Sunteți pe pagina 1din 12

MCA SEM5

Wireless Technology Viva Questions & Answer


1. Wireless Communications
Wireless communication is the transfer of information over a distance without the use of
electrical conductors or wires.
2. Broadband
broadband refers to the wide bandwidth characteristics of a transmission medium and its
ability to transport multiple signals and traffic types simultaneously.
3. Signal
A signal is a function that conveys information about the behavior or attributes of some
phenomenon
4. Data Rate
the rate at which circuits or other devices operate when handling digital information.
5. Bandwidth
The amount of data that can be transmitted in a fixed amount of time. For digital devices, the
bandwidth is usually expressed in bits per second(bps) or bytes per second.
For analog devices, the bandwidth is expressed in cycles per second, or Hertz (Hz).
6. Analog Data
Analog data take on
continuous values in some interval. For example, voice and video are continuously varying
patterns of intensity.
7. Digital Data
Digital data take on discrete values; examples are text and integers.
8. Analog Signal
An analog signal is a continuously varying electromagnetic wave that may be propagated
over a variety of media, depending on frequency; examples are copper wire media, such
as twisted pair and coaxial cable;
9. Digital Signal
A digital signal is a sequence of voltage pulses that may be transmitted over a copper wire
medium; for example, a constant positive voltage level may represent binary 0 and a
constant negative voltage level may represent binary 1.
10. channel capacity
The maximum rate at which data can be transmitted over a given communication path, or
channel, under given conditions is referred to as the channel capacity.
11. Transmission medium and its type
the transmission medium is the physical path between transmitter and receiver.
Transmission media can be classified as guided or unguided.
12. Infrared
Infrared (IR) light is electromagnetic radiation with longer wavelengths than those of visible
light, extending from the nominal red edge of the visible spectrum at 0.74 micrometres (m)
to 300 m.
13. Multiplexing
is a method by which multiple analog message signals or digital data streams are combined
into one signal over a shared medium.

MissionMca.com

14. Demultiplexing
demultiplexer (or demux) is a device taking a single input signal and selecting one of many
data-output-lines, which is connected to the single input.
15. frequency division multiplexing (FDM)
FDM is a technique by which the total bandwidth available in a communication mediumis
divided into a series of non-overlapping frequency sub-bands, each of which is used to carry
a separate signal.
16. Time division multiplexing (TDM).
TDM is a type of digital (or rarely analog) multiplexing in which two or more bit streams or
signals are transferred appearing simultaneously as sub-channels in one communication
channel, but are physically taking turns on the channel.
17. guard bands
a guard band is an unused part of the radio spectrum between radio bands, for the purpose of
preventing interference.
18. What techniques are used for multiplexing?
Two techniques for multiplexing in telecommunications networks are in common use:
frequency division multiplexing (FDM) and time division multiplexing (TDM).
19. LAN,MAN,WAN
LAN: (local area network as listed in our computer terms page) A group of computers that
share a common connection and are usually in a small area or even in the same building.
MAN: (metropolitan area network) This is a larger network that connects computer users in a
particular geographic area or region. For example a large university may have a network so
large that it may be classified as a MAN. The MAN network usually exist to provide
connectivity to local ISPs, cable tv, or large corporations.
WAN: (wide area network) This is the largest network and can interconnect networks
throughout the world and is not restricted to a geographical location. The Internet is an
example of a worldwide public WAN.
20. Switching Techniques
a. circuit switching : Communication via circuit switching implies that there is a
dedicated communication path between two stations.
b. packet switching: Packet switching is a digital networking communications method
that groups all transmitted data regardless of content, type, or structure into suitably
sized blocks, called packets.
21. Asynchronous transfer mode
Asynchronous transfer mode (ATM), also known as cell relay, is in some ways similar to
packet switching. Like packet switching, ATM involves the transfer of data in discrete
chunks. Also, like packet switching, ATM allows multiple logical connections to be
multiplexed over a single physical interface.
22. TCP IP Protocol
is the basic communication language or protocol of the Internet. It can also be used as a
communications protocol in a private network
23. OSI Model
The Open Systems Interconnection (OSI) model (ISO/IEC 7498-1) is a product of the Open
Systems Interconnection effort at theInternational Organization for Standardization. It is a

