0% found this document useful (0 votes)
188 views

Wireless MCQs

The document contains a collection of multiple choice questions related to wireless and mobile communication. It includes questions about wireless security threats, firewalls, wireless network attacks, cellular network capacity expansion techniques like sectoring, cell splitting and microcells. Questions also cover CDMA fundamentals, roaming in cellular networks, components of GSM systems, transmission methods and air interface characteristics. The document serves as an assignment on wireless and mobile communication for undergraduate students.

Uploaded by

Salma Akter
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
188 views

Wireless MCQs

The document contains a collection of multiple choice questions related to wireless and mobile communication. It includes questions about wireless security threats, firewalls, wireless network attacks, cellular network capacity expansion techniques like sectoring, cell splitting and microcells. Questions also cover CDMA fundamentals, roaming in cellular networks, components of GSM systems, transmission methods and air interface characteristics. The document serves as an assignment on wireless and mobile communication for undergraduate students.

Uploaded by

Salma Akter
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 73

NOAKHALI SCIENCE AND TECHNOLOGY UNIVERSITY

Department of Electrical and Electronic Engineering


(EEE)
Course Code : EEE 4109

Course Title : Wireless and Mobile Communication

Assignment On : MCQs on Wireless and Mobile

Communication

 Submitted To
Mr. Kamaruzzaman
Assistant Professor,
Department of EEE,
NSTU.
 Submitted By
Group-1

Group-2

Group-3

Dept.: EEE

Year: 04; Term: 01

Session: 2016-17

Submission Date: 12.07.2021


Group-1

1. Which one of the following can be considered as the class of computer


threats?

a. Dos Attack
b. Phishing
c. Soliciting
d. Both A and C

Ans: a

2. It can be a software program or a hardware device that filters all data


packets coming through the internet, a network, etc. it is known as
the_______:

a. Antivirus
b. Firewall
c. Cookies
d. Malware

Ans: b

3. To protect the computer system against the hacker and different kind of
viruses, one must always keep _________ on in the computer system.

a. Antivirus
b. Firewall
c. Vlc player
d. Script

4. Which attack attempts to alter system resources or affect their


operation?

A. active attack
B. passive attack
C. dual attack
D. third-party attack
5. ____________________ is the anticipation of unauthorized access or
break to computers or data by means of wireless networks.
a) Wireless access
b) Wireless security
c) Wired Security
d) Wired device apps
6. The transmitted message must make sense only to intended ________,
in message confidentiality.
A. Sender
B. Receiver
C. Translator
D. Modulor
E. Both A & B
F. None of these

7. Which security mechanism is implemented to counter security attacks?


a) Security prevention
b) Security detection
c) Recovery
d) a+b

8. Security service that ensures the sender of the information is correctly


identified is called _
a)Integrity
b)Authentication
c)Confidentiality
d)Availability

9. Which kind of ‘Attack’ causes attack on confidentiality?


a)Interruption
b)Modification
c)Interception
d)Fabrication

10. Which kind of ‘Attack’ causes attack on authentication ?


a)Modification
b)Interception
c)Fabrication
d)a+c

10. Which of the following techniques do not help in expanding the


capacity of cellular system?
a) Sectoring
b) Scattering
c) Splitting
d) Microcell zone concept

Answer: b
Explanation: As the demand for wireless service increases, the number
of channels assigned to a call eventually becomes insufficient to support
the required number of user. Techniques such as cell splitting, sectoring
and coverage zone approaches are used in practice to expand the capacity
of cellular system.

11. Which of the following technology distributes the coverage of the cell
and extends the cell boundary to hard-to-reach places?
a) Cell splitting
b) Scattering
c) Sectoring
d) Micro cell zone concept

Answer: d
Explanation: Micro cell zone concept distributes the coverage of the cell
and extends the cell boundary to hard-to reach places. It is the solution for
the problem of increased number of handoffs when sectoring which
results in an increase of load on switching.

12. Which of the following trunking inefficiencies?


a) Cell splitting
b) Micro cell zone technique
c) Sectoring
d) Repeaters

Answer: c
Explanation: Sectored cells experience trunking inefficiencies. Cell
splitting and zone micro cell techniques do not suffer the trunking
inefficiencies experienced by sectored cells. They enable the base station
to oversee all handoff chores related to microcells, thus reducing the
computational load at MSC.

13. Cell splitting allows a system to grow by replacing large cells with
bigger cells.
a) True
b) False

Answer: b
Explanation: Cell splitting allows a system to grow by replacing large
cells with smaller cells. It does not upset the channel allocation scheme
required to maintain the minimum co channel reuse ratio Q between co-
channel cells.

14. Which of the following technique is used to limit radio coverage of


newly formed microcells?
a) Sectoring
b) Splitting
c) Antenna downtilting
d) Scattering

Answer: c
Explanation: Antenna downtilting deliberately focuses radiated energy
from the base station toward the ground (rather than toward the horizon).
It is often used to limit the radio coverage of newly formed microcells.

15. Sectoring increases SIR (Signal to Interference Ratio).


a) True
b) False

Answer: a
Explanation: Sectoring increases SIR so that cluster size may be reduced.
SIR is improved using directional antenna. And then capacity
improvement is achieved by reducing the number of cells in a cluster,
thus increasing the frequency reuse.

16. Which of the following has range extension capability?


a) Sectoring
b) Repeaters
c) Scattering
d) Micro cell zone concept

Answer: b
Explanation: Wireless operator needs to provide dedicated coverage for
hard-to-reach areas, such as within buildings, or in valleys or tunnels.
Radio transmitters used to provide such range extension capabilities are
called as repeaters. They are bidirectional in nature.

17. Repeaters has one drawback of reradiating ____________


a) Frequency
b) Channels
c) Power
d) Repeater noise and interference

Answer: d
Explanation: Upon receiving signals from a base station forward link, the
repeater amplifies and reradiates the base station signals to the specific
coverage region. Unfortunately, the received noise and interference is
also reradiated by repeater on both the forward and reverse link.
18. Which of the following is not an advantage of micro cell zone
technique?
a) Reduced co channel interference
b) Improved signal quality
c) Increase in capacity
d) Increasing number of base stations

Answer: d
Explanation: The advantage of the zone cell technique is that co-channel
interference in the cellular system is reduced since a large central base
station is replaced by several low powered transmitters on the edges of
the cell. Thus, signal quality is reduced and it leads to an increase in
capacity.

19. In a micro cell zone concept, when a mobile travels from one zone to
another within the cell, it retains the same _________
a) Power level
b) Base station
c) Channel
d) Receiver

Answer: c
Explanation: As a mobile travels from one zone to another within the cell,
it retains the same channel. Thus, unlike in sectoring, a handoff is not
required at the MSC when the mobile travels between zones within the
cell. The channels are re used in co channel cells in a normal fashion.

20. What is the shape of the cell present in the cellular system?

o Circular
o Square
 Hexagonal
o Triangular
21. Which of the following increases the number of base stations in order
to increase capacity

a) Cell splitting

b) Sectoring

c) Repeaters

d) Micro cell zone concept

Answer: a

22. In a Cellular network, which of the following is used to use the same
frequency for others?

o Frequency hopping
 Frequency reuse
o Frequency planning
o None of the above

23. 5. Which of the following can be considered as the advantage of using


frequency reuse?

o The same spectrum can be allocated to the other networks


o Only a limited spectrum is required
o Increase capacity
 All of the above

24. Radio capacity may be increased in cellular by_____

o Increase in the radio spectrum


 Increasing the number of base stations & reusing the channels
o None of the above
o Both a & b

25. What is the relation between D, R (radius of each cell) and N (No. of
cells in a cluster)?

o 𝑅 = √3𝑁𝐷
 𝐷 = √3𝑁𝑅
o 𝐷 = √3𝑅𝑁
o 𝐷 = √3𝑁/𝑅
26. How N per cluster can be represented?

 𝑁= 𝑖 2 + 𝑖𝑗 + 𝑗 2
o 𝑁= 𝑖 2 + 2𝑖𝑗 + 𝑗 2
o 𝑁= 𝑖 2 + 4𝑖𝑗 + 𝑗 2
o 𝑁= 𝑖 2 + 𝑖/𝑗 + 𝑗 2

27. What is the direction of j in respect with i?

o 900 to the direction of i.


o 450 to the direction of i.
 600 to the direction of i.
o 300 to the direction of i.

