McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) .
1. |
Ubiquitous computing is the method of ........ |
A. | enhancing computer use by making many computers available throughout the physical environment |
B. | wireless communication and carry-around computers. |
C. | allowing transmission of data, voice and video via a computer |
D. | interact with a variety of users via the internet. |
Answer» A. enhancing computer use by making many computers available throughout the physical environment |
2. |
............... main properties for UbiCom Systems were proposed by Weiser |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» B. 2 |
3. |
Which of the following is not a key characteristic of Ubicomp System ? |
A. | distributed |
B. | ihci |
C. | context- awareness |
D. | pay as you go |
Answer» D. pay as you go |
4. |
Among the various wireless options for wearable devices, which one needs to connect to a smart phone and is the most popular? |
A. | bluetooth |
B. | wifi |
C. | rfid |
D. | none of the above |
Answer» A. bluetooth |
5. |
When connecting a wearable device to the cloud, what software is required to run a custom service? |
A. | database |
B. | operating system |
C. | http server |
D. | all of the above |
Answer» D. all of the above |
6. |
What does RFID stand for? |
A. | radio frequency issue date |
B. | radio frequency identification |
C. | rear field identification |
D. | real far identification |
Answer» B. radio frequency identification |
7. |
What applications run on a SMART Board? |
A. | any applicaiton on the computer |
B. | internet browsers like explorer and navigator only |
C. | powerpoint only |
D. | powerpoint only |
Answer» A. any applicaiton on the computer |
8. |
The SMART Board Software is called |
A. | notepage |
B. | notebook |
C. | spiral page |
D. | all of the above |
Answer» B. notebook |
9. |
It takes the output signal from the transmission channel and delivers |
A. | transmitter |
B. | transmission channel |
C. | receiver |
D. | hardware |
Answer» C. receiver |
10. |
Which of the Following is used in banking industary..... |
A. | micr |
B. | omr |
C. | all of above |
D. | none of the above |
Answer» A. micr |
11. |
WAP? |
A. | wireless application protocol |
B. | wired allication protocol |
C. | wide application protocol |
D. | none of the above |
Answer» A. wireless application protocol |
12. |
The tag can be used to activate the task when the user clicks on a word on the screen? |
A. | true |
B. | false |
C. | both |
D. | none of the above |
Answer» A. true |
13. |
WAP is designed for? |
A. | internet explorer |
B. | web browser |
C. | micro browser |
D. | macro browser |
Answer» C. micro browser |
14. |
Limitations of Short Messaging Service (SMS) |
A. | limited to 160 characters or less |
B. | message latency is one minute or more |
C. | poor security at the application level |
D. | all of the above |
Answer» D. all of the above |
15. |
DoCoMo Stands for ............... |
A. | documentation over the mobile network |
B. | do communications over the mobile network |
C. | documentation & communications over the mobile network |
D. | none of the above |
Answer» B. do communications over the mobile network |
16. |
Mobile Web Service design often uses a three tier ............... |
A. | thin client, client proxy, server architecture |
B. | network, client proxy, server architecture |
C. | internet,cilent & server |
D. | none of the above |
Answer» A. thin client, client proxy, server architecture |
17. |
In J2ME architecture Connected Device Configuration (CDC) provides .......... |
A. | fundamental services for devices |
B. | fundamental services for virtual machines |
C. | both |
D. | none of the above |
Answer» C. both |
18. |
Java 2 Mobile Environment supports ................. |
A. | development of client server system |
B. | stand alone system designs in which code is developed |
C. | both |
D. | none of the above |
Answer» C. both |
19. |
J2ME is a multi layered organisation of software bundles of three types ............. |
A. | servers,desktop machines & high end consumer devices |
B. | configurations, profiles and optional packages |
C. | j2ee,j2se & kvm |
D. | none of the above |
Answer» B. configurations, profiles and optional packages |
20. |
The .NET Framework consists of two main parts ............ |
A. | common language runtime & unified set of class libraries |
B. | client & server |
C. | packeges & class labraries |
D. | digital packages & digital class labraries |
Answer» A. common language runtime & unified set of class libraries |
21. |
Code written on the .NET Framework platform is called ........... |
A. | client code |
B. | managed code |
C. | server code |
D. | none of the above |
Answer» B. managed code |
22. |
Managed code ....... |
A. | cannot have bad pointers |
B. | cannot create memory leaks |
C. | supports strong code type safety |
D. | all of the above |
Answer» D. all of the above |
23. |
.NET CF designed specifically for devices, such as ............. |
A. | smart cards |
B. | smart wearable devices |
C. | pdas and smart mobile phones. |
D. | sensors |
Answer» C. pdas and smart mobile phones. |
24. |
IrDA support ........ |
A. | sql server ce |
B. | device specific controls |
C. | high performance jit compiler |
D. | all of the above |
Answer» D. all of the above |
25. |
Mobile code is any ......... |
A. | program |
B. | application |
C. | content |
D. | all of the above |
Answer» D. all of the above |
26. |
Sandboxes .......... |
A. | that limit the local services that code can access. |
B. | which ensures that code originates from a trusted source. |
C. | machines that can access the internet |
D. | that carries explicit proof of its security. |
Answer» A. that limit the local services that code can access. |
27. |
Code Signing ......... |
A. | that limit the local services that code can access. |
B. | which ensures that code originates from a trusted source. |
C. | machines that can access the internet |
D. | that carries explicit proof of its security. |
Answer» B. which ensures that code originates from a trusted source. |
28. |
Firewalls ............ |
