Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

The local operating system on the server machine passes the incoming packets to the ___________(a) server stub(b) client stub(c) client operating system(d) client processI had been asked this question in my homework.This key question is from RPC in section Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

The correct answer is (a) SERVER stub

To EXPLAIN: The local operating SYSTEM on the server machine passes the incoming packets to the server stub which then processes the packets which contain the QUERIES from the client machines for retrieving information.

2.

RPC is a _________(a) synchronous operation(b) asynchronous operation(c) time independent operation(d) channel specific operationI got this question during an interview for a job.Asked question is from RPC topic in portion Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Right answer is (a) synchronous operation

Explanation: RPC is a synchronous operation where the remote machine WORKS in SYNC with the other machines to ACT as a SERVER that can respond to queries called by the other machines.

3.

RPC is used to _________(a) establish a server on remote machine that can respond to queries(b) retrieve information by calling a query(c) establish a server on remote machine that can respond to queries and retrieve information by calling a query(d) to secure the clientThis question was addressed to me during an internship interview.Question is from RPC in section Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Correct option is (c) establish a server on REMOTE machine that can RESPOND to queries and retrieve information by CALLING a QUERY

The explanation is: RPC or Remote Procedure Call is used to establish a server on remote machine that can respond to queries and to retrieve information by calling a query by other computers.

4.

An RPC application requires _________(a) specific protocol for client server communication(b) a client program(c) a server program(d) all of the mentionedThe question was asked by my college director while I was bunking the class.The origin of the question is RPC topic in chapter Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Correct answer is (d) all of the mentioned

To explain I would say: The RPC technique for constructing distributed, client-server APPLICATIONS based on extending the CONVENTIONAL LOCAL PROCEDURE CALLING. It requires a client program, a server program and specific protocol for client server communication to build the system.

5.

A remote procedure is uniquely identified by _________(a) program number(b) version number(c) procedure number(d) all of the mentionedThis question was posed to me in semester exam.This interesting question is from RPC topic in chapter Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Correct choice is (d) all of the mentioned

To EXPLAIN I WOULD say: Each remote procedure can be uniquely identified by the program NUMBER, version number and the procedure number in the networks SCOPE. The identifiers can be used to control the remote procedure by parties INVOLVED in the process.

6.

RPC works between two processes. These processes must be ____________(a) on the same computer(b) on different computers connected with a network(c) on the same computer and also on different computers connected with a network(d) on none of the computersThe question was asked in an interview for job.This intriguing question originated from RPC in division Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer» RIGHT option is (C) on the same computer and also on DIFFERENT computers connected with a network

Explanation: For the OPERATION of RPC between two processes, it is mandatory that the processes are present on the same computer and also on different computers connected with its network.
7.

RPC allows a computer program to cause a subroutine to execute in _________(a) its own address space(b) another address space(c) both its own address space and another address space(d) applications address spaceI have been asked this question in an internship interview.Query is from RPC topic in section Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

The correct choice is (b) another address space

The explanation is: RPC allows a computer program to cause a SUBROUTINE to execute in another address space which is usually the SERVERS address space in a conventional client-server NETWORK.

8.

A remote procedure call is _______(a) inter-process communication(b) a single process(c) a single thread(d) a single streamThis question was posed to me in final exam.The query is from RPC in division Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

The correct answer is (a) inter-PROCESS communication

The best explanation: Remote PROCEDURE calls is a FORM of inter-process communication where the client initiates an RPC to start a connection process. It is used to construct DISTRIBUTED, client-server applications.

9.

In RPC, while a server is processing the call, the client is blocked ________(a) unless the client sends an asynchronous request to the server(b) unless the call processing is complete(c) for the complete duration of the connection(d) unless the server is disconnectedI had been asked this question in homework.My enquiry is from RPC in chapter Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Correct option is (a) UNLESS the client sends an ASYNCHRONOUS request to the SERVER

The best I can explain: While the server is processing the call i.e. looking through the specifications, the client is blocked, unless the client sends an asynchronous request to the server for another OPERATION.

10.

