340+ Ubiquitous Computing System (UCS) Solved MCQs

101.

uses radio-frequency waves to transfer data between a

A. Wi-Fi
B. OCR
C. Bar Code
D. RFID
Answer» D. RFID
102.

                              Is fast and does not require physical sight or contact

A. Wi-Fi
B. OCR
C. Bar Code
D. RFID
Answer» D. RFID
103.

                              technology often used in "smart cards," have small radio

A. Wi-Fi
B. OCR
C. Bar Code
D. RFID
Answer» D. RFID
104.

A network of physical objects or things embedded with electronics or

A. AI
B. ML
C. IoT
D. Internet
Answer» C. IoT
105.

RFID stands for .

A. Random
B. Radio
C. Random
D. Radio frequency
Answer» B. Radio
106.

Which of the following is not involved in working of IoT?

A. RFID
B. Sensors
C. Nano Tech
D. RFID
Answer» C. Nano Tech
107.

Making the smaller and smaller things have the ability to connect and interact

A. Micro Tech
B. Smart Tech
C. Nano Tech
D. RFID
Answer» C. Nano Tech
108.

Several instructions execution simultaneously in .

A. Processing
B. Parallel
C. Serial
D. Multi Tasking
Answer» B. Parallel
109.

In , data is written only once during manufacturing or

A. Read Only
B. Write Once –
C. Read/Write
D. All of above
Answer» B. Write Once –
110.

In tag data can be changed over time.

A. Read Only
B. Write Once –
C. Read/Write
D. All of above
Answer» C. Read/Write
111.

These are the functions of RFID Reader

A. Remotely
B. Establish a
C. Inventory tags,
D. All of above
Answer» D. All of above
112.

In , One antenna is used to transmit the RF signals, and the

A. Mon Static
B. Multi Static
C. Bi Static
D. None of the above
Answer» C. Bi Static
113.

                              propose a scheme to define labels that can be automatically

A. Semacode
B. RFID
C. IANA
D. IEEE
Answer» A. Semacode
114.

In Smart Device Form Factors, can be spread into physical

A. Smart dust
B. Smart Clay
C. Smart Skins
D. None of the above
Answer» A. Smart dust
115.

In smart device form factors, application of where paint used

A. Smart dust
B. Smart Clay
C. Smart Skins
D. None of the above
Answer» C. Smart Skins
116.

Claytronics project is application of .

A. Smart dust
B. Smart Clay
C. Smart Skins
D. None of the above
Answer» B. Smart Clay
117.

process two or more combined user input modes, such as

A. Multimodal
B. Gesture
C. Reflective
D. Active Interfaces
Answer» A. Multimodal
118.

controller with control action the output of the controller

A. Derivative
B. Integral
C. Proportional
D. None of the above
Answer» A. Derivative
119.

With action, there is a continuous relationship between the

A. Derivative
B. Integral
C. Proportional
D. None of the above
Answer» C. Proportional
120.

can be defined as the manipulation, precision

A. Nano-
B. Ubiquitous
C. MEMS
D. Semacode
Answer» A. Nano-
121.

can be sprayed & embedded throughout the digital

A. Smart dust
B. Smart Clay
C. Smart Skin
D. Smart Object
Answer» A. Smart dust
122.

Which of the following statements about radio frequency identification

A. RFID
B. RFID
C. RFID
D. Companies may
Answer» C. RFID
123.

The wireless networking standard that is useful for creating small personal

A. Toothless
B. Whitetooth
C. Bluetooth
D. None of the
Answer» C. Bluetooth
124.

The transmission medium that consists of strands of clear glass fibre, each of

A. Fiber Optics
B. Twisted
C. Microwave
D. None of the
Answer» A. Fiber Optics
125.

The device that is required to translate digital signals into analogue form and

A. Connector
B. Modem
C. Switch
D. Router
Answer» B. Modem
126.

The TCP/IP layer that is responsible for providing the communication and

A. Application
B. Transport
C. Network
D. Data Link Layer
Answer» B. Transport
127.

The method of slicing digital messages into parcels, sending them along

A. TCP/IP
B. Packet
C. Data
D. Client Server
Answer» B. Packet
128.

Which of the following businesses benefit and implemented RFID?

A. Logistics
B. Building
C. IT
D. All of the above
Answer» D. All of the above
129.

There are basic types of chips available on RFID tags.