MissionMca.com

prescription of characterizing and standardizing the functions of a communications system in


terms of abstraction layers.
24. Internetworking
Internetworking (a combination of the words inter (between) and networking; it is
not internet-working or international-network) is the practice of connecting a computer
networkwith other networks through the use of gateways that provide a common method
of routing information packets between the networks. The resulting system of interconnected
networks is called an internetwork, or simply an internet.
25. Routers
A router is a device that forwards data packets between computer networks, creating an
overlay internetwork. A router is connected to two or more data lines from different
networks. When a data packet comes in one of the lines, the router reads the address
information in the packet to determine its ultimate destination. Then, using information in
its routing table or routing policy, it directs the packet to the next network on its journey.
26. IPv4 & IPv6
IPv4: Addresses are 32 bits (4 bytes) in length.
IPv6: Addresses are 128 bits (16 bytes) in length
IPv4: Header includes a checksum.
IPv6: Header does not include a checksum.
IPv4: Must support a 576-byte packet size (possibly fragmented).
IPv6: Must support a 1280-byte packet size (without fragmentation).
27. What is antenna, what are its type?
An antenna can be defined as an electrical conductor or system of conductors used
either for radiating electromagnetic energy or for collecting electromagnetic
energy. Antenna Types are Dipoles, Parabolic Reflective Antenna
28. What are different propagation modes?
Ground Wave Propagation, Sky Wave Propagation, Line-of-Sight Propagation
29. Attenuation
It is the loss of energy as the signal propagates outward. The amount of energy depends on
the
frequency. If the attenuation is too much, the receiver may not be able to detect the signal at
all,
or the signal may fall below the noise level. For reliable communication, the attenuation and
delay over the range of frequencies of transmission should be constant.
30. Noise
Noise is a third impairment. It can be define as unwanted energy from sources other than the
transmitter. Thermal noise is caused by the random motion of the electrons in a wire and is
unavoidable.
31. Crosstalk
cross talk is a noise that is caused by the inductive coupling between two wires that are
closed to each other. Sometime when talking on the telephone, you can hear another
conversation in the background. That is cross talk
32. Distortion
Communication line have distributed

MissionMca.com

inductance and capacitance which distort the amplitude of signals and also delay the signals
at different frequencies by different amounts. It is caused by the fact that different Fourier
components travel at different speed.
33. What is fading? What are its type?
The term fading refers to the time variation of received signal power caused by changes
in the transmission medium or path(s). Fast fading: Fast fading occurs when the
coherence time of the channel is small relative to the delay constraint of the channel. In
this regime, the amplitude and phase change imposed by the channel varies considerably
over the period of use. Slow Fading: slow-fading channel, it is not possible to use time
diversity because the transmitter see only a single realization of the channel within its
delay constraint. A deep fade therefore lasts the entire duration of transmission and
cannot be mitigated using coding.
34. What is error correction? What are its type?
a. forward error correction FEC) or channel coding is a technique used for controlling errors
in data transmission over unreliable or noisy communication channels.
b. backward error correction: in which the receiver merely detects the presence of errors and
then sends a request back to the transmitter to retransmit the data in error. Backward error
correction is not practical in many wireless applications.
35. What is ASK, FSK, PSK
ASK refers to a type of amplitude modulation that assigns bit values to discrete amplitude
levels. The carrier signal is then modulated among the members of a set of discrete values to
transmit information.
FSK refers to a type of frequency modulation that assigns bit values to discrete frequency
levels. FSK is divided into noncoherent and coherent forms. In noncoherent forms of FSK,
the instantaneous frequency shifts between two discrete values termed the mark and
space frequencies. In coherent forms of FSK, there is no phase discontinuity in the output
signal. FSK modulation formats generate modulated waveforms that are strictly real values,
and thus tend not to share common features with quadrature modulation schemes.
PSK in a digital transmission refers to a type of angle modulation in which the phase of the
carrier is discretely variedeither in relation to a reference phase or to the phase of the
immediately preceding signal elementto represent data being transmitted. For example,
when encoding bits, the phase shift could be 0 degree for encoding a 0, and 180 degrees for
encoding a 1, or the phase shift could be 90 degrees for 0 and +90 degrees for a 1,
thus making the representations for 0 and 1 a total of 180 degrees apart.
36. Amplitude Modulation
amplitude modulation A form of modulation in which the amplitude of a carrier wave is
varied in accordance with some characteristic of the modulating signal.
37. Frequency Modulation
frequency modulation (FM) conveys information over a carrier wave by varying its
instantaneous frequency. This contrasts with amplitude modulation, in which
the amplitude of the carrier is varied while its frequency remains constant.