28. What is the most popular value for N (No. of cells in a cluster)?

o 3 and 9
o 1 and 4
o 7 and 28
 4 and 7

29. Determine the transmit power for a CDMA mobile unit that is
receiving a signal from the base station at 100 dBm
o 12 dBm
 24 dBm
o 36 dBm
o 14 dBm
30. Class of orthogonal spreading coded used in CDMA communication
o Color code
 Walsh code
o PCS code
o CDMA
31. It is when a mobile unit moves from one cell to another from one
company's service area to another company's service area.
 Roaming
o Handoff
o Handover
o Paging
32. Which Station in the mobile service not intended to be used while in
motion.
o base station
o fixed station
o coast station
 land station

33. In the GSM system, a "smart card" containing all user information,
which is inserted into the phone before use
o IMSI
o IMEI
o IMTS
 SIM

34. When transmitting digital information, voice transmission is


inhibited, this is called ______.
o Quieting
o Muting
 blank-and-burst
o all of these
35. In mobile wireless communication, the radio equipment and the
propagation path
o FSL
 air interface
o direct link
o mobile interface
36. Macrocells have base stations transmit power between _____.
o 3W to 7W
 1W to 6W
o 2W to 8W
o 0.1W to 5W
37. It is a 34-bit binary code that represents the 10-digit telephone
number
o electronic serial number
o system identification
o digital color code
 mobile identification number

38. The AMPS system uses a ___________ cell reuse pattern.

a) One

b) Five

c) Three

d) Seven

Answer: d

Explanation: The AMPS system uses a seven-cell reuse pattern. It also


provides sectoring and cell splitting to increase capacity when needed.

39. Which of the following is virtually identical to AMPS?

a) ETACS

b) GSM

c) CDMA

d) IS-54

Answer: a

Explanation: ETACS is virtually identical to AMPS. It was developed in


middle 1980s and stands for European Total Access Communication
System.

40. AMPS and ETACS use ___________ and _____ for radio
transmission.

a) FM, TDD

b) FM, FDD

c) AM, TDD

d) FM, FDB

Answer: b
Explanation: Like all other first generation, analog, cellular systems,
AMPS and ETACS use frequency modulation (FM) and frequency
division duplex (FDD) for radio transmission.

41. US AMPS system provides 42 control channels for each of the two
service providers.

a) True

b) False

Answer: b

Explanation: In the US AMPS system, there are twenty-one control


channels for each of the two service providers in each market. However,
ETACS supports forty-two control channels for a single provider.

42. Which one is correct for transmit carrier frequency for N is equal to
345?

a) ft = 0.03𝑁 + 825

b) ft = 0.03(𝑁 − 1023) + 825

c) ft = 0.03𝑁 + 895

d) ft = 0.03(𝑁 − 1023) + 895

Answer: a
Explanation: The mobile units transmit carrier frequency in MHz for any
channel is calculated as follows:

ft = 0.03𝑁 + 825 𝑓𝑜𝑟 1 ≤ 𝑁 ≤ 866

ft = 0.03(𝑁 − 1023) + 825 𝑓𝑜𝑟 990 ≤ 𝑁 ≤ 1023

43. Which one is correct for transmit carrier frequency for N is equal to
1020?

a) ft = 0.03𝑁 + 825

b) ft = 0.03(𝑁 − 1023) + 825


c) ft = 0.03𝑁 + 895

d) ft = 0.03(𝑁 − 1023) + 895

Answer: b

Explanation: The mobile units transmit carrier frequency in MHz for any
channel is calculated as follows:

ft = 0.03𝑁 + 825 𝑓𝑜𝑟 1 ≤ 𝑁 ≤ 866

ft = 0.03(𝑁 − 1023) + 825 𝑓𝑜𝑟 990 ≤ 𝑁 ≤ 1023

44. FBMC means-


o Frequency Build Minimum Carrier
o Frequent Bank Multidimensional Carrier
o Filter Based Multi Carrier
 Filter Bank Multi Carrier
45. OFDM means-
o Optical Frequency Data Multiplexing
o Opto-electronic Frequent Division Multiplexing
 Orthogonal Frequency Division Multiplexing
o Orthogonal Field Data Multiplexing
46. In transmitter of OFDM-
o Data stream converted DC to AC signal
 Data stream converted serial to parallel
o Data stream converted parallel to serial
o Data stream converted AC to DC signal
47. In receiver of OFDM use-
 Low pass filter
o High pass filter
o Hybrid filter
o Band pass filter
48. What is not true for OFDM?
o It can reduce interference between subcarrier
 It has higher bandwidth efficiency
o It offers a lower complexity
o Cyclic Prefix is needed
49. FFT means-
o Fast Frequency Transform
o Fast Frequency Transmission
 Fast Fouriar Transform
o Fast Field Transmission

50. OFDM modulation technique is called-


 Symbol mapping
o Frequency mapping
o Fouriar mapping
o Fast Mapping

51. _______ uses directional antennas to control interference


a) Sectoring
b) Cell splitting
c) Repeaters
d) Micro cell zone concept
Answer: a

52. Header of datagram in IPv4 has _________

a) 0 to 20 bytes
b) 20 to 40 bytes
c) 20 to 60 bytes
d) 20 to 80 bytes

53. In IPv4 layer, datagram is of ________


a) Fixed length
b) Variable length
c) Global length
d) Zero length

54. _______ allows an orderly growth of the cellular system.


a) Sectoring
b) Scattering
c) Cell splitting
d) Micro cell zone technique
Answer: c
55. Three strategies used to handle transition from version 4 to version 6
are dual-stack, tunneling and ________
a) Header Switching
b) Header Translation
c) Header Transfer
d) Header Transmission

56. In IPv6, real-time audio or video, particularly in digital form, requires


resources such as __________
a) Fixed Bandwidth
b) Variable Bandwidth
c) High Bandwidth
d) Low Bandwidth

57. In practical IPv6 application, a technology encapsulates IPv6 packets


inside IPv4 packets, this technology is called _______
a) Tunneling
b) Hashing
c) Routing
d) NAT

58. Which one of the following descriptions about IPv6 is correct?


a) Addresses are not hierarchical and are assigned at random
b) Broadcasts have been eliminated and replaced with multicasts
c) There are 2.7 billion available addresses
d) An interface can only be configured with one IPv6 address

59. Which are the features present in IPv4 but not in IPv6?
a) Fragmentation
b) Header checksum
c) Options
d) All of the mentioned

60. IPv6 is designed to allow extension of the _________


a) Protocol
b) Dataset
c) Headers
d) Routes

61. In IPv6, base header can be followed by, up to _________


a) Six Extension Layers
b) Six Extension Headers
c) Eight Extension headers
d) Eight Extension layers

62. In an IPv6 datagram, M bit is 0, value of HLEN is 5, value of total


length is 200 and offset value is ___________
a) 400
b) 350
c) 300
d) 200

63. Which of the following techniques do not help in expanding the


capacity of cellular systems?
a) Sectoring
b) Scattering
c) Splitting
d) Microcell zone concept
Answer: b

64. In the IPv6 header, the traffic class field is similar to which field in
the IPv4 header?
a) Fragmentation field
b) Fast switching
c) TOS field
d) Option field

65. Checksum is used in Internet by several protocols although not at the


_________
a) Session layer
b) Transport layer
c) Network layer
d) Data link layer
66. What is the name of the database that stores subscriber information
under an MSC and his eligible services?
A) MSC
B) HLR
C) EIR
D) AuC

67. Which of the following is not applicable for IP?


a) Error reporting
b) Handle addressing conventions
c) Datagram format
d) Packet handling
Answer: a
Explanation: The Internet Protocol is the networking protocol that
establishes the internet by relaying datagram across network boundaries.
ICMP is a supporting protocol for IP which handles the Error Reporting
functionality.

68. Which of the following field in IPv4 datagram is not related to


fragmentation?
a) Flags
b) Offset
c) TOS
d) Identifier
Answer: c
Explanation: TOS-type of service identifies the type of packets. It is not
related to fragmentation but is used to request specific treatment such as
high throughput, high reliability or low latency for the IP packet
depending upon the type of service it belongs to.