A. Two
B. Three
C. Five
D. Seven
Answer» A. Two
130.

Does RFID have the ability to read many tags together at once?

A. Yes
B. No
C. May Be
D. Neutral
Answer» A. Yes
131.

The information on read-only chips be changed.

A. Can
B. Cannot
C. Sometimes
D. None of the above
Answer» B. Cannot
132.

A reader may have multiple antennas that are responsible for sending and

A. True
B. False
Answer» A. True
133.

Which of the following is not RFID type?

A. Ultra-Low
B. Low
C. High
D. Ultra-High
Answer» A. Ultra-Low
134.

occurs when many tags are present in a small area; but since

A. RFID reader
B. RFID Tag
C. RFID
D. None of the
Answer» B. RFID Tag
135.

Which of the following is correct for tactile sensors?

A. Touch
B. Pressure
C. Input
D. Humidity
Answer» A. Touch
136.

Change in output of sensor with change in input is

A. Threshold
B. Slew rate
C. Sensitivity
D. None of the
Answer» C. Sensitivity
137.

Thermocouple generate output voltage according to

A. Circuit
B. Humidity
C. Temperature
D. Voltage
Answer» C. Temperature
138.

Sensor is a type of transducer.

A. True
B. False
Answer» A. True
139.

Which of the following is not an analog sensor?

A. Potentiometer
B. Force-sensing resistors
C. Accelerometer s
D. None of the mentioned
Answer» D. None of the mentioned
140.

Following acts as detector in Optical sensor

A. Light
B. Photo
C. Transistor
D. All of above
Answer» B. Photo
141.

Following is (are) the type(s) of Light sensor(s)

A. Photo
B. Photo
C. Photo
D. All of above
Answer» D. All of above
142.

In real time operating system

A. all processes
B. a task must
C. process
D. kernel is not
Answer» B. a task must
143.

Hard real time operating system has jitter than a soft real

A. Less
B. More
C. Equal
D. None of above
Answer» A. Less
144.

For real time operating systems, interrupt latency should be

A. Minimal
B. Maximum
C. Zero
D. Dependent onscheduling
Answer» A. Minimal
145.

Which one of the following is a real time operating system?

A. RTLinux
B. VxWorks
C. Windows
D. All of above
Answer» D. All of above
146.

Drives are also known as

A. Actuators
B. Controller
C. Sensors
D. Manipulator
Answer» A. Actuators
147.

The main objective(s) of Industrial robot is to

A. Tominimize the
B. To increaseproductivity
C. To enhancethe life of
D. All of the above
Answer» D. All of the above
148.

                               deals with the protection of an individual’s information which is implemented while using

A. Digital agony
B. Digital privacy
C. Digital secrecy
D. Digital protection
Answer» B. Digital privacy
149.

Which of the following statements are true in case of privacy.

A. It is product of norms, legal protections and activities.
B. IT is a state type in which the identity and personal information of a person is kept confidential.
C. Privacy of an entity is the result of negotiating and enforcing when, how, to what extent and in
D. All above statements are true.
Answer» D. All above statements are true.
150.

involves the revelation of truthful

A. Breach of confidentially.
B. Disclosure
C. Exposure
D. Increased accessibility
Answer» B. Disclosure
151.

is breaking the promise to stay a person’s data confidential.

A. Breach of confidentially.
B. Disclosure
C. Exposure
D. Increased accessibility
Answer» A. Breach of confidentially.
152.

A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic-filtering rules is

A. Gateways
B. Proxy
C. Firewall
D. DNS
Answer» C. Firewall
153.

In , there ought as far as possible to the accumulation of individual information and any such information ought to be gotten by legal and reasonable means and where suitable with the learning or

A. Gathering Limitation Principle
B. Information Quality Principle
C. Reason Specification Principle
D. Utilize Limitation Principle.
Answer» A. Gathering Limitation Principle
154.

In , individual information ought to be applicable to the reasons for which they are to be utilized and to the degree important for those reasons, ought to be

A. Gathering Limitation Principle
B. Information Quality Principle
C. Reason Specification Principle
D. Utilize Limitation Principle.
Answer» B. Information Quality Principle
155.

In , reasons for which personal information are gathered ought to be indicated not later than at the season of information accumulation and the consequent utilize constrained to the satisfaction of those reasons or such others are not inconsistent with those

A. Gathering Limitation Principle
B. Information Quality Principle
C. Reason Specification Principle
D. Utilize Limitation Principle.
Answer» C. Reason Specification Principle
156.

