Bluetooth uses ______method in thephysical layer to avoid interference from other devicesor othernetworks.
A)
DSSS
B)
FHSS
C)
FDMA
D)
none of the above

1 Answer

Answer :

FHSS

Related questions

Description : The IEEE 802.11g, uses _________. A) FHSS B) DSSS C) OFDM D) either (a)or (b)

Last Answer : OFDM

Description : The IEEE 802.11b, uses _________. A) FHSS B) DSSS C) OFDM D) either (a)or (b)

Last Answer : DSSS

Description : The IEEE 802.11a, uses _________. A) FHSS B) DSSS C) OFDM D) either (a)or (b)

Last Answer : OFDM

Description : The original IEEE 802.11,uses _________. A) FHSS B) DSSS C) OFDM D) either (a)or (b)

Last Answer : either (a)or (b)

Description : The ______ technique expands the bandwidthof a signal by replacing each data bit with n bits. A) FDM B) DSSS C) FHSS D) TDM

Last Answer : DSSS

Description : In Bluetooth, the_______ layer is roughly equivalent to thephysical layer of theInternet model. A) radio B) baseband C) L2CAP D) none of the above

Last Answer : radio

Description : Which of the following spread spectrum techniques were used in the original IEEE 802.11 standard? a) FHSS and DSSS b) THSS and FHSS c) THSS and DSSS d) Hybrid technique

Last Answer : a) FHSS and DSSS

Description : The access method in Bluetooth is________. A) FDMA B) TDD-TDMA C) CDMA D) none of the above

Last Answer : TDD-TDMA

Description : A ________operates in both thephysical andthe data link layer. A) passive hub B) repeater C) bridge D) router

Last Answer : bridge

Description : _______ ispart of the media; its location in the Internet model is below thephysical layer. A) An activehub B) A passivehub C) either (a)or (b) D) neither (a) nor (b)

Last Answer : A passivehub

Description : The _______ layer corresponds to thephysical layer of the OSI model. A) section B) line C) path D) photonic

Last Answer : section

Description : ______ is based oncoding theory and uses sequencesof numbers called chips. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : CDMA

Description : A _______ is a device that operates only in the physical layer A) passive hub B) repeater C) bridge D) router

Last Answer : repeater

Description : Which of the following scheme is used by Bluetooth? a) Frequency hopping TDD scheme b) Frequency hopping FDD scheme c) DSSS TDD scheme d) DSSS FDD scheme

Last Answer : a) Frequency hopping TDD scheme

Description : In______, each station is allocated a band to send its data. In other words, each band is reservedfor a specific station,and it belongs to the station all the time. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : FDMA

Description : In_______, the sequences aregenerated using orthogonal codes such the Walsh tables. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : CDMA

Description : In ______, the stations usedifferent codes toachieve multipleaccess. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : CDMA

Description : In_____, each station transmits its data in itsassignedtime slot. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : TDMA

Description : In_____, each station is allocateda time slotduring which it can send data. Each stationtransmits its data in itsassigned time slot. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : TDMA

Description : In_______, the stations share thebandwidth of the channel in time. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : TDMA

Description : In________, the available bandwidth is divided into frequency bands. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : TDMA

Description : ________ requires that each station first listento the medium before sending. A) MA B) CSMA C) FDMA D) CDMA

Last Answer : CSMA

Description : In ______, the chanceof collisioncan be reduced if a station senses the medium beforetrying touse it. A) MA B) CSMA C) FDMA D) CDMA

Last Answer : CSMA

Description : The _____ layer uses data compression to reduce the number of bits to be transmitted. a. presentation b. network c. data link d. application

Last Answer : a. presentation

Description : State weather the following statement is true or false for Stream Control Transmission Protocol (SCTP). 1). SCTP uses only few known ports in the TCP space. 2).SCTP is a new transport protocol at the same layer as TCP and ... , 3. false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : D. 1.false, 2. true, 3. true

Description : When displaying a web page, the application layer uses the _____________ A. HTTP protocol B. FTP protocol C. SMTP protocol D. TCP protocol

Last Answer : A. HTTP protocol

Description : Electronic mail uses which Application layer protocol? A. SMTP B. HTTP C. FTP D. SIP

Last Answer : A. SMTP

Description : Internal auditing can affect the scope of the external auditor's audit of financial statements by a. Decreasing the external auditor's need to perform detailed tests b. Eliminating the need ... direct testing by the external auditor to management assertions not directly tested by internal auditing.