69. The size of an IP address in IPv6 is _________


a) 4bytes
b) 128bits
c) 8bytes
d) 100bits
Answer: b
Explanation: An IPv6 address is 128 bits long. Therefore, 2128 i.e. 340
undecillion unique addresses are available in IPv6. IPv4 has only 4 billion
possible addresses and IPv6 would be a brilliant alternative in case IPv4
runs out of possible new addresses.

70. The header length of an IPv6 datagram is ___________


a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes
Answer: d
Explanation: IPv6 datagram has fixed header length of 40bytes, which
results in faster processing of the datagram. There is one fixed header and
optional headers which may or may not exist. The fixed header contains
the mandatory essential information about the packet while the optional
headers contain the optional “not that necessary” information.

71. MIMO stands for _______


a) Many input many output
b) Multiple input multiple output
c) Major input minor output
d) Minor input minor output

Answer: b
Explanation: MIMO stands for Multiple Input and Multiple Output. It
refers to the technology where there are multiple antennas at the base
station and multiple antennas at the mobile device.

72. In MIMO, which factor has the greatest influence on data rates?
a) The size of antenna
b) The height of the antenna
c) The number of transmit antennas
d) The area of receive antennas
Answer: c
Explanation: By increasing the number of receiving and transmitting
antennas, it is possible to linearly increase the throughput of the channel
with every pair of antennas added to the system.

73. MIMO was initially developed in the year __________


a) 1980
b) 1990
c) 1980
d) 1975

Answer: b
Explanation: Since the initial development in the year 1990, MIMO
Wireless Communications have become integral part of the most
forthcoming commercial and next generation wireless data
communication systems.

advertisement

74. MIMO is a smart antenna technology.


a) True
b) False

Answer: a
Explanation: MIMO is one of several forms of smart antenna technology,
the others being MISO (multiple input, single output) and SIMO (single
input, multiple output). It is an antenna technology for wireless
communications in which multiple antennas are used at both the source
and the destination.

75. MIMO technology makes advantage of a natural radio wave


phenomenon called _________
a) Reflection
b) Multipath
c) Refraction
d) Diffraction
Answer: b
Explanation: MIMO technology makes use of multipath phenomenon to
maximize transmission by receiving bounced signals from obstructions.
Multipath is a phenomenon in wave propagation.

76. Which of the following technology does not use MIMO?


a) 4G
b) Wifi
c) WiMax
d) AMPS

Answer: d
Explanation: MIMO is used in mobile radio telephone standards such as
recent 3GPP and 3GPP2. In 3GPP, High-Speed Packet Access plus
(HSPA+) and Long Term Evolution (LTE) standards take MIMO into
account. Moreover, MIMO is also used in Wifi and WiMax.

77. MIMO means both transmitter and receiver have multiple antennas.
a) True
b) False

Answer: a
Explanation: MIMO provides a way of utilising the multiple signal paths
that exist between a transmitter and receiver to significantly improve the
data throughput available on a given channel with its defined bandwidth.
It uses multiple antennas at the transmitter and receiver along with some
complex digital signal processing.

79. Blocked calls delayed formula is also known as _______?

a) Erlang A
b) Erlang B
c) Erlang C
d) Erlang D

Answer B

80. Traffic intensity offered by each user is the product of __________


a) Set up time and holding time
b) Call request rate and holding time
c) Load and holding time
d) Call request rate and set up time
Answer: b

Explanation: All the subcarriers of an OFDM symbol do not carry useful


data. In OFDM and OFDMA PHY layers, the DC subcarrier is the
subcarrier whose frequency is equal to the RF centre frequency of the
transmitting station.

81. What processing step combines multiple OFDM subcarriers into a


single signal for transmission?
a) FFT
b) IFFT
c) RF combining
d) Channel mapping

Answer: b
Explanation: IFFT combines multiple OFDM subcarriers into a single
signal for transmission. These transforms are important from the OFDM
perspective because they can be viewed as mapping digitally modulated
input data (data symbols) onto orthogonal subcarriers.

82. In OFDMA, what is the relationship between the subcarrier spacing f


and symbol time t?
a) f=t
b) f=1/2t
c) f=1/t
d) no relation

Answer: c
Explanation: In OFDMA, the relationship between the subcarrier spacing
f and symbol time t is f=1/t. They are inversely proportional.
83. OFDM uses complex equalizers.
a) True
b) False
Answer: b
Explanation: ODMA does not use complex equalizers. In OFDM, the
equalizer only has to multiply each detected sub-carrier (each Fourier
coefficient) in each OFDM symbol by a constant complex number, or a
rarely changed value.

84. When we divide band of Orthogonal Frequency Division


Multiplexing (OFDM) into sub bands, it diminishes effects of
__________
a) noise
b) collision
c) interference
d) signals absence

Answer: c
Explanation: OFDM uses the same bandwidth to deliver roughly the same
data rate as a single carrier modulation by introducing multiple lower-
bandwidth channels. Each of the lower-bandwidth channels has a lower
rate, and by combining them together, the original rate is achieved.

85. Common data rates of IEEE 802.11 OFDM are ____________


a) 18 Mbps
b) 200 Mbps
c) 50 Mbps
d) 54 Mbps

Answer: a
Explanation: The IEEE 802.11a standard specifies a modulation that
divides a high-speed serial information signal into multiple lower-speed
sub signals. Common data rates of IEEE 802.11 OFDM is 18 Mbps.

86. What does SGSN stands for?


a) Serving GPRS Support Node
b) Supporting GGSN Support Node
c) Supporting GPRS Support Node
d) Supporting Gateway Support Node

Answer: a
Explanation: The Serving GPRS Support Node (SGSN) is a main
component of the GPRS network, which handles all packet switched data
within the network, e.g. the mobility management and authentication of
the users. The SGSN performs the same functions as the MSC for voice
traffic.

87. Repeaters inside communications satellites are known as


___________
a) Transceivers
b) Transponders
c) Transducers
d) TWT

Answer: b
Explanation: A communications satellite’s transponder is the series of
interconnected units that form a communications channel between the
receiving and the transmitting antennas. It is mainly used in satellite
communication to transfer the received signals.

88. ___________ is the geographical representation of a satellite antenna


radiation pattern.
a) Footprint
b) Spot
c) Earth
d) Region

Answer: a
Explanation: The geographical representation of a satellite’s antenna
radiation pattern is called a footprint or footprint map. In essence, a
footprint of a satellite is the area on Earth’s surface that the satellite can
receive from or transmit to.
89. The smallest beam of a satellite antenna radiation pattern is ________
a) Zone beam
b) Hemispheric beam
c) Spot beam
d) Global beam

Answer: c
Explanation: The size of the antenna that generates these beams on earth
is related directly to the peak gain at the center of the spot beams and the
smallest spot beam size. The spot beams are typically defined by the
contours at 3 or 4 dB down from the peak power at the center of the
beam.

90. _________ detects the satellite signal relayed from the feed and
converts it to an electric current, amplifies and lowers its frequency.
a) Horn antenna
b) LNA
c) Satellite receiver
d) Satellite dish

Answer: b
Explanation: LNA detects the satellite signal relayed from the feed and
converts it to an electric current, amplifies and lower its frequency. The
most common device used as an LNA is tunnel diode.

91. A satellite signal transmitted from a satellite transponder to earth’s


station is _________
a) Uplink
b) Downlink
c) Terrestrial
d) Earthbound

Answer: b
Explanation: In satellite telecommunication, a downlink is the link from a
satellite down to one or more ground stations or receivers, and an uplink
is the link from a ground station up to a satellite.

92. __________ is a loss of power of a satellite downlink signal due to


earth’s atmosphere.
a) Atmospheric loss
b) Path loss
c) Radiation loss
d) RFI

Answer: b
Explanation: The path loss is the loss in signal strength of a signal as it
travels through free space. This value is usually calculated by discounting
any obstacles or reflections that might occur in its path.

93. Which of the following is the point on the satellite orbits closest to the
Earth?
a) Apogee
b) Perigee
c) Prograde
d) Zenith

Answer: b
Explanation: The point where satellite is closest to the Earth is known as
the perigee. Here, the satellite moves at its fastest. The high point of the
orbit, when the satellite is moving the slowest is called the apogee.

