Ubiquitous Computing System UCS Multiple choice Questions
1. Ubiquitous computing is the method of ……..
A. enhancing computer use by making many computers available throughout the physical environment
B. wireless communication and carry-around computers.
C. allowing transmission of data, voice and video via a computer
D. interact with a variety of users via the internet.
Answer:
A. enhancing computer use by making many computers available throughout the physical environment
2. …………… main properties for UbiCom Systems were proposed by Weiser
A. 1
B. 2
C. 3
D. 4
Answer:
B. 2
3. Which of the following is not a key characteristic of Ubicomp System ?
A. distributed
B. ihci
C. context- awareness
D. pay as you go
Answer:
D. pay as you go
4. Among the various wireless options for wearable devices, which one needs to connect to a smart phone and is the most popular?
A. bluetooth
B. wifi
C. rfid
D. none of the above
Answer:
A. bluetooth
5. When connecting a wearable device to the cloud, what software is required to run a custom service?
A. database
B. operating system
C. http server
D. all of the above
Answer:
D. all of the above
6. What does RFID stand for?
A. radio frequency issue date
B. radio frequency identification
C. rear field identification
D. real far identification
Answer:
B. radio frequency identification
7. What applications run on a SMART Board?
A. any applicaiton on the computer
B. internet browsers like explorer and navigator only
C. powerpoint only
D. powerpoint only
Answer:
A. any applicaiton on the computer
8. The SMART Board Software is called
A. notepage
B. notebook
C. spiral page
D. all of the above
Answer:
B. notebook
9. It takes the output signal from the transmission channel and delivers
A. transmitter
B. transmission channel
C. receiver
D. hardware
Answer:
C. receiver
10. Which of the Following is used in banking industary…..
A. micr
B. omr
C. all of above
D. none of the above
Answer:
A. micr
11. WAP?
A. wireless application protocol
B. wired allication protocol
C. wide application protocol
D. none of the above
Answer:
A. wireless application protocol
12. The tag can be used to activate the task when the user clicks on a word on the screen?
A. true
B. false
C. both
D. none of the above
Answer:
A. true
13. WAP is designed for?
A. internet explorer
B. web browser
C. micro browser
D. macro browser
Answer:
C. micro browser
14. Limitations of Short Messaging Service (SMS)
A. limited to 160 characters or less
B. message latency is one minute or more
C. poor security at the applicationlevel
D. all of the above
Answer:
D. all of the above
15. DoCoMo Stands for ……………
A. documentation over the mobile network
B. do communications over the mobile network
C. documentation & communications over the mobilenetwork
D. none of the above
Answer:
B. do communications over the mobile network
16. Mobile Web Service design often uses a three tier ……………
A. thin client, client proxy, server architecture
B. network, clientproxy, server architecture
C. internet,cilent & server
D. none of the above
Answer:
A. thin client, client proxy, server architecture
17. In J2ME architecture Connected Device Configuration (CDC) provides ……….
A. fundamental services for devices
B. fundamental services for virtual machines
C. both
D. none of the above
Answer:
C. both
18. Java 2 Mobile Environment supports ……………..
A. development of client server system
B. stand alone system designs in which code is developed
C. both
D. none of the above
Answer:
C. both
19. J2ME is a multi layered organisation of software bundles of three types ………….
A. servers,desktop machines & high endconsumer devices
B. configurations, profiles andoptional packages
C. j2ee,j2se & kvm
D. none of the above
Answer:
B. configurations, profiles andoptional packages
20. The .NET Framework consists of two main parts …………
A. common language runtime & unified setof class libraries
B. client & server
C. packeges & class labraries
D. digital packages & digital class labraries
Answer:
A. common language runtime & unified setof class libraries
21. Code written on the .NET Framework platform is called ………..
A. client code
B. managed code
C. server code
D. none of the above
Answer:
B. managed code
22. Managed code …….
A. cannot have bad pointers
B. cannot create memory leaks
C. supports strong code type safety
D. all of the above
Answer:
D. all of the above
23. .NET CF designed specifically for devices, such as ………….
A. smart cards
B. smart wearable devices
C. pdas and smart mobile phones.
D. sensors
Answer:
C. pdas and smart mobile phones.
24. IrDA support ……..
A. sql server ce
B. device specific controls
C. high performance jit compiler
D. all of the above
Answer:
D. all of the above
25. Mobile code is any ………
A. program
B. application
C. content
D. all of the above
Answer:
D. all of the above
26. Sandboxes ……….
A. that limit the local services that code can access.
B. which ensures that code originates from a trusted source.
C. machines that can access the internet
D. that carries explicit proof of its security.
Answer:
A. that limit the local services that code can access.
27. Code Signing ………
A. that limit the local services that code can access.
B. which ensures that code originates from a trusted source.
C. machines that can access the internet
D. that carries explicit proof of its security.
Answer:
B. which ensures that code originates from a trusted source.
28. Firewalls …………
A. that limit the local services that code can access.
B. which ensures that code originates from a trusted source.
C. machines that can access the internet
D. that carries explicit proof of its security.
Answer:
C. machines that can access the internet
29. Proof Carrying Code ……………
A. that limit the local services that code can access.
B. which ensures that code originates from a trusted source.
C. machines that can access the internet
D. that carries explicit proof of its security.
Answer:
D. that carries explicit proof of its security.
30. A smart card …………
A. is a plastic cardembedded with digital memory
B. which store data on magnetic strips
C. is reprogrammable
D. all of the above
Answer:
D. all of the above
31. The primary tasks of a smart card operating system ………….
A. transferring data to and from the smart card
B. controlling the execution of commands
C. managing and executing cryptographicalgorithms
D. all of the above
Answer:
D. all of the above
32. Java Card widely used in ………..
A. sim cards
B. atm cards
C. both
D. none of the above
Answer:
C. both
33. The Home Electronic System (HES) defines the system
components ………
A. residential gateway, homegate
B. standard interfaces
C. both
D. none of the above
Answer:
C. both
34. Jini consists of three Java language protocols ……………
A. discovery, join and lookup
B. discovery, configuration andlookup
C. discovery, join and installation
D. find , join and lookup
Answer:
A. discovery, join and lookup
35. UPnP Stands for ……….
A. united plug and play protocol
B. undirectional plug and play protocol
C. universal plug and play protocol
D. unidirectional plug and play protocol
Answer:
C. universal plug and play protocol
36. Benefit of UPnP ………….
A. media and deviceindependence
B. platformindependence
C. internet-basedtechnologies
D. all of the above
Answer:
D. all of the above
37. OSGi’s core component is ………..
A. server
B. bundle
C. node
D. gateway
Answer:
B. bundle
38. A MANIFEST.MF file located in
the …….. directory .
A. general graph directory
B. acyclic graphdirectory
C. single-level
D. meta-inf
Answer:
D. meta-inf
39. Service Oriented Architectures
Functions ,,,,,,,,,,,,,,
A. service discovery
B. service invocation
C. servicemanagement
D. all of the above
Answer:
D. all of the above
40. Service Provision Life-Cycle – Creation Phase ………..
A. service processes register themselves in service directories.
B. services are invoked and multiple interlinked services may need to becoordinated
C. service processes, access configurations and servicecompositions
D. services may be put off line or terminated temporarily or permanently.
Answer:
A. service processes register themselves in service directories.
41. Service Provision Life-Cycle – Execution Phase ………..
A. service processes register themselves in service directories.
B. services are invoked and multiple interlinked servicesmay need to be coordinated
C. service processes, access configurationsand service compositions
D. services may be put off line or terminated temporarily or permanently.
Answer:
B. services are invoked and multiple interlinked servicesmay need to be coordinated
42. Service Provision Life-Cycle – Maintenance Phase ………
A. service processes register themselves in service directories.
B. services are invoked and multiple interlinked services may need to becoordinated
C. service processes, access configurations and servicecompositions
D. services may be put off line or terminated temporarily or permanently.
Answer:
C. service processes, access configurations and servicecompositions
43. Service Provision Life-Cycle – Dissolution Phase ………..
A. service processes register themselves in service directories.
B. services are invoked and multiple interlinked services may need to becoordinated
C. service processes, access configurations and servicecompositions
D. services may be put off line or terminated temporarily or permanently.
Answer:
D. services may be put off line or terminated temporarily or permanently.
44. Life-Cycle for Tagging Physical Objects …………..
A. capturing a physicalview or some object feature
B. identifying physical objects
C. anchoring or relating objects
D. all of the above
Answer:
D. all of the above
45. Types of active RFID tags are
……….
A. transmitter & receiver
B. transponders and beacons
C. transmiter & reader
D. none of the above
Answer:
B. transponders and beacons
46. Active transponders are woken up
…………..
A. no power source and no active transmitter
B. they typically have a read range of 20 100m
C. when they receive a signal from areader
D. none of the above
Answer:
C. when they receive a signal from areader
47. Passive RFID – Transponders can be packaged …..
A. sandwiched between an adhesive layer and apaper label
B. embedded in a plastic card
C. both a&b
D. none of the above
Answer:
C. both a&b
48. Sensors Primary Functions ……….
A. instrument and monitor environments
B. detect changes in the environment
C. control a systemwith respect to the environment
D. all of the above
Answer:
D. all of the above
49. Sensors Nodes ……
A. common nodes
B. sink nodes
C. gateway nodes
D. all of the above
Answer:
D. all of the above
50. Sensors Common Nodes …….
A. mainly responsible for collecting sensor data.
B. that are responsible for receiving, storing, processing, aggregating data
C. that connect sink nodes to external entities
D. none of the above
Answer:
A. mainly responsible for collecting sensor data.
51. Micro-Electro-Mechanical Systems (MEMS) consists of
………..
A. microelectronic elements
B. actuators, sensors
C. mechanical structures
D. all of the above
Answer:
D. all of the above
52. Micro-Electro-Mechanical Systems (MEMS) developed using
……….. techniques
A. fabrication
B. microfabrication
C. etching
D. none of the above
Answer:
B. microfabrication
53. The most common forms of
production for MEMS are ………..
A. bulk micromachining
B. surfacemicromachining
C. har fabrication
D. all of the above
Answer:
D. all of the above
54. The main components of robots
are ………..
A. end effectors oractuators
B. controller
C. sensors
D. all of the above
Answer:
D. all of the above
55. Which phase is not a part of development of Human-Centred
Design Life-Cycle .
A. requirement gathering and analysis
B. modelling and design
C. configurations & optional packages
D. implementation and testing.
Answer:
C. configurations & optional packages
56. Head(s) Up Display or HUD is
………..
A. any type of display that presents data without blocking the user’s view
B. the user looks through a display element attached to the airframe or vehicle chassis
C. that is worn in front of the eye that acts as a camera to record the scene available to the eye, and acts as adisplay
D. none of the above
Answer:
A. any type of display that presents data without blocking the user’s view
57. Gestures are expressive, meaningful body motions involving physical movements of the fingers, hands, arms, head,
face, or body.
A. true
B. false
Answer:
A. true
58. Sensors used in gestures ……..
A. magnetic field trackers
B. accelerometers
C. gyroscopes
D. all of the above
Answer:
D. all of the above
59. In Solove’s taxonomy of privacy
Surveillance & Interrogation is a part of ……….
A. information collection
B. information processing
C. information dissemination
D. invasion
Answer:
A. information collection
60. In Solove’s taxonomy of privacy
Aggregation & Identification is a part of ……….
A. information collection
B. information processing
C. information dissemination
D. invasion
Answer:
B. information processing
61. Breach of confidentiality is
…………
A. is the threat to disclose personal information
B. is breaking the promise to keep a person’s informationconfidential.
C. is amplifying the accessibility of information.
D. none of the above
Answer:
B. is breaking the promise to keep a person’s informationconfidential.
62. Decisional interference involves
………….
A. revealing another’s nudity, grief, or bodily functions
B. the revelation of truthful information about a person
C. the government’s incursion into people’s decisionsregarding their private affairs
D. the dissemination of certain information about a person to servethe aims and interests of another
Answer:
C. the government’s incursion into people’s decisionsregarding their private affairs
63. RFID privacy challenges ………
A. automation & identification
B. identification & authentication
C. integration & automation
D. all of the above
Answer:
D. all of the above
64. Clandestine Scanning is …………..
A. the tag data is scanned without the tag carrier’s consent.
B. the tag data is scanned for informationprocessing
C. both a&b
D. none of the above
Answer:
A. the tag data is scanned without the tag carrier’s consent.
65. PSTN stands for
A. public switched telephone network
B. personal switched telephone network
C. personal switched telephone node
D. public switched telephone node
Answer:
A. public switched telephone network
66. PSTN is and wireless networks are
A. highly dynamic, virtually static
B. static, virtually static
C. highly dynamic, virtually dynamic
D. virtually static, highly dynamic
Answer:
D. virtually static, highly dynamic
67. In public switched telephone network, LATA stands for
A. local access and transport area
B. land area and transport area
C. local access and telephone access
D. local area and telephone access
Answer:
A. local access and transport area
68. LATAs are connected by a
company called
A. land exchange carrier
B. local exchangecarrier
C. local controlexchange
D. land area exchange
Answer:
B. local exchangecarrier
69. A long distance telephone company that collects toll is called
A. lata
B. lec
C. pstn
D. ixc
Answer:
D. ixc
70. The technique for separate but parallel signalling channel is
called
A. common channel signalling
B. forward channel signalling
C. reverse channel signalling
D. separate channel signalling
Answer:
A. common channel signalling
71. ADLS Broadband stands for
A. asynchronous digital subscriber line
B. asemetric digital subscriber line
C. asynchronous doublesubscriber line
D. asynchronous data subscriber line
Answer:
A. asynchronous digital subscriber line
72. US cellular standard CDPD stands for
A. cellular digital packet data
B. cellular digital packet data
C. cellular digital pocket data
D. cellular discrete pocket data
Answer:
A. cellular digital packet data
73. What are the Methods to move
data through a network of links and switches?
A. packet switching and line switching
B. circuit switching and line switching
C. line switching and bit switching
D. packet switching and circuit switching
Answer:
D. packet switching and circuit switching
74. In systems, resources
are allocated on demand.
A. packet switching
B. circuit switching
C. line switching
D. frequency switching
Answer:
A. packet switching
75. WiMAX stands for
A. wireless maximum communication
B. worldwide interoperability for microwave access
C. worldwide international standard formicrowave access
D. wireless internet maximum communication
Answer:
B. worldwide interoperability for microwave access
76. WiMAX provides
A. simplex communication
B. half duplex communication
C. full duplex communication
D. no communication
Answer:
C. full duplex communication
77. Which of the following modulation schemes is supported
by WiMAX?
A. binary phase shift keying modulation
B. quadrature phase shift keyingmodulation
C. quadrature amplitudemodulation
D. all of the mentioned
Answer:
D. all of the mentioned
78. WiMAX provides
A. voip services
B. iptv services
C. both voip andiptv services
D. no iptv services
Answer:
C. both voip andiptv services
79. Which of the following frequencies is not used in WiMAX
for communication?
A. 2.3 ghz
B. 2.4 ghz
C. 2.5 ghz
D. 3.5 ghz
Answer:
B. 2.4 ghz
80. What is the access point (AP) in a wireless LAN?
A. device that allows wireless devices to connect to a wired network
B. wireless devices itself
C. both device that allows wireless devices to connect to a wired
D. all the nodes in the network
Answer:
A. device that allows wireless devices to connect to a wired network
81. Which multiple access technique
is used by IEEE 802.11 standard for wireless LAN?
A. cdma
B. csma/ca
C. aloha
D. csma/cd
Answer:
B. csma/ca
82. Mostly is used in wireless LAN.
A. time division multiplexing
B. orthogonalfrequency division multiplexing
C. space division multiplexing
D. channel division multiplexing
Answer:
B. orthogonalfrequency division multiplexing
83. What is WPA?
A. wi-fi protected access
B. wired protectedaccess
C. wired processaccess
D. wi-fi process access
Answer:
A. wi-fi protected access
84. In
Bluetooth,multiple form a network called a ————
A. scatternet; piconets
B. piconets: scatternet
C. piconets: bluenet
D. bluenet; scatternet
Answer:
B. piconets: scatternet
85. The bluetooth supports
A. point-to-point connections
B. point-to-multipoint connection
C. both (a) and (b)
D. none of the above
Answer:
C. both (a) and (b)
86. Frequency range supported in
Zigbee ………….
A. 2.4 ghz worldwide
B. 2.0 ghz worldwide
C. 2.1 ghzworldwide
D. 3.4 ghz worldwide
Answer:
A. 2.4 ghz worldwide
87. There is more than …………… cell
nodes in zigbee.
A. 66000
B. 65000
C. 60000
D. 70000
Answer:
B. 65000
88. ZigBee developed under …………..
A. ieee 802.15.1.
B. ieee 802.15.2.
C. ieee 802.15.3.
D. ieee 802.15.4.
Answer:
D. ieee 802.15.4.
89. A Body Area Network or BAN consists ……………
A. wireless devices to connect to a wirednetwork
B. set of mobile and compact sensors
C. sensors & communicationdevices
D. wearable device & sensors
Answer:
B. set of mobile and compact sensors
90. Body Area Network requirements
……….
A. low powerconsumption & interoperability
B. self-healing & security
C. low latency
D. all of the above
Answer:
D. all of the above
91. Find out wrong stament of Body Area Network……………
A. sensors are put on patient’s body to monitor heart rate, blood pressure and ecg.
B. provides healthcare services over a long distance with the help of it and communication.
C. sensors can be used to measure navigation, timer, distance, pulse rate and bodytemperature.
D. allowing transmission of data, voice and video via a computer
Answer:
D. allowing transmission of data, voice and video via a computer
92. WBAN(Wireless Body Area Network) allows the user to move another without having the restriction of a cable for sharing
information.
A. true
B. false
Answer:
A. true
93. Which of the following standard committee specifies Bluetooth and other Personal Area Networks
(PAN)?
A. ieee 802.11b
B. ieee 802.15.2.
C. ieee 802.11g
D. ieee 802.16
Answer:
B. ieee 802.15.2.
94. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as
A. chock point
B. meeting point
C. firewall point
D. secure point
Answer:
A. chock point
95. A proxy firewall filters at
A. physical layer
B. data link layer
C. network layer
D. application layer
Answer:
D. application layer
96. A firewall needs to be
so that it can grow proportionally with the network that it protects.
A. robust
B. expansive
C. fast
D. scalable
Answer:
B. expansive
97. provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to
the private network.
A. visual private network
B. virtual protocol network
C. virtual protocol networking
D. virtual private network
Answer:
D. virtual private network
98. Which of the statements are not true to classify VPN systems?
A. protocols used for tunnelling the traffic
B. whether vpns are providing site-to-site or remote accessconnection
C. securing the network from bots andmalwares
D. levels of security provided for sending and receiving dataprivately
Answer:
C. securing the network from bots andmalwares
99. What types of protocols are used
in VPNs?
A. application levelprotocols
B. tunnellingprotocols
C. networkprotocols
D. mailing protocols
Answer:
A. application levelprotocols
100. Which types of VPNs are used for corporate connectivity across companies residing in different
geographical location?
A. remote access vpns
B. site-to-site vpns
C. peer-to-peer vpns
D. country-to-country vpns
Answer:
B. site-to-site vpns
101. uses radio-frequency waves to transfer data between a
A. Wi-Fi
B. OCR
C. Bar Code
D. RFID
Answer:
D. RFID
102. Is fast and does not require physical sight or contact
A. Wi-Fi
B. OCR
C. Bar Code
D. RFID
Answer:
D. RFID
103. technology often used in “smart cards,” have small radio
A. Wi-Fi
B. OCR
C. Bar Code
D. RFID
Answer:
D. RFID
104. A network of physical objects or things embedded with electronics or
A. AI
B. ML
C. IoT
D. Internet
Answer:
C. IoT
105. RFID stands for .
A. Random
B. Radio
C. Random
D. Radio frequency
Answer:
B. Radio
106. Which of the following is not involved in working of IoT?
A. RFID
B. Sensors
C. Nano Tech
D. RFID
Answer:
C. Nano Tech
107. Making the smaller and smaller things have the ability to connect and interact
A. Micro Tech
B. Smart Tech
C. Nano Tech
D. RFID
Answer:
C. Nano Tech
108. Several instructions execution simultaneously in .
A. Processing
B. Parallel
C. Serial
D. Multi Tasking
Answer:
B. Parallel
109. In , data is written only once during manufacturing or
A. Read Only
B. Write Once –
C. Read/Write
D. All of above
Answer:
B. Write Once –
110. In tag data can be changed over time.
A. Read Only
B. Write Once –
C. Read/Write
D. All of above
Answer:
C. Read/Write
111. These are the functions of RFID Reader
A. Remotely
B. Establish a
C. Inventory tags,
D. All of above
Answer:
D. All of above
112. In , One antenna is used to transmit the RF signals, and the
A. Mon Static
B. Multi Static
C. Bi Static
D. None of the above
Answer:
C. Bi Static
113. propose a scheme to define labels that can be automatically
A. Semacode
B. RFID
C. IANA
D. IEEE
Answer:
A. Semacode
114. In Smart Device Form Factors, can be spread into physical
A. Smart dust
B. Smart Clay
C. Smart Skins
D. None of the above
Answer:
A. Smart dust
115. In smart device form factors, application of where paint used
A. Smart dust
B. Smart Clay
C. Smart Skins
D. None of the above
Answer:
C. Smart Skins
116. Claytronics project is application of .
A. Smart dust
B. Smart Clay
C. Smart Skins
D. None of the above
Answer:
B. Smart Clay
117. process two or more combined user input modes, such as
A. a. Multimodal
B. b. Gesture
C. c. Reflective
D. d. Active Interfaces
Answer:
A. a. Multimodal
118. controller with control action the output of the controller
A. a. Derivative
B. b. Integral
C. c. Proportional
D. None of the above
Answer:
A. a. Derivative
119. With action, there is a continuous relationship between the
A. a. Derivative
B. b. Integral
C. c. Proportional
D. None of the above
Answer:
C. c. Proportional
120. can be defined as the manipulation, precision
A. a. Nano-
B. b. Ubiquitous
C. c. MEMS
D. d. Semacode
Answer:
A. a. Nano-
121. IANA stands for:
A. a. Internal
B. b. Internet
C. c.
D. d. Internet
Answer:
D. d. Internet
122. MQTT Stands for
A. a. MQ
B. b. MQ
C. c. MQ
D. d. MQ Telemetry
Answer:
D. d. MQ Telemetry
123. can be sprayed & embedded throughout the digital
A. a. Smart dust
B. b. Smart Clay
C. c. Smart Skin
D. d. Smart Object
Answer:
A. a. Smart dust
124. Which of the following statements about radio frequency identification
A. a. RFID
B. b. RFID
C. c. RFID
D. d. Companies may
Answer:
C. c. RFID
125. The wireless networking standard that is useful for creating small personal
A. a. Toothless
B. b. Whitetooth
C. c. Bluetooth
D. d. None of the
Answer:
C. c. Bluetooth
126. The transmission medium that consists of strands of clear glass fibre, each of
A. a. Fiber Optics
B. b. Twisted
C. c. Microwave
D. d. None of the
Answer:
A. a. Fiber Optics
127. The device that is required to translate digital signals into analogue form and
A. a. Connector
B. b. Modem
C. c. Switch
D. d. Router
Answer:
B. b. Modem
128. The TCP/IP layer that is responsible for providing the communication and
A. a. Application
B. b. Transport
C. c. Network
D. d. Data Link Layer
Answer:
B. b. Transport
129. The method of slicing digital messages into parcels, sending them along
A. a. TCP/IP
B. b. Packet
C. c. Data
D. d. Client Server
Answer:
B. b. Packet
130. Which of the following businesses benefit and implemented RFID?
A. a. Logistics
B. b. Building
C. c. IT
D. d. All of the above
Answer:
D. d. All of the above
131. There are basic types of chips available on RFID tags.
A. a. Two
B. b. Three
C. c. Five
D. d. Seven
Answer:
A. a. Two
132. Does RFID have the ability to read many tags together at once?
A. a. Yes
B. b. No
C. May Be
D. Neutral
Answer:
A. a. Yes
133. The information on read-only chips be changed.
A. a. Can
B. b. Cannot
C. c. Sometimes
D. d. None of the
Answer:
B. b. Cannot
134. A reader may have multiple antennas that are responsible for sending and
A. a. True
B. b. False
Answer:
A. a. True
135. Which of the following is not RFID type?
A. a. Ultra-Low
B. b. Low
C. c. High
D. d. Ultra-High
Answer:
A. a. Ultra-Low
136. occurs when many tags are present in a small area; but since
A. a. RFID reader
B. b. RFID Tag
C. c. RFID
D. d. None of the
Answer:
B. b. RFID Tag
137. Which of the following is correct for tactile sensors?
A. a. Touch
B. b. Pressure
C. c. Input
D. d. Humidity
Answer:
A. a. Touch
138. Change in output of sensor with change in input is
A. a. Threshold
B. b. Slew rate
C. c. Sensitivity
D. d. None of the
Answer:
C. c. Sensitivity
139. Thermocouple generate output voltage according to
A. a. Circuit
B. b. Humidity
C. c.
D. d. Voltage
Answer:
C. c.
140. Sensor is a type of transducer.
A. a. True
B. b. False
Answer:
A. a. True
141. Which of the following is not an analog sensor?
A. Potentiometer
B. Force-sensingresistors
C. Accelerometers
D. None of thementioned
Answer:
D. None of thementioned
142. Following acts as detector in Optical sensor
A. a. Light
B. b. Photo
C. c. Transistor
D. d. All of above
Answer:
B. b. Photo
143. Following is (are) the type(s) of Light sensor(s)
A. a. Photo
B. b. Photo
C. c. Photo
D. d. All of above
Answer:
D. d. All of above
144. In real time operating system
A. a. all processes
B. b. a task must
C. c. process
D. d. kernel is not
Answer:
B. b. a task must
145. Hard real time operating system has jitter than a soft real
A. a. Less
B. b. More
C. c. Equal
D. d. None of above
Answer:
A. a. Less
146. For real time operating systems, interrupt latency should be
A. a. Minimal
B. b. Maximum
C. c. Zero
D. d. Dependent onscheduling
Answer:
A. a. Minimal
147. Which one of the following is a real time operating system?
A. a. RTLinux
B. b. VxWorks
C. c. Windows
D. d. All of above
Answer:
D. d. All of above
148. Drives are also known as
A. a. Actuators
B. b. Controller
C. c. Sensors
D. d. Manipulator
Answer:
A. a. Actuators
149. A Robot is a
A. a.
B. b. Multi
C. c. Both (A)
D. d. None of the
Answer:
C. c. Both (A)
150. The main objective(s) of Industrial robot is to
A. a. Tominimize the
B. b. To increaseproductivity
C. c. To enhancethe life of
D. d. All of the above
Answer:
D. d. All of the above
151. deals with the protection of an individual’s information which is implemented while using
A. Digital agony
B. Digital privacy
C. Digital secrecy
D. Digital protection
Answer:
B. Digital privacy
152. Which of the following statements are true in case of privacy.
A. It is product of norms, legal protections and activities.
B. IT is a state type in which the identity and personal information of a person is kept confidential.
C. Privacy of anentity is the result of negotiating and enforcing when, how, to what extent and in
D. All above statements are true.
Answer:
D. All above statements are true.
153. involves the revelation of truthful
A. Breach ofconfidentially.
B. Disclosure
C. Exposure
D. Increasedaccessibility
Answer:
B. Disclosure
154. is breaking the promise to stay a person’s data confidential.
A. Breach of confidentially.
B. Disclosure
C. Exposure
D. Increased accessibility
Answer:
A. Breach of confidentially.
155. A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic-filtering rules is
A. Gateways
B. Proxy
C. Firewall
D. DNS
Answer:
C. Firewall
156. In , there ought as far as possible to the accumulation of individual information and any such information ought to be gotten by legal and reasonable means and where suitable with the learning or
A. Gathering Limitation Principle
B. Information Quality Principle
C. Reason Specification Principle
D. Utilize Limitation Principle.
Answer:
A. Gathering Limitation Principle
157. In , individual information ought to be applicable to the reasons for which they are to be utilized and to the degree important for those reasons, ought to be
A. Gathering Limitation Principle
B. Information Quality Principle
C. Reason Specification Principle
D. Utilize Limitation Principle.
Answer:
B. Information Quality Principle
158. In , reasons for which personal information are gathered ought to be indicated not later than at the season of information accumulation and the consequent utilize constrained to the satisfaction of those reasons or such others are not inconsistent with those
A. Gathering Limitation Principle
B. Information Quality Principle
C. Reason Specification Principle
D. Utilize Limitation Principle.
Answer:
C. Reason Specification Principle
159. In , individual information ought not be unveiled , made accessible or generally utilized for purposes as per purpose specification rule.
A. Gathering Limitation Principle
B. Information Quality Principle
C. Reason Specification Principle
D. Utilize Limitation Principle.
Answer:
D. Utilize Limitation Principle.
160. Systems used to track and identify the location of objects in real time is
A. Geolocation
B. geographicalinformation
C. WirelessApplication
D. Real-time location system (RTLS)
Answer:
D. Real-time location system (RTLS)
161. Gateway to the Internet optimized for mobility
A. Voice Portal
B. Wi-Max
C. Mobile Enterprise
D. Mobile Portal
Answer:
D. Mobile Portal
162. automatically identifying a Web user’s location
A. Voice Portal
B. Geolocation
C. Sensor Network
D. Wi-Max
Answer:
B. Geolocation
163. Computing capabilities embedded into objects around us (mobile and stationary)
A. pervasive computing
B. ubiquitous computing
C. Context-aware computing
D. None of above
Answer:
B. ubiquitous computing
164. Computing capabilities embedded in the environment but typically not mobile
A. pervasive computing
B. Mobile Portal
C. Context-aware computing
D. None of above
Answer:
A. pervasive computing
165. A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes
A. Voice Portal
B. Mobile Portal
C. Geolocation
D. Sensor Network
Answer:
D. Sensor Network
166. short-range radio frequency communication technology for remotely storing and retrieving data using devices called RFID tags and RFID readers
A. Network Based Positioning
B. Real Time Location Systems
C. Radio Frequency Identification
D. Wireless Network
Answer:
C. Radio Frequency Identification
167. a technology that offers Internet browsing from wireless devices
A. Real Time Location Systems
B. RFID
C. Wireless wide Area Network
D. Wireless Application Protocol
Answer:
D. Wireless Application Protocol
168. a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology
A. Bluetooth
B. Mobile Portal
C. Wi-Max
D. Geolocation
Answer:
C. Wi-Max
169. a wireless version of the Ethernet networking standard
A. Wireless wide area network
B. Wireless local area network
C. Personal area network
D. Body area network
Answer:
B. Wireless local area network
170. computer system capable of integrating, storing, editing, analyzing, sharing, and displaying geographically referenced (spatial) information
A. Personal area network
B. Body area network
C. Bluetooth
D. GIS
Answer:
D. GIS
171. a voice system enables users to request/receive info, enter/change data through a telephone to a computerized
A. Bluetooth
B. Real Time location Systems
C. GIS
D. Interactive Voice response
Answer:
D. Interactive Voice response
172. a telecommunications network that offers wireless coverage over a large geographical area, typically over a cellular phone network
A. Bluetooth
B. Zigbee
C. Wireless Wide Area network
D. WAP
Answer:
C. Wireless Wide Area network
173. ability to detect and react to a set of environmental variables that is described as context (which can be sensor info or
A. Mobile Portal
B. Conext Aware Computing
C. Pervasive Computing
D. Network Based positioning
Answer:
B. Conext Aware Computing
174. a wireless telecommunications network for device-to-device connections within a very short range
A. Wireless Wide Area Network
B. Personal Area Network
C. Wireless Local Area Network
D. Wired Network
Answer:
B. Personal Area Network
175. a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology
A. Wi-FI
B. Wi-Max
C. Bluetooth
D. Wired LAN
Answer:
B. Wi-Max
176. When you use the word it means you are protecting your data from getting disclosed.
A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer:
A. Confidentiality
177. is what every individual prefer in terms of physical privacy as well as digital privacy.
A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer:
A. Confidentiality
178. means the protection of data from modification by unknown users.
A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer:
B. Integrity
179. of information means, only authorised users are capable of accessing the information.
A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer:
D. Availability
180. This helps in identifying the origin of information and
A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer:
C. Authentication
181. Data is used to ensure confidentiality.
A. Encryption
B. Locking
C. Deleting
D. Backup
Answer:
A. Encryption
182. One common way to maintain data availability is
A. Data Clustering
B. Data backup
C. Data Altering
D. Data recovery
Answer:
B. Data backup
183. The First Phase Of Hacking An IT System Is Compromise Of W hich Foundation Of Security?
A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer:
A. Confidentiality
184. Data integrity means
A. providing first access to stored data
B. ensuring correctness and consistency of
C. providing data sharing
D. none of the above
Answer:
B. ensuring correctness and consistency of
185. Authentication refers to :
A. methods ofrestricting user access to system
B. controllingaccess to portions of
C. controlling theoperation on the data
D. all of the above
Answer:
D. all of the above
186. does not have any management flow.
A. Synchronous
B. Casual
C. Asynchronous
D. Smart Interaction
Answer:
C. Asynchronous
187. is proving that a message was sent by a certain sender.
A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer:
C. Authentication
188. means hiding contents of a message so that nobody else but the intended recipient can read it.
A. Authenticity
B. Integrity
C. Encryption
D. Availability
Answer:
C. Encryption
189. is the act of taking data and rendering it unreadable to anyone except for the intended recipient. While on the other hand, is the act of a user proving that they are who they are, and that they can
A. Encryption, Decryption
B. Encryption, Availability
C. Authentication, Encryption
D. Encryption, Authentication
Answer:
D. Encryption, Authentication
190. ensures no one other our intended recipient(s) can eavesdrop on the message while provides confidentiality by scrambling the
A. Encryption, Decryption
B. Encryption, Availability
C. Authentication, Encryption
D. Confidentiality, Encryption
Answer:
D. Confidentiality, Encryption
191. ensures no one can alter the message before our intended recipient(s) sees it.
A. Authenticity
B. Integrity
C. Encryption
D. Availability
Answer:
B. Integrity
192. ensures that the message really came from the supposed sender.
A. Authenticity
B. Integrity
C. Encryption
D. Availability
Answer:
A. Authenticity
193. Digital signatures combined with digital certificates provide by giving the recipient(s) a way to tie the message to an individual or entity who signed the message.
A. Authenticity
B. Integrity
C. Encryption
D. Availability
Answer:
A. Authenticity
194. transforms meaningful data into what looks like gibberish using a secret that can also be used to reverse the process. Reversing the process is called
A. Encryption, Decryption
B. Encryption, Availability
C. Authentication, Encryption
D. Confidentiality, Encryption
Answer:
A. Encryption, Decryption
195. is the process of convincing a gatekeeper that you are who you say you are, typically by proving that you know a secret, I.e. password, captcha
A. Authenticity
B. Integrity
C. Encryption
D. Availability
Answer:
A. Authenticity
196. A collection of nodes used for sensing the environment is known as .
A. Voice Portal
B. Mobile Portal
C. Geolocation
D. Sensor Network
Answer:
D. Sensor Network
197. Sensors are those which require an external excitation signal or a power signal.
A. Active
B. Passive
C. Active and Passive both
D. All of above
Answer:
B. Passive
198. do not require any external power signal and directly generates output response.
A. Active
B. Passive
C. Active andPassive both
D. All of above
Answer:
A. Active
199. is a non-contact type sensor that detects the presence of an object.
A. Temperature
B. Pressure
C. Proximity
D. All of above
Answer:
C. Proximity
200. sensors are light based sensor that are used in various applications like Proximity and Object
A. Temperature
B. Pressure
C. Infrared
D. None of above
Answer:
C. Infrared
201. This is not included as a main 3 properties for UbiCom Systems were proposed by Weiser in 1991.
A. Computers need to be networked, distributed and transparently accessible
B. Computer Interaction with Humans needs to be more hidden
C. Computers need to be aware of environment context
D. Computers can operate autonomously, without human intervention, be self-governed
Answer:
D. Computers can operate autonomously, without human intervention, be self-governed
202. This is not included as a properties of Ubiquitous Computing
A. Remote
B. Autonomous
C. Distributed
D. Intelligent
Answer:
A. Remote
203. In ubicomp system Model , Smart DEI where DEI stands for
A. Devices, Environment, Interfaces
B. Devices, Environment, Interactions
C. Distributed, Energy Saving, Intelligent
D. Digital, Environment, Intelligent
Answer:
B. Devices, Environment, Interactions
204. Sub-Properties (sub-types of individual intelligence) of Individual Intelligence includes
A. Reactive, Reflex
B. Model-based,
C. Rule/Policy-based
D. All of above
Answer:
D. All of above
205. eHCI indicate
A. H2H
B. H2C
C. C2H
D. C2C
Answer:
B. H2C
206. Implicit (i)HCI indicates
A. H2H
B. H2C
C. C2H
D. C2C
Answer:
C. C2H
207. In Different Degrees of CPI complete physical interaction (no ICT mediation) specifies
A. P2P
B. C2P / CA(Physical Env. Context-aware)
C. P2C/AR/MR
D. C2C /VR
Answer:
A. P2P
208. 3 basic architectural design patterns for UbiCom includes smart
A. Devices, Environment, Interfaces
B. Devices, Environment, Interactions
C. Distributed, Energy Saving, Intelligent
D. Digital, Environment, Intelligent
Answer:
B. Devices, Environment, Interactions
209. Smart means systems are active, digital, networked, autonomous, reconfigurable, local control of its own resources, is this statement is true or false?
A. TRUE
B. FALSE
Answer:
A. TRUE
210. indicates Increasing capability to manufacture low power, micro, more complex devices.
