Google News
logo
5G Network - Quiz(MCQ)
A)
July 2015
B)
July 2016
C)
July 2017
D)
July 2018

Correct Answer : Option (B) :   July 2016


Explanation : 5G was introduced in July 2016 and Developed by 3GPP.

A)
China
B)
Japan
C)
South Korea
D)
Singapore

Correct Answer : Option (C) :   South Korea


Explanation :

South Korea launched the world's first fully-fledged 5G mobile networks in April 2019.
 
The superfast communications heralded by fifth-generation wireless technology will ultimately underpin everything from toasters to telephones; from electric cars to power grids.
 
It will bring smartphones near-instantaneous connectivity -- 20 times faster than the existing 4G.

A)
Gigabit
B)
Gigahertz
C)
Good to Go
D)
Generation

Correct Answer : Option (D) :   Generation


Explanation : 5G is the 5th generation mobile network. It is a new global wireless standard after 1G, 2G, 3G, and 4G networks. 5G enables a new kind of network that is designed to connect virtually everyone and everything together including machines, objects, and devices.

A)
Laptops
B)
Televisions
C)
Broadband cellular networks
D)
None of the Above

Correct Answer : Option (C) :   Broadband cellular networks

A)
New Radio
B)
Not Right
C)
New Reach
D)
Never Ready

Correct Answer : Option (A) :   New Radio


Explanation : 5G New Radio (NR) is the global standard for a unified, more capable 5G wireless air interface. It will deliver significantly faster and more responsive mobile broadband experiences, and extend mobile technology to connect and redefine a multitude of new industries.

A)
True
B)
False
C)
None of the above
D)
--

Correct Answer : Option (A) :   True

A)
IBM
B)
3GPP's
C)
TRAI
D)
Google

Correct Answer : Option (B) :   3GPP's


Explanation : 5G Technology is drafted by standards groups such as 3GPP (Third Generation Partnership Projects). No company individually owns 5G. However, several vendors such as Ericsson, Nokia, Huawei and ZTE develop equipment which gets deployed in a 5G network.

A)
Priority, policy, policy control and QoS
B)
Network slice selection function, network repository function, user plane function and policy control function
C)
Efficient signaling, fixed mobile convergence, enhanced mobility management and network capability exposure
D)
Network slicing, efficiency, diverse mobility management and connectivity models

Correct Answer : Option (D) :   Network slicing, efficiency, diverse mobility management and connectivity models

A)
True
B)
False
C)
None of the Above
D)
--

Correct Answer : Option (B) :   False

A)
The process by which network resources are controlled to implement a given policy for a given user
B)
A set of rules specifying the user plane services and functions available to a particular user, supplied by the network
C)
A value assigned to specific packets transmitted to/from a user that determines the relative importance of transmitting those packets during the upcoming opportunity to use the medium
D)
The measurable end-to-end performance properties of a network service, which can be guaranteed in advance by a service-level agreement (SLA) between a user and a service provider

Correct Answer : Option (D) :   The measurable end-to-end performance properties of a network service, which can be guaranteed in advance by a service-level agreement (SLA) between a user and a service provider

A)
Flow bit rates, aggregate bit rates, notification control and default values
B)
Resource type, priority level, packet error rate and maximum data burst volume
C)
Traffic classification, packet marking, traffic shaping and congestion avoidance
D)
Session management function, user plane function, policy control function and network repository function

Correct Answer : Option (C) :   Traffic classification, packet marking, traffic shaping and congestion avoidance

A)
Permanent Identity
B)
Concealed Identity
C)
Temporary Identity
D)
Hidden Identity

Correct Answer : Option (A) :   Permanent Identity


Explanation : In telecommunication systems, network operator allocate to each SIM card a unique identifier, known up to the 4G as an IMSI (International Mobile Subscriber Identity) and for the 5G as a  SUPI (Subscription Permanent Identifier). As authentication between a user and its  network provider is based on a shared symmetric key, it can only take place after user identification. However, if the IMSI/SUPI values are sent in plaintext over the radio access link, then users can be identified, located and tracked using these permanent identifiers.

A)
The delay between an input and a desired outcome
B)
The time it takes to reboot a connection
C)
The speed of detecting a disruption to the network
D)
The length of time devices will automatically connect to the network

Correct Answer : Option (A) :   The delay between an input and a desired outcome

A)
True
B)
False
C)
None of the Above
D)
--

Correct Answer : Option (A) :   True

A)
True
B)
False
C)
None of the Above
D)
--

Correct Answer : Option (A) :   True

A)
True
B)
False
C)
None of the Above
D)
--

Correct Answer : Option (B) :   False

A)
SLA
B)
Policy
C)
Traffic restoration
D)
All of the above

Correct Answer : Option (D) :   All of the above

A)
Orthogonal frequency-division multiple
B)
Original frequency-division multiplexing
C)
Orthogonal frequency-division multiplexing
D)
None of the Above