An RPC (remote procedure call) is initiated by the _________(a) server(b) client(c) client after the sever(d) a third partyI got this question during an interview for a job.The above asked question is from RPC in portion Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

The correct answer is (b) client

Easy explanation: REMOTE Procedure Call is a METHOD USED for constructing distributed, client-server APPLICATIONS BASED on extending the conventional local procedure calling where the client initiates an RPC to start a connection process.

11.

Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data?(a) SRTP(b) RTCP(c) RCP(d) RTCTThe question was posed to me in an interview for job.My enquiry is from RTP in section Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Correct choice is (a) SRTP

Best EXPLANATION: SRTP STANDS for Secure Real-time Transport Protocol. It is like an extension to RTP which provides STREAM SECURITY through encryption, message authentication and integrity, and replay attack protection.

12.

Which one of the following is not correct?(a) RTCP provides canonical end-point identifiers to all session participants(b) RTCP reports are expected to be sent by all participants(c) RTCP itself does not provide any flow encryption or authentication methods(d) RTCP handles the actual data deliveryThe question was asked by my college director while I was bunking the class.This intriguing question originated from RTP in portion Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

The correct option is (d) RTCP handles the actual DATA delivery

Easiest explanation: RTCP works with RTP to SEND control packets to the USERS of the networks and provide CANONICAL end-point IDENTIFIERS to all session participants while RTP handles the actual data delivery.

13.

An RTP header has a minimum size of _________(a) 12 bytes(b) 16 bytes(c) 24 bytes(d) 32 bytesI had been asked this question at a job interview.This interesting question is from RTP in section Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

The CORRECT choice is (a) 12 bytes

For explanation: Each RTP packet has a fixed header of SIZE 12 bytes that contains ESSENTIAL control information like TIMESTAMP, payload type etc. for the receiving system processing.

14.

Which one of the following multimedia formats can not be supported by RTP?(a) MPEG-4(b) MJPEG(c) MPEG(d) TXTI had been asked this question in a job interview.Query is from RTP topic in portion Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

The correct option is (d) TXT

For explanation: RTP is SUITABLE only for multimedia and not for simple TEXT files as the operation would result into wastage of resources. Other protocols LIKE FTP are suitable for such TRANSMISSIONS.

15.

RTP can use __________(a) unprevileleged UDP ports(b) stream control transmission protocol(c) datagram congestion control protocol(d) all of the mentionedThe question was posed to me in final exam.The doubt is from RTP in division Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer» RIGHT choice is (d) all of the mentioned

Easy explanation: RTP uses unprevileleged UDP ports, stream CONTROL transmission protocol, and DATAGRAM congestion control protocol for data DELIVERY over IP networks.
16.

An RTP session is established for ____________(a) each media stream(b) all media streams(c) some predefined number of media streams(d) no media streamThe question was asked during an online interview.My question is from RTP topic in section Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Correct choice is (a) each media stream

The best I can explain: An RTP SESSION is required to be ESTABLISHED for each media stream for delivering AUDIO and video over the IP network. Each session has INDEPENDENT data transmission.

17.

Which protocol provides the synchronization between media streams?(a) RTP(b) RTCP(c) RPC(d) RTCTThe question was asked in an online quiz.I need to ask this question from RTP in portion Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Correct CHOICE is (B) RTCP

The BEST explanation: RTCP STANDS for Real-time Transport CONTROL Protocol and it works with RTP to send control packets to the users of the networks while RTP handles the actual data delivery.

18.

RTP provides the facility of jitter ____________(a) media stream(b) expansion(c) media modification(d) securityThe question was asked in a national level competition.The origin of the question is RTP in section Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Right answer is (a) MEDIA stream

To explain: RTP provides the facility of JITTER media stream through a jitter BUFFER which works by reconstructing the sequence of packets on the RECEIVING side. Then an even AUDIO / video stream is generated.

19.

