340+ Ubiquitous Computing System (UCS) Solved MCQs

1.

Ubiquitous computing is the method of ........

A. enhancing computer use by making many computers available throughout the physical environment
B. wireless communication and carry-around computers.
C. allowing transmission of data, voice and video via a computer
D. interact with a variety of users via the internet.
Answer» A. enhancing computer use by making many computers available throughout the physical environment
2.

............... main properties for UbiCom Systems were proposed by Weiser

A. 1
B. 2
C. 3
D. 4
Answer» B. 2
3.

Which of the following is not a key characteristic of Ubicomp System ?

A. distributed
B. ihci
C. context- awareness
D. pay as you go
Answer» D. pay as you go
4.

Among the various wireless options for wearable devices, which one needs to connect to a smart phone and is the most popular?

A. bluetooth
B. wifi
C. rfid
D. none of the above
Answer» A. bluetooth
5.

When connecting a wearable device to the cloud, what software is required to run a custom service?

A. database
B. operating system
C. http server
D. all of the above
Answer» D. all of the above
6.

What does RFID stand for?

A. radio frequency issue date
B. radio frequency identification
C. rear field identification
D. real far identification
Answer» B. radio frequency identification
7.

What applications run on a SMART Board?

A. any applicaiton on the computer
B. internet browsers like explorer and navigator only
C. powerpoint only
D. powerpoint only
Answer» A. any applicaiton on the computer
8.

The SMART Board Software is called

A. notepage
B. notebook
C. spiral page
D. all of the above
Answer» B. notebook
9.

It takes the output signal from the transmission channel and delivers

A. transmitter
B. transmission channel
C. receiver
D. hardware
Answer» C. receiver
10.

Which of the Following is used in banking industary.....

A. micr
B. omr
C. all of above
D. none of the above
Answer» A. micr
11.

WAP?

A. wireless application protocol
B. wired allication protocol
C. wide application protocol
D. none of the above
Answer» A. wireless application protocol
12.

The tag can be used to activate the task when the user clicks on a word on the screen?

A. true
B. false
C. both
D. none of the above
Answer» A. true
13.

WAP is designed for?

A. internet explorer
B. web browser
C. micro browser
D. macro browser
Answer» C. micro browser
14.

Limitations of Short Messaging Service (SMS)

A. limited to 160 characters or less
B. message latency is one minute or more
C. poor security at the application level
D. all of the above
Answer» D. all of the above
15.

DoCoMo Stands for ...............

A. documentation over the mobile network
B. do communications over the mobile network
C. documentation & communications over the mobile network
D. none of the above
Answer» B. do communications over the mobile network
16.

Mobile Web Service design often uses a three tier ...............

A. thin client, client proxy, server architecture
B. network, client proxy, server architecture
C. internet,cilent & server
D. none of the above
Answer» A. thin client, client proxy, server architecture
17.

In J2ME architecture Connected Device Configuration (CDC) provides ..........

A. fundamental services for devices
B. fundamental services for virtual machines
C. both
D. none of the above
Answer» C. both
18.

Java 2 Mobile Environment supports .................

A. development of client server system
B. stand alone system designs in which code is developed
C. both
D. none of the above
Answer» C. both
19.

J2ME is a multi layered organisation of software bundles of three types .............

A. servers,desktop machines & high end consumer devices
B. configurations, profiles and optional packages
C. j2ee,j2se & kvm
D. none of the above
Answer» B. configurations, profiles and optional packages
20.

The .NET Framework consists of two main parts ............

A. common language runtime & unified set of class libraries
B. client & server
C. packeges & class labraries
D. digital packages & digital class labraries
Answer» A. common language runtime & unified set of class libraries
21.

Code written on the .NET Framework platform is called ...........

A. client code
B. managed code
C. server code
D. none of the above
Answer» B. managed code
22.

Managed code .......

A. cannot have bad pointers
B. cannot create memory leaks
C. supports strong code type safety
D. all of the above
Answer» D. all of the above
23.