Correct Answer : Option (C) :   Orthogonal frequency-division multiplexing

A)
Speed
B)
Capacity
C)
Strength
D)
Connection

Correct Answer : Option (B) :   Capacity

A)
The ability to create multiple virtual networks within a single 5G network
B)
The ability to utilize connections from other nearby networks
C)
The ability to designate multiple passwords for one 5G network
D)
The ability to set up multiple connection points to one 5G network

Correct Answer : Option (A) :   The ability to create multiple virtual networks within a single 5G network

A)
Millimeter wave
B)
Real-time spectrum
C)
Radio-frequency band
D)
Lower-frequency spectrum

Correct Answer : Option (A) :   Millimeter wave

A)
Institute of Technology
B)
Interstate of Transportation
C)
International Operations Tech
D)
Internet of Things

Correct Answer : Option (D) :   Internet of Things

A)
True
B)
False
C)
None of the above
D)
--

Correct Answer : Option (A) :   True

A)
QoS parameters are variables that are typically the same for a wide variety of instances of an application. QoS characteristics define the requirements associated with a QoS flow.
B)
QoS parameters are more relevant to dynamic decisions made during the operation of the QoS flow, such as using the priority level as a tiebreaker when two flows compete for resources. QoS characteristics are used at configuration time to determine the network resources needed for creating network slices.
C)
QoS parameters are used at configuration time to determine the network resources needed for creating network slices. QoS characteritics are more relevant to dynamic decisions made during the operation of the QoS flow, such as using the priority level as a tiebreaker when two flows compete for resources.
D)
None of the Above

Correct Answer : Option (C) :   QoS parameters are used at configuration time to determine the network resources needed for creating network slices. QoS characteritics are more relevant to dynamic decisions made during the operation of the QoS flow, such as using the priority level as a tiebreaker when two flows compete for resources.

A)
Miniature cells
B)
Small cells
C)
Frequent cells
D)
Short-range cells

Correct Answer : Option (B) :   Small cells

A)
Multiple in multiple out
B)
Multiple input multiple output
C)
Message in message out
D)
Message input message output

Correct Answer : Option (B) :   Multiple input multiple output

A)
How many users can connect to one network
B)
How many connections can run securely at once
C)
How many base stations can communicate over one spectrum
D)
How many bits of data can be transmitted to a certain number of users per second

Correct Answer : Option (D) :   How many bits of data can be transmitted to a certain number of users per second

A)
Operators must apply all the requirements to their allocated network resources.
B)
IP Multimedia Subsystem needs to be supported independent of network slices.
C)
Support is needed to provide connectivity to home and roaming users in the same network slice.
D)
Creation, modification and deletion of a network slice should have no or minimal impact on traffic and services in other network slices in the same network.

Correct Answer : Option (D) :   Creation, modification and deletion of a network slice should have no or minimal impact on traffic and services in other network slices in the same network.

A)
The ability to transmit and receive data at the same time and frequency
B)
The ability to become compatible with all types of IoT devices
C)
The ability to utilize the full capacity of transmission at all times
D)
The ability to incorporate twice the number of transceivers into one base station

Correct Answer : Option (A) :   The ability to transmit and receive data at the same time and frequency

A)
A connectivity system that identifies the closest base station for each user
B)
A connectivity system that caps the number of users utilizing the network at once
C)
A traffic-signaling system that identifies the route of least interference to deliver data to a user
D)
A traffic-signaling system that breaks down data into smaller packets for transport

Correct Answer : Option (C) :   A traffic-signaling system that identifies the route of least interference to deliver data to a user

A)
True
B)
False
C)
None of the Above
D)
--

Correct Answer : Option (A) :   True

A)
True
B)
False
C)
None of the Above
D)
--

Correct Answer : Option (A) :   True

A)
Self-driving cars
B)
Faster internet speeds
C)
Smart homes (internet of things)
D)
All of the Above

Correct Answer : Option (D) :   All of the Above

A)
True
B)
False
C)
None of the Above
D)
--

Correct Answer : Option (A) :   True

A)
SDN enables effective deployment of cloud resources to the appropriate edge node for a given application and given fixed or mobile user; NFV provides for flexible and dynamic creation and management of paths.
B)
SDN enables the movement of edge resources and services to dynamically accommodate mobile users; NFV creates paths that use an access node for one or both ends of a connection involving a wireless device.
C)
SDN operates to monitor and enforce QoS requirements by controlling the behavior of the QoS flow for each slice; NFV implements the network functions in a network slice, enabling the isolation of each network slice from all other network slices.
D)
All of the Above

Correct Answer : Option (C) :   SDN operates to monitor and enforce QoS requirements by controlling the behavior of the QoS flow for each slice; NFV implements the network functions in a network slice, enabling the isolation of each network slice from all other network slices.

A)
FR1
B)
FR2
C)
FR3
D)
Both (A) and (B)

Correct Answer : Option (D) :   Both (A) and (B)

A)
True
B)
False
C)
None of the Above
D)
--

Correct Answer : Option (A) :   True

A)
True
B)
False
C)
None of the Above
D)
--

Correct Answer : Option (A) :   True

A)
2017
B)
2018
C)
2019
D)
2020

Correct Answer : Option (C) :   2019