Mobile Computing Review Questions - 504 Verified Questions

Page 1


Mobile Computing Review Questions

Course Introduction

Mobile Computing explores the principles, technologies, and challenges involved in developing and deploying computing systems that operate within mobile and wireless environments. This course covers key topics such as mobile device architectures, wireless communication protocols, mobile operating systems, location-based services, and mobile application development. Students will gain a comprehensive understanding of issues such as resource management, security, context awareness, and user interface design for mobile platforms. Through hands-on projects and case studies, learners will develop the skills needed to create innovative applications for smartphones, tablets, and wearable devices, preparing them for the rapidly evolving field of mobile technologies.

Recommended Textbook

CWNA Guide to Wireless LANs Networking 2nd Edition by Mark Ciampa

Available Study Resources on Quizplus 12 Chapters

504 Verified Questions

504 Flashcards

Source URL: https://quizplus.com/study-set/1032

Page 2

Chapter 1: Its a Wireless World

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20462

Sample Questions

Q1) Some airlines use WLAN technology to communicate with the aircraft once it has parked or is taxiing on the ground.

A)True

B)False

Answer: True

Q2) Amanda's car is equipped with hands-free cellular calling based on the Bluetooth wireless standard. Explain how this device helps Amanda during her commute. Answer: Amanda first turns on her Bluetooth-enabled cell phone to pair it with the Bluetooth device in the car. She then can control the phone with buttons on her steering wheel. Amanda presses the Talk button on the steering wheel and says aloud the name of the person she's calling. Her cell phone dials the number that is stored in the car's phone book. The dialing and caller information as well as signal and battery strength appear on her car's instrument panel. Once the person answers the call, Amanda can talk hands-free. The Bluetooth system also works with the car's navigation system, so Amanda can auto-dial phone numbers associated with local points of interest, such as hotels and restaurants.

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Wireless LAN Devices and Standards

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20463

Sample Questions

Q1) A(n) ____ card improves input/output speed over a PC Card by increasing the bus width to 32 bits yet still supports lower-voltage PC Cards.

A) mini PCI

B) CardBus

C) built-in

D) access point

Answer: B

Q2) A device called a ____ must sometimes be attached to a PDA in order to establish a wireless connection. The device contains a slot for a wireless NIC or similar device.

A) shoe

B) slot

C) sled

D) bridge

Answer: C

Q3) Access points are typically mounted on a(n) ____________________ to reduce interference from surrounding objects.

Answer: ceiling

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: How Wireless Works

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20464

Sample Questions

Q1) Why is it important to understand how wireless technology works?

Answer: Knowing how wireless works can become an important tool in troubleshooting a WLAN that is not functioning correctly. Although access points (APs) are no longer expensive items to purchase, often the problem with a wireless network does not lie with the equipment but instead with the signal that is being transmitted and obstructions to that signal. Knowing how a wireless signal is transmitted can help in isolating and correcting problems.

Q2) The ASK 1 bit has a carrier signal (positive voltage) while a 0 bit has no signal (zero voltage).

A)True

B)False

Answer: True

Q3) What is a problem with measuring RF loss using a linear scale?

A) it does not reveal what the loss is in relation to the whole

B) it is inaccurate

C) it is difficult to calculate

D) it requires complex measurements

Answer: A

To view all questions and flashcards with answers, click on the resource link above.

5

Chapter 4: IEEE 80211 Physical Layer Standards

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20465

Sample Questions

Q1) Narrowband transmissions require significant power for the signal to be transmitted because the signal must exceed the ____________________, or the total amount of outside interference, by a substantial margin.

Q2) ____ signals by nature transmit on only one frequency or a very narrow portion of the frequencies.

A) Broadband

B) Computer

C) Radio

D) Heat

Q3) The ____ coding technique consists of a set of 64 8-bit code words.

A) chipping

B) fixed scramble

C) Barker

D) complementary code keying

Q4) The 802.11b standard specifies ____ frequencies that can be used, beginning at 2.412 GHz.

A) 4

B) 10

C) 14

D) 30

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: IEEE 80211 Media Access Control and Network

Layer Standards

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20466

Sample Questions

Q1) At regular intervals the AP in an infrastructure network or wireless device in an ad hoc network sends a ____ frame both to announce its presence and to provide the necessary information for other devices to join the network.

A) master

B) beacon

C) data

D) control

Q2) On ESS networks that have multiple access points, the wireless device might actually receive beacon frames from several APs. Which AP would a wireless device generally choose in this case?

A) the closest

B) the one with the fewest wireless devices attached to the AP

C) the one with the strongest signal strength

D) the choice will be random

Q3) Describe power management for an ad hoc configuration.

Q4) CSMA/CA eliminates the possibility of collisions.

A)True

B)False

Q5) What fields are contained in the body of a beacon frame?

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Planning and Deploying a Wireless LAN

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20467

Sample Questions

Q1) What is the second step in the wireless LAN model developed by Intel?

A) implement a pilot

B) develop a report

C) assemble data

D) calculate ROI

Q2) Wireless access to network resources can improve the quality and productivity of meetings.

