Author: Henry Carol

Click link for more description


1. Prior to cellular radio, mobile radio and telephone services required:A. a high-power transmitter/receiverB. multiple transmitters/receiversC. only one or two dedicated channelsD. that many channels be used, which exceed the frequency capacity2. When using cellular networks, __________.A. a single base station can serve multiple cellsB. adjacent cells must use the same frequenciesC. adjacent cells are assigned different frequenciesD. non-adjacent cells are assigned different frequencies3. The ideal design for cells in a cellular network is a hexagonal shape because _____.A. this makes enforcement of shapes easierB. this is the easiest to implementC. this makes all frequencies available to all cellsD. this makes the distance to all adjacent cells the same4. When a mobile unit moves, it may connect with a different base station. This action is called____________.A. a handoffB. a transferC. a reconfigurationD. a dropped signal5. Which of the following is NOT one of the ways that frequency spectrum can be dividedamong active users?A. frequency division multiple accessB. time division multiple accessC. code division multiple accessD. cell division multiple access6. Because of the limited frequencies available, a key design element of any cellular system is to___________.A. use small cellsB. employ multiple accessC. limit the number of users at one timeD. use as many frequencies as possible7. The Wireless Application Protocol (WAP) is:A. proprietary protocol developed in the USA for wireless securityB. dependent on the specific network technologies employedC. an Internet standard that replaces HTML, HTTP, and XMLD. designed to overcome many of the limitations hindering acceptance of mobile dataservices8. Which of the following is NOT one of the components of the WAP specification?A. A framework for wireless telephony applicationsB. A full-featured communications protocol stackC. A programming model based on the WWWD. A markup language adhering to XML9. The WAP Programming Model uses a ________ that acts as a proxy server for the wirelessdomain.A. translatorB. WAP serverC. gatewayD. decoder10. For a given system, multiple access is based on _______.A. TDMAB. FDMAC. CDMAD. all of the above11. Important objectives of computer security include:A. confidentialityB. integrityC. availabilityD. all of the above12. One type of attack on the security of a computer system or network that impacts theavailability of a system (e.g. destruction of a resource in the system) is referred to as___________.A. incapacitationB. interceptionC. modificationD. all of the above13. The type of attack on communications lines and networks known as traffic analysis belongsto the general category of ____________.A. active attacksB. passive attacksC. administrative attacksD. none of the above

See More
Try a College Course Free

Sophia’s self-paced online courses are a great way to save time and money as you earn credits eligible for transfer to over 2,000 colleges and universities.*

Begin Free Trial
No credit card required

26 Sophia partners guarantee credit transfer.

226 Institutions have accepted or given pre-approval for credit transfer.

* The American Council on Education's College Credit Recommendation Service (ACE Credit®) has evaluated and recommended college credit for 21 of Sophia’s online courses. More than 2,000 colleges and universities consider ACE CREDIT recommendations in determining the applicability to their course and degree programs.