RTP is used to ________(a) carry the media stream(b) monitor transmission statistics of streams(c) monitor quality of service of streams(d) secure the streamThe question was asked in a national level competition.My query is from RTP topic in portion Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Correct option is (a) carry the MEDIA stream

For EXPLANATION I would SAY: RTP is used to carry the media stream for delivering audio and video over IP networks. Its applications include STREAMING media, video teleconference, and TELEVISION services.

20.

Real-time transport protocol (RTP) is mostly used in _________(a) streaming media(b) video teleconference(c) television services(d) all of the mentionedThis question was addressed to me by my school teacher while I was bunking the class.This interesting question is from RTP in chapter Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer» CORRECT OPTION is (d) all of the mentioned

The EXPLANATION is: RTP stands for Real-time transport protocol and is for delivering audio and video over IP NETWORKS. Its applications include streaming media, video teleconference, and TELEVISION services.
21.

What is SDH?(a) sdh is similar standard to SONET developed by ITU-T(b) synchronous digital hierarchy(c) sdh stands for synchronous digital hierarchy and is a similar standard to SONET developed by ITU-T(d) none of the mentionedI got this question in a job interview.Asked question is from SONET topic in chapter Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Correct answer is (c) sdh STANDS for SYNCHRONOUS digital hierarchy and is a SIMILAR standard to SONET developed by ITU-T

To explain I would say: SDH is a standard that allows low bit rates to be combined into high-rate data streams and as it is synchronous, each individual bit stream can be embedded into and EXTRACTED from high-rate data streams EASILY.

22.

A unidirectional path switching ring is a network with __________(a) one ring(b) two rings(c) three rings(d) four ringsThis question was posed to me in semester exam.Query is from SONET topic in division Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

The correct choice is (b) TWO rings

The best explanation: ONE ring is USED as the WORKING ring and other as the protection ring in which each node is connected to its respective adjacent NODES by two fibers, one to transmit, and one to receive.

23.

Automatic protection switching in linear network is defined at the _______(a) line layer(b) section layer(c) photonic layer(d) path layerThe question was asked in class test.The question is from SONET topic in portion Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer» RIGHT option is (a) line layer

To ELABORATE: The Line layer in SONET operates like the data link layer in the OSI MODEL and it is responsible for the movement of signal across a physical line. The Synchronous Transport Signal Mux/Demux and Add/Drop Mux PROVIDE the Line layer functions.
24.

A linear SONET network can be ________(a) point-to-point(b) multi-point(c) both point-to-point and multi-point(d) single pointI got this question in unit test.My question comes from SONET topic in chapter Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

The correct choice is (c) both point-to-point and multi-point

To EXPLAIN I would say: Synchronous Optical Network (SONET) is basically an optical fiber point-to-point or ring network BACKBONE that provides a way to accommodate ADDITIONAL capacity as the needs of the organization INCREASE to multipoint networks.

25.

Which one of the following is not true about SONET?(a) frames of lower rate can be synchronously time-division multiplexed into a higher-rate frame(b) multiplexing is synchronous TDM(c) all clocks in the network are locked to a master clock(d) STS-1 provides the data rate of 622.080MbpsI got this question in a job interview.This intriguing question comes from SONET in chapter Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

The CORRECT option is (d) STS-1 provides the DATA rate of 622.080Mbps

Explanation: In SONET, STS-N stands for Synchronous TRANSPORT Signal LEVEL-N. STS-1 level provides the data rate of 51.84 Mbps, and STS-12 provides a data rate of 622.080 Mbps.

26.

In SONET, each synchronous transfer signal STS-n is composed of __________(a) 2000 frames(b) 4000 frames(c) 8000 frames(d) 16000 framesI got this question at a job interview.Asked question is from SONET in portion Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Correct answer is (c) 8000 frames

Easiest EXPLANATION: SONET defines the electrical SIGNAL as STS-N (Synchronous Transport Signal Level-N) and the optical signal as OC-N (Optical CARRIER Level-N). The building block of SONET is the STS-1/OC-1 signal, which is based on an 8-kHz frame RATE and operates at 51.84 Mbps.

27.

