McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) .
151. |
is breaking the promise to stay a person’s data confidential. |
A. | Breach of confidentially. |
B. | Disclosure |
C. | Exposure |
D. | Increased accessibility |
Answer» A. Breach of confidentially. |
152. |
A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic-filtering rules is |
A. | Gateways |
B. | Proxy |
C. | Firewall |
D. | DNS |
Answer» C. Firewall |
153. |
In , there ought as far as possible to the accumulation of individual information and any such information ought to be gotten by legal and reasonable means and where suitable with the learning or |
A. | Gathering Limitation Principle |
B. | Information Quality Principle |
C. | Reason Specification Principle |
D. | Utilize Limitation Principle. |
Answer» A. Gathering Limitation Principle |
154. |
In , individual information ought to be applicable to the reasons for which they are to be utilized and to the degree important for those reasons, ought to be |
A. | Gathering Limitation Principle |
B. | Information Quality Principle |
C. | Reason Specification Principle |
D. | Utilize Limitation Principle. |
Answer» B. Information Quality Principle |
155. |
In , reasons for which personal information are gathered ought to be indicated not later than at the season of information accumulation and the consequent utilize constrained to the satisfaction of those reasons or such others are not inconsistent with those |
A. | Gathering Limitation Principle |
B. | Information Quality Principle |
C. | Reason Specification Principle |
D. | Utilize Limitation Principle. |
Answer» C. Reason Specification Principle |
156. |
In , individual information ought not be unveiled , made accessible or generally utilized for purposes as per purpose specification rule. |
A. | Gathering Limitation Principle |
B. | Information Quality Principle |
C. | Reason Specification Principle |
D. | Utilize Limitation Principle. |
Answer» D. Utilize Limitation Principle. |
157. |
Systems used to track and identify the location of objects in real time is |
A. | Geolocation |
B. | geographical information |
C. | Wireless Application |
D. | Real-time location system (RTLS) |
Answer» D. Real-time location system (RTLS) |
158. |
Gateway to the Internet optimized for mobility |
A. | Voice Portal |
B. | Wi-Max |
C. | Mobile Enterprise |
D. | Mobile Portal |
Answer» D. Mobile Portal |
159. |
automatically identifying a Web user's location |
A. | Voice Portal |
B. | Geolocation |
C. | Sensor Network |
D. | Wi-Max |
Answer» B. Geolocation |
160. |
Computing capabilities embedded into objects around us (mobile and stationary) |
A. | pervasive computing |
B. | ubiquitous computing |
C. | Context-aware computing |
D. | None of above |
Answer» B. ubiquitous computing |
161. |
Computing capabilities embedded in the environment but typically not mobile |
A. | pervasive computing |
B. | Mobile Portal |
C. | Context-aware computing |
D. | None of above |
Answer» A. pervasive computing |
162. |
A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes |
A. | Voice Portal |
B. | Mobile Portal |
C. | Geolocation |
D. | Sensor Network |
Answer» D. Sensor Network |
163. |
short-range radio frequency communication technology for remotely storing and retrieving data using devices called RFID tags and RFID readers |
A. | Network Based Positioning |
B. | Real Time Location Systems |
C. | Radio Frequency Identification |
D. | Wireless Network |
Answer» C. Radio Frequency Identification |
164. |
a technology that offers Internet browsing from wireless devices |
A. | Real Time Location Systems |
B. | RFID |
C. | Wireless wide Area Network |
D. | Wireless Application Protocol |
Answer» D. Wireless Application Protocol |
165. |
a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology |
A. | Bluetooth |
B. | Mobile Portal |
C. | Wi-Max |
D. | Geolocation |
Answer» C. Wi-Max |
166. |
a wireless version of the Ethernet networking standard |
A. | Wireless wide area network |
B. | Wireless local area network |
C. | Personal area network |
D. | Body area network |
Answer» B. Wireless local area network |
167. |
computer system capable of integrating, storing, editing, analyzing, sharing, and displaying geographically referenced (spatial) information |
A. | Personal area network |
B. | Body area network |
C. | Bluetooth |
D. | GIS |
Answer» D. GIS |
168. |
a voice system enables users to request/receive info, enter/change data through a telephone to a computerized |
A. | Bluetooth |
B. | Real Time location Systems |
C. | GIS |
D. | Interactive Voice response |
Answer» D. Interactive Voice response |
169. |
a telecommunications network that offers wireless coverage over a large geographical area, typically over a cellular phone network |
A. | Bluetooth |
B. | Zigbee |
C. | Wireless Wide Area network |
D. | WAP |
Answer» C. Wireless Wide Area network |
170. |
ability to detect and react to a set of environmental variables that is described as context (which can be sensor info or |
A. | Mobile Portal |
B. | Conext Aware Computing |
C. | Pervasive Computing |
D. | Network Based positioning |
Answer» B. Conext Aware Computing |
171. |
a wireless telecommunications network for device-to-device connections within a very short range |
A. | Wireless Wide Area Network |
B. | Personal Area Network |
C. | Wireless Local Area Network |
D. | Wired Network |
Answer» B. Personal Area Network |
172. |
a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology |
A. | Wi-FI |
B. | Wi-Max |
C. | Bluetooth |
D. | Wired LAN |
Answer» B. Wi-Max |
173. |
When you use the word it means you are protecting your data from getting disclosed. |
A. | Confidentiality |
B. | Integrity |
C. | Authentication |
D. | Availability |
Answer» A. Confidentiality |
174. |
is what every individual prefer in terms of physical privacy as well as digital privacy. |
A. | Confidentiality |
B. | Integrity |
C. | Authentication |
