300+ TOP Ubiquitous Computing System (UCS) MCQs and Answers

Ubiquitous Computing System UCS Multiple choice Questions

1. Ubiquitous computing is the method of ……..
A. enhancing computer use by making many computers available throughout the physical environment

B. wireless communication and carry-around computers.

C. allowing transmission of data, voice and video via a computer

D. interact with a variety of users via the internet.

Answer:
A. enhancing computer use by making many computers available throughout the physical environment

2. …………… main properties for UbiCom Systems were proposed by Weiser
A. 1

B. 2

C. 3

D. 4

Answer:
B. 2

3. Which of the following is not a key characteristic of Ubicomp System ?
A. distributed

B. ihci

C. context- awareness

D. pay as you go

Answer:
D. pay as you go

4. Among the various wireless options for wearable devices, which one needs to connect to a smart phone and is the most popular?
A. bluetooth

B. wifi

C. rfid

D. none of the above

Answer:
A. bluetooth

5. When connecting a wearable device to the cloud, what software is required to run a custom service?
A. database

B. operating system

C. http server

D. all of the above

Answer:
D. all of the above

6. What does RFID stand for?
A. radio frequency issue date

B. radio frequency identification

C. rear field identification

D. real far identification

Answer:
B. radio frequency identification

7. What applications run on a SMART Board?
A. any applicaiton on the computer

B. internet browsers like explorer and navigator only

C. powerpoint only

D. powerpoint only

Answer:
A. any applicaiton on the computer

8. The SMART Board Software is called
A. notepage

B. notebook

C. spiral page

D. all of the above

Answer:
B. notebook

9. It takes the output signal from the transmission channel and delivers
A. transmitter

B. transmission channel

C. receiver

D. hardware

Answer:
C. receiver

10. Which of the Following is used in banking industary…..
A. micr

B. omr

C. all of above

D. none of the above

Answer:
A. micr

11. WAP?
A. wireless application protocol

B. wired allication protocol

C. wide application protocol

D. none of the above

Answer:
A. wireless application protocol

12. The tag can be used to activate the task when the user clicks on a word on the screen?
A. true

B. false

C. both

D. none of the above

Answer:
A. true

13. WAP is designed for?
A. internet explorer

B. web browser

C. micro browser

D. macro browser

Answer:
C. micro browser

14. Limitations of Short Messaging Service (SMS)
A. limited to 160 characters or less

B. message latency is one minute or more

C. poor security at the applicationlevel

D. all of the above

Answer:
D. all of the above

15. DoCoMo Stands for ……………
A. documentation over the mobile network

B. do communications over the mobile network

C. documentation & communications over the mobilenetwork

D. none of the above

Answer:
B. do communications over the mobile network

16. Mobile Web Service design often uses a three tier ……………
A. thin client, client proxy, server architecture

B. network, clientproxy, server architecture

C. internet,cilent & server

D. none of the above

Answer:
A. thin client, client proxy, server architecture

17. In J2ME architecture Connected Device Configuration (CDC) provides ……….
A. fundamental services for devices

B. fundamental services for virtual machines

C. both

D. none of the above

Answer:
C. both

18. Java 2 Mobile Environment supports ……………..
A. development of client server system

B. stand alone system designs in which code is developed

C. both

D. none of the above

Answer:
C. both

19. J2ME is a multi layered organisation of software bundles of three types ………….
A. servers,desktop machines & high endconsumer devices

B. configurations, profiles andoptional packages

C. j2ee,j2se & kvm

D. none of the above

Answer:
B. configurations, profiles andoptional packages

20. The .NET Framework consists of two main parts …………
A. common language runtime & unified setof class libraries

B. client & server

C. packeges & class labraries

D. digital packages & digital class labraries

Answer:
A. common language runtime & unified setof class libraries

21. Code written on the .NET Framework platform is called ………..
A. client code

B. managed code

C. server code

D. none of the above

Answer:
B. managed code

22. Managed code …….
A. cannot have bad pointers

B. cannot create memory leaks

C. supports strong code type safety

D. all of the above

Answer:
D. all of the above

23. .NET CF designed specifically for devices, such as ………….
A. smart cards

B. smart wearable devices

C. pdas and smart mobile phones.

D. sensors

Answer:
C. pdas and smart mobile phones.

