McqMate
1. |
Ubiquitous computing is the method of ........ |
A. | enhancing computer use by making many computers available throughout the physical environment |
B. | wireless communication and carry-around computers. |
C. | allowing transmission of data, voice and video via a computer |
D. | interact with a variety of users via the internet. |
Answer» A. enhancing computer use by making many computers available throughout the physical environment |
2. |
............... main properties for UbiCom Systems were proposed by Weiser |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» B. 2 |
3. |
Which of the following is not a key characteristic of Ubicomp System ? |
A. | distributed |
B. | ihci |
C. | context- awareness |
D. | pay as you go |
Answer» D. pay as you go |
4. |
Among the various wireless options for wearable devices, which one needs to connect to a smart phone and is the most popular? |
A. | bluetooth |
B. | wifi |
C. | rfid |
D. | none of the above |
Answer» A. bluetooth |
5. |
When connecting a wearable device to the cloud, what software is required to run a custom service? |
A. | database |
B. | operating system |
C. | http server |
D. | all of the above |
Answer» D. all of the above |
6. |
What does RFID stand for? |
A. | radio frequency issue date |
B. | radio frequency identification |
C. | rear field identification |
D. | real far identification |
Answer» B. radio frequency identification |
7. |
What applications run on a SMART Board? |
A. | any applicaiton on the computer |
B. | internet browsers like explorer and navigator only |
C. | powerpoint only |
D. | powerpoint only |
Answer» A. any applicaiton on the computer |
8. |
The SMART Board Software is called |
A. | notepage |
B. | notebook |
C. | spiral page |
D. | all of the above |
Answer» B. notebook |
9. |
It takes the output signal from the transmission channel and delivers |
A. | transmitter |
B. | transmission channel |
C. | receiver |
D. | hardware |
Answer» C. receiver |
10. |
Which of the Following is used in banking industary..... |
A. | micr |
B. | omr |
C. | all of above |
D. | none of the above |
Answer» A. micr |
11. |
WAP? |
A. | wireless application protocol |
B. | wired allication protocol |
C. | wide application protocol |
D. | none of the above |
Answer» A. wireless application protocol |
12. |
The tag can be used to activate the task when the user clicks on a word on the screen? |
A. | true |
B. | false |
C. | both |
D. | none of the above |
Answer» A. true |
13. |
WAP is designed for? |
A. | internet explorer |
B. | web browser |
C. | micro browser |
D. | macro browser |
Answer» C. micro browser |
14. |
Limitations of Short Messaging Service (SMS) |
A. | limited to 160 characters or less |
B. | message latency is one minute or more |
C. | poor security at the application level |
D. | all of the above |
Answer» D. all of the above |
15. |
DoCoMo Stands for ............... |
A. | documentation over the mobile network |
B. | do communications over the mobile network |
C. | documentation & communications over the mobile network |
D. | none of the above |
Answer» B. do communications over the mobile network |
16. |
Mobile Web Service design often uses a three tier ............... |
A. | thin client, client proxy, server architecture |
B. | network, client proxy, server architecture |
C. | internet,cilent & server |
D. | none of the above |
Answer» A. thin client, client proxy, server architecture |
17. |
In J2ME architecture Connected Device Configuration (CDC) provides .......... |
A. | fundamental services for devices |
B. | fundamental services for virtual machines |
C. | both |
D. | none of the above |
Answer» C. both |
18. |
Java 2 Mobile Environment supports ................. |
A. | development of client server system |
B. | stand alone system designs in which code is developed |
C. | both |
D. | none of the above |
Answer» C. both |
19. |
J2ME is a multi layered organisation of software bundles of three types ............. |
A. | servers,desktop machines & high end consumer devices |
B. | configurations, profiles and optional packages |
C. | j2ee,j2se & kvm |
D. | none of the above |
Answer» B. configurations, profiles and optional packages |
20. |
The .NET Framework consists of two main parts ............ |
A. | common language runtime & unified set of class libraries |
B. | client & server |
C. | packeges & class labraries |
D. | digital packages & digital class labraries |
Answer» A. common language runtime & unified set of class libraries |
21. |
Code written on the .NET Framework platform is called ........... |
A. | client code |
B. | managed code |
C. | server code |
D. | none of the above |
Answer» B. managed code |
22. |
Managed code ....... |
A. | cannot have bad pointers |
B. | cannot create memory leaks |