D. | Availability |
Answer» A. Confidentiality |
175. |
means the protection of data from modification by unknown users. |
A. | Confidentiality |
B. | Integrity |
C. | Authentication |
D. | Availability |
Answer» B. Integrity |
176. |
of information means, only authorised users are capable of accessing the information. |
A. | Confidentiality |
B. | Integrity |
C. | Authentication |
D. | Availability |
Answer» D. Availability |
177. |
This helps in identifying the origin of information and |
A. | Confidentiality |
B. | Integrity |
C. | Authentication |
D. | Availability |
Answer» C. Authentication |
178. |
Data is used to ensure confidentiality. |
A. | Encryption |
B. | Locking |
C. | Deleting |
D. | Backup |
Answer» A. Encryption |
179. |
One common way to maintain data availability is |
A. | Data Clustering |
B. | Data backup |
C. | Data Altering |
D. | Data recovery |
Answer» B. Data backup |
180. |
The First Phase Of Hacking An IT System Is Compromise Of W hich Foundation Of Security? |
A. | Confidentiality |
B. | Integrity |
C. | Authentication |
D. | Availability |
Answer» A. Confidentiality |
181. |
Data integrity means |
A. | providing first access to stored data |
B. | ensuring correctness and consistency of |
C. | providing data sharing |
D. | none of the above |
Answer» B. ensuring correctness and consistency of |
182. |
Authentication refers to : |
A. | methods of restricting user access to system |
B. | controlling access to portions of |
C. | controlling the operation on the data |
D. | all of the above |
Answer» D. all of the above |
183. |
does not have any management flow. |
A. | Synchronous |
B. | Casual |
C. | Asynchronous |
D. | Smart Interaction |
Answer» C. Asynchronous |
184. |
is proving that a message was sent by a certain sender. |
A. | Confidentiality |
B. | Integrity |
C. | Authentication |
D. | Availability |
Answer» C. Authentication |
185. |
means hiding contents of a message so that nobody else but the intended recipient can read it. |
A. | Authenticity |
B. | Integrity |
C. | Encryption |
D. | Availability |
Answer» C. Encryption |
186. |
is the act of taking data and rendering it unreadable to anyone except for the intended recipient. While on the other hand, is the act of a user proving that they are who they are, and that they can |
A. | Encryption, Decryption |
B. | Encryption, Availability |
C. | Authentication, Encryption |
D. | Encryption, Authentication |
Answer» D. Encryption, Authentication |
187. |
ensures no one other our intended recipient(s) can eavesdrop on the message while provides confidentiality by scrambling the |
A. | Encryption, Decryption |
B. | Encryption, Availability |
C. | Authentication, Encryption |
D. | Confidentiality, Encryption |
Answer» D. Confidentiality, Encryption |
188. |
ensures no one can alter the message before our intended recipient(s) sees it. |
A. | Authenticity |
B. | Integrity |
C. | Encryption |
D. | Availability |
Answer» B. Integrity |
189. |
ensures that the message really came from the supposed sender. |
A. | Authenticity |
B. | Integrity |
C. | Encryption |
D. | Availability |
Answer» A. Authenticity |
190. |
Digital signatures combined with digital certificates provide by giving the recipient(s) a way to tie the message to an individual or entity who signed the message. |
A. | Authenticity |
B. | Integrity |
C. | Encryption |
D. | Availability |
Answer» A. Authenticity |
191. |
transforms meaningful data into what looks like gibberish using a secret that can also be used to reverse the process. Reversing the process is called |
A. | Encryption, Decryption |
B. | Encryption, Availability |
C. | Authentication, Encryption |
D. | Confidentiality, Encryption |
Answer» A. Encryption, Decryption |
192. |
is the process of convincing a gatekeeper that you are who you say you are, typically by proving that you know a secret, I.e. password, captcha |
A. | Authenticity |
B. | Integrity |
C. | Encryption |
D. | Availability |
Answer» A. Authenticity |
193. |
A collection of nodes used for sensing the environment is known as . |
A. | Voice Portal |
B. | Mobile Portal |
C. | Geolocation |
D. | Sensor Network |
Answer» D. Sensor Network |
194. |
Sensors are those which require an external excitation signal or a power signal. |
A. | Active |
B. | Passive |
C. | Active and Passive both |
D. | All of above |
Answer» B. Passive |
195. |
do not require any external power signal and directly generates output response. |
A. | Active |
B. | Passive |
C. | Active and Passive both |
D. | All of above |
Answer» A. Active |
196. |
is a non-contact type sensor that detects the presence of an object. |
A. | Temperature |
B. | Pressure |
C. | Proximity |
D. | All of above |
Answer» C. Proximity |
197. |
sensors are light based sensor that are used in various applications like Proximity and Object |
A. | Temperature |
B. | Pressure |
C. | Infrared |
D. | None of above |
Answer» C. Infrared |
198. |
This is not included as a main 3 properties for UbiCom Systems were proposed by Weiser in 1991. |
A. | Computers need to be networked, distributed and transparently accessible |
B. | Computer Interaction with Humans needs to be more hidden |
C. | Computers need to be aware of environment context |
D. | Computers can operate autonomously, without human intervention, be self-governed |
Answer» D. Computers can operate autonomously, without human intervention, be self-governed |
199. |
This is not included as a properties of Ubiquitous Computing |
A. | Remote |
B. | Autonomous |
C. | Distributed |
D. | Intelligent |
Answer» A. Remote |
200. |
In ubicomp system Model , Smart DEI where DEI stands for |
A. | Devices, Environment, Interfaces |
B. | Devices, Environment, Interactions |
C. | Distributed, Energy Saving, Intelligent |
D. | Digital, Environment, Intelligent |
Answer» B. Devices, Environment, Interactions |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.