Saturday, 14 January 2017

IPU BCA Semester 6: Mobile Computing (End Term Paper 2015)

END TERM EXAMINATION
BCA SEMESTER 6
MAY JUNE 2015

MOBILE COMPUTING

IPU BCA Semester 6: Mobile Computing (End Term Paper 2015)

Time: 3 Hours Max. Marks: 75
Note: Attempt any five questions. Question 1 is compulsory.


Question 1: Answer the following questions: (10 ✕ 2.5 = 25)

(a) List four limitations of mobile computing. (see Answer)

(b) Discuss how roaming is facilitated in a mobile phone.

(c) What is Wireless Session Protocol?

(d) What is the role of UDP in WAP?

(e) List four features of a WML card.

(f) What is the role of standard library functions in any programming language?

(g) Compare html and xhtml

(h) What is the difference between diagram and packet?

(i) What is IEEE 802.15.1?

(j) What is the function of URL and http?

UNIT I

Question 2:

(a) What is the role of DBMS and ROBNMS in mobile data management? List three examples of database systems for mobile computing?  (7.5)



(b) List five functions of Middleware for mobile systems. (5)

OR

Question 3:
(a) Describe how implicit and explicit business logic is implemented in mobile computing. (5)

(b) Compare and contrast client server, distributed and mobile computing architecture. (7.5)


UNIT II

Question 4:
(a) Explain in detail the WAP architecture with special emphasis on WDP & WTLS (8)
(b) Discuss Wireless transaction protocol (WTP)          (4.5)


OR

Question 5:
(a) Explain the physical and networking layers of WAP.        (4.5)

(b) Define the following terms
(i)   CGI script
(ii) Micro browser
(iii) https
(iv) Directory service

UNIT III

Question 6:
With respect to WML, define the following: (12.5)

(i)   WML document Prolog
(ii)  WML document Body
(iii) Deck and Card Elements
(iv)  Text Formatting Tags
(v)  Event Elements

OR

Question 7:
What is WML script? Define the following terms and its role. (12.5)
Bytecode
Functions
Data types
Strings

UNIT IV

Question 8:
With respect to Wireless Telephony Application (WTA) explain the following: (12.5)
WTA application
WTA Logical Architecture
WTA security requirements

OR

Question 9:
Compare pull and push technology of WAP push framework with the help of real world examples. Explain PG architecture & PAP architecture. (12.5)




No comments:

Post a comment