C. | supports strong code type safety |
D. | all of the above |
Answer» D. all of the above |
23. |
.NET CF designed specifically for devices, such as ............. |
A. | smart cards |
B. | smart wearable devices |
C. | pdas and smart mobile phones. |
D. | sensors |
Answer» C. pdas and smart mobile phones. |
24. |
IrDA support ........ |
A. | sql server ce |
B. | device specific controls |
C. | high performance jit compiler |
D. | all of the above |
Answer» D. all of the above |
25. |
Mobile code is any ......... |
A. | program |
B. | application |
C. | content |
D. | all of the above |
Answer» D. all of the above |
26. |
Sandboxes .......... |
A. | that limit the local services that code can access. |
B. | which ensures that code originates from a trusted source. |
C. | machines that can access the internet |
D. | that carries explicit proof of its security. |
Answer» A. that limit the local services that code can access. |
27. |
Code Signing ......... |
A. | that limit the local services that code can access. |
B. | which ensures that code originates from a trusted source. |
C. | machines that can access the internet |
D. | that carries explicit proof of its security. |
Answer» B. which ensures that code originates from a trusted source. |
28. |
Firewalls ............ |
A. | that limit the local services that code can access. |
B. | which ensures that code originates from a trusted source. |
C. | machines that can access the internet |
D. | that carries explicit proof of its security. |
Answer» C. machines that can access the internet |
29. |
Proof Carrying Code ............... |
A. | that limit the local services that code can access. |
B. | which ensures that code originates from a trusted source. |
C. | machines that can access the internet |
D. | that carries explicit proof of its security. |
Answer» D. that carries explicit proof of its security. |
30. |
A smart card ............ |
A. | is a plastic card embedded with digital memory |
B. | which store data on magnetic strips |
C. | is reprogrammable |
D. | all of the above |
Answer» D. all of the above |
31. |
The primary tasks of a smart card operating system ............. |
A. | transferring data to and from the smart card |
B. | controlling the execution of commands |
C. | managing and executing cryptographic algorithms |
D. | all of the above |
Answer» D. all of the above |
32. |
Java Card widely used in ........... |
A. | sim cards |
B. | atm cards |
C. | both |
D. | none of the above |
Answer» C. both |
33. |
The Home Electronic System (HES) defines the system components ......... |
A. | residential gateway, homegate |
B. | standard interfaces |
C. | both |
D. | none of the above |
Answer» C. both |
34. |
Jini consists of three Java language protocols ............... |
A. | discovery, join and lookup |
B. | discovery, configuration and lookup |
C. | discovery, join and installation |
D. | find , join and lookup |
Answer» A. discovery, join and lookup |
35. |
UPnP Stands for .......... |
A. | united plug and play protocol |
B. | undirectional plug and play protocol |
C. | universal plug and play protocol |
D. | unidirectional plug and play protocol |
Answer» C. universal plug and play protocol |
36. |
Benefit of UPnP ............. |
A. | media and device independence |
B. | platform independence |
C. | internet-based technologies |
D. | all of the above |
Answer» D. all of the above |
37. |
OSGi’s core component is ........... |
A. | server |
B. | bundle |
C. | node |
D. | gateway |
Answer» B. bundle |
38. |
A MANIFEST.MF file located in the ........ directory . |
A. | general graph directory |
B. | acyclic graph directory |
C. | single-level |
D. | meta-inf |
Answer» D. meta-inf |
39. |
Service Oriented Architectures Functions ,,,,,,,,,,,,,, |
A. | service discovery |
B. | service invocation |
C. | service management |
D. | all of the above |
Answer» D. all of the above |
40. |
Service Provision Life-Cycle - Creation Phase ........... |
A. | service processes register themselves in service directories. |
B. | services are invoked and multiple interlinked services may need to be coordinated |
C. | service processes, access configurations and service compositions |
D. | services may be put off line or terminated temporarily or permanently. |
Answer» A. service processes register themselves in service directories. |
41. |
Service Provision Life-Cycle - Execution Phase ........... |
A. | service processes register themselves in service directories. |
B. | services are invoked and multiple interlinked services may need to be coordinated |
C. | service processes, access configurations and service compositions |
D. | services may be put off line or terminated temporarily or permanently. |
Answer» B. services are invoked and multiple interlinked services may need to be coordinated |