94. What kind of battery panels are used in some advanced satellites?
a) Germanium based panels
b) Silicon based panel
c) Gallium Phosphate solar panel array
d) Gallium Arsenide solar panel array
Answer: d
Explanation: Gallium Arsenide solar panel arrays are used for battery
panels in some advanced satellites. These new types of cells allow
smaller solar arrays to be used on future space missions.

95. A satellite battery has more power but lighter _________


a) Lithium
b) Leclanche
c) Hydrogen
d) Magnesium

Answer: a
Explanation: Lithium batteries have more power and are lighter in
weight. Any mass that could be saved by the use of lighter batteries
would allow a corresponding increase in the amount of useful payload
equipment.

96. INTELSAT stands for ___________


a) Intel Satellite
b) International Telephone Satellite
c) International Telecommunications Satellite
d) International Satellite

Answer: c
Explanation: INTELSAT is a communications satellite services provider.
INTELSAT operates a fleet of 52 communications satellites, which is one
of the world’s largest fleet of commercial satellites.

97. The most common device used as an LNA is ________


a) Zener diode
b) Tunnel diode
c) IMPATT
d) Shockley diode
Answer: b
Explanation: The LNA must provide a relatively flat response for the
frequency range of interest, preferably with less than 1 dB of gain
variation. The most common device used as an LNA (low noise
amplifier) is tunnel diode. It is a highly sensitive, low-noise device.

98. In version field of IPv4 header, when machine is using some other
version of IPv4 then datagram is __________
a) Discarded
b) Accepted
c) Interpreted
d) Interpreted incorrectly

Answer: a
Explanation: A 4 bit field defines the version of IPv4 protocol. This field
tells the software running in the processing machine that the datagram has
the format of version 4. If the machine is using some other version of
IPv4, the datagram is discarded rather than interpreted incorrectly.

99. Network layer at source is responsible for creating a packet from data
coming from another ________
a) Station
b) Link
c) Node
d) Protocol
Answer: d

100. In IPv4, service type of service in header field, first 3 bits are called
______
a) Type of service
b) Code bits
c) Sync bits
d) Precedence bits

Answer: d
Group-2

1. Which of the following is not a characteristic of cellular telephone


systems?

a. Accommodate a large number of users


b. Large geographic area
c. Limited frequency spectrum
d. Large frequency spectrum
Answer: d

2. What is the responsibility of MSC in cellular telephone systems?

a. Connection of mobile to base stations


b. Connection of mobile to PSTN
c. Connection of base station to PSTN
d. Connection of base station to MSC
Answer: b

3. What is handoff?

a. Forward channel
b. Roamer
c. Switching technique
d. Guard channel
Answer: c

4. What is the function of FVC (Forward Voice Channel)?

a. Voice transmission from BS to MS


b. Voice transmission from MS to BS
c. Broadcast all traffic requests for all mobile
d. Initiating mobile calls
Answer: a

5. Which one is not an advantage of using frequency reuse?

a. Increased capacity
b. Limited spectrum is required
c. Same spectrum may be allocated to other network
d. Number of base stations is reduced
Answer: d

6. The interference between the neighboring base stations is avoided by-

a. Assigning different groups of channels

b. Using different base stations


c. Using transmitters with different power level

d. Using different antennas


Answer: a

7. Which of the following is a CDMA standard of second-generation


networks?

a. IS-95
b. IS-136
c. ETACS
d. EDGE
Answer: a

8. What is frequency reuse?

a. Process of selecting and allocating channels


b. Process of selection of mobile users
c. Process of selecting frequency of mobile equipment
d. Process of selection of number of cells
Answer: a

9. Why the shape of a cell is not circle?

a. Omni directionality
b. Small area
c. Overlapping regions or gaps are left
d. Complex design
Answer: c

10. What is a cluster in a cellular system?

a. Group of frequencies
b. Group of cells
c. Group of subscribers
d. Group of mobile systems
Answer: b

11. What is a frequency reuse factor for N number of cells in a system?

a. N
b. N2
c. 2*N
d. 1/N
Answer: d

12. In fixed channel assignment strategy, each cell is allocated a


predetermined set of

_______

a. Voice channels
b. Control channels
c. Frequency
d. base stations
Answer: a

13. Soft handoff is also known as _________

a. MAHO
b. Hand over
c. Break before make
d. Make before break
Answer: d
Explanation: Soft handoff is one in which the channel in the source cell is
retained and used for a while in parallel with the channel in the target
cell. In this case, the connection with the receiver target is established
before the connection to the source is broken, hence this handover is
called make-before-break.

14. Interference in control channel leads to ________

a. Cross talk
b. Queuing
c. Blocked calls
d. Voice traffic
Answer: c

15. Interference on voice channels causes _______

a. Blocked calls
b. Cross talk
c. Queuing
d. Missed calls
Answer: b

16. What are co-channel cells?

a. Cells having different base stations


b. Cells using different frequency
c. Cells using adjacent frequency
d. Cells using same frequency
Answer: d

17. Co-channel reuse ratio is define by _________

a. Q=D*R
b. Q=D/R
c. Q=D^R
d. Q=1/R
Answer: b

18. Adjacent channel interference occurs due to _______

a. Power transmitted by Base station


b. MSCs
c. Same frequency of mobile users
d. Imperfect receiver filters
Answer: d

19. Which of the following problem occur due to adjacent channel


interference?

a. Blocked calls
b. Cross talk
c. Near-far effect
d. Missed calls
Answer: c

20. FM has _______ noise immunity when compared to amplitude


modulation.

a. Same
b. Less
c. No
d. Better
Answer: d

21. Which IP address is not correct?

a. 192.168.20.4
b. 10.10.10.1
c. 203.208.16.3
d. 203.195.283.1
Answer: b

22. TCP stands for?

a. Transmission Control Protocol


b. Transmission Control Program
c. Transfer Control Program
d. Transfer Control Protocol
Answer: a

23. WiMax Stands for?

a. Wireless Maximum Communication


b. Worldwide Interoperability for Microwave Access
c. Worldwide International Standard for Microwave Access
d. Wireless Internet Maximum Communication
Answer: b

24. When was the first offline email introduced in Bangladesh?

a. 1991
b. 1994
c. 1996
d. 1998
Answer: b

25. GSM system architecture can be grouped in ______ main areas.

a. Two
b. Three
c. Four
d. Five
Answer: c

26. GSM operates on mobile communication bands ______?

a. 400MHz to 900MHz
b. 400MHz to 1300MHz

c. 900MHz to 1500MHz
d. 900MHz to 1800MHz
Answer: d

27. GSM divides 200KHz channel into _______ time slots?

a. Eight 25KHz
b. Four 50KHz
c. Two 100KHz
d. None of them
Answer: a

28. What is the maximum data transmission rate in a GSM based system?

a. 10 mbps
b. 20 mbps
c. 100 mbps
d. 120 mbps
Answer: d

29. Why is GSM used?

a. Improved spectrum efficiency


b. International roaming
c. Low cost base station
d. All of them
Answer: d

30. What is the channel capacity for a cellular telephone area comprising
seven macrocells with 5 channels per cell?

a. 35 channel/area
b. 5 channel/cell
c. 7 channel/area
d. 1.4 cell/area
Answer: a

31. What is the type of radiation of microwave frequencies which are


emitted from cell phones?

a. Ionizing Radiation
b. Non-ionizing Radiation
c. High Density Radiation
d. Low Density Radiation
Answer: b

32. The radiation power density for GSM antennas are lower than
__________?

a. 2 uW/cm
b. 10 uW/cm
c. 20 uW/cm
d. 50 uW/cm
Answer: b

33. Mobile Base Stations should not be sited within _________ from the
residential arenas?

a. 300m
b. 500m
c. 1km
d. 1.5km
Answer: a
34. SAR value is calculated through -

a. Theoretical calculation
b. Simulation
c. Both A and B
d. None
Answer: c

35. Microwaves may lead to-

a. DNA damage
b. Chromosomal stability
c. Both A and B
d. None
Answer: a

36. The total number of channels within a particular area is called-

a. Cell Capacity

b. Channel Density
c. Erlang
d. Erlang C
Answer: a

37. The unit of measurement of traffic density in a telecommunications


system is called-

a. Cell Capacity
b. Channel Density
c. Erlang
d. Erlang C
Answer: c

38. The number of cells in a cluster is 7, and the radius of the cell is 5km.
What is the

minimum distance at which the same frequency can be reused ?