MissionMca.com

In analog applications, the difference between the instantaneous and the base frequency of the
carrier is not directly proportional to the instantaneous value of the input-signal amplitude but
it is proportional to frequency
38. Pulse Code Modulation
Pulse-code modulation (PCM) is a method used to digitally represent sampled analog signals.
It is the standard form for digital audio in computers and various Blu-ray, DVD andCompact
Disc formats, as well as other uses such as digital telephone systems. A PCM stream is a
digital representation of an analog signal, in which the magnitude of the analog signal is
sampled regularly at uniform intervals, with each sample being quantized to the nearest value
within a range of digital steps.
39. What is spread spectrum
Spread spectrum techniques involve spreading the bandwidth needed to transmit data
which does not make sense at first sight. Spreading the bandwidth has several advantages.
The main advantage is the resistance to narrowband interference.
40. FHSS
Frequency-hopping spread spectrum (FHSS) is a method of transmitting radio signals by
rapidly switching a carrier among many frequency channels, using a pseudorandom sequence
known to both transmitter and receiver. It is utilized as a multiple access method in
the frequency-hopping code division multiple access (FH-CDMA) scheme.
41. DSSS
direct-sequence spread spectrum (DSSS) is a modulation technique. As with other spread
spectrumtechnologies, the transmitted signal takes up more bandwidth than the information
signal that modulates the carrier or broadcast frequency. The name spread spectrum comes
from the fact that the carrier signals occur over the full bandwidth (spectrum) of a devices
transmitting frequency.
42. Parity Check
parity checking: A technique used to detect memory or data communication errors. The
computer adds up the number of bits in a one-byte data item, and if the parity bit setting
disagrees with the sum of the other bits, the computer reports an error. Parity-checking
schemes work by storing a one-bit digit (0 or 1) that indicates whether the sum of the bits in a
data item is odd or even. When the data item is read from memory or received by another
computer, a panty check occurs. If the parity check reveals that the parity bit is incorrect, the
computer displays an error message
43. Cyclic Redundancy Check
A cyclic redundancy check (CRC) is an error-detecting code commonly used in
digital networks and storage devices to detect accidental changes to raw data. Blocks of data
entering these systems get a short check value attached, based on the remainder of
a polynomial division of their contents; on retrieval the calculation is repeated, and corrective
action can be taken against presumed data corruption if the check values do not match.
44. Hamming Code
Hamming codes are a family of linear error-correcting codes that generalize
the Hamming(7,4)-code invented by Richard Hamming in 1950. Hamming codes can detect
up to two and correct up to one bit errors. By contrast, the simpleparity code cannot correct
errors, and can detect only an odd number of errors. Hamming codes are special in that they
are perfect codes, that is, they achieve the highest possible rate for codes with their block
length and minimum distance 3
45. BCH Codes

MissionMca.com

BCH codes form a class of cyclic error-correcting codes that are constructed using finite
fields. BCH codes were invented in 1959 by Hocquenghem, and independently in 1960
by Bose and Ray-Chaudhuri.[1] The abbreviation BCH comprises the initials of these
inventors names. One of the key features of BCH codes is that during code design, there is a
precise control over the number of symbol errors correctable by the code
46. convolutional code
convolutional code is a type of error-correcting code in which each m-bit information symbol
(each m-bit string) to be encoded is transformed into an n-bit symbol, where m/n is the
code rate (n m) and the transformation is a function of the last k information symbols,
where k is the constraint length of the code.
47. 1G, 2G, 3G mobile System
*Refer Q.A wise notes
48. GPRS
General packet radio service (GPRS) is a packet oriented mobile data service on
the 2G and 3G cellular communication systems global system for mobile
communications(GSM).
49. GSM
GSM is Global System for Mobile Communications. GSM is a wireless platform that uses
radio frequencies. It has been designed for speech services and uses circuit switched
transmission.
50. GSM vs CDMA
*Refer book
51. What is Handoff? What are its type?
When a mobile user travels from one area of coverage or cell to another cell within a calls
duration the call should be transferred to the new cells base station. Otherwise, the call will
be dropped because the link with the current base station becomes too weak as the mobile
recedes. Indeed, this ability for transference is a design matter in mobile cellular system
design and is call handoff.
Two basic types of handoff are definedviz. hard handoff and soft handoff.
52. cordless systems
cordless systems have evolved from cordless telephone technology. Originally,
cordless telephones were developed to provide users with mobility within a residence or
small
office by separating the handset from the rest of the telephone (called the base station) and
providing a simple analog wireless link.
53. wireless local loop (WLL)
Wireless local loop (WLL), is a term for the use of a wireless communications link as the
last mile / first mile connection for delivering plain old telephone service (POTS)
and/orbroadband Internet to telecommunications customers. Various types of WLL systems
and technologies exist.
54. IEEE 802.16
EEE 802.16 is a series of Wireless Broadband standards authored by the Institute of
Electrical and Electronics Engineers (IEEE). The IEEE Standards Board established a
working group in 1999 to develop standards for broadband for Wireless Metropolitan Area