In , individual information ought not be unveiled , made accessible or generally utilized for purposes as per purpose specification rule.

A. Gathering Limitation Principle
B. Information Quality Principle
C. Reason Specification Principle
D. Utilize Limitation Principle.
Answer» D. Utilize Limitation Principle.
157.

Systems used to track and identify the location of objects in real time is                                            

A. Geolocation
B. geographical information
C. Wireless Application
D. Real-time location system (RTLS)
Answer» D. Real-time location system (RTLS)
158.

Gateway to the Internet optimized for mobility

A. Voice Portal
B. Wi-Max
C. Mobile Enterprise
D. Mobile Portal
Answer» D. Mobile Portal
159.

automatically identifying a Web user's location

A. Voice Portal
B. Geolocation
C. Sensor Network
D. Wi-Max
Answer» B. Geolocation
160.

Computing capabilities embedded into objects around us (mobile and stationary)                            

A. pervasive computing
B. ubiquitous computing
C. Context-aware computing
D. None of above
Answer» B. ubiquitous computing
161.

Computing capabilities embedded in the environment but typically not mobile

A. pervasive computing
B. Mobile Portal
C. Context-aware computing
D. None of above
Answer» A. pervasive computing
162.

A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes                        

A. Voice Portal
B. Mobile Portal
C. Geolocation
D. Sensor Network
Answer» D. Sensor Network
163.

short-range radio frequency communication technology for remotely storing and retrieving data using devices called RFID tags and RFID readers

A. Network Based Positioning
B. Real Time Location Systems
C. Radio Frequency Identification
D. Wireless Network
Answer» C. Radio Frequency Identification
164.

a technology that offers Internet browsing from wireless devices

A. Real Time Location Systems
B. RFID
C. Wireless wide Area Network
D. Wireless Application Protocol
Answer» D. Wireless Application Protocol
165.

a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology

A. Bluetooth
B. Mobile Portal
C. Wi-Max
D. Geolocation
Answer» C. Wi-Max
166.

a wireless version of the Ethernet networking standard

A. Wireless wide area network
B. Wireless local area network
C. Personal area network
D. Body area network
Answer» B. Wireless local area network
167.

computer system capable of integrating, storing, editing, analyzing, sharing, and displaying geographically referenced (spatial) information

A. Personal area network
B. Body area network
C. Bluetooth
D. GIS
Answer» D. GIS
168.

a voice system enables users to request/receive info, enter/change data through a telephone to a computerized

A. Bluetooth
B. Real Time location Systems
C. GIS
D. Interactive Voice response
Answer» D. Interactive Voice response
169.

a telecommunications network that offers wireless coverage over a large geographical area, typically over a cellular phone network

A. Bluetooth
B. Zigbee
C. Wireless Wide Area network
D. WAP
Answer» C. Wireless Wide Area network
170.

ability to detect and react to a set of environmental variables that is described as context (which can be sensor info or

A. Mobile Portal
B. Conext Aware Computing
C. Pervasive Computing
D. Network Based positioning
Answer» B. Conext Aware Computing
171.

a wireless telecommunications network for device-to-device connections within a very short range

A. Wireless Wide Area Network
B. Personal Area Network
C. Wireless Local Area Network
D. Wired Network
Answer» B. Personal Area Network
172.

a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology

A. Wi-FI
B. Wi-Max
C. Bluetooth
D. Wired LAN
Answer» B. Wi-Max
173.

When you use the word it means you are protecting your data from getting disclosed.

A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer» A. Confidentiality
174.

                   is what every individual prefer in terms of physical privacy as well as digital privacy.

A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer» A. Confidentiality
175.

             means the protection of data from modification by unknown users.

A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer» B. Integrity
176.

of information means, only authorised users are capable of accessing the information.

A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer» D. Availability
177.

This helps in identifying the origin of information and

A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer» C. Authentication
178.

Data is used to ensure confidentiality.

A. Encryption
B. Locking
C. Deleting
D. Backup
Answer» A. Encryption
179.

One common way to maintain data availability is

A. Data Clustering
B. Data backup
C. Data Altering
D. Data recovery
Answer» B. Data backup
180.

The First Phase Of Hacking An IT System Is Compromise   Of W hich Foundation Of Security?

A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer» A. Confidentiality
181.