.NET CF designed specifically for devices, such as .............

A. smart cards
B. smart wearable devices
C. pdas and smart mobile phones.
D. sensors
Answer» C. pdas and smart mobile phones.
24.

IrDA support ........

A. sql server ce
B. device specific controls
C. high performance jit compiler
D. all of the above
Answer» D. all of the above
25.

Mobile code is any .........

A. program
B. application
C. content
D. all of the above
Answer» D. all of the above
26.

Sandboxes ..........

A. that limit the local services that code can access.
B. which ensures that code originates from a trusted source.
C. machines that can access the internet
D. that carries explicit proof of its security.
Answer» A. that limit the local services that code can access.
27.

Code Signing .........

A. that limit the local services that code can access.
B. which ensures that code originates from a trusted source.
C. machines that can access the internet
D. that carries explicit proof of its security.
Answer» B. which ensures that code originates from a trusted source.
28.

Firewalls ............

A. that limit the local services that code can access.
B. which ensures that code originates from a trusted source.
C. machines that can access the internet
D. that carries explicit proof of its security.
Answer» C. machines that can access the internet
29.

Proof Carrying Code ...............

A. that limit the local services that code can access.
B. which ensures that code originates from a trusted source.
C. machines that can access the internet
D. that carries explicit proof of its security.
Answer» D. that carries explicit proof of its security.
30.

A smart card ............

A. is a plastic card embedded with digital memory
B. which store data on magnetic strips
C. is reprogrammable
D. all of the above
Answer» D. all of the above
31.

The primary tasks of a smart card operating system .............

A. transferring data to and from the smart card
B. controlling the execution of commands
C. managing and executing cryptographic algorithms
D. all of the above
Answer» D. all of the above
32.

Java Card widely used in ...........

A. sim cards
B. atm cards
C. both
D. none of the above
Answer» C. both
33.

The Home Electronic System (HES) defines the system components .........

A. residential gateway, homegate
B. standard interfaces
C. both
D. none of the above
Answer» C. both
34.

Jini consists of three Java language protocols ...............

A. discovery, join and lookup
B. discovery, configuration and lookup
C. discovery, join and installation
D. find , join and lookup
Answer» A. discovery, join and lookup
35.

UPnP Stands for ..........

A. united plug and play protocol
B. undirectional plug and play protocol
C. universal plug and play protocol
D. unidirectional plug and play protocol
Answer» C. universal plug and play protocol
36.

Benefit of UPnP .............

A. media and device independence
B. platform independence
C. internet-based technologies
D. all of the above
Answer» D. all of the above
37.

OSGi’s core component is ...........

A. server
B. bundle
C. node
D. gateway
Answer» B. bundle
38.

A MANIFEST.MF file located in the ........ directory .

A. general graph directory
B. acyclic graph directory
C. single-level
D. meta-inf
Answer» D. meta-inf
39.

Service Oriented Architectures Functions ,,,,,,,,,,,,,,

A. service discovery
B. service invocation
C. service management
D. all of the above
Answer» D. all of the above
40.

Service Provision Life-Cycle - Creation Phase ...........

A. service processes register themselves in service directories.
B. services are invoked and multiple interlinked services may need to be coordinated
C. service processes, access configurations and service compositions
D. services may be put off line or terminated temporarily or permanently.
Answer» A. service processes register themselves in service directories.
41.

Service Provision Life-Cycle - Execution Phase ...........

A. service processes register themselves in service directories.
B. services are invoked and multiple interlinked services may need to be coordinated
C. service processes, access configurations and service compositions
D. services may be put off line or terminated temporarily or permanently.
Answer» B. services are invoked and multiple interlinked services may need to be coordinated
42.

Service Provision Life-Cycle - Maintenance Phase .........

A. service processes register themselves in service directories.
B. services are invoked and multiple interlinked services may need to be coordinated
C. service processes, access configurations and service compositions
D. services may be put off line or terminated temporarily or permanently.
Answer» C. service processes, access configurations and service compositions
43.