42. |
Service Provision Life-Cycle - Maintenance Phase ......... |
A. | service processes register themselves in service directories. |
B. | services are invoked and multiple interlinked services may need to be coordinated |
C. | service processes, access configurations and service compositions |
D. | services may be put off line or terminated temporarily or permanently. |
Answer» C. service processes, access configurations and service compositions |
43. |
Service Provision Life-Cycle - Dissolution Phase ........... |
A. | service processes register themselves in service directories. |
B. | services are invoked and multiple interlinked services may need to be coordinated |
C. | service processes, access configurations and service compositions |
D. | services may be put off line or terminated temporarily or permanently. |
Answer» D. services may be put off line or terminated temporarily or permanently. |
44. |
Life-Cycle for Tagging Physical Objects .............. |
A. | capturing a physical view or some object feature |
B. | identifying physical objects |
C. | anchoring or relating objects |
D. | all of the above |
Answer» D. all of the above |
45. |
Types of active RFID tags are .......... |
A. | transmitter & receiver |
B. | transponders and beacons |
C. | transmiter & reader |
D. | none of the above |
Answer» B. transponders and beacons |
46. |
Active transponders are woken up .............. |
A. | no power source and no active transmitter |
B. | they typically have a read range of 20 100 m |
C. | when they receive a signal from a reader |
D. | none of the above |
Answer» C. when they receive a signal from a reader |
47. |
Passive RFID - Transponders can be packaged ..... |
A. | sandwiched between an adhesive layer and a paper label |
B. | embedded in a plastic card |
C. | both a&b |
D. | none of the above |
Answer» C. both a&b |
48. |
Sensors Primary Functions .......... |
A. | instrument and monitor environments |
B. | detect changes in the environment |
C. | control a system with respect to the environment |
D. | all of the above |
Answer» D. all of the above |
49. |
Sensors Nodes ...... |
A. | common nodes |
B. | sink nodes |
C. | gateway nodes |
D. | all of the above |
Answer» D. all of the above |
50. |
Sensors Common Nodes ....... |
A. | mainly responsible for collecting sensor data. |
B. | that are responsible for receiving, storing, processing, aggregating data |
C. | that connect sink nodes to external entities |
D. | none of the above |
Answer» A. mainly responsible for collecting sensor data. |
51. |
Micro-Electro-Mechanical Systems (MEMS) consists of ........... |
A. | microelectronic elements |
B. | actuators, sensors |
C. | mechanical structures |
D. | all of the above |
Answer» D. all of the above |
52. |
Micro-Electro-Mechanical Systems (MEMS) developed using ........... techniques |
A. | fabrication |
B. | microfabrication |
C. | etching |
D. | none of the above |
Answer» B. microfabrication |
53. |
The most common forms of production for MEMS are ........... |
A. | bulk micromachining |
B. | surface micromachining |
C. | har fabrication |
D. | all of the above |
Answer» D. all of the above |
54. |
The main components of robots are ........... |
A. | end effectors or actuators |
B. | controller |
C. | sensors |
D. | all of the above |
Answer» D. all of the above |
55. |
Which phase is not a part of development of Human-Centred Design Life-Cycle . |
A. | requirement gathering and analysis |
B. | modelling and design |
C. | configurations & optional packages |
D. | implementation and testing. |
Answer» C. configurations & optional packages |
56. |
Head(s) Up Display or HUD is ........... |
A. | any type of display that presents data without blocking the user’s view |
B. | the user looks through a display element attached to the airframe or vehicle chassis |
C. | that is worn in front of the eye that acts as a camera to record the scene available to the eye, and acts as a display |
D. | none of the above |
Answer» A. any type of display that presents data without blocking the user’s view |
57. |
Gestures are expressive, meaningful body motions involving physical movements of the fingers, hands, arms, head, face, or body. |
A. | true |
B. | false |
Answer» A. true |
58. |
Sensors used in gestures ........ |
A. | magnetic field trackers |
B. | accelerometers |
C. | gyroscopes |
D. | all of the above |
Answer» D. all of the above |
59. |
In Solove’s taxonomy of privacy Surveillance & Interrogation is a part of .......... |
A. | information collection |
B. | information processing |
C. | information dissemination |
D. | invasion |
Answer» A. information collection |
60. |
In Solove’s taxonomy of privacy Aggregation & Identification is a part of .......... |