Last Answer : Decreasing the external auditor's need to perform detailed tests

Description : Which of the following is not a disadvantage of wireless LAN? A. Slower data transmission B. higher error rate C. interference of transmissions from different computers D. All of theabove

Last Answer : All of theabove

Description : Fiber optics posses following properties __________ a) Immune electromagnetic interference b) Very less signal attenuation c) Very hard to tap d) All of the mentioned

Last Answer : d) All of the mentioned

Description : Which of the following WLAN standard has been named Wi-Fi? a) IEEE 802.6 b) IEEE 802.15.4 c) DSSS IEEE 802.11b d) IEEE 802.11g

Last Answer : c) DSSS IEEE 802.11b

Description : Explain direct sequence spread spectrum (DSSS) transmitter with block diagram.

Last Answer : In direct sequence, the serial binary data is mixed with a higher frequency pseudorandom binary code at a faster rate and the result is used to phase-modulate a carrier. The ... 1010 with odd parity. le of spread spectrum modulation and demodulation using PSK for primary modulation.

Description : In Bluetooth, the_____ link is used when data integrity is more important than avoiding latency. A) SCO B) ACL C) ACO D) SCL

Last Answer : ACL

Description : In Bluetooth, the_____ link is used when avoiding latency (delay in data delivery) is more important than integrity (error-free delivery). A) SCO B) ACL C) ACO D) SCL

Last Answer : SCO

Description : In Bluetooth, theL2CAP sublayer, is roughly equivalent to the LLC sublayer inLANs. A) radio B) baseband C) L2CAP D) none of the above

Last Answer : L2CAP

Description : In Bluetooth, the_____layer is roughlyequivalent tothe MAC sublayer in LANs. A) radio B) baseband C) L2CAP D) none of the above

Last Answer : baseband

Description : In Bluetooth, thecurrent data rateis ____Mbps A) 2 B) 5 C) 11 D) none of the above

Last Answer : none of the above

Description : A Bluetooth network consists of _____primary device(s)and up to____ secondary devices. A) one; five B) five; three C) two; six D) one; seven

Last Answer : one; seven

Description : In Bluetooth, multiple ________ form a network called a _________. A) scatternet; piconets B) piconets: scatternet C) piconets:bluenet D) bluenet; scatternet

Last Answer : piconets: scatternet

Description : A Bluetooth network is called a ________. A) piconet B) scatternet C) bluenet D) none of the above

Last Answer : piconet

Description : Bluetooth is a _______ technology that connects devices (called gadgets) ina small area. A) wired LAN B) wirelessLAN C) VLAN D) none of the above

Last Answer : wirelessLAN

Description : Match the following IEEE No to their corresponding Name for IEEE 802 standards for LANs. i) 802.3 a) WiFi ii) 802.11 b) WiMa iii) 802.15.1 c) Ethernet iv) 802.16 d) Bluetooth a. i-b, ii-c, iii-d, iv-a b. i-c, ii-d, iii-a, iv-b c. i-c, ii-a, iii-d, iv-b d. i-b, ii-d, iii-c, iv-a

Last Answer : c. i-c, ii-a, iii-d, iv-b

Description : Bluetooth is an example of __________ a) personal area network b) local area network c) virtual private network d) wide area network

Last Answer : a) personal area network

Description : How does spatial isolation technique in satellite communications avoid interference? A. Use of different polarity antennas B. Use of different types of antennas C. Employment of highly directional spot-beam antennas D. Use of low gain antennas

Last Answer : C. Employment of highly directional spot-beam antennas

Description : In cellular system, _____ defines the geographic distance that is required between cells using identical frequencies in order to avoid interference between the radio transmissions at these cells. A. frequency-reuse ratio B. distance-to-reuse ratio (D/R) C. reuse format plan ratio D. reuse factor

Last Answer : B. distance-to-reuse ratio (D/R)

Description : If a power cable and a communication cable are to run parallel the minimum distance between the two, to avoid interference, should be (a) 2 cm (b) 10 cm (c) 50 cm (d) 400 cm

Last Answer : (c) 50 cm

Description : A method of multiple accessing where a given RF channel bandwidth is divided inot smaller frequency band. A. CDMA B. ANIK-D C. TDMA D. FDMA

Last Answer : D. FDMA

Description : A multiple access technique used in GSM cellular system A. TACS B. FDMA C. TDMA D. CDMA

Last Answer : C. TDMA

Description : Which of the following multiple access techniques are used by second generation cellular systems? a) FDMA/FDD and TDMA/FDD c c) FDMA/FDD and CDMA/FDD d) FDMA/FDD only

Last Answer : b) TDMA/FDD and CDMA/FDD

Description : UMTS use which multiple access technique? a) CDMA b) TDMA c) FDMA d) SDMA

Last Answer : a) CDMA