A. | that limit the local services that code can access. |
B. | which ensures that code originates from a trusted source. |
C. | machines that can access the internet |
D. | that carries explicit proof of its security. |
Answer» C. machines that can access the internet |
29. |
Proof Carrying Code ............... |
A. | that limit the local services that code can access. |
B. | which ensures that code originates from a trusted source. |
C. | machines that can access the internet |
D. | that carries explicit proof of its security. |
Answer» D. that carries explicit proof of its security. |
30. |
A smart card ............ |
A. | is a plastic card embedded with digital memory |
B. | which store data on magnetic strips |
C. | is reprogrammable |
D. | all of the above |
Answer» D. all of the above |
31. |
The primary tasks of a smart card operating system ............. |
A. | transferring data to and from the smart card |
B. | controlling the execution of commands |
C. | managing and executing cryptographic algorithms |
D. | all of the above |
Answer» D. all of the above |
32. |
Java Card widely used in ........... |
A. | sim cards |
B. | atm cards |
C. | both |
D. | none of the above |
Answer» C. both |
33. |
The Home Electronic System (HES) defines the system components ......... |
A. | residential gateway, homegate |
B. | standard interfaces |
C. | both |
D. | none of the above |
Answer» C. both |
34. |
Jini consists of three Java language protocols ............... |
A. | discovery, join and lookup |
B. | discovery, configuration and lookup |
C. | discovery, join and installation |
D. | find , join and lookup |
Answer» A. discovery, join and lookup |
35. |
UPnP Stands for .......... |
A. | united plug and play protocol |
B. | undirectional plug and play protocol |
C. | universal plug and play protocol |
D. | unidirectional plug and play protocol |
Answer» C. universal plug and play protocol |
36. |
Benefit of UPnP ............. |
A. | media and device independence |
B. | platform independence |
C. | internet-based technologies |
D. | all of the above |
Answer» D. all of the above |
37. |
OSGi’s core component is ........... |
A. | server |
B. | bundle |
C. | node |
D. | gateway |
Answer» B. bundle |
38. |
A MANIFEST.MF file located in the ........ directory . |
A. | general graph directory |
B. | acyclic graph directory |
C. | single-level |
D. | meta-inf |
Answer» D. meta-inf |
39. |
Service Oriented Architectures Functions ,,,,,,,,,,,,,, |
A. | service discovery |
B. | service invocation |
C. | service management |
D. | all of the above |
Answer» D. all of the above |
40. |
Service Provision Life-Cycle - Creation Phase ........... |
A. | service processes register themselves in service directories. |
B. | services are invoked and multiple interlinked services may need to be coordinated |
C. | service processes, access configurations and service compositions |
D. | services may be put off line or terminated temporarily or permanently. |
Answer» A. service processes register themselves in service directories. |
41. |
Service Provision Life-Cycle - Execution Phase ........... |
A. | service processes register themselves in service directories. |
B. | services are invoked and multiple interlinked services may need to be coordinated |
C. | service processes, access configurations and service compositions |
D. | services may be put off line or terminated temporarily or permanently. |
Answer» B. services are invoked and multiple interlinked services may need to be coordinated |
42. |
Service Provision Life-Cycle - Maintenance Phase ......... |
A. | service processes register themselves in service directories. |
B. | services are invoked and multiple interlinked services may need to be coordinated |
C. | service processes, access configurations and service compositions |
D. | services may be put off line or terminated temporarily or permanently. |
Answer» C. service processes, access configurations and service compositions |
43. |
Service Provision Life-Cycle - Dissolution Phase ........... |
A. | service processes register themselves in service directories. |
B. | services are invoked and multiple interlinked services may need to be coordinated |
C. | service processes, access configurations and service compositions |
D. | services may be put off line or terminated temporarily or permanently. |
Answer» D. services may be put off line or terminated temporarily or permanently. |
44. |
Life-Cycle for Tagging Physical Objects .............. |
A. | capturing a physical view or some object feature |
B. | identifying physical objects |
C. | anchoring or relating objects |
D. | all of the above |
Answer» D. all of the above |
45. |
Types of active RFID tags are .......... |
A. | transmitter & receiver |
B. | transponders and beacons |
C. | transmiter & reader |
D. | none of the above |
Answer» B. transponders and beacons |
46. |
Active transponders are woken up .............. |
A. | no power source and no active transmitter |
B. | they typically have a read range of 20 100 m |
C. | when they receive a signal from a reader |
D. | none of the above |
Answer» C. when they receive a signal from a reader |
47. |
Passive RFID - Transponders can be packaged ..... |
A. | sandwiched between an adhesive layer and a paper label |
B. | embedded in a plastic card |
C. | both a&b |
D. | none of the above |
Answer» C. both a&b |
48. |
Sensors Primary Functions .......... |
A. | instrument and monitor environments |
B. | detect changes in the environment |
C. | control a system with respect to the environment |
D. | all of the above |
Answer» D. all of the above |
49. |
Sensors Nodes ...... |
A. | common nodes |
B. | sink nodes |
C. | gateway nodes |
D. | all of the above |
Answer» D. all of the above |
50. |
Sensors Common Nodes ....... |
A. | mainly responsible for collecting sensor data. |
B. | that are responsible for receiving, storing, processing, aggregating data |
C. | that connect sink nodes to external entities |
D. | none of the above |
Answer» A. mainly responsible for collecting sensor data. |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.