MissionMca.com

Networks. The Workgroup is a unit of the IEEE 802 local area network and metropolitan area
network standards committee.
55. Mobile IP
Mobile IP (or IP mobility) is an Internet Engineering Task Force (IETF) standard
communications protocol that is designed to allow mobile device users to move from one
network to another while maintaining a permanent IP address.
56. Wireless Application Protocol (WAP)
Forum to provide mobile users of wireless phones and other wireless terminals such as
pagers and personal digital assistants (PDAs) access to telephony and information
services,
including the Internet and the Web.
57. Wireless Markup Language (WML)
WML was designed to describe content and format for presenting data on devices with
limited bandwidth, limited screen size, and limited user input capability. It is designed to
work
with telephone keypads, styluses, and other input devices common to mobile, wireless
communication.
58. WMLScript
WML Script is a scripting language with similarities to JavaScript. It is designed for
defining script-type programs in a user device with limited processing power and memory.
59. Wireless Application Environment (WAE)
The WAE specifies an application framework for wireless devices such as mobile
telephones,
pagers, and PDAs. In essence, the WAE consists of tools and formats that are intended to
ease
the task of developing applications and devices supported by WAP.
60. Wireless Session Protocol (WSP)
WSP provides applications with an interface for two session services. The connection
oriented
session service operates above the reliable transport protocol WTP, and the connectionless
session service operates above the unreliable transport protocol WDP. In essence, WSP is
based
on HTTP with some additions and modifications to optimize its use over wireless channels
61. Wireless Transaction Protocol (WTP)
WTP manages transactions by conveying requests and responses between a user agent (such
as a
WAP browser) and an application server for such activities as browsing and e-commerce
transactions. WTP provides a reliable transport service but dispenses with much of the
overhead
of TCP, resulting in a lightweight protocol that is suitable for implementation in thin clients
(e.g., mobile nodes) and suitable for use over low-bandwidth wireless links.
62. Wireless Datagram Protocol (WDP)
WDP is used to adapt a higher-layer WAP protocol to the communication mechanism

MissionMca.com

(called the bearer) used between the mobile node and the WAP gateway. Adaptation may
include
partitioning data into segments of appropriate size for the bearer and interfacing with the
bearer
network.
63. IEEE 802.11
IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN)
computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and
maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). The base version of
the standard was released in 1997 and has had subsequent amendments. These standards
provide the basis for wireless network products using the Wi-Fi brand.
64. WiFi
WiFi is a popular technology that allows an electronic device to exchange
data wirelessly(using radio waves) over a computer network, including high-speed
Internet connections.
65. What is Bluetooth?
Bluetooth is a wireless technology standard for exchanging data over short distances (using
short-wavelength radio transmissions in theISM band from 24002480 MHz) from fixed and
mobile devices, creating personal area networks (PANs) with high levels of security. Created
by telecom vendor Ericsson in 1994,[1] it was originally conceived as a wireless alternative
to RS-232 data cables. It can connect several devices, overcoming problems of
synchronization.
66. What is Piconets?
A piconet is an ad-hoc computer network linking a wireless user group of devices
using Bluetooth technology protocols. It allows one master device to interconnect with up to
seven active slave devices. Up to 255 further slave devices can be inactive, or parked, which
the master device can bring into active status at any time.
67. Scatternets
A scatternet is a type of ad-hoc computer network consisting of two or more piconets. The
terms scatternet and piconet are typically applied to Bluetooth wireless technology.
68. Logical Link Control (LLC)
In the seven-layer OSI model of computer networking, the logical link control (LLC) data
communication protocol layer is the upper sublayer of the data link layer, which is itself layer
2. The LLC sublayer provides multiplexing mechanisms that make it possible for several
network protocols (IP, IPX, Decnetand Appletalk) to coexist within a multipoint network and
to be transported over the same network media. It can also provide flow
control and automatic repeat request (ARQ) error management mechanisms.
69. XHTML
XHTML (Extensible HyperText Markup Language) is a family of XML markup
languages that mirror or extend versions of the widely used Hypertext Markup
Language (HTML), the language in which web pages are written.
70. CHTML
C-HTML (short for Compact HyperText Markup Language), also called i-mode-HTML,[1] is
a subset of HTML for small information devices, such as first-generation smart phones
and PDAs, such as DoCoMos i-mode mobile phones used in Japan. C-HTML adds several
features not found in standard HTML, notably accesskeys, phone number shortcuts for links,