A)True

B)False

Q3) List the seven different deployment scenarios for WLANs.

Q4) ____ is one of the most effective strategies for providing support for a new wireless network.

A) Creating formal user support groups

B) Assigning support to the information technology department

C) Maintaining a help desk

D) Outsourcing support to a third party

Q5) In buildings that have a false ceiling (sometimes called a drop or suspended ceiling), there is a temptation to simply remove a ceiling tile, place the access point in the space above the ceiling, and then replace the tile. Why is this a bad idea?

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Conducting a Site Survey

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20468

Sample Questions

Q1) The process of planning a wireless LAN to meet the design goals is known as a(n)

Q2) What type of AP antenna is most commonly used in a site survey?

A) omnidirectional

B) semi-directional

C) highly-directional

D) parabolic

Q3) What is a spectrum analyzer?

Q4) Which network requires some sort of gateway or interface to be compatible with IEEE 802.11 WLANs?

A) Token Ring

B) Wired Bus

C) Mobile IP

D) Ethernet

Q5) You would use ____ in documenting a site survey.

A) a digital camera

B) blueprints

C) plain paper

D) All of the above

Q6) What are the steps involved in gathering data for a site survey?

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Wireless LAN Security and Vulnerabilities

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20469

Sample Questions

Q1) Which characteristic of information is guarded by access control?

A) availability

B) integrity

C) confidentiality

D) robustness

Q2) Using the same (shared) secret key to both encrypt as well as decrypt is called ____________________ cryptography.

Q3) ____ was initially founded by the U.S. Department of Defense and is now part of the Software Engineering Institute at Carnegie Mellon University.

A) Computer Emergency Response Team Coordination Center (CERT/CC)

B) InfraGard

C) National Security Institute (NSI)

D) SysAdmin, Audit, Network, Security (SANS) Institute

Q4) When the recipient receives the encrypted text, it must be decrypted with the cipher and the key to produce the original ____.

A) plaintext

B) detext

C) ciphertext

D) deciphertext

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Implementing Wireless Lan Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20470

Sample Questions

Q1) A ____ VPN is a user-to-LAN connection used by remote users.

A) remote-access

B) site-to-site

C) peer-to-peer

D) remote-to-LAN

Q2) The ____ method of encryption is used in a personal security model.

A) PSK

B) WEP

C) TKIP

D) MAC

Q3) Describe Advanced Encryption Standard (AES).

Q4) What feature of IEEE 802.11i allows a device to become authenticated to an AP before moving to it?

A) key caching

B) port security

C) pre-authentication

D) message passing

Q5) Most consumer access points are in reality wireless ____________________, because they combine the functions of an access point, router, network address translator, firewall, and switch.

11

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Managing a Wireless LAN

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20471

Sample Questions

Q1) A wireless network is a static system.

A)True

B)False

Q2) What is an RF amplifier?

Q3) What tool(s) are used most often as "standard" network monitoring tools?

A) AP Monitor and Simple Network Management Protocol

B) WLAN Logger and Remote Monitoring

C) Simple Network Management Protocol and Remote Monitoring

D) All of the above

Q4) The first step in the security policy cycle is to perform a(n) ____________________, which attempts to determine the nature of the risks to the organization's assets.

Q5) In the Windows operating system, what window provides basic tools for monitoring a WLAN?

A) Wireless Adapter Information

B) Wireless Network Connection Status

C) Access Point Utilities

D) Network Monitor

Q6) ____________________ engineering relies on tricking or deceiving someone to give a hacker access to a system.

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Network Settings and Wireless LAN

Troubleshooting

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20472

Sample Questions

Q1) The Default IP Address and Default IP Subnet Mask fields are used only when ____ is enabled for the network.

A) DHCP

B) MAC

C) Mobile IP

D) Advanced IP

Q2) What are some of the factors that influence system throughput?

Q3) When using WEP as part of the transitional security model, the same ____ key must be installed on the access point and the device. If not the wireless device may not operate properly.

A) secure

B) linked

C) shared

D) private

Q4) With some wireless networks using Mobile IP, up to ____ AAPs can be designated.

A) three

B) four

C) six

D) ten

Q5) What are the three different frame formats?

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Personal, Metropolitan, and Wide Area Wireless

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/20473

Sample Questions

Q1) How does the MAC layer of WiMAX (Worldwide Interoperability for Microwave Access) differ from that used in IEEE 802.11a/b/g?

Q2) Describe the way cellular telephone networks work.

Q3) Describe the last mile connection problem.

Q4) If multiple piconets cover the same area, a Bluetooth device can be a member in two or more overlaying piconets.

A)True

B)False

Q5) A ____ satellite remains "fixed" over a given location on the earth and seems to hang motionless in space.

A) low earth orbiting

B) medium earth orbiting

C) high-earth orbiting

D) geosynchronous earth orbiting

Q6) The ZigBee group has drafted standards relating to network configuration, security, and other higher-level features that are not covered by the IEEE 802.15.4 standard.

A)True

B)False

Page 14

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook