115
68.9k

340+ Ubiquitous Computing System (UCS) Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) .

151.

is breaking the promise to stay a person’s data confidential.

A. Breach of confidentially.
B. Disclosure
C. Exposure
D. Increased accessibility
Answer» A. Breach of confidentially.
152.

A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic-filtering rules is

A. Gateways
B. Proxy
C. Firewall
D. DNS
Answer» C. Firewall
153.

In , there ought as far as possible to the accumulation of individual information and any such information ought to be gotten by legal and reasonable means and where suitable with the learning or

A. Gathering Limitation Principle
B. Information Quality Principle
C. Reason Specification Principle
D. Utilize Limitation Principle.
Answer» A. Gathering Limitation Principle
154.

In , individual information ought to be applicable to the reasons for which they are to be utilized and to the degree important for those reasons, ought to be

A. Gathering Limitation Principle
B. Information Quality Principle
C. Reason Specification Principle
D. Utilize Limitation Principle.
Answer» B. Information Quality Principle
155.

In , reasons for which personal information are gathered ought to be indicated not later than at the season of information accumulation and the consequent utilize constrained to the satisfaction of those reasons or such others are not inconsistent with those

A. Gathering Limitation Principle
B. Information Quality Principle
C. Reason Specification Principle
D. Utilize Limitation Principle.
Answer» C. Reason Specification Principle
156.

In , individual information ought not be unveiled , made accessible or generally utilized for purposes as per purpose specification rule.

A. Gathering Limitation Principle
B. Information Quality Principle
C. Reason Specification Principle
D. Utilize Limitation Principle.
Answer» D. Utilize Limitation Principle.
157.

Systems used to track and identify the location of objects in real time is                                            

A. Geolocation
B. geographical information
C. Wireless Application
D. Real-time location system (RTLS)
Answer» D. Real-time location system (RTLS)
158.

Gateway to the Internet optimized for mobility

A. Voice Portal
B. Wi-Max
C. Mobile Enterprise
D. Mobile Portal
Answer» D. Mobile Portal
159.

automatically identifying a Web user's location

A. Voice Portal
B. Geolocation
C. Sensor Network
D. Wi-Max
Answer» B. Geolocation
160.

Computing capabilities embedded into objects around us (mobile and stationary)                            

A. pervasive computing
B. ubiquitous computing
C. Context-aware computing
D. None of above
Answer» B. ubiquitous computing
161.

Computing capabilities embedded in the environment but typically not mobile

A. pervasive computing
B. Mobile Portal
C. Context-aware computing
D. None of above
Answer» A. pervasive computing
162.

A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes                        

A. Voice Portal
B. Mobile Portal
C. Geolocation
D. Sensor Network
Answer» D. Sensor Network
163.

short-range radio frequency communication technology for remotely storing and retrieving data using devices called RFID tags and RFID readers

A. Network Based Positioning
B. Real Time Location Systems
C. Radio Frequency Identification
D. Wireless Network
Answer» C. Radio Frequency Identification
164.

a technology that offers Internet browsing from wireless devices

A. Real Time Location Systems
B. RFID
C. Wireless wide Area Network
D. Wireless Application Protocol
Answer» D. Wireless Application Protocol
165.

a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology

A. Bluetooth
B. Mobile Portal
C. Wi-Max
D. Geolocation
Answer» C. Wi-Max
166.

a wireless version of the Ethernet networking standard

A. Wireless wide area network
B. Wireless local area network
C. Personal area network
D. Body area network
Answer» B. Wireless local area network
167.

computer system capable of integrating, storing, editing, analyzing, sharing, and displaying geographically referenced (spatial) information

A. Personal area network
B. Body area network
C. Bluetooth
D. GIS
Answer» D. GIS
168.

a voice system enables users to request/receive info, enter/change data through a telephone to a computerized

A. Bluetooth
B. Real Time location Systems
C. GIS
D. Interactive Voice response
Answer» D. Interactive Voice response
169.

a telecommunications network that offers wireless coverage over a large geographical area, typically over a cellular phone network

A. Bluetooth
B. Zigbee
C. Wireless Wide Area network
D. WAP
Answer» C. Wireless Wide Area network
170.

ability to detect and react to a set of environmental variables that is described as context (which can be sensor info or

A. Mobile Portal
B. Conext Aware Computing
C. Pervasive Computing
D. Network Based positioning
Answer» B. Conext Aware Computing
171.

a wireless telecommunications network for device-to-device connections within a very short range

A. Wireless Wide Area Network
B. Personal Area Network
C. Wireless Local Area Network
D. Wired Network
Answer» B. Personal Area Network
172.

a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology

A. Wi-FI
B. Wi-Max
C. Bluetooth
D. Wired LAN
Answer» B. Wi-Max
173.

When you use the word it means you are protecting your data from getting disclosed.

A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer» A. Confidentiality
174.

                   is what every individual prefer in terms of physical privacy as well as digital privacy.

A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer» A. Confidentiality
175.

             means the protection of data from modification by unknown users.

A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer» B. Integrity
176.

of information means, only authorised users are capable of accessing the information.

A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer» D. Availability
177.

This helps in identifying the origin of information and

A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer» C. Authentication
178.

Data is used to ensure confidentiality.

A. Encryption
B. Locking
C. Deleting
D. Backup
Answer» A. Encryption
179.

One common way to maintain data availability is

A. Data Clustering
B. Data backup
C. Data Altering
D. Data recovery
Answer» B. Data backup
180.

The First Phase Of Hacking An IT System Is Compromise   Of W hich Foundation Of Security?

A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer» A. Confidentiality
181.

Data integrity means

A. providing first access to stored data
B. ensuring correctness and consistency of
C. providing data sharing
D. none of the above
Answer» B. ensuring correctness and consistency of
182.

Authentication refers to :

A. methods of restricting user access to system
B. controlling access to portions of
C. controlling the operation on the data
D. all of the above
Answer» D. all of the above
183.

                                       does not have any management flow.

A. Synchronous
B. Casual
C. Asynchronous
D. Smart Interaction
Answer» C. Asynchronous
184.

is proving that a message was sent by a certain sender.

A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer» C. Authentication
185.

means hiding contents of a message so that nobody else but the intended recipient can read it.

A. Authenticity
B. Integrity
C. Encryption
D. Availability
Answer» C. Encryption
186.

                                   is the act of taking data and rendering it unreadable to anyone except for the intended recipient. While on the other hand, is the act of a user proving that they are who they are, and that they can

A. Encryption, Decryption
B. Encryption, Availability
C. Authentication, Encryption
D. Encryption, Authentication
Answer» D. Encryption, Authentication
187.

                                 ensures no one other our intended recipient(s) can eavesdrop on the message while                              provides confidentiality by scrambling the

A. Encryption, Decryption
B. Encryption, Availability
C. Authentication, Encryption
D. Confidentiality, Encryption
Answer» D. Confidentiality, Encryption
188.

ensures no one can alter the message before our intended recipient(s) sees it.

A. Authenticity
B. Integrity
C. Encryption
D. Availability
Answer» B. Integrity
189.

ensures that the message really came from the supposed sender.

A. Authenticity
B. Integrity
C. Encryption
D. Availability
Answer» A. Authenticity
190.

Digital signatures combined with digital certificates provide                          by giving the recipient(s) a way to tie the message to an individual or entity who signed the message.

A. Authenticity
B. Integrity
C. Encryption
D. Availability
Answer» A. Authenticity
191.

                               transforms meaningful data into what looks like gibberish using a secret that can also be used to reverse the process. Reversing the process is called

A. Encryption, Decryption
B. Encryption, Availability
C. Authentication, Encryption
D. Confidentiality, Encryption
Answer» A. Encryption, Decryption
192.

                        is the process of convincing a gatekeeper that you are who you say you are, typically by proving that you know a secret, I.e. password, captcha

A. Authenticity
B. Integrity
C. Encryption
D. Availability
Answer» A. Authenticity
193.

A collection of nodes used for sensing the environment is known as .

A. Voice Portal
B. Mobile Portal
C. Geolocation
D. Sensor Network
Answer» D. Sensor Network
194.

Sensors are those which require an external excitation signal or a power signal.

A. Active
B. Passive
C. Active and Passive both
D. All of above
Answer» B. Passive
195.

do not require any external power signal and directly generates output response.

A. Active
B. Passive
C. Active and Passive both
D. All of above
Answer» A. Active
196.

is a non-contact type sensor that detects the presence of an object.

A. Temperature
B. Pressure
C. Proximity
D. All of above
Answer» C. Proximity
197.

sensors are light based sensor that are used in various applications like Proximity and Object

A. Temperature
B. Pressure
C. Infrared
D. None of above
Answer» C. Infrared
198.

This is not included as a main 3 properties for UbiCom Systems were proposed by Weiser in 1991.

A. Computers need to be networked, distributed and transparently accessible
B. Computer Interaction with Humans needs to be more hidden
C. Computers need to be aware of environment context
D. Computers can operate autonomously, without human intervention, be self-governed
Answer» D. Computers can operate autonomously, without human intervention, be self-governed
199.

This is not included as a properties of Ubiquitous Computing

A. Remote
B. Autonomous
C. Distributed
D. Intelligent
Answer» A. Remote
200.

In ubicomp system Model , Smart DEI where DEI stands for

A. Devices, Environment, Interfaces
B. Devices, Environment, Interactions
C. Distributed, Energy Saving, Intelligent
D. Digital, Environment, Intelligent
Answer» B. Devices, Environment, Interactions

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.