MissionMca.com

and emojipictorial characters as locally extended Shift JIS, all concepts borrowed
from HDML and WML.
71. 2.5G
2.5G (second and a half generation) is used to describe 2G-systems that have implemented
a packet-switched domain in addition to the circuit-switched domain. It does not necessarily
provide faster services because bundling of timeslots is used for circuit-switched data
services (HSCSD) as well. The first major step in the evolution of GSM networks to 3G
occurred with the introduction of General Packet Radio Service (GPRS).
72. 3rd generation of mobile
third Generation, is a term used to represent the 3rd generation of mobile telecommunications
technology. Also called Tri-Band 3G. This is a set of standards used for mobile
devices and mobile telecommunication services and networks that comply with
the International Mobile Telecommunications-2000 (IMT-2000) specifications by
the International Telecommunication Union. 3G finds application in wireless
voice telephony, mobile Internet access, fixed wireless Internet access, video calls and mobile
TV.
73. VSAT
VSAT is an abbreviation for a Very Small Aperture Terminal. It is basically a two-way
satellite ground station with less than 3 meters tall dish antenna stationed. The transmissions
rates of VSATs are usually from very low and up to 4 Mbit/s . These VSATs primary job is
accessing the satellites in the geosynchronous orbit and relaying data from terminals in earth
to other terminals and hubs.
74. Radio Specification
The Bluetooth radio specification is a short document that gives the basic details of radio
transmission for Bluetooth devices.
75. Baseband Specification
The Bluetooth baseband consists mainly of a Link Controller (LC) that carries out baseband
protocols and low-layer link routines. Protocols defined within the scope of the baseband
specification include (among others) physical channels and links, data packet definitions,
error correction and detection, logical channels, channel control, and hop selection. For more
information about the Bluetooth baseband specification, see the Bluetooth core specification
document.
76. Symbian OS
Symbian OS is one of Nokias mobile operating systems for mobile devices and low-end
smartphones, with associated libraries, user interface, frameworks and reference
implementations of common tools, originally developed by Symbian Ltd. The Symbian
Operating System is an operating system designed mainly for mobile devices. Symbian
77. iOS
iOS (previously iPhone OS) is a mobile operating system developed and distributed by Apple
Inc. Originally released in 2007 for theiPhone and iPod Touch, it has been extended to
support other Apple devices such as the iPad and Apple TV. Unlike MicrosoftsWindows
Phone (Windows CE) and Googles Android, Apple does not license iOS for installation on
non-Apple hardware
78. Android OS
ndroid is a Linux-based operating system designed primarily for touchscreen mobile devices
such as smartphones and tablet computers.

MissionMca.com

79. MIDP
The Mobile Information Device Profile (MIDP) is key element of the Java 2 Platform,
Mobile
Edition (J2ME). When combined with the Connected Limited Device Configuration (CLDC),
MIDP provides a standard runtime Java environment for todays most popular mobile
information devices, such as cell phones and mainstream personal digital assistants (PDAs).
80. WCDMA
WCDMA is the radio access scheme used for Third Generation cellular systems that are
being rolled out in various parts of the globe. The 3G systems to support wideband services
like
high-speed Internet Access, video and high quality image transmission with the same quality
as
the fixed networks. In WCDMA systems the CDMA air interface is combined with GSM
based
networks. The WCDMA standard was evolved through the Third Generation Partnership
Project
(3GPP) which aims to ensure interoperability between different 3G networks.
81. FDMA
The satellite is used as in intermediate device providing, in effect, a point-to-point link
between
two earth stations. Because of the wide area coverage of the satellite, this is not
necessarily the case to be divided using FDM into a number of smaller channels, each of
which uses FM. Each of the smaller channels in turn carries a number of voice frequency
(VF) signals using FDM. The ability of multiple earth stations to access the same channel
is referred to as FDMA.
82. Bluetooth Architecture
*Refer notes
83. GSM Architecture
*Refer notes
84. List the transmission impairment effecting the wireless transmission
Analog signal consist of varying a voltage with time to represent an information steam. If
the transmission media were perfectly, the receiver could receive exactly the same signal that
the
transmitter sent. But communication lines are usually not perfect, so the receive signal is not
the
same as the transmitted signal. For digital data this difference can lead to errors.
Transmission
lines suffers from three major problems
1. Attenuation
2. Delay distortions
3. Noise
85. Short Message Service(SMS)
is a text messaging service component of phone, web, or mobile communication systems,
using standardized communications protocols that allow the exchange of short text messages
between fixed line or mobile phone device
86. CLDC configuration, and different profile supported by it?