A. Smart Devices
B. Smart Environments
C. Smart Interactions
Answer:
A. Smart Devices
211. indicates Increasing capability to embed devices in the physical environment.
A. Smart Devices
B. Smart Environments
C. Smart Interactions
Answer:
B. Smart Environments
212. indicates Increasing capability for more interoperable distributed mobile devices
A. Smart Devices
B. Smart Environments
C. Smart Interactions
Answer:
C. Smart Interactions
213. can be sprayed & embedded throughout the digital environment
A. Smart Dust
B. Smart Skin
C. Smart Clay
Answer:
A. Smart Dust
214. feature allows user to connect the systems on the move
A. Distributed
B. Mobility
C. Real time embedded
D. Intelligent
Answer:
B. Mobility
215. Internet of Things (IoT) systems are fully systems
A. M2M
B. H2M
C. M2H
D. H2H
Answer:
A. M2M
216. Layer is always at the bottom of ubiquitous computing stack.
A. Physical
B. Services
C. Applications
D. Internet
Answer:
A. Physical
217. In user performs an action which is having primary aim to interact with systems.
A. iHCI
B. eHCI
C. CCI
D. HHI
Answer:
A. iHCI
218. is dependent on physical dimensions like time or temperature etc.
A. Physical environment context
B. Human context
C. Virtual environment or ICT context
D. All of the Above
Answer:
A. Physical environment context
219. In the main constraint on interactions is
A. Physical
B. Human context
C. Virtual
D. All of the Above
Answer:
B. Human context
220. In any type of specific component in
A. Physical
B. Human context
C. Virtual
D. All of the Above
Answer:
C. Virtual
221. is a feature or property of system that enables
A. Mobility
B. Autonomy
C. Distributed
D. Pervasive
Answer:
B. Autonomy
222. is a feature of systems which adapt
A. Mobility
B. Intelligence
C. Distributed
D. Pervasive
Answer:
B. Intelligence
223. In basic interaction, protocol consists
A. Synchronous
B. Asynchronous
C. Smart Interaction
D. All of the Above
Answer:
A. Synchronous
224. In basic interaction, protocol consists of
A. Synchronous
B. Asynchronous
C. mart Interaction
Answer:
B. Asynchronous
225. In completely different elements act
A. Coordinated
B. Policy Based
C. Dynamic
D. Semantic and
Answer:
A. Coordinated
226. In completely different elements act
A. Coordinated
B. Policy Based
C. Dynamic
D. Semantic and
Answer:
B. Policy Based
227. In , peoples in organization interact
A. Coordinated
B. Policy Based
C. Dynamic
D. Semantic and
Answer:
C. Dynamic
228. includes communication ability and to
A. Coordinated
B. Policy Based
C. Dynamic
D. Semantic and
Answer:
D. Semantic and
229. A method which uses advertisements in electronic media,
A. PUSH
B. PULL
C. POP
D. All of the Above
Answer:
A. PUSH
230. In method, for getting some type of information, if
A. PUSH
B. PULL
C. POP
D. All of the Above
Answer:
B. PULL
231. can be defined as the manipulation,
A. Nano-
B. MEMS
C. Semacode
D. Ubiquitous Systems
Answer:
A. Nano-
232. can be considered to be resource-
A. Wired System
B. Wireless System
C. Real Time Systems
D. None of the Above
Answer:
C. Real Time Systems
233. In is response thats late is incorrect and
A. Hard Real
B. Soft Real Time
C. Operating Systems
D. Embedded Systems
Answer:
A. Hard Real
234. protocol is used for Streaming Media over
A. TCP
B. RTP
C. RTSP
D. Voice Over IP
Answer:
B. RTP
235. Protocol is used for voice communication
A. TCP
B. RTP
C. RTSP
D. Voice Over IP
Answer:
D. Voice Over IP
236. In the user requests the system to carry out a certain
A. eHCI
B. iHCI
C. CCI
D. HHI
Answer:
A. eHCI
237. micron- to millimetre-scale electronic
A. Nano-
B. MEMS
C. Semacode
D. Ubiquitous
Answer:
B. MEMS
238. is based upon a broader range of materials,
A. Nano-
B. MEMS
C. Semacode
D. Ubiquitous Systems
Answer:
A. Nano-
239. The drive to switch transistors faster and to be low-powered has been to make them smaller where electronic components approach nanometer sizes is called as
A. Nano- computing
B. MEMS
C. Semacode
D. Ubiquitous Systems
Answer:
A. Nano- computing
240. Announcement, discovery, selection, configuration and composition are included in phase of service provision life cycle.
A. Service creatio
B. Service operatio
C. Service maintenanc
D. Service dissolution
Answer:
A. Service creatio
241. Invoke and coordinate are included in phase of service provision life cycle.
A. Service creatio
B. Service operatio
C. Service maintenanc
D. Service dissolution
Answer:
B. Service operatio
242. Terminate and remove registrations are included in phase of service provision life cycle.
A. Service creatio
B. Service operatio
C. Service maintenanc
D. Service dissolution
Answer:
D. Service dissolution
243. Re-invoke, Update descriptions, reconfiguration and update composition are included in phase of service provision life cycle.
A. Service creatio
B. Service operatio
C. Service maintenanc
D. Service dissolution
Answer:
C. Service maintenanc
244. is also known as Publish-and-Subscribe interaction.
A. Layered model
B. Pipe-filter mode
C. Event-driven Action or EDA
D. Shared data repositories
Answer:
C. Event-driven Action or EDA
245. subscribe to being notified when specified events occur.
A. Layered model
B. Pipe-filter mode
C. Event-drivenAction or EDA Model
D. Shared data repositories
Answer:
C. Event-drivenAction or EDA Model
246. systems that are self governing and also they are capable of taking their own independent decisions and
A. Autonomy
B. Distributed
C. Networked
D. Context aware
Answer:
A. Autonomy
247. enable computer-based services to be made available everywhere.
A. Real Time Syst
B. Embedded Syste
C. Distributed Systems
D. Ubiquitous Systems
Answer:
D. Ubiquitous Systems
248. Human / User interaction to the devices is maximum in .
A. M2M
B. H2M
C. M2H
D. H2H
Answer:
D. H2H
249. Ubiquitous computing interaction to the devices is minimum or zero in .
A. M2M
B. H2M
C. M2H
D. H2H
Answer:
D. H2H
250. systems are known as ubiquitous systems and does not involve humans to interact.
A. M2M
B. H2M
C. M2H
D. H2H
Answer:
A. M2M
251. If the systems are made proactive as per the requirement of users then these efforts and attempts are built in concept called
A. Ubiquitous Computing
B. Mobile Computing
C. Cloud Computing
D. All of There
Answer:
A. Ubiquitous Computing
252. The Assumption of pervasive computing is about and technology.
A. Information &Communicatio
B. Data , Message
C. Knowledge,Messag
D. None of the Above
Answer:
A. Information &Communicatio
253. . mainly allows you to connect on the move.
A. Scalability
B. Portability
C. Mobility
D. Flexibility
Answer:
C. Mobility
254. Ubiquitous Computing connects environment and in unobtrusive ways.
A. User
B. Cloud
C. Resource
D. Data
Answer:
A. User
255. Advantages Of ubiquitious computing
A. Invisible
B. Socialization
C. Decision-making
D. All of There
Answer:
D. All of There
256. For modelling different key properties of computing the increasingly digital world is occupied.
A. Pervasive
B. Ubiquitous
C. Both a & b
D. None of the Above
Answer:
C. Both a & b
257. The ICT systems are called as when system view is as single system
A. Multiple
B. Single
C. Distributed
D. Disjoint
Answer:
C. Distributed
258. The technique has various dimension.
A. VR
B. RJ
C. Calm
D. Real
Answer:
C. Calm
259. . also exists as a separate reality from physical world.
