B.E/B.TECH DEGREE INTERNAL EXAMINATION I: Feb 2017 REGULATIONS: 2013
REGULATIONS: 2013 VI-SEMESTER: CSE
VI-SEMESTER: CSE IT6601- Mobile Computing
IT6601- Mobile Computing DATE: 16/02/2017 Max: 50 Marks
DATE: 16/02/2017 Max: 50 Marks TIME: 09.25 am to 10.55 am
TIME: 09.25 am to 10.55 am PART- A (7X 2 = 14)
ANSWER ALL QUESTIONS PART- A (7X 2 = 14) 1. What are the applications of mobile computing? ANSWER ALL QUESTIONS 2. Define mobile computing. 1. What are the applications of mobile computing? 3. Differentiate VANET and MANET. 2. Define mobile computing. 4. What are the characteristics of mobile computing? 3. Differentiate VANET and MANET. 5. What do you mean by tunneling? 4. What are the characteristics of mobile computing? 6. Differentiate Bluetooth and WIFI. 5. What do you mean by tunneling? 7. What is bandwidth? 6. Differentiate Bluetooth and WIFI. 7. What is bandwidth? PART- B (3X12 = 36) ANSWER ALL QUESTIONS PART- B (3X12 = 36) 8. a. (i) Explain about wireless MAC issues and reservation ANSWER ALL QUESTIONS based schemes.(8) 8. a. (i) Explain about wireless MAC issues and reservation (ii) Explain about ALOHA technique.(4) based schemes.(8) (or) (ii) Explain about ALOHA technique.(4) b. (i) What are the types of CSMA and explain it?(6) (or) (ii) Explain structure of mobile computing with diagram.(6) b. (i) What are the types of CSMA and explain it?(6) (ii) Explain structure of mobile computing with diagram.(6) 9. a. Explain about the fixed assignment schemes.(12) (or) 9. a. Explain about the fixed assignment schemes.(12) b. (i) Explain about MAC protocol.(8) (or) (ii) Differentiate wireless and mobile computing.(4) b. (i) Explain about MAC protocol.(8) (ii) Differentiate wireless and mobile computing.(4) 10. a. (i) What do you know about TCP, IP & UDP (6) (ii) Explain about the term Ad-Hoc, physical layer & collision 10. a. (i) What do you know about TCP, IP & UDP (6) (6) (ii) Explain about the term Ad-Hoc, physical layer & collision (or) (6) b. (i) Explain about the terms Ethernet, RTO & Buffer.(6) (or) (ii) Write in your own way about the packet transmission b. (i) Explain about the terms Ethernet, RTO & Buffer.(6) process from sender to receiver in mobile computing.(6) (ii) Write in your own way about the packet transmission process from sender to receiver in mobile computing.(6)
Cybersecurity: A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
Evaluation of Some Websites that Offer Virtual Phone Numbers for SMS Reception and Websites to Obtain Virtual Debit/Credit Cards for Online Accounts Verifications
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux