) Code on Demand
    b) Remote Evaluation
    c) Mobile Agents
    d) All of mentioned
    30. Java Applets is an example of a
    a) Code on Demand
    b) Remote Evaluation
    c) Mobile Agents
    e) Client server
    31. WWW, RPC, Webservices, CORBA, EJBs are examples of_______ Mobile code system
    d
    a) Code on Demand
    b) Remote Evaluation
    c) Mobile Agents
    d) Client server
    32. In code on demand mobile code system, data is _______ & code is ___________ a
    a) Static,mobile
    b) dynamic,mobile
    c) Static,mobile
    d) None of mentioned
    33. Which of the following is not a property of mobile agent? c
    a) Intelligent functionality
    b) Agent communication language
    c) consistency
    d) Mobility
    34. Which of the following is not an advantage of Mobile Agent ? b
    a) overcome network latency in real-time systems
    b) increase in the network load
    c) encapsulate protocols by bringing their own protocol code
    d) none of above
    35. Which of the following is not a characteristic of Mobile agent? a
    a) Agent to host communication
    b) Prevent agent interference
    c) Unique identity
    d) Must determine what other agents are executing on agent host
    36. Which of the following is not a characteristic of Mobile agent? c
    a) Agent to agent communication

    Page 5

  • b) Prevent agent interference
    c) Multiple identity
    d) None of above
    37. Automatic program Updates example exhibits which of the following property of Mobile
    agent? b
    a) Intelligent functionality
    b) Autonomy
    c) Mobility
    d) Agent communication language
    38. The agents which are helpful in commercial sites are c
    a) Network & system mgmt agents
    b) User assistance agents
    c) Interest matching agents
    d) Organizational structure agents
    39. When moving, a mobile agent carries code + data state + execution state. This scenario is
    seen in case of b
    a) Weak mobility
    b) Strong mobility
    c) Hybrid mobility
    d) None of mentioned
    40. MASIF stands for- d
    a) Mobile Agent System Interoperability Forum
    b) Mobile Agent System Internet Facilities
    c) Mobile Agent System Internet Forum
    d) Mobile Agent System Interoperability Facilities
    41. load balancing & failure anticipation are functionalities associated with c
    a) Interest matching agents
    b) Organizational structure agents
    c) Network & system mgmt agents
    d) User assistance agents
    42. The agents which are used at user level to provide services to users are d
    a) Interest matching agents
    b) Organizational structure agents
    c) Network & system mgmt agents
    d) User assistance agents
    43. An agent system is a ________that can create, interpret, execute, transfer and terminate
    agents. b
    a) Network
    b) Platform
    c) Protocol

    Page 6

  • d) None
    44. Currently, most agents are programmed in _________language for portability a
    a) an interpreted language
    b) procedural language
    c) structured Query Language
    d) all of mentioned
    45. Which of the following is not an events in Mobile Agent’s life-time c
    a) Creation
    b) Activation
    c) Mutation
    d) Cloning
    46. An Events in Mobile Agent’s life-time in which a brand new agent is born and its state is
    initialized - c
    a) Cloning
    b) Activation
    c) Creation
    d) Deactivation
    47. An Events in Mobile Agent’s life-time in which an agent travels to a new host. a
    a) Dispatch
    b) Retraction
    c) Disposal
    d) Cloning
    48. An Events in Mobile Agent’s life-time in which an agent is brought back from a remote
    host along with its state to the home machine. b
    a) Dispatch
    b) Retraction
    c) Disposal
    d) Cloning
    49. Which of the following is not a reason among Seven Good Reasons for Mobile Agents
    c
    a) They encapsulate protocols
    b) They execute asynchronously and autonomously
    c) They increase network load
    d) They overcome network latency
    50. Possible applications of Mobile agents are- d
    a) E-Commerce
    b) Personal Assistance
    c) Secure Brokering
    d) All of mentioned
    51. Which of the following is not a key elements to achieve interoperability between agents

    Page 7

  • d
    a) Common agent communication language and protocol
    b) Common format of context of communication,
    c) Shared ontology
    d) an agent must authenticate itself to the host
    52. The requirement in which host enforces strict access control to its resources a
    a) Authorization
    b) Authentication
    c) Auditing
    d) None of mentioned
    53. Agent poses as another agent to gain access to services or data at a host in- a
    a) Masquerading
    b) Denial of Service
    c) Unauthorized Access
    d) None of mentioned
    54. Which of the following are agent Protecting mechanism- a,b,c,d
    a) Digital Signature
    b) Safe Code Interpretation
    c) Software-Based Fault Isolation
    d) Path Histories
    55. One of the most widely used interpretative languages today for mobile agent is c
    a) C++
    b) Ada
    c) Java
    d) Visual Basic
    56. Aglets are java based framework for Mobile agents and designed by- a
    a) IBM
    b) Microsoft
    c) Nokia
    d) d) None
    57. Transportable agent system Agent Tcl is developed using a language A
    a) TcL
    b) Java
    c) Scheme
    d) none
    58. Which of the following is not a Java based mobile agent system- c
    a) Voyager
    b) Aglets
    c) Tacoma

    Page 8

  • d) Odyssey
    59. Which of the following is not a mobile agent platform? c
    a) Voyager
    b) Aglets
    a) Tahiti
    b) Agent Tcl
    60. Which of the following is not true about Aglet? c
    a) It is mobile Java Object
    b) It is autonomous
    c) none
    d) It is reactive
    61. Aglet context is- a
    a) Workspace
    b) Shield for aglet
    c) Object exchanged between aglet
    e) All of above
    62. Aglets are applied in different scenarios like D
    a) e-commerce
    b) e-market place
    c) Air tickets & package tours
    d) All of mentioned
    63. Aglets are java based framework for Mobile agents and designed by- a
    a) IBM
    b) Microsoft
    c) Nokia
    d) None
    64. Agent_Tcl uses pretty good policy(PGP) for which one of the following function?
    b
    a) To encrypt servers
    b) To authenticate servers
    c) To authorize servers
    d) none of above
    65. Which of the following is a Task not performed by server in agent TcL - c
    a) migration
    b) Low level inter agent communication
    c) security
    d) status of running agents

    Page 9

  • 66. Agent level support system with docking system includes- d
    a) Server
    b) support agent
    c) Network monitor
    d) All
    67. Which one of the following is not considered as a requirement for mobile agent System?
    d
    a) Portability
    b) Security
    c) Ubiquity
    d) Resource availability
    68. WAP stands for A
    a) Wireless Application Protocol
    b) Wired Application Protocol
    c) Wireless Analysis Protocol
    d) Wired Analysis Protocol
    69. WAP sites (Mobile internet sites) are websites written in, or dynamically converted to-
    C
    a) HTML
    b) XML
    c) WML
    d) none of mentioned
    70. WAP application is enable to access WAP sites using which of the following WAP
    browser- b
    a) Macro-browser
    b) Micro-browser
    c) Mini browser
    d) All
    71. In WTP, which class of transaction service is responsible to provide unreliable message
    transfer without any result message a
    a) Class 0
    b) Class 1
    c) Class 2
    d) None of mentioned

    Page 10

Download this file to view remaining 5 pages

logo StudyDocs
StudyDocs is a platform where students and educators can share educational resources such as notes, lecture slides, study guides, and practice exams.

Contacts

Links

Resources

© 2025 StudyDocs. All Rights Reserved.