A. | information collection |
B. | information processing |
C. | information dissemination |
D. | invasion |
Answer» B. information processing |
61. |
Breach of confidentiality is ............ |
A. | is the threat to disclose personal information |
B. | is breaking the promise to keep a person’s information confidential. |
C. | is amplifying the accessibility of information. |
D. | none of the above |
Answer» B. is breaking the promise to keep a person’s information confidential. |
62. |
Decisional interference involves ............. |
A. | revealing another’s nudity, grief, or bodily functions |
B. | the revelation of truthful information about a person |
C. | the government’s incursion into people’s decisions regarding their private affairs |
D. | the dissemination of certain information about a person to serve the aims and interests of another |
Answer» C. the government’s incursion into people’s decisions regarding their private affairs |
63. |
RFID privacy challenges ......... |
A. | automation & identification |
B. | identification & authentication |
C. | integration & automation |
D. | all of the above |
Answer» D. all of the above |
64. |
Clandestine Scanning is .............. |
A. | the tag data is scanned without the tag carrier’s consent. |
B. | the tag data is scanned for information processing |
C. | both a&b |
D. | none of the above |
Answer» A. the tag data is scanned without the tag carrier’s consent. |
65. |
PSTN stands for |
A. | public switched telephone network |
B. | personal switched telephone network |
C. | personal switched telephone node |
D. | public switched telephone node |
Answer» A. public switched telephone network |
66. |
PSTN is and wireless networks are |
A. | highly dynamic, virtually static |
B. | static, virtually static |
C. | highly dynamic, virtually dynamic |
D. | virtually static, highly dynamic |
Answer» D. virtually static, highly dynamic |
67. |
In public switched telephone network, LATA stands for |
A. | local access and transport area |
B. | land area and transport area |
C. | local access and telephone access |
D. | local area and telephone access |
Answer» A. local access and transport area |
68. |
LATAs are connected by a company called |
A. | land exchange carrier |
B. | local exchange carrier |
C. | local control exchange |
D. | land area exchange |
Answer» B. local exchange carrier |
69. |
A long distance telephone company that collects toll is called |
A. | lata |
B. | lec |
C. | pstn |
D. | ixc |
Answer» D. ixc |
70. |
The technique for separate but parallel signalling channel is called |
A. | common channel signalling |
B. | forward channel signalling |
C. | reverse channel signalling |
D. | separate channel signalling |
Answer» A. common channel signalling |
71. |
ADLS Broadband stands for |
A. | asynchronous digital subscriber line |
B. | asemetric digital subscriber line |
C. | asynchronous double subscriber line |
D. | asynchronous data subscriber line |
Answer» A. asynchronous digital subscriber line |
72. |
US cellular standard CDPD stands for |
A. | cellular digital packet data |
B. | cellular digital packet data |
C. | cellular digital pocket data |
D. | cellular discrete pocket data |
Answer» A. cellular digital packet data |
73. |
What are the Methods to move data through a network of links and switches? |
A. | packet switching and line switching |
B. | circuit switching and line switching |
C. | line switching and bit switching |
D. | packet switching and circuit switching |
Answer» D. packet switching and circuit switching |
74. |
In systems, resources are allocated on demand. |
A. | packet switching |
B. | circuit switching |
C. | line switching |
D. | frequency switching |
Answer» A. packet switching |
75. |
WiMAX stands for |
A. | wireless maximum communication |
B. | worldwide interoperability for microwave access |
C. | worldwide international standard formicrowave access |
D. | wireless internet maximum communication |
Answer» B. worldwide interoperability for microwave access |
76. |
WiMAX provides |
A. | simplex communication |
B. | half duplex communication |
C. | full duplex communication |
D. | no communication |
Answer» C. full duplex communication |
77. |
Which of the following modulation schemes is supported by WiMAX? |
A. | binary phase shift keying modulation |
B. | quadrature phase shift keying modulation |
C. | quadrature amplitude modulation |
D. | all of the mentioned |
Answer» D. all of the mentioned |
78. |
WiMAX provides |
A. | voip services |
B. | iptv services |
C. | both voip and iptv services |
D. | no iptv services |
Answer» C. both voip and iptv services |
79. |
Which of the following frequencies is not used in WiMAX for communication? |
A. | 2.3 ghz |
B. | 2.4 ghz |
C. | 2.5 ghz |
D. | 3.5 ghz |