The photonic layer of the SONET is similar to the __________ of OSI model.(a) network layer(b) data link layer(c) physical layer(d) transport layerThe question was posed to me in an interview for internship.I need to ask this question from SONET topic in division Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

The correct ANSWER is (c) PHYSICAL layer

The explanation is: The PHOTONIC layer in SONET is like the physical layer of the OSI model. It is the lowest layer AMONG the four layers of SONET namely the photonic, the section, the line, and the PATH layers.

28.

The path layer of SONET is responsible for the movement of a signal _________(a) from its optical source to its optical destination(b) across a physical line(c) across a physical section(d) back to its optical sourceThis question was addressed to me in final exam.I'd like to ask this question from SONET topic in section Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Right option is (B) across a PHYSICAL line

The EXPLANATION: The path layer in SONET is responsible for finding the path of the signal across the physical line to reach the optical destination. It is IDEALLY expected to find the shortest and the most reliable path to the destination.

29.

In SONET, STS-1 level of electrical signalling has the data rate of _________(a) 51.84 Mbps(b) 155.52 Mbps(c) 2488.320 Mbps(d) 622.080 MbpsThe question was posed to me by my college director while I was bunking the class.This interesting question is from SONET topic in division Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Right answer is (a) 51.84 MBPS

The explanation: STS-1 level PROVIDES the DATA RATE of 51.84 Mbps, STS-3 provides a data rate of 155.52 Mbps, STS-12 provides a data rate of 622.080 Mbps and STS-48 provides a data rate of 2488.320 Mbps.

30.

SONET stands for ___________(a) synchronous optical network(b) synchronous operational network(c) stream optical network(d) shell operational networkThe question was asked during an interview.My enquiry is from SONET topic in division Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer» CORRECT option is (a) synchronous optical network

Explanation: SONET stands for synchronous optical network. FRAME relay uses SONET to physically transmit data frames over a Frame Relay network as SONET is CHEAPER and PROVIDES better network reliability than other carriers.
31.

Which of the following frequencies is not used in WiMAX for communication?(a) 2.3 GHz(b) 2.4 GHz(c) 2.5 GHz(d) 3.5 GHzThis question was addressed to me during an interview.Question is taken from WiMAX topic in division Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Right OPTION is (b) 2.4 GHz

Easy explanation: The 2.4GHz ISM frequency band is used for PERSONAL AREA NETWORK technologies such as Bluetooth and hence is not SUITABLE for WiMAX which is mostly used for Metropolitan Area Networks.

32.

WiMAX is mostly used for __________(a) local area network(b) metropolitan area network(c) personal area network(d) wide area networkThe question was posed to me in a job interview.My doubt is from WiMAX topic in section Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Right choice is (b) metropolitan area network

The best explanation: WiMAX provides Wi-Fi CONNECTIVITY WITHIN the home or business for computers and smartphones. WiMAX network operators typically PROVIDE a WiMAX Subscriber Unit to do so. The subscriber unit is USED to connect to the metropolitan WiMAX network.

33.

Devices that provide the connectivity to a WiMAX network are known as _________(a) subscriber stations(b) base stations(c) gateway(d) switch stationsThis question was addressed to me by my school principal while I was bunking the class.I need to ask this question from WiMAX in division Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Right choice is (a) subscriber stations

For explanation I WOULD SAY: Subscriber stations in WiMAX are transceivers (transmitter and RECEIVERS). They are used to CONVERT radio signals into digital signals that can be routed to and from communication devices. There is a variety of types of WiMAX subscriber stations like PORTABLE PCMCIA cards and fixed stations that provide service to multiple users.

34.

WiMAX provides _______(a) VoIP services(b) IPTV services(c) Both VoIP and IPTV services(d) no IPTV servicesThis question was posed to me by my school teacher while I was bunking the class.This intriguing question comes from WiMAX in chapter Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Correct CHOICE is (c) Both VoIP and IPTV services

The explanation: IPTV can be TRANSMITTED over WIMAX, and relies on packet-switching to offer reliable delivery. VoIP can be operated over a WiMax network with no special HARDWARE or software.

35.