a. 22.91km
b. 105km
c. 10.42km
d. 35km
Answer: a

39. The number of cells in a cluster is 7, and the radius of the cell is 5km.
What is the reuse factor?

a. 35
b. 1.2
c. 4.6
d. 5
Answer: c

40. Network layer at source is responsible for creating a packet from data
coming from another ________

a) Station
b) Link
c) Node
d) Protocol
Answer: d

41. Which is a link-layer protocol?

a) ARP
b) TCP
c) UDP
d) HTTP
Answer: b

42. Protocols are set of rules to govern _________

a) Communication
b) Standard
c) Metropolitan communication
d) Bandwidth
Answer: a
43. What layer in the TCP/IP stack is equivalent to the Transport layer of
the OSI model?

a) Application
b) Host to host
c) Internet
d) Network Access
Answer: b

44. TCP/IP layer is equivalent to combined Session, Presentation and


_________

a) Network layer
b) Application layer
c) Transport layer
d) Physical layer
Answer: b

45. IPv6 has a larger address space of _________

a) 16
b) 128
c) 28
d) 32
Answer: b

46. MTU stands for _________

a) Minimum Transfer Unit


b) Maximum Transfer Unit
c) Maximum Transport Unit
d) Maximum Transmission Unit
Answer: d

47. OFDMA stands for ________

a) omnidirectional frequency division multiple access


b) orthogonal frequency duplex multiple access
c) orthogonal frequency divider multiple access
d) orthogonal frequency division multiple access
Answer: d

48. OFDM is a technique for 3G mobile communication.

a) True
b) False
Answer: b

49. Who developed the first US cellular telephone system called AMPS?

a) Motorola
b) Ericsson
c) AT & T Bell Laboratories
d) ETSI
Answer: c

50. To increase the capacity of AMPS, Motorola developed


____________

a) P-AMPS
b) N-AMPS
c) H-APMS
d) R-AMPS
Answer: b

51. Previously in 1980s, GSM stands for ____________

a) Global system for mobile


b) Groupe special mobile
c) Global special mobile
d) Groupe system mobile
Answer: b

52. Which of the following memory device stores information such as


subscriber’s identification number in GSM?

a) Register
b) Flip flop
c) SIM
d) SMS
Answer: c
53. Which of the following does not come under the subsystem of GSM
architecture?

a) BSS
b) NSS
c) OSS
d) Channel
Answer: d

54. Group of super frames in GSM is called multi-frame.

a) True
b) False
Answer: b

55. US digital cellular system based on CDMA was standardized as


________

a) IS-54
b) IS-136
c) IS-95
d) IS-76
Answer: c

56. IS-95 uses the same modulation technique for forward and reverse
channel.

a) True
b) False
Answer: b

57. ________ uses directional antennas to control interference.

a) Sectoring
b) Cell splitting
c) Repeaters
d) Micro cell zone concept
Answer: a

58. Cell splitting increases the capacity of a cellular system since it


increases the number of times ________ are reused.
a) Cells
b) Channels
c) Transmitters
d) Mobile stations
Answer: b

59. How many different tones may be produced by a four-column DTMF


keypad?

A. 8
B. 12
C. 14
D. 16
Answer: D.

60. Which one is the correct equation of offered traffic load?

A. a = λT
B. a = λ/T
C. a = 1/λT
D. a = (λT)2
Answer: A

61. Which one of the following is not a category of service security?

A. Confidentiality
B. Integrity
C. Unavailability
D. Authentication
Answer: D.

62. Security mechanisms can be divided into how many categories?

A. 5
B. 2
C. 3
D. 4
Answer: C.

63. Data modification or false data transmission fall into which category
of attack ?
A. Active
B. Accidental

C. Passive
D. None of the above
Answer: A.

64. Active attack can be divided into how many groups?

A. 4
B. 5
C. 6
D. 7
Answer: A.

65. Which one of the following is not the effect of attacks?

A. Interception
B. Modification
C. Fabrication
D. Uninterruption:
Answer: D.

66. Which one of the following is an example of passive attacks?

A. Monitoring network traffic


B. CPU
C. Disk usage
D. All of the above
Answer: D.

67. The below figure would represent which security threat Category?

A. Interception
B. Modification
C. Fabrication
D. Interruption:
Answer: D.
68. How much a quad-sector architecture has a higher capacity for area
coverage than a tri-sector cell?

A. 40%
B. 50%
C. 70%
D. 90%
Answer: D.

69. Interference is more severe in rural areas.

A. True
B. False
Answer: B

70. The process of subdividing a congested cell into smaller cells is called
--------

A. Cell sectoring
B. Repeaters
C. Micro cell technique
D. Cell splitting
Answer: D.

71. BSC comes under which of the following category?

A.Operation
B.Radio
C.Network
D.Mobile
Answer: B

72. In --------- handoff, a mobile station communicates with only one base
station.

A. Hard
B. Soft
C. Medium
D. None of the above
Answer: A.
SIFAT

73. Which of the following multiple access techniques are used by second
generation cellular systems?

a) FDMA/FDD and TDMA/FDD


b) TDMA/FDD and CDMA/FDD
c) FDMA/FDD and CDMA/FDD
d) FDMA/FDD only
Answer: b

74. Which one is not a TDMA standard of second generation networks?

a) GSM
b) IS-136
c) AMPS
d) PDC
Answer: c

75. Popular 2G CDMA standard IS-95 is also known as ______________

a) CDMA-One
b) CDMA-Two
c) IS-136
d) IS-95B
Answer: a

76. How many users or voice channels are supported for each 200 KHz
channel in GSM?

a) Eight
b) Three
c) Sixty four
d) Twelve
Answer: a

77. Which of the following is not a characteristic of 3G network?

a) Communication over VoIP


b) Unparalleled network capacity
c) Multi-megabit Internet access
d) LTE based network

Answer: d

78. What is the term used by ITU for a set of global standards of 3G
systems?

a) IMT 2000
b) GSM
c) CDMA
d) EDGE
Answer: a

79. Which of the following 3G standard is used in Japan?

a) Cdma2000
b) TD-SCDMA
c) UMTS
d) UTRA
Answer: c

80. What type of handovers is supported by LTE?

a) Hard handover only


b) Soft handover only
c) Hard and soft handover
d) Hard, soft and softest handover
Answer: a

81. What is the largest channel bandwidth a UE is required to support in


LTE?

a) 10 MHz
b) 20 MHz
c) 1.4 MHz
d) 5 MHz
Answer: b

82. Why is a cyclic prefix required in an OFDMA?

a) To ensure symbol time is an integer number


b) To help overcome multipath and ISI
c) To maintain orthogonality
d) To make OFDMA scalable
Answer: b

83. What does the DC subcarrier indicate?

a) Identity of the cell


b) Antenna configuration

c) Center of OFDM channel


d) Format of data channel
Answer: c

84. What processing step combines multiple OFDM subcarriers into a


single signal for transmission?

a) FFT
b) IFFT
c) RF combining
d) Channel mapping
Answer: b

85. Which property of OFDMA system allows adjacent subcarriers to be


used without interference?

a) Orthogonality
b) Orthodoxy
c) Octagonality
d) Originality
Answer: a

86. An internet is a __________

a) Collection of WANS
b) Network of networks
c) Collection of LANS
d) Collection of identical LANS and WANS
Answer: b
87. Which protocol is commonly used to retrieve email from a mail
server?

a) FTP
b) IMAP
c) HTML
d) TELNET
Answer: b

88. What is MIN?

a) Subscriber’s telephone number


b) Paging message

c) Traffic request number


d) Mobile Internet
Answer: a

89. Which modulation technique is used by GSM?

a) GMSK
b) BPSK
c) QPSK
d) GFSK
Answer: a

90. Which is one of the disadvantages of 2G standards?

a) Short Messaging Service (SMS)


b) Digital modulation
c) Limited capacity
d) Limited Internet Browsing
Answer: d

91. What is the main reason to adopt hexagon shape in comparison to


square and triangle?

a) Largest area
b) Simple design
c) Small area
d) Single directional
Answer: a

92. Which type of antenna is used for center excited cells?

a) Dipole antenna
b) Grid antenna
c) Sectored antenna
d) Omnidirectional antenna
Answer: d