A. VR
B. Real
C. Calm
D. Distributed
Answer:
A. VR
260. Ubiquitous Means ……
A. Found Everywhere
B. Found Nowhere
C. Found Anyhow
D. Found Veryfast
Answer:
A. Found Everywhere
261. Which two methods followed by Business Models?
A. PUSH & POP
B. PUSH & PULL
C. PULL & POP
D. None of the above
Answer:
B. PUSH & PULL
262. What is main aim of Ubiquitous Computing?
A. Creating Digital Product
B. Creating Smart Product
C. Creating Best Product
D. Creating High Quality Product
Answer:
B. Creating Smart Product
263. Ubiquitous Computing closely realted with?
A. IOT
B. M2M
C. Both IOT & M2M
D. None of the above
Answer:
C. Both IOT & M2M
264. Second era of computing is known as the …….
A. Mainfram e era
B. PC era
C. Ubiquitous Computing
D. None of the above
Answer:
B. PC era
265. Third era of computing is known as the …….
A. Mainfram e era
B. PC era
C. Ubiquitous Computing
D. None of the above
Answer:
C. Ubiquitous Computing
266. Who invented term Ubiquitous Computing ?
A. Shaun Watson
B. Mark Ciere
C. Mark Watson
D. Mark Weiser
Answer:
D. Mark Weiser
267. Which of the following is not Ubiquitous Device ?
A. TV
B. RFIDTags
C. PDAs
D. Smartpho ne GPS
Answer:
A. TV
268. Ubiquitous Computing supports …….
A. Many to 1
B. 1 to 1
C. Many to Many
D. 1 to Many
Answer:
D. 1 to Many
269. Ubiquitous Computing is also called as …….
A. Cloud Computi ng
B. Grid Computin g
C. Pervasive Computing
D. Distribute d Computin g
Answer:
C. Pervasive Computing
270. Systems used to track and identify the location of objects in real time
A. Geolocati on
B. geographi cal informatio n system (GIS)
C. geographic al information system (GIS)
D. Real-time location system (RTLS)
Answer:
D. Real-time location system (RTLS)
271. gateway to the Internet optimized for mobility
A. Voice portal
B. WiMax
C. Mobile enterprise
D. Mobile Portal
Answer:
D. Mobile Portal
272. Computing capabilities embedded in the environment but typically not mobile
A. Mobile Portal
B. pervasive computing
C. Context- aware computing
D. voice portal
Answer:
B. pervasive computing
273. A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes
A. Voice portal
B. Mobile Portal
C. Geolocatio n
D. sensor network
Answer:
D. sensor network
274. ability to detect and react to a set of environmental variables that is described as context (which can be sensor info or users’ attitudes)
A. Mobile Portal
B. Context- aware computing
C. Network- based positioning
D. pervasive computin g
Answer:
B. Context- aware computing
275. HCI stands for
A. Human Computer Inteface
B. Human Computer Intraction
C. Both
D. None of the above
Answer:
B. Human Computer Intraction
276. Distributed ICT system consists of how many layes ?
A. 2
B. 3
C. 5
D. 4
Answer:
B. 3
277. Which of the following is not property of UbiComp system ?
A. Implicit HCI
B. Explicit HCI
C. Distributed
D. Both A & C
Answer:
B. Explicit HCI
278. Which of the following are Interaction Models in UbiComp System ?
A. HCI
B. CCI
C. CPI
D. All of the above
Answer:
D. All of the above
279. Design architecture of UbiComp system consists of …………..
A. Smart Device
B. Smart Environme nt
C. Smart Interaction
D. All of the above
Answer:
D. All of the above
280. CPI stands for
A. Computer Physical World Ineraction
B. Human Computer Intraction
C. Computer Physical Interface
D. None of the above
Answer:
A. Computer Physical World Ineraction
281. Which of the following is not characteristics of Smart Devices ?
A. Mobility
B. Single Fuction
C. Dynamic Service Discovery
D. Intermitte nt Resource Access
Answer:
B. Single Fuction
282. Which are the smart devices under CCI ?
A. Smart Board
B. Smart Pad&Tabs
C. Active Badge,Bat,Fl oor
D. All of the above
Answer:
D. All of the above
283. Which are the smart devices under CPI ?
A. Unimate
B. MH-1Robot
C. Smart Dust and Tiny OS
D. All of the above
Answer:
D. All of the above
284. Main goal of Things That Think(TTT) was …….
A. See how physical world meets with logical world
B. See how logical world meets with physical world
C. See how physical world meets with logical world
D. None of the above
Answer:
A. See how physical world meets with logical world
285. Tangible Bits converts ……
A. tangible bits into painted bits
B. Painted bits into tangible bits
C. All of the above
D. None of the above
Answer:
B. Painted bits into tangible bits
286. WearCamp and WearCam comes under ……..
A. CCI
B. CPI
C. iHCI
D. ICT
Answer:
C. iHCI
287. Mobile Service Design consists of which of the following type ?
A. User Virtual Environm ent
B. Mobile Virtual Terminal
C. Virtual Resource Managemen t
D. All of the above
Answer:
D. All of the above
288. MVT stands for ……………..
A. Mobile Virtual Terminal
B. Mobile Visual Terminnal
C. Mobile Video Terminal
D. None of the above
Answer:
A. Mobile Virtual Terminal
289. Mobile Web Service Design consists of
Architecture
A. 2 tier
B. 3 tier
C. 4 tier
D. multi tier
Answer:
B. 3 tier
290. J2ME platfom distributed into which two categories
?
A. CDC & CLDC
B. CDC & HCI
C. CCI & HCI
D. None of the above
Answer:
A. CDC & CLDC
291. What is full form of CLR?
A. Common Language Rutime
B. Common Language Rellocation
C. Common Language Relocation
D. Common Language Resource
Answer:
A. Common Language Rutime
292. Service Provision Life Cycle consiste for phases.
A. 2
B. 3
C. 4
D. 5
Answer:
C. 4
293. Which are two main approaches to dynamic service announcement and discovery ?
A. PUSH & POP
B. PUSH & PULL
C. PULL & POP
D. None of the above
Answer:
B. PUSH & PULL
294. Proportional band of a controller is defined as the range of:
A. Measured variable to the set variable
B. Air output as the measured variable varies from maximum to minimum
C. Measured variables through which the air output varies from maximum to minimum
D. None of the above
Answer:
C. Measured variables through which the air output varies from maximum to minimum
295. The term reset control refers to:
A. Proportio nal
B. Integral
C. Derivative
D. None of the above
Answer:
B. Integral
296. The integral control:
A. Increases the steady state error
B. Decreases the steady state error
C. Increases the noise and stability
D. Decreases the damping
Answer:
A. Increases the steady state error
297. The number of operational amplifiers require for designing of electronic PID controller is:
A. 1
B. 2
C. 3
D. 6
Answer:
A. 1
298. A Robot is a
A. Programm able
B. Multi functional
C. Both (A) and (B)
D. None of the above
Answer:
C. Both (A) and (B)
299. The main objective(s) of Industrial robot is to
A. To minimise the labour requireme nt
B. To increase productivit y
C. To enhance the life of production machines
D. All of the above
Answer:
D. All of the above
300. Which of the following is characteritics of ICT devices
A. Size
B. Connectivit y
C. Haptic Input
D. All of the above
Answer:
D. All of the above
301. system consists of desk which can operated from specific distance.
A. MEMS
B. MEMSX
C. MEMX
D. MEMES
Answer:
B. MEMSX
302. system does not require any some person to carry identifying task.