MissionMca.com

10

The Connected Limited Device Configuration (CLDC) is a specification of


a framework for Java ME applications describing the basic set of libraries and virtualmachine features that must be present in an implementation. The CLDC is combined with
one or more profiles to give developers a platform for building applications on embedded
devices with very limited resources such as pagers and mobile phones
Mobile Information Device Profile:
The Mobile Information Device Profile (MIDP) is used with the CLDC configuration and
contains classes that provide local storage, a user interface, and networking capabilities to
an application that runs on a mobile computing device such as Palm OS devices. MIDP is
used with wireless Java applications.
PDA Profile:
The PDA Profile (PDAP) is used with the CLDC configuration and contains classes that
utilize sophisticated resources found on personal digital assistants. These features include
better displays and larger memory than similar resources found on MIDP mobile devices.
87. Explain the various states that a Bluetooth enabled device can move into
Active Mode:In this mode, the Bluetooth module participates actively on the transmission
channel
Sniff Mode: This is a low consumption mode. A Bluetooth module in the Sniff mode stays
synchronised in the piconet. It listens to the piconet at regular intervals (Tsniff) for a short
instant.
Hold Mode:The module remains synchronized. This is lower consumption mode than the
Sniff mode
Park Mode:A Bluetooth module in this mode is no longer an active member of the piconet.
However,
it remains synchronized with the master and can listen to a broadcast channel (Beacon
Channel).
88. Various Configuration supported by J2ME
There are two configurations for J2ME.
1. Connected Limited Device Configuration (CLDC)
The CLDC is designed for 16-bit or 32-bit small computing devices with limited
amounts
of memory. CLDC devices usually have between 160KB and 512KB of available
memory and
are battery powered. They also use an inconsistent, small-bandwidth network wireless
connection and may not have a user interface. CLDC devices use the KJava Virtual
Machine
(KVM) implementation, which is a stripped-down version of the JVM. CLDC devices
include

MissionMca.com

11

pagers, personal digital assistants, cell phones, dedicated terminals, and handheld
consumer
devices with between 128KB and 512KB of memory.
2. Connected Device Configuration (CDC)
CDC devices use a 32-bit architecture, have at least two megabytes of memory
available,
and implement a complete functional JVM. CDC devices include digital set-top
boxes, home appliances, navigation systems, point-of-sale terminals, and smart
phones.
89. Various Profile supported by J2ME
Game Profile : The Game Profile is also used with the CDC configuration and contains
the necessary classes for developing game applications for any small computing device
that uses the CDC configuration.
Mobile Information Device Profile : The Mobile Information Device Profile (MIDP) is
used with the CLDC configuration and contains classes that provide local storage, a user
interface, and networking capabilities to an application that runs on a mobile computing
device such as Palm OS devices. MIDP is used with wireless Java applications.
PDA Profile : The PDA Profile (PDAP) is used with the CLDC configuration and
contains classes that utilize sophisticated resources found on personal digital assistants.
These features include better displays and larger memory than similar resources found on
MIDP mobile devices.
Personal Profile : The Personal Profile is used with the CDC configuration and the
Foundation Profile and contains classes to implement a complex user interface. The
Foundation Profile provides core classes, and the Personal Profiles provide classes to
implement a sophisticated user interface, which is a user interface that is capable of
displaying multiple windows at a time.
Personal Basis Profile:
The Personal Basis Profile is similar to the Personal Profile in that it is used with the
CDC configuration and the Foundation Profile. However, the Personal Basis Profile
provides classes to implement a simple user interface, which is a user interface that is
capable of displaying one window at a time.
RMI Profile: The RMI Profile is used with the CDC configuration and the Foundation
Profile to provide Remote Method Invocation classes to the core classes contained in the
Foundation Profile.

**And all other topics from syllabus**


All the Best

MissionMca.com

12

S-ar putea să vă placă și