πŸ“Š Computer Architecture and Organization
Q. A wireless network interface controller can work in
  • (A) infrastructure mode
  • (B) ad-hoc mode
  • (C) both infrastructure mode and ad-hoc mode
  • (D) wds mode
πŸ’¬ Discuss
βœ… Correct Answer: (C) both infrastructure mode and ad-hoc mode

Explanation: a wireless network interface controller works on the physical layer and the data link layer of the osi model.

πŸ“Š Computer Architecture and Organization
Q. In wireless network an extended service set is a set of
  • (A) connected basic service sets
  • (B) all stations
  • (C) all access points
  • (D) connected access points
πŸ’¬ Discuss
βœ… Correct Answer: (A) connected basic service sets

Explanation: the extended service set is a part of the ieee 802.11 wlan architecture and is used to expand the range of the basic service set by allowing connection of multiple basic service sets.

πŸ“Š Computer Architecture and Organization
Q. Mostly is used in wireless LAN.
  • (A) time division multiplexing
  • (B) orthogonal frequency division multiplexing
  • (C) space division multiplexing
  • (D) channel division multiplexing
πŸ’¬ Discuss
βœ… Correct Answer: (B) orthogonal frequency division multiplexing

Explanation: in orthogonal frequency division multiplexing, digital data is encoded on multiple carrier frequencies. it is also used in digital television and audio broadcasting in addition to wireless lans.

πŸ“Š Computer Architecture and Organization
Q. Which one of the following event is not possible in wireless LAN?
  • (A) collision detection
  • (B) acknowledgement of data frames
  • (C) multi-mode data transmission
  • (D) connection to wired networks
πŸ’¬ Discuss
βœ… Correct Answer: (A) collision detection

Explanation: collision detection is not possible in wireless lan with no extensions. collision detection techniques for multiple access like csma/cd are used to detect collisions in wireless lans.

πŸ“Š Computer Architecture and Organization
Q. What is Wired Equivalent Privacy (WEP)?
  • (A) security algorithm for ethernet
  • (B) security algorithm for wireless networks
  • (C) security algorithm for usb communication
  • (D) security algorithm for emails
πŸ’¬ Discuss
βœ… Correct Answer: (B) security algorithm for wireless networks

Explanation: wep is a security algorithm for wireless network which intended to provide data confidentiality comparable to that of traditional wired networks. it was introduced in 1997.

πŸ“Š Computer Architecture and Organization
Q. What is WPA?
  • (A) wi-fi protected access
  • (B) wired protected access
  • (C) wired process access
  • (D) wi-fi process access
πŸ’¬ Discuss
βœ… Correct Answer: (A) wi-fi protected access

Explanation: wpa or wifi protected access is a security protocol used to provide users and firms with strong data security and protection for their wireless networks (wifi) to give them confidence that only authorized users can access their network.

πŸ“Š Computer Architecture and Organization
Q. The time required to transmit frame depends on
  • (A) frame size
  • (B) channel capacity
  • (C) frame size & channel capacity
  • (D) none of the mentioned
πŸ’¬ Discuss
βœ… Correct Answer: (C) frame size & channel capacity

Explanation: the time to transmit frame is given by the ratio of frame size and channel capacity.

πŸ“Š Computer Architecture and Organization
Q. Window given the number of
  • (A) bytes
  • (B) frames
  • (C) bytes & frames
  • (D) none of the mentioned
πŸ’¬ Discuss
βœ… Correct Answer: (C) bytes & frames

Explanation: window gives the number of frames or bytes that can be in transit unacknowledged.

Jump to