93. For a cellular system, if there are N cells and each cell is allocated k
channel. What is the total number of available radio channels, S?

a) S=k*N
b) S=k/N
c) S=N/k
d) S=k
Answer: a

94. Umbrella cell approach is possible by using _________

a) Antenna of same heights


b) Antenna of different heights
c) Different voice channels
d) Different control channels
Answer: b

95. What was the typical handoff time in first generation analog cellular
systems?

a) 1 second
b) 10 seconds

c) 1 minute
d) 10 milliseconds
Answer: b

96. How much time does it take for handoff in digital cellular systems
like GSM?

a) 1 second
b) 10 seconds
c) 1 minute
d) 10 milliseconds
Answer: a

97. Co-channel ratio in terms of cluster size is defined as _________

a) √(3N)
b) N
c) 3N
d) √N
Answer: a

98. Adjacent channel interference can be minimized through _______

a) Changing frequency of base stations


b) Careful filtering and channel assignments
c) Increasing number of base stations
d) Increasing number of control channels
Answer: b

99. Average duration of a typical call is called ________

a) Holding time
b) Dwell time
c) Set up time
d) Run time
Answer: a

100. Traffic intensity offered by each user is the product of __________

a) Set up time and holding time


b) Call request rate and holding time
c) Load and holding time
d) Call request rate and set up time
Answer: b
Group-3

1. Which of the following is not a standard used for paging system?


(a) POCSAG
(b) ERMES
(c) IS-95
(d) FLEX
Answer: (c) IS-95

2. Paging system uses which mode of transmission?


(a) Full duplex
(b) Simplex
(c) Half Duplex
(d) Duplex
Answer: (b) Simplex

3. The information sent by paging system is known as a ____


(a) Note
(b) Line
(c) Message
(d) Page
Answer: (d) Page

4. Which of the following is not a characteristic of cellular telephone


system?
(a) Accommodate a large number of users
(b) Large geographic area
(c) Limited frequency spectrum
(d) Large frequency spectrum
Answer: (d) Large frequency spectrum

5. What is the responsibility of MSC in cellular telephone system?


(a) Connecting of mobile to base stations
(b) Connection of mobile to PSTN
(c) Connection of base station to PSTN
(d) Connection of base station to MSC
Answer: (b) Connecting of mobile to PSTN

6. Who has the responsibility of billing and system maintenance


function in cellular system?
(a) Base Station
(b) PSTN
(c) MSC
(d) Mobile system
Answer: (c) MSC

7. Which of the following multiple access techniques are used by


second generation cellular systems?
(a) FDMA/FDD and TDMA/FDD
(b) TDMA/FDD and CDMA/FDD
(c) FDMA/FDD and CDMA/FDD
(d) FDMA/FDD only
Answer: (b) TDMA/FDD and CDMA/FDD

8. What is the name of the web browsing format language supported


by 2.5G technology?
(a) Wireless Application Protocol
(b) Hypertext Markup Language
(c) Extensible Markup Language
(d) Hypertext Transfer Protocol
Answer: (a) Wireless Application Protocol

9. Which of the following is not a characteristic of 3G network?


(a) Communication over VoIP
(b) Unparalleled network capacity
(c) Multi-megabit Internet access
(d) LTE based network
Answer: (d) LTE based network

10. What is the full form of UMTS?


(a) Universal Mobile Telephone System
(b) Ubiquitous Mobile Telephone System
(c) Ubiquitous Mobile Telemetry System
(d) Universal Machine Telemedicine System
Answer: (a) Universal Mobile Telephone System

11. Which of the following has no backward compatibility with 3G


Cdma2000?
(a) IS-95
(b) GPRS
(c) IS-95A
(d) IS-95B
Answer: (b) GPRS

12. What is the full form of WLAN?


(a) Wide Local Area Network
(b) Wireless Local Area Network
(c) Wireless Land Access Network
(d) Wireless Local Area Node
Answer: (b) Wireless Local Area Network

13. What is the nominal range of Bluetooth?


(a) 1 Km
(b) 10 m
(c) 1 m
(d) 10 Km
Answer: (b) 10 m

14. What is a cell in cellular system?


(a) A group of cells
(b) A group of subscribers
(c) A small geographical area
(d) A large group of mobile systems
Answer: (c) A small geographical area

15. In fixed channel assignment strategy, each cell is allocated a


predetermined set of ____
(a) Voice channels
(b) Control Channels
(c) Frequency
(d) base stations
Answer: (a) Voice channels

16. What is the condition for handoff?


(a) A mobile move into a different cell while in conversation
(b) A mobile remains in the same cell while in conversation
(c) A mobile move to different cell when idle
(d) A mobile remains in the same cell and is idle
Answer: (a) A mobile moves into a different cell while in
conversation

17. Which of the following is not a source of interference?


(a) Base station in a different cluster
(b) Another mobile in same cell
(c) A call-in progress in neighboring cell
(d) Any BS operating on same frequency
Answer: (a) Base station in a different cluster

18. What is the unit for the measure of traffic intensity?


(a) Meters
(b) Henry
(c) Ohm
(d) Erlang
Answer: (d) Erlang

19. Which of the following technology distributes the coverage of the


cell and extends the cell boundary to hard-to-reach places?
(a) Cell splitting
(b) Scattering
(c) Sectoring
(d) Micro cell zone concept
Answer: (d) Micro cell zone concept

20. Small scale fading described the ______ fluctuations of the


amplitude, phases of a signal.
(a) Rapid
(b) Slow
(c) Instantaneous
(d) Different
Answer: (a) Rapid

21. What is the order of typical values of rms delay spread in outdoor
mobile radio channel?
(a) Microseconds
(b) Nanoseconds
(c) Seconds
(d) Minutes
Answer: (a) Microseconds

22. Which of the following is not a channel parameter?


(a) Bandwidth
(b) Coherence time
(c) Rms delay spread
(d) Doppler spread
Answer: (a) Bandwidth

23. Which is the process of encoding information from a message


source in suitable manner for transmission?
(a) Modulation
(b) Demodulation
(c) Encryption
(d) Decryption
Answer: (a) Modulation

24. AM signal have all information in ____ of the carrier.


(a) Amplitude
(b) Magnitude
(c) Frequency
(d) Power
Answer: (a) Amplitude

25. FM signal have all their information in ____ of the carrier.


(a) Amplitude
(b) Magnitude
(c) Frequency
(d) Power
Answer: (c) Frequency

26. FM has _____ noise immunity when compared to AM.


(a) Same
(b) Less
(c) No
(d) Better
Answer: (d) Better

27. FM signals are _____ susceptible to atmospheric and impulse noise


as compared to AM.
(a) Largely
(b) Less
(c) Not
(d) Better
Answer: (b) Less

28. Carrier signal in modulation technique is _______ signal.


(a) High frequency
(b) Low frequency
(c) High Amplitude
(d) Low Amplitude
Answer: (a) High frequency

29. If the peak message signal amplitude is half the peak amplitude of
the carrier signal, the signal is _____ modulated.
(a) 100%
(b) 2%
(c) 50%
(d) 70%
Answer: (c) 50%

30. The RF bandwidth of AM is ____________ the maximum


frequency contained in the modulating message signal.
(a) Equal
(b) Two times
(c) Four times
(d) Ten times

Answer: (b) Two times

31. In digital communication system, in order to increase noise


immunity, it is necessary to increase _________
(a) Signal power
(b) Signal amplitude
(c) Signal frequency
(d) Signal magnitude
Answer: (a) Signal power
32. Quantization is a process of mapping a ________ range of
amplitude of a signal into a finite set of __________ amplitudes.
(a) Continuous, discrete
(b) Discrete, continuous
(c) Discrete, discrete
(d) Continuous, continuous
Answer: (a) Continuous, discrete
33. For a n bit quantizer, number of levels is equal to __________
(a) n
(b) 2n
(c) n2
(d) 2n
Answer: (b) 2n
34. The technique that makes possible the task of listening and talking
in communication system is called ________
(a) Simplexing
(b) Duplexing
(c) Modulating
(d) Multiple access technique
Answer: (b) Duplexing
35. Frequency division duplexing provides ________ distinct bands of
frequencies for _________ user.
(a) Two, two
(b) One, two
(c) Two, one
(d) Two, many
Answer: (c) Two, one
36. Frequency division multiple access (FDMA) assigns ______
channels to _______ users.
(a) Individual, individual
(b) Many, individual
(c) Individual, many
(d) Many, many
Answer: (a) Individual, individual
37. The bandwidth of FDMA channel is ______
(a) Wide
(b) Narrow
(c) Large
(d) Zero
Answer: (b) Narrow