For encryption, WiMAX supports _______(a) advanced encryption standard(b) triple data encryption standard(c) advanced encryption standard and triple data encryption standard(d) double data encryption standardThe question was posed to me in exam.This interesting question is from WiMAX in division Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

The correct choice is (c) ADVANCED ENCRYPTION STANDARD and triple data encryption standard

To elaborate: Both advanced encryption standard and triple data encryption standard are block cipher techniques and are popularly USED in WiMAX and other applications for SECURE encryption.

36.

WiMAX MAC layer provides an interface between ___________(a) higher transport layers and physical layer(b) application layer and network layer(c) data link layer and network layer(d) session layer and application layerThe question was asked at a job interview.I'm obligated to ask this question of WiMAX topic in portion Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer» CORRECT option is (a) higher transport layers and physical layer

Easiest explanation: WIMAX provides support for multiple physical layer (PHY) on the physical layer and Media Access Control (MAC) options for higher layers to provide wireless BROADBAND access to BUILDINGS.
37.

Which of the following modulation schemes is supported by WiMAX?(a) binary phase shift keying modulation(b) quadrature phase shift keying modulation(c) quadrature amplitude modulation(d) all of the mentionedI have been asked this question in an interview.This key question is from WiMAX in division Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Right CHOICE is (d) all of the mentioned

Best EXPLANATION: WiMAX supports a variety of modulation schemes such as binary phase shift keying modulation, quadrature phase shift keying modulation, and quadrature amplitude modulation and allows for the scheme to change on a burst-by-burst basis PER link, depending on channel CONDITIONS.

38.

WiMAX uses the _________(a) orthogonal frequency division multiplexing(b) time division multiplexing(c) space division multiplexing(d) channel division multiplexingThe question was posed to me in an interview.This is a very interesting question from WiMAX in portion Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer» CORRECT OPTION is (a) orthogonal FREQUENCY division multiplexing

The best I can EXPLAIN: WiMAX physical layer USES orthogonal frequency division multiplexing as it provides simplified reception in multipath and allows WiMAX to operate in NLOS conditions.
39.

WiMAX provides ________(a) simplex communication(b) half duplex communication(c) full duplex communication(d) no communicationI had been asked this question in an interview for internship.My doubt is from WiMAX in division Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

The correct choice is (c) full duplex communication

The EXPLANATION is: WiMax was developed to provide WIRELESS BROADBAND access to buildings. It can also be used to connect WLAN hotspots to the Internet. It is based on IEEE 802.16 standards.

40.

WiMAX stands for ___________(a) wireless maximum communication(b) worldwide interoperability for microwave access(c) worldwide international standard for microwave access(d) wireless internet maximum communicationThe question was posed to me in class test.I'd like to ask this question from WiMAX in division Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

The correct choice is (b) worldwide interoperability for microwave access

For explanation I would say: WiMAX or worldwide interoperability for microwave access is a set of wireless communication standards. It provides support for multiple PHYSICAL layer (PHY) and MEDIA Access Control (MAC) options. It is BASED on IEEE 802.16 standards.

41.

A scatternet can have maximum __________(a) 10 piconets(b) 20 piconets(c) 30 piconets(d) 40 piconetsI have been asked this question in class test.Question is from Bluetooth in division Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer» RIGHT ANSWER is (a) 10 piconets

To elaborate: A scatternet can have maximum of 10 piconets and minimum of 2 piconets. To connect these piconets, a slave node of one PICONET may ACT as a master in a piconet that is PART of the scatternet.
42.

Bluetooth supports _______(a) point-to-point connections(b) point-to-multipoint connection(c) both point-to-point connections and point-to-multipoint connection(d) multipoint to point connectionThe question was asked in homework.This interesting question is from Bluetooth topic in chapter Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Right OPTION is (c) both point-to-point connections and point-to-multipoint connection

For explanation I WOULD say: In Bluetooth, each slave node communicates with the master of the piconet independently i.e. each master-slave connection is independent. The slave is not ALLOWED to communicate with other SLAVES directly.

43.