Data integrity means

A. providing first access to stored data
B. ensuring correctness and consistency of
C. providing data sharing
D. none of the above
Answer» B. ensuring correctness and consistency of
182.

Authentication refers to :

A. methods of restricting user access to system
B. controlling access to portions of
C. controlling the operation on the data
D. all of the above
Answer» D. all of the above
183.

                                       does not have any management flow.

A. Synchronous
B. Casual
C. Asynchronous
D. Smart Interaction
Answer» C. Asynchronous
184.

is proving that a message was sent by a certain sender.

A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer» C. Authentication
185.

means hiding contents of a message so that nobody else but the intended recipient can read it.

A. Authenticity
B. Integrity
C. Encryption
D. Availability
Answer» C. Encryption
186.

                                   is the act of taking data and rendering it unreadable to anyone except for the intended recipient. While on the other hand, is the act of a user proving that they are who they are, and that they can

A. Encryption, Decryption
B. Encryption, Availability
C. Authentication, Encryption
D. Encryption, Authentication
Answer» D. Encryption, Authentication
187.

                                 ensures no one other our intended recipient(s) can eavesdrop on the message while                              provides confidentiality by scrambling the

A. Encryption, Decryption
B. Encryption, Availability
C. Authentication, Encryption
D. Confidentiality, Encryption
Answer» D. Confidentiality, Encryption
188.

ensures no one can alter the message before our intended recipient(s) sees it.

A. Authenticity
B. Integrity
C. Encryption
D. Availability
Answer» B. Integrity
189.

ensures that the message really came from the supposed sender.

A. Authenticity
B. Integrity
C. Encryption
D. Availability
Answer» A. Authenticity
190.

Digital signatures combined with digital certificates provide                          by giving the recipient(s) a way to tie the message to an individual or entity who signed the message.

A. Authenticity
B. Integrity
C. Encryption
D. Availability
Answer» A. Authenticity
191.

                               transforms meaningful data into what looks like gibberish using a secret that can also be used to reverse the process. Reversing the process is called

A. Encryption, Decryption
B. Encryption, Availability
C. Authentication, Encryption
D. Confidentiality, Encryption
Answer» A. Encryption, Decryption
192.

                        is the process of convincing a gatekeeper that you are who you say you are, typically by proving that you know a secret, I.e. password, captcha

A. Authenticity
B. Integrity
C. Encryption
D. Availability
Answer» A. Authenticity
193.

A collection of nodes used for sensing the environment is known as .

A. Voice Portal
B. Mobile Portal
C. Geolocation
D. Sensor Network
Answer» D. Sensor Network
194.

Sensors are those which require an external excitation signal or a power signal.

A. Active
B. Passive
C. Active and Passive both
D. All of above
Answer» B. Passive
195.

do not require any external power signal and directly generates output response.

A. Active
B. Passive
C. Active and Passive both
D. All of above
Answer» A. Active
196.

is a non-contact type sensor that detects the presence of an object.

A. Temperature
B. Pressure
C. Proximity
D. All of above
Answer» C. Proximity
197.

sensors are light based sensor that are used in various applications like Proximity and Object

A. Temperature
B. Pressure
C. Infrared
D. None of above
Answer» C. Infrared
198.

This is not included as a main 3 properties for UbiCom Systems were proposed by Weiser in 1991.

A. Computers need to be networked, distributed and transparently accessible
B. Computer Interaction with Humans needs to be more hidden
C. Computers need to be aware of environment context
D. Computers can operate autonomously, without human intervention, be self-governed
Answer» D. Computers can operate autonomously, without human intervention, be self-governed
199.

This is not included as a properties of Ubiquitous Computing

A. Remote
B. Autonomous
C. Distributed
D. Intelligent
Answer» A. Remote
200.

In ubicomp system Model , Smart DEI where DEI stands for

A. Devices, Environment, Interfaces
B. Devices, Environment, Interactions
C. Distributed, Energy Saving, Intelligent
D. Digital, Environment, Intelligent
Answer» B. Devices, Environment, Interactions
Tags
  • Question and answers in Ubiquitous Computing System (UCS),
  • Ubiquitous Computing System (UCS) multiple choice questions and answers,
  • Ubiquitous Computing System (UCS) Important MCQs,
  • Solved MCQs for Ubiquitous Computing System (UCS),
  • Ubiquitous Computing System (UCS) MCQs with answers PDF download