A. Active Flore
B. Smart Flore
C. Both (A) and (B)
D. None of the above
Answer:
C. Both (A) and (B)
303. In which of the following device concept of Ultrasonic Sound gets arises ?
A. Active Flore
B. Active Badge
C. Active Bat
D. All of the above
Answer:
B. Active Badge
304. In interface user has to remember the syntax of any parameter.
A. WIMPS
B. PC
C. Command Promp
D. Human Computer
Answer:
C. Command Promp
305. WIMP stands for
A. Windows
B. Icons
C. Menu & Pointer
D. All of the above
Answer:
D. All of the above
306. Mouse is replacement of
.
A. Light Pen
B. Ball Pen
C. Scan Pen
D. Slider
Answer:
A. Light Pen
307. In direct manipulation technique documents arranged in which of following way ?
A. Queue
B. LinkedList
C. Array
D. Stack
Answer:
D. Stack
308. Which of the following technique is used to handle limited input ?
A. T9
B. Soft Keys
C. Auditory Inteface
D. All of the above
Answer:
D. All of the above
309. Which of the following is example of implicit interaction ?
A. Multi Tapping
B. Soft Keys
C. Auditory Inteface
D. T9
Answer:
D. T9
310. Peocess of hiting several keys at once is called
A. Active Chording
B. Passive Chording
C. Multi Chording
D. None of the above
Answer:
B. Passive Chording
311. Which system is used to increase the use of low resolution screen ?
A. MEMS
B. ATOS
C. AOS
D. MTOS
Answer:
D. MTOS
312. is technique in which human sense input and control motor output.
A. Multi Modal
B. Multi functional manipulato r
C. Multi Chording
D. multi tier
Answer:
A. Multi Modal
313. Visual Modal system further consists of
A. Large body movemen t
B. gestures
C. Eye gaze
D. All of the above
Answer:
D. All of the above
314. Gesture consists of
A. Contactful Gesture
B. Contactless Gesture
C. Both (A) and (B)
D. None of the above
Answer:
C. Both (A) and (B)
315. In which type of gesture there is direct physical contact invloved
A. Contactful Gesture
B. Contactless Gesture
C. Both (A) and (B)
D. None of the above
Answer:
A. Contactful Gesture
316. is used to sense the orientation of devices.
A. Microscop e
B. Gyroscope
C. Macroscope
D. Tethoscop e
Answer:
B. Gyroscope
317. BAN stands for
A. Back Area Network
B. Body Area Network
C. Back Air Network
D. Body Air Network
Answer:
B. Body Area Network
318. State whether True or False : Gesture may be static or dynamic
A. TRUE
B. FALSE
C. None of the above
Answer:
A. TRUE
319. Input and output UI are merge in which of the following interfaces ?
A. Tangible user interface
B. Organic user interface
C. Both (A) and (B)
D. None of the above
Answer:
C. Both (A) and (B)
320. is interface in which a person interact with digital information throgh the physical environment.
A. Organic user interface
B. Tangible user interface
C. Auditory Inteface
D. WIMPSinterface
Answer:
B. Tangible user interface
321. is metaphor having relation to the shape of object.
A. Noun
B. Verb
C. Pronoun
D. Full
Answer:
A. Noun
322. is metaphor having relation to motion of object.
A. Noun
B. Verb
C. Pronoun
D. Full
Answer:
B. Verb
323. In which of the following metaphor physical system is directly totally matches with virtual system
A. Noun
B. Verb
C. Pronoun
D. Full
Answer:
D. Full
324. OLED stands for
A. Original Light Emitting Diode
B. Organic Light Emitting Diode
C. Both (A) and (B)
D. None of the above
Answer:
B. Organic Light Emitting Diode
325. OLED have a response time than an LED.
A. much lower
B. much faster
C. more
D. less
Answer:
B. much faster
326. Auditory interface is used when
A. user want to give visual input
B. user want to give written inout
C. user want to give oral input
D. All of the above
Answer:
C. user want to give oral input
327. Which of following NOT example of Natural Language Inteface(NLI)
A. SHRDLU
B. IBMLanguage Access
C. Ubiquity Add-on for Mozilla Firebox
D. All of the above are part of NLI
Answer:
D. All of the above are part of NLI
328. Technology which is external to body and is directly attached to it is called as
A. Accompan ied Technolog y
B. Wearable Technology
C. Non- Wearable Technology
D. Virtual Technolog y
Answer:
B. Wearable Technology
329. Virtual Reality submerges
A. physical user in a virtual 3D world
B. Virtual 3D world into physical user
C. Physical user into logical world
D. Logical world into physical user
Answer:
A. physical user in a virtual 3D world
330. Which device comes under MTOS ?
A. WearCam p
B. Smart Dust and Tiny OS
C. WearCam
D. Both A & C
Answer:
D. Both A & C
331. Head Up Display consists of
A. Movable HUD
B. Fixed HUD
C. Head Mounted HUD
D. Both B & C
Answer:
D. Both B & C
332. Virtual Retinal Display (VRD) is also called as a
A. Retinal Secure Display
B. Retinal Scan Display
C. Retinal Scan Display
D. Retinal Safe Display
Answer:
B. Retinal Scan Display
333. EyeTap Display works on
sensors.
A. Single
B. Joined
C. Multiple
D. Unlimited
Answer:
A. Single
334. In interface electronic circuitary conection is done to the human nervous system.
A. Human Computer Inteface
B. Brain Computer Interface
C. Auditory Inteface
D. All of the above
Answer:
B. Brain Computer Interface
335. Human Computer Design is phase development life cycle.
A. Two
B. Three
C. Four
D. Five
Answer:
C. Four
336. The user activities are derived byhaving specification of goal and plans to complete goal in
action.
A. Planned
B. Situated
C. Concept
D. All
Answer:
A. Planned
337. Soloves taxonomy of Privacy consists of
A. Data collection
B. Data process
C. Data Disseminati on
D. All of the above
Answer:
D. All of the above
338. Difficulties in RFID tags are
A. Automatio n
B. Identificati on
C. Integration
D. All of the above
Answer:
D. All of the above
339. RFID applications undermine two classes of indivitual pricacy
and .
A. Data Privacy, Location Privacy
B. Data Privacy, Migration Privacy
C. Location Privacy,Migr ation Privacy
D. Data Privacy, User Privacy
Answer:
A. Data Privacy, Location Privacy
340. Network address divided into and
A. Sub network addree and host computer address
B. client address and server address
C. mac address and ip address
D. None of the above
Answer:
A. Sub network addree and host computer address
341. IPV4 supports
bit address
A. 32
B. 64
C. 128
D. 256
Answer:
A. 32
342. IPV6 supports
bit address
A. 32
B. 64
C. 128
D. 256
Answer:
C. 128
343. PSDN stands for
A. Packet Secure Data Network
B. Packet Switch Data Network
C. Packet Security Data Network
D. All of the above
Answer:
B. Packet Switch Data Network
344. First types of pervasive communication networks were
A. Video Network
B. Vitual Network
C. Audio Network
D. Virtual Network
Answer:
C. Audio Network
345. WiMAX comes under which standard ?
A. IEEE 802.1
B. IEEE 802.16
C. Both (A) and (B)
D. None of the above
Answer:
B. IEEE 802.16
346. Root of network tree is formed by _.
A. ZigBee Co- ordinator
B. ZigBee Router
C. ZigBee End Device
D. All of the above
Answer:
A. ZigBee Co- ordinator
347. is used to translate information science address.
A. NAT
B. VPN
C. GPS
D. ICT
Answer:
A. NAT
348. State the proper opinion : A key design issues for conyext aware system is to balance the degree of user management and awareness of proper environment.
A. Partially True
B. TRUE
C. FALSE
D. Might be True
Answer:
B. TRUE
349. Context Awareness is nothing but
A. Physical Awarenes s
B. Virtual Awareness
C. Both (A) and (B)
D. Person Awareness
Answer:
D. Person Awareness