Bluetooth transceiver devices operate in ______ band.(a) 2.4 GHz ISM(b) 2.5 GHz ISM(c) 2.6 GHz ISM(d) 2.7 GHz ISMI have been asked this question during an interview.My question is based upon Bluetooth in division Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

The correct answer is (a) 2.4 GHz ISM

Easy EXPLANATION: Bluetooth OPERATES on 2.45 GHz frequency ISM band for transmission. It is used to create a wireless PERSONAL area network for data TRANSFER up to a DISTANCE of 10 meters.

44.

In a piconet, one master device ________(a) can not be slave(b) can be slave in another piconet(c) can be slave in the same piconet(d) can be master in another piconetThe question was asked during a job interview.My doubt stems from Bluetooth in chapter Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer» RIGHT choice is (b) can be slave in another PICONET

Easy explanation: In a scatternet, a slave node of ONE piconet may act as a MASTER in a piconet that is part of the scatternet. The scatternet uses this property to connect many piconets together to create a larger NETWORK.
45.

What is A2DP (advanced audio distribution profile)?(a) a bluetooth profile for streaming audio(b) a bluetooth profile for streaming video(c) a bluetooth profile for security(d) a bluetooth profile for file managementI have been asked this question during an online exam.My question is taken from Bluetooth topic in portion Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Correct answer is (a) a bluetooth profile for streaming audio

The explanation is: A2DP stands for ADVANCED Audio Distribution Profile is a transfer STANDARD use to transmit high definition audio through Bluetooth. It is mainly used in Bluetooth SPEAKERS and wireless headphones.

46.

Unauthorised access of information from a wireless device through a bluetooth connection is called _________(a) bluemaking(b) bluesnarfing(c) bluestring(d) bluescopingThe question was posed to me in unit test.I'm obligated to ask this question of Bluetooth in portion Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Correct answer is (B) bluesnarfing

To EXPLAIN I would say: UNAUTHORISED access of INFORMATION from a wireless device through a BLUETOOTH connection is called Bluesnarfing. It is done through exploiting the vulnerabilities of the Bluetooth device to steal the transmitted information.

47.

Bluetooth uses __________(a) frequency hopping spread spectrum(b) orthogonal frequency division multiplexing(c) time division multiplexing(d) channel division multiplexingThe question was posed to me in semester exam.This intriguing question comes from Bluetooth topic in section Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer» CORRECT answer is (a) frequency hopping spread spectrum

Best EXPLANATION: Frequency hopping spread spectrum is a METHOD of transmitting radio signals by rapidly changing the carrier frequency and is controlled by the codes known to the sender and RECEIVER only.
48.

Bluetooth is the wireless technology for __________(a) local area network(b) personal area network(c) metropolitan area network(d) wide area networkI had been asked this question during an internship interview.Question is from Bluetooth topic in division Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Right choice is (B) personal area NETWORK

Explanation: Bluetooth is a wireless technology used to create a wireless personal area network for data transfer up to a DISTANCE of 10 METERS. It operates on 2.45 GHz frequency BAND for transmission.

49.

In a piconet, there can be up to ________ parked nodes in the network.(a) 63(b) 127(c) 255(d) 511This question was posed to me by my school teacher while I was bunking the class.I'm obligated to ask this question of Bluetooth in portion Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Right answer is (c) 255

The explanation: A slave NODE in a piconet can be instructed by the MASTER node to go into parked mode. Then the slave node ENTERS the parked mode in which the node is not disconnected from the NETWORK but is INACTIVE unless the master wakes it up.

50.

An interconnected collection of piconet is called ___________(a) scatternet(b) micronet(c) mininet(d) multinetThe question was asked in an international level competition.This is a very interesting question from Bluetooth in section Wireless LAN’s, Electronic Mail and File Transfer of Computer Network

Answer»

Correct option is (a) scatternet

Explanation: PICONET is the BASIC unit of a bluetooth system having a MASTER NODE and upto seven active slave nodes. A collection of piconets is called scatternet and a slave node of a piconet may act as a master in a piconet that is part of the scatternet.