Answer» B. 2.4 ghz |
80. |
What is the access point (AP) in a wireless LAN? |
A. | device that allows wireless devices to connect to a wired network |
B. | wireless devices itself |
C. | both device that allows wireless devices to connect to a wired |
D. | all the nodes in the network |
Answer» A. device that allows wireless devices to connect to a wired network |
81. |
Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? |
A. | cdma |
B. | csma/ca |
C. | aloha |
D. | csma/cd |
Answer» B. csma/ca |
82. |
Mostly is used in wireless LAN. |
A. | time division multiplexing |
B. | orthogonal frequency division multiplexing |
C. | space division multiplexing |
D. | channel division multiplexing |
Answer» B. orthogonal frequency division multiplexing |
83. |
What is WPA? |
A. | wi-fi protected access |
B. | wired protected access |
C. | wired process access |
D. | wi-fi process access |
Answer» A. wi-fi protected access |
84. |
In Bluetooth,multiple form a network called a ------------ |
A. | scatternet; piconets |
B. | piconets: scatternet |
C. | piconets: bluenet |
D. | bluenet; scatternet |
Answer» B. piconets: scatternet |
85. |
The bluetooth supports |
A. | point-to-point connections |
B. | point-to-multipoint connection |
C. | both (a) and (b) |
D. | none of the above |
Answer» C. both (a) and (b) |
86. |
Frequency range supported in Zigbee ............. |
A. | 2.4 ghz worldwide |
B. | 2.0 ghz worldwide |
C. | 2.1 ghz worldwide |
D. | 3.4 ghz worldwide |
Answer» A. 2.4 ghz worldwide |
87. |
There is more than ............... cell nodes in zigbee. |
A. | 66000 |
B. | 65000 |
C. | 60000 |
D. | 70000 |
Answer» B. 65000 |
88. |
ZigBee developed under .............. |
A. | ieee 802.15.1. |
B. | ieee 802.15.2. |
C. | ieee 802.15.3. |
D. | ieee 802.15.4. |
Answer» D. ieee 802.15.4. |
89. |
A Body Area Network or BAN consists ............... |
A. | wireless devices to connect to a wired network |
B. | set of mobile and compact sensors |
C. | sensors & communication devices |
D. | wearable device & sensors |
Answer» B. set of mobile and compact sensors |
90. |
Body Area Network requirements .......... |
A. | low power consumption & interoperability |
B. | self-healing & security |
C. | low latency |
D. | all of the above |
Answer» D. all of the above |
91. |
Find out wrong stament of Body Area Network............... |
A. | sensors are put on patient’s body to monitor heart rate, blood pressure and ecg. |
B. | provides healthcare services over a long distance with the help of it and communication. |
C. | sensors can be used to measure navigation, timer, distance, pulse rate and body temperature. |
D. | allowing transmission of data, voice and video via a computer |
Answer» D. allowing transmission of data, voice and video via a computer |
92. |
WBAN(Wireless Body Area Network) allows the user to move another without having the restriction of a cable for sharing information. |
A. | true |
B. | false |
Answer» A. true |
93. |
Which of the following standard committee specifies Bluetooth and other Personal Area Networks (PAN)? |
A. | ieee 802.11b |
B. | ieee 802.15.2. |
C. | ieee 802.11g |
D. | ieee 802.16 |
Answer» B. ieee 802.15.2. |
94. |
A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as |
A. | chock point |
B. | meeting point |
C. | firewall point |
D. | secure point |
Answer» A. chock point |
95. |
A proxy firewall filters at |
A. | physical layer |
B. | data link layer |
C. | network layer |
D. | application layer |
Answer» D. application layer |
96. |
A firewall needs to be so that it can grow proportionally with the network that it protects. |
A. | robust |
B. | expansive |
C. | fast |
D. | scalable |
Answer» B. expansive |
97. |
provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network. |
A. | visual private network |
B. | virtual protocol network |
C. | virtual protocol networking |
D. | virtual private network |
Answer» D. virtual private network |
98. |
Which of the statements are not true to classify VPN systems? |
A. | protocols used for tunnelling the traffic |
B. | whether vpns are providing site-to-site or remote access connection |
C. | securing the network from bots and malwares |
D. | levels of security provided for sending and receiving data privately |
Answer» C. securing the network from bots and malwares |
99. |
What types of protocols are used in VPNs? |
A. | application level protocols |
B. | tunnelling protocols |
C. | network protocols |
D. | mailing protocols |
Answer» A. application level protocols |
100. |
Which types of VPNs are used for corporate connectivity across companies residing in different geographical location? |
A. | remote access vpns |
B. | site-to-site vpns |
C. | peer-to-peer vpns |
D. | country-to-country vpns |
Answer» B. site-to-site vpns |
Done Reading?