Service Provision Life-Cycle - Dissolution Phase ...........

A. service processes register themselves in service directories.
B. services are invoked and multiple interlinked services may need to be coordinated
C. service processes, access configurations and service compositions
D. services may be put off line or terminated temporarily or permanently.
Answer» D. services may be put off line or terminated temporarily or permanently.
44.

Life-Cycle for Tagging Physical Objects ..............

A. capturing a physical view or some object feature
B. identifying physical objects
C. anchoring or relating objects
D. all of the above
Answer» D. all of the above
45.

Types of active RFID tags are ..........

A. transmitter & receiver
B. transponders and beacons
C. transmiter & reader
D. none of the above
Answer» B. transponders and beacons
46.

Active transponders are woken up ..............

A. no power source and no active transmitter
B. they typically have a read range of 20 100 m
C. when they receive a signal from a reader
D. none of the above
Answer» C. when they receive a signal from a reader
47.

Passive RFID - Transponders can be packaged .....

A. sandwiched between an adhesive layer and a paper label
B. embedded in a plastic card
C. both a&b
D. none of the above
Answer» C. both a&b
48.

Sensors Primary Functions ..........

A. instrument and monitor environments
B. detect changes in the environment
C. control a system with respect to the environment
D. all of the above
Answer» D. all of the above
49.

Sensors Nodes ......

A. common nodes
B. sink nodes
C. gateway nodes
D. all of the above
Answer» D. all of the above
50.

Sensors Common Nodes .......

A. mainly responsible for collecting sensor data.
B. that are responsible for receiving, storing, processing, aggregating data
C. that connect sink nodes to external entities
D. none of the above
Answer» A. mainly responsible for collecting sensor data.
51.

Micro-Electro-Mechanical Systems (MEMS) consists of ...........

A. microelectronic elements
B. actuators, sensors
C. mechanical structures
D. all of the above
Answer» D. all of the above
52.

Micro-Electro-Mechanical Systems (MEMS) developed using ........... techniques

A. fabrication
B. microfabrication
C. etching
D. none of the above
Answer» B. microfabrication
53.

The most common forms of production for MEMS are ...........

A. bulk micromachining
B. surface micromachining
C. har fabrication
D. all of the above
Answer» D. all of the above
54.

The main components of robots are ...........

A. end effectors or actuators
B. controller
C. sensors
D. all of the above
Answer» D. all of the above
55.

Which phase is not a part of development of Human-Centred Design Life-Cycle .

A. requirement gathering and analysis
B. modelling and design
C. configurations & optional packages
D. implementation and testing.
Answer» C. configurations & optional packages
56.

Head(s) Up Display or HUD is ...........

A. any type of display that presents data without blocking the user’s view
B. the user looks through a display element attached to the airframe or vehicle chassis
C. that is worn in front of the eye that acts as a camera to record the scene available to the eye, and acts as a display
D. none of the above
Answer» A. any type of display that presents data without blocking the user’s view
57.

Gestures are expressive, meaningful body motions involving physical movements of the fingers, hands, arms, head, face, or body.

A. true
B. false
Answer» A. true
58.

Sensors used in gestures ........

A. magnetic field trackers
B. accelerometers
C. gyroscopes
D. all of the above
Answer» D. all of the above
59.

In Solove’s taxonomy of privacy Surveillance & Interrogation is a part of ..........

A. information collection
B. information processing
C. information dissemination
D. invasion
Answer» A. information collection
60.

In Solove’s taxonomy of privacy Aggregation & Identification is a part of ..........

A. information collection
B. information processing
C. information dissemination
D. invasion
Answer» B. information processing
61.

Breach of confidentiality is ............

A. is the threat to disclose personal information
B. is breaking the promise to keep a person’s information confidential.
C. is amplifying the accessibility of information.
D. none of the above
Answer» B. is breaking the promise to keep a person’s information confidential.
62.

Decisional interference involves .............