38. In .............. Frequency Spectrum is divided into smaller spectra and is


allocated to each user.
A) TDMA B) CDMA C) FDMA D) FGMA
Ans: C

39. The basic GSM is based on ____________________ traffic channels.


A) connection oriented. B) connection less.
C) packet switching. D) circuit switching.
Ans: A

40. State whether True or False.


i) In GSM only TDMA is used.
ii) There is zero inter-channel interference in CDMA.
A) True, False B) False, True C)
False, False D) True, True
Ans: C

41. In ................ multiple access is achieved by allocating different time


slots for the different users.
A) TDMA B) CDMA C) FDMA D) FGMA
Ans: A

42. Increase in Co- channel reuse ratio indicates


A) Better transmission quality B) Larger capacity
C) Low co-channel interference D) Both A and C

Ans: D

43.Interference in cellular system is caused by


A) Two base stations operating in same frequency band
B) Two calls in progress in nearby mobile stations
C) Leakage of energy signals by non-cellular systems into cellular
frequency band
D) All of the above

Ans: D.

44.Global Positioning System uses


A) CDMA B) TDMA C) SDMA D) FDMA
Ans: A

45. c

1024kbps
100mbs
200mbps
None of the above

Answer: b

Explanation: The rate of data transfer or speed of the 4G network is


approximately 100mbps, which is 20 times faster than that of 3G
networks. The maximum speed of the 4g network is about 300mbps or
more, but such speed is only achievable in well-controlled laboratory
environments. So the correct answer will be B.

46.In Handoff
A) process of transferring the call to the new base station
B) transfer the call
C)New channel allocation is done
D) All of the above

Ans: D

47.Inter system Handoff are done


A) When mobile station moves in two cellular systems with different
MSC
B) When mobile station moves between two cellular system
C)When mobile station receives more power from other base station than
serving base station
D) All of the above

Ans: D

48.GSM is an example of
A) TDMA cellular systems
B) FDMA cellular systems
C)CDMA cellular systems
D)All of the above
Ans: A

50.When a fraction assigned channel is reversed for Handoff, it is


A) Guard channel concept
B) Fixed channel assignment
C)Dynamic channel assignment
D)None of the above

Ans: A

51.While Handoffs, the termination of call may be avoided by:


A) Providing Guard channel B) Queuing the HAndoffs
C)Both A & B D) None of the above

Ans: C
52.TDMA allows the user to have:
A. Use of same frequency channel same time slot
B. Use of same frequency channel for different time slot
C. Use of same time slot for different frequency channels
D. Use of different time slot for different frequency channels

Ans) B

53.The advantage of using frequency reuse is:


A) Increase capacity
B) Limited spectrum is required
C)Same spectrum may be allocated to another network
D)All of the above

Ans: D

54.The process of transferring a mobile station from one base station to


another is:
A. MSC B) Roamer
C)Handoff D) None of the above

Ans: C

55.The interference between the neighboring base station is avoided by :


A. Assigning different group of channels
B. Using transmitters with different power level
C. Using different antennas
D. All of these
Ans: A

56.The shape of the region for maximum radio coverage is:


A) Circular B) Square
C)Oval D) Hexagon

Ans: D

57.Hexagon shape is used for radio coverage for a cell because:


A. It uses the maximum area for coverage
B. Fewer number of cells are required
C. It approximates circular radiation
D. All of the above

Ans) D

58.Interference in frequency bands may lead to


A) Cross talk B) Missed calls
C)Blocked calls D) All of the above
Ans: D

59. Co-channel reuse ratio depends upon


a. Radius of the cell
b. Distance between the centers of the co channel cells
c. Frequency allocation of nearest cells
d. Both a and b
Ans: D

60. Radio capacity may be increased in cellular concept by


A). Increase in radio spectrum
B. Increasing the number of base stations & reusing the channels
C. Both a & b
D. None of the above

ANSWER: Increasing the number of base stations & reusing the channels

61. In a fixed channel assignment strategy, if all the assigned channels are
occupied, the call
a. Gets transferred to another cell
b. Gets blocked
c. Is kept on waiting
d. All of the above
ANSWER: Gets blocked

62. In a fixed channel assignment strategy


a. Each cell is assigned a predetermined set of frequencies
b. The call is served by unused channels of the cell
c. The call gets blocked if all the channels of the cell are occupied
d. All of the above
ANSWER: All of the above

63. Delay in handoffs is caused due to


a. Week signal conditions
b. High traffic conditions
c. Un availability of the channel
d. All of the above
ANSWER: All of the above

64. Dwell time is the time for


a. A call within the cell
b. Hand off
c. Waiting for channel allocation
d. None of the above
ANSWER: A call within the cell

65. Guard band is


a. The small unused bandwidth between the frequency channels to avoid
interference
b. The bandwidth allotted to the signal
c. The channel spectrum
d. The spectrum acquired by the noise between the signal
ANSWER: The small unused bandwidth between the frequency channels
to avoid interference

66. In FDMA,
1. Each user is assigned unique frequency slots
2. Demand assignment is possible
3. Fixed assignment is possible
4. It is vulnerable to timing problems
a. 1 and 2 are correct
b. 2 and 4 are correct
c. 1, 2 and 3 are correct
d. All four are correct

ANSWER: 1, 2 and 3 are correct

67. The advantages of FDMA over TDMA includes


1. Division is simpler
2. Propagation delays are eliminated
3. Cheaper filters with less complicated logic functions
4. Linearity

a. 1, 2 and 3 are correct


b. 1 and 2 are correct
c. 1 and 4 are correct
d. All four are correct
ANSWER: 1 and 2 are correct

68. TDMA is a multiple access technique that has


a. Different users in different time slots
b. Each user is assigned unique frequency slots
c. Each user is assigned a unique code sequence
d. Each signal is modulated with frequency modulation technique
ANSWER: Different users in different time slots

69. FDMA demand assignment uses


1. Single channel per carrier
2. Multi-channel per carrier
3. Single transmission in one time slot
4. Multi transmission in one time slot

a. 1 and 2 are correct


b. 2, 3 and 4 are correct
c. 1, 2 and 3 are correct
d. All four are correct
ANSWER: 1 and 2 are correct

70. In TDMA, the user occupies the whole bandwidth during


transmission
a. True
b. False
ANSWER: True

71. OFDM is a technique of


1. Encoding digital data
2. Multiple carrier frequencies
3. Wide band digital communication
4. 4G mobile communication

a. 1, 2 and 3 are correct


b. 2 and 3 are correct
c. 1, 2 and 4 are correct
d. All the four are correct
ANSWER: All the four are correct

72. Mobile Computing allows transmission of data from one wireless-


enabled device to another_

a. Any device
b. Wired device
c. Wireless-enabled device
d.one of the above
Answer: c

Explanation: In general, mobile computing allows the transmission of


information between one wireless-enabled device to another wireless-
enabled device. So the correct answer will be DC

73. The guard interval is provided in OFDM


a. To eliminate the need of pulse shaping filter
b. To eliminate ISI
c. High symbol rate
d. Both a and b
e. Both b and c
ANSWER: Both a and b

74. Advantages of using OFDM include


1. Avoids complex equalizers
2. Low symbol rate and guard interval
3. Avoids ISI
4. Multiple users at same frequency

a. 1, 2 and 3 are correct


b. 2 and 3 are correct
c. 1, 2 and 4 are correct
d. All the four are correct
ANSWER: All the four are correct

75. The wide band usage in CDMA helps in


1. Increased immunity to interference
2. Increased immunity to jamming
3. Multiple user access
4. Different spectrum allocation in different time slots

a. 1, 2 and 3 are correct


b. 2, 3 and 4 are correct
c. 1, 2 and 4 are correct
d. All the four are correct
ANSWER: 1, 2 and 3 are correct

76. In which one of the following codes with specific characteristics can
be applied to the transmission?

a. CDMA
b. GPRS
c. GSM
d. All of the above

Ans: A

77. Which of the following offers packet mode data transfer service over
the cellular network? Difference between JDK, JRE, and JVM

a. TCP b. GPRS c. GSM d.None of the


above

Ans: B
78. How much time it takes for handoff in digital cellular systems like
GSM?

a) 1 second

b) 10 seconds

c) 1 minute

d) 10 milliseconds

Answer: a

Explanation: In digital cellular systems, the mobile assists with the handoff
procedure by determining the best candidate. Once the decision is made, it
typically requires 1 to 2 seconds for handoff.