A. revealing another’s nudity, grief, or bodily functions
B. the revelation of truthful information about a person
C. the government’s incursion into people’s decisions regarding their private affairs
D. the dissemination of certain information about a person to serve the aims and interests of another
Answer» C. the government’s incursion into people’s decisions regarding their private affairs
63.

RFID privacy challenges .........

A. automation & identification
B. identification & authentication
C. integration & automation
D. all of the above
Answer» D. all of the above
64.

Clandestine Scanning is ..............

A. the tag data is scanned without the tag carrier’s consent.
B. the tag data is scanned for information processing
C. both a&b
D. none of the above
Answer» A. the tag data is scanned without the tag carrier’s consent.
65.

PSTN stands for

A. public switched telephone network
B. personal switched telephone network
C. personal switched telephone node
D. public switched telephone node
Answer» A. public switched telephone network
66.

PSTN is              and wireless networks are                

A. highly dynamic, virtually static
B. static, virtually static
C. highly dynamic, virtually dynamic
D. virtually static, highly dynamic
Answer» D. virtually static, highly dynamic
67.

In public switched telephone network, LATA stands for              

A. local access and transport area
B. land area and transport area
C. local access and telephone access
D. local area and telephone access
Answer» A. local access and transport area
68.

LATAs are connected by a company called              

A. land exchange carrier
B. local exchange carrier
C. local control exchange
D. land area exchange
Answer» B. local exchange carrier
69.

A long distance telephone company that collects toll is called

A. lata
B. lec
C. pstn
D. ixc
Answer» D. ixc
70.

The technique for separate but parallel signalling channel is called                  

A. common channel signalling
B. forward channel signalling
C. reverse channel signalling
D. separate channel signalling
Answer» A. common channel signalling
71.

ADLS Broadband stands for

A. asynchronous digital subscriber line
B. asemetric digital subscriber line
C. asynchronous double subscriber line
D. asynchronous data subscriber line
Answer» A. asynchronous digital subscriber line
72.

US cellular standard CDPD stands for

A. cellular digital packet data
B. cellular digital packet data
C. cellular digital pocket data
D. cellular discrete pocket data
Answer» A. cellular digital packet data
73.

What are the Methods to move data through a network of links and switches?

A. packet switching and line switching
B. circuit switching and line switching
C. line switching and bit switching
D. packet switching and circuit switching
Answer» D. packet switching and circuit switching
74.

In                    systems, resources are allocated on demand.

A. packet switching
B. circuit switching
C. line switching
D. frequency switching
Answer» A. packet switching
75.

WiMAX stands for

A. wireless maximum communication
B. worldwide interoperability for microwave access
C. worldwide international standard formicrowave access
D. wireless internet maximum communication
Answer» B. worldwide interoperability for microwave access
76.

WiMAX provides                  

A. simplex communication
B. half duplex communication
C. full duplex communication
D. no communication
Answer» C. full duplex communication
77.

Which of the following modulation schemes is supported by WiMAX?

A. binary phase shift keying modulation
B. quadrature phase shift keying modulation
C. quadrature amplitude modulation
D. all of the mentioned
Answer» D. all of the mentioned
78.

WiMAX provides                

A. voip services
B. iptv services
C. both voip and iptv services
D. no iptv services
Answer» C. both voip and iptv services
79.

Which of the following frequencies is not used in WiMAX for communication?

A. 2.3 ghz
B. 2.4 ghz
C. 2.5 ghz
D. 3.5 ghz
Answer» B. 2.4 ghz
80.

What is the access point (AP) in a wireless LAN?

A. device that allows wireless devices to connect to a wired network
B. wireless devices itself
C. both device that allows wireless devices to connect to a wired
D. all the nodes in the network
Answer» A. device that allows wireless devices to connect to a wired network
81.

Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?

A. cdma
B. csma/ca
C. aloha
D. csma/cd
Answer» B. csma/ca
82.

Mostly                  is used in wireless LAN.