79. What is the disadvantage of guard channel?


a) Efficient utilization of spectrum
b) Cross talk
c) Near far effect
d) Reduce total carried traffic

Answer: d

Explanation: Guard channel is a concept for handling priority in handoff.


Here, a fraction of the total available channels in a cell is reserved
exclusively for handoff requests from ongoing calls. This method has the
disadvantage of reducing the total carried traffic, as fewer channels are
allocated to originating calls.

80. Which one of the following is considered as the GSM supplementary


service?

a. Emergency number
b. SMS
c. Call forwarding
d. All of the above

Ans: C

81. How many sub-systems are Global Systems for Mobiles?

a. 4 b.3 c.2 d.None of the above

Ans: B

Explanation: In general, the GSM (or Global System for mobiles )


architecture comprises three sub-systems that interact with each other and
as well as with users through some certain network interface. These sub-
systems are named BSS (or Base Station Subsystem), NSS (or Networks
Switching Sub System), and OSS (or Operational Support Sub-system).

82. The term "HLR" stands for the ______

a. Home Location Register


b. House Location Register
c. Home Live Register
d. None of the above

Ans: A

Explanation: In Mobile Computing, the term "HLR" stands for Home


Location Register, which is a type of database that contains information
about the authorized subscribers through the GSM core network. So the
correct answer will be A.

83. MAHO stands for ______


a) MSC assisted handoff
b) Mobile assisted handoff
c) Machine assisted handoff
d) Man assisted handoff

Answer: b

Explanation: MAHO stands for mobile assisted handoff. In 2G systems,


handoff decisions are mobile assisted. In MAHO, every mobile station
measure the received power from surrounding base station and
continuously reports the results to serving base station.

84.In which of the following, the single-channel has the ability to carry all
transmissions simultaneously?

a. In the Code Division, Multiple Access (or CDMA)


b. In the Time Division Multiple Access (or TDMA)
c. In the Frequency Division Multiple Access (or FDMA)
d. None of the above

Ans: A

Explanation: In the CDMA, the single-channel can carry all the


transmissions simultaneously. We can also say that it shares a band of
frequency among several servers without undue interference among them.
In other words, it optimizes the overall use of the available bandwidth as it
transmits over the entire frequency range.

85. In which one of the following times is specifically divided into several
time slots that are in the fixed patterns?

a. CDMA
b. TDMA
c. FDMA
d. All of the above

Answer: B

Explanation: The TDMA is a type of digital cellular telephone


communication technology. It allows the users to use the same frequency
without interference. In the TDMA (or Time Division Multiple Access),
time is divided into several required time slots that are in the fixed patterns.
So the correct answer will be B.

86.Radio capacity may be increased in cellular by_____

a. Increase in the radio spectrum


b. Increasing the number of base stations & reusing the channels
c. None of the above
d. Both a & b

Anwer: B

Explanation: The radio capacity can be increased in cellular by adding


more base stations and reusing the channels.

87.Which one of the following is not referred as the characteristics of the


cellular telephone system?

a. Large frequency spectrum


b. Limited frequency spectrum
c. Accommodate a large number of users
d. None of the above

Ans: A

The large frequency spectrum is not referred to as one of the characteristics


of a cellular telephone system as the cellular communication
accommodates a large number of users using a limited frequency spectrum
over a large geographic area.

88. Interference on voice channels causes _______

a) Blocked calls

b) Cross talk
c) Queuing

d) Missed calls

Answer: B

Explanation: Interference on voice channels causes crass talk. Here, the


subscriber hears interference in the background due to an undesired
transmission.

89. Dwell time does not depend on which of the following factor?
a) Propagation
b) Interference
c) Distance between subscriber and base station
d) Mobile station

Answer: d

Explanation: Dwell time of a particular user is governed by a number of


factors. They include propagation, interference, distance between the
subscriber and the base station, and other time varying effects.

90. Co-channel reuse ratio is defined by _________

a) Q=D*R

b) Q=D/R

c) Q=D^R

d) Q=1/R

Answer: b

Explanation: Co-channel reuse ratio is defined by Q=D/R. By increasing


the ratio of D/R, the spatial separation between co-channel cells relative
to the coverage distance of a cell is increased. Thus, interference I
reduced from improved isolation of RF energy from the co-channel cells.
91. The time over which a call can be maintained within a cell
without handoff is called _________
a) Run time
b) Peak time
c) Dwell time
d) Cell time

Answer: c

Explanation: The time over which a call is maintained within a cell without
handoff is called as dwell time. Dwell time vary depending on speed of
user and type of radio coverage.

92. What is the cluster size for CDMA?

a) N=10

b) N=100

c) N=1

d) N=50

Answer: c

Explanation: CDMA systems have a cluster size of N=1.Therefore,


frequency reuse is not as difficult as for TDMA or first-generation
cellular systems.

93. Adjacent channel interference occurs due to _______

a) Power transmitted by Base station

b) MSCs

c) Same frequency of mobile users

d) Imperfect receiver filters


Answer: d

Explanation: Interference resulting from signals which are adjacent in


frequency to the desired signal is called adjacent channel interference. It
results from imperfect receiver filters which allow nearby frequencies to
leak into the passband.

94. The term _________ refers to transporting a mobile station from one
base station to another base station.

a. Roamer

b. Forward channel

c. Handoff or hand over

d. MIN

Ans: c

Explanation: In cellular telecommunications, Hands off or hand over is a


type of process in which an ongoing (or active) call or data session is
transferred from one station (or channel) to another base station.

95. Which of the following is also referred to as the functions of forward


Voice Channel?

a. Initiating Mobile calls

b. Broadcasting all traffic for mobiles

c. Voice transmission from the base station to mobiles

d. All of the above

Answer: c

Explanation: The voice transmission form base station to mobiles is also


referred to as one of the main functions of the Forward Voice Channel
(FVC). However, the Forward Voice Channel and Reverse Voice
Channel both are responsible for voice transmission. The Forward Voice
channel is used for transmission of voice form base stations to mobiles,
while on the other hand, the Reverse voice channel is used for voice
transmission form mobiles to base stations.

96. _______ allows an orderly growth of cellular system.

a) Sectoring

b) Scattering

c) Cell splitting

d) Micro cell zone technique

Answer: c

Explanation: Cell splitting allows an orderly growth of cellular system.


By defining new cells which have a smaller radius than the original cells,
capacity increases due to additional number of channels per unit area.

97. Which of the following is not a standard of 3G?


a) UMTS
b) Cdma2000
c) TD-SCDMA
d) LTE

Answer: d

Explanation: UMTS (Universal Mobile Telecommunication System), TD-


SCDMA (Time Division Synchronous Code Division Multiple Access),
Cdma2000 are the standards defined for 3G networks. LTE (Long Term
Evolution) is a 4G standard for high-speed wireless communication.

98. Which of the following priority handoff method decrease the


probability of forced termination of a call due to lack of available
channels?
a) Queuing

b) Guard channel

c) Cell dragging

d) Near far effect

Answer: a

Explanation: Queuing of handoff requests is a method to decrease the


probability of forced termination of a call due to lack of available
channels. Queuing of handoff is possible due to the fact that there is a
finite time interval between the time the received signal level drops below
the handoff threshold and the time the call is terminated.

99. Which of the following is associated with the handoff in first


generation analog cellular systems?

a) Locator receiver

b) MAHO

c) Cell dragging

d) Breathing cell

Answer: a

Explanation: Locator receiver is a spare receiver in each base station. It is


used to scan and determine signal strengths of mobile users which are in
neighbouring cells.

100. Handoff does not require voice and control channel to be allocated to
channels associated with the new base station.
a) True

b) False

Answer: b
Explanation: Handoff operation involves identifying a new base station. It
also requires that the voice and control signal be allocated to channels
associated with the new base station.

You might also like