A. time division multiplexing
B. orthogonal frequency division multiplexing
C. space division multiplexing
D. channel division multiplexing
Answer» B. orthogonal frequency division multiplexing
83.

What is WPA?

A. wi-fi protected access
B. wired protected access
C. wired process access
D. wi-fi process access
Answer» A. wi-fi protected access
84.

In Bluetooth,multiple                  form a network called a ------------

A. scatternet; piconets
B. piconets: scatternet
C. piconets: bluenet
D. bluenet; scatternet
Answer» B. piconets: scatternet
85.

The bluetooth supports

A. point-to-point connections
B. point-to-multipoint connection
C. both (a) and (b)
D. none of the above
Answer» C. both (a) and (b)
86.

Frequency range supported in Zigbee .............

A. 2.4 ghz worldwide
B. 2.0 ghz worldwide
C. 2.1 ghz worldwide
D. 3.4 ghz worldwide
Answer» A. 2.4 ghz worldwide
87.

There is more than ............... cell nodes in zigbee.

A. 66000
B. 65000
C. 60000
D. 70000
Answer» B. 65000
88.

ZigBee developed under ..............

A. ieee 802.15.1.
B. ieee 802.15.2.
C. ieee 802.15.3.
D. ieee 802.15.4.
Answer» D. ieee 802.15.4.
89.

A Body Area Network or BAN consists ...............

A. wireless devices to connect to a wired network
B. set of mobile and compact sensors
C. sensors & communication devices
D. wearable device & sensors
Answer» B. set of mobile and compact sensors
90.

Body Area Network requirements ..........

A. low power consumption & interoperability
B. self-healing & security
C. low latency
D. all of the above
Answer» D. all of the above
91.

Find out wrong stament of Body Area Network...............

A. sensors are put on patient’s body to monitor heart rate, blood pressure and ecg.
B. provides healthcare services over a long distance with the help of it and communication.
C. sensors can be used to measure navigation, timer, distance, pulse rate and body temperature.
D. allowing transmission of data, voice and video via a computer
Answer» D. allowing transmission of data, voice and video via a computer
92.

WBAN(Wireless Body Area Network) allows the user to move another without having the restriction of a cable for sharing information.

A. true
B. false
Answer» A. true
93.

Which of the following standard committee specifies Bluetooth and other Personal Area Networks (PAN)?

A. ieee 802.11b
B. ieee 802.15.2.
C. ieee 802.11g
D. ieee 802.16
Answer» B. ieee 802.15.2.
94.

A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as

A. chock point
B. meeting point
C. firewall point
D. secure point
Answer» A. chock point
95.

A proxy firewall filters at

A. physical layer
B. data link layer
C. network layer
D. application layer
Answer» D. application layer
96.

A firewall needs to be                      so that it can grow proportionally with the network that it protects.

A. robust
B. expansive
C. fast
D. scalable
Answer» B. expansive
97.

                     provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.

A. visual private network
B. virtual protocol network
C. virtual protocol networking
D. virtual private network
Answer» D. virtual private network
98.

Which of the statements are not true to classify VPN systems?

A. protocols used for tunnelling the traffic
B. whether vpns are providing site-to-site or remote access connection
C. securing the network from bots and malwares
D. levels of security provided for sending and receiving data privately
Answer» C. securing the network from bots and malwares
99.

What types of protocols are used in VPNs?

A. application level protocols
B. tunnelling protocols
C. network protocols
D. mailing protocols
Answer» A. application level protocols
100.

Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?

A. remote access vpns
B. site-to-site vpns
C. peer-to-peer vpns
D. country-to-country vpns
Answer» B. site-to-site vpns
Tags
Question and answers in Ubiquitous Computing System (UCS), Ubiquitous Computing System (UCS) multiple choice questions and answers, Ubiquitous Computing System (UCS) Important MCQs, Solved MCQs for Ubiquitous Computing System (UCS), Ubiquitous Computing System (UCS) MCQs with answers PDF download