24. IrDA support ……..
A. sql server ce

B. device specific controls

C. high performance jit compiler

D. all of the above

Answer:
D. all of the above

25. Mobile code is any ………
A. program

B. application

C. content

D. all of the above

Answer:
D. all of the above

26. Sandboxes ……….
A. that limit the local services that code can access.

B. which ensures that code originates from a trusted source.

C. machines that can access the internet

D. that carries explicit proof of its security.

Answer:
A. that limit the local services that code can access.

27. Code Signing ………
A. that limit the local services that code can access.

B. which ensures that code originates from a trusted source.

C. machines that can access the internet

D. that carries explicit proof of its security.

Answer:
B. which ensures that code originates from a trusted source.

28. Firewalls …………
A. that limit the local services that code can access.

B. which ensures that code originates from a trusted source.

C. machines that can access the internet

D. that carries explicit proof of its security.

Answer:
C. machines that can access the internet

29. Proof Carrying Code ……………
A. that limit the local services that code can access.

B. which ensures that code originates from a trusted source.

C. machines that can access the internet

D. that carries explicit proof of its security.

Answer:
D. that carries explicit proof of its security.

30. A smart card …………
A. is a plastic cardembedded with digital memory

B. which store data on magnetic strips

C. is reprogrammable

D. all of the above

Answer:
D. all of the above

31. The primary tasks of a smart card operating system ………….
A. transferring data to and from the smart card

B. controlling the execution of commands

C. managing and executing cryptographicalgorithms

D. all of the above

Answer:
D. all of the above
32. Java Card widely used in ………..
A. sim cards

B. atm cards

C. both

D. none of the above

Answer:
C. both
33. The Home Electronic System (HES) defines the system
components ………
A. residential gateway, homegate

B. standard interfaces

C. both

D. none of the above

Answer:
C. both
34. Jini consists of three Java language protocols ……………
A. discovery, join and lookup

B. discovery, configuration andlookup

C. discovery, join and installation

D. find , join and lookup

Answer:
A. discovery, join and lookup
35. UPnP Stands for ……….
A. united plug and play protocol

B. undirectional plug and play protocol

C. universal plug and play protocol

D. unidirectional plug and play protocol

Answer:
C. universal plug and play protocol

36. Benefit of UPnP ………….
A. media and deviceindependence

B. platformindependence

C. internet-basedtechnologies

D. all of the above

Answer:
D. all of the above
37. OSGi’s core component is ………..
A. server

B. bundle

C. node

D. gateway

Answer:
B. bundle
38. A MANIFEST.MF file located in
the …….. directory .
A. general graph directory

B. acyclic graphdirectory

C. single-level

D. meta-inf

Answer:
D. meta-inf
39. Service Oriented Architectures
Functions ,,,,,,,,,,,,,,
A. service discovery

B. service invocation

C. servicemanagement

D. all of the above

Answer:
D. all of the above
40. Service Provision Life-Cycle – Creation Phase ………..
A. service processes register themselves in service directories.

B. services are invoked and multiple interlinked services may need to becoordinated

C. service processes, access configurations and servicecompositions

D. services may be put off line or terminated temporarily or permanently.

Answer:
A. service processes register themselves in service directories.
41. Service Provision Life-Cycle – Execution Phase ………..
A. service processes register themselves in service directories.

B. services are invoked and multiple interlinked servicesmay need to be coordinated

C. service processes, access configurationsand service compositions

D. services may be put off line or terminated temporarily or permanently.

Answer:
B. services are invoked and multiple interlinked servicesmay need to be coordinated

42. Service Provision Life-Cycle – Maintenance Phase ………
A. service processes register themselves in service directories.

B. services are invoked and multiple interlinked services may need to becoordinated

C. service processes, access configurations and servicecompositions

D. services may be put off line or terminated temporarily or permanently.

Answer:
C. service processes, access configurations and servicecompositions
43. Service Provision Life-Cycle – Dissolution Phase ………..
A. service processes register themselves in service directories.

B. services are invoked and multiple interlinked services may need to becoordinated

C. service processes, access configurations and servicecompositions

D. services may be put off line or terminated temporarily or permanently.

Answer:
D. services may be put off line or terminated temporarily or permanently.
44. Life-Cycle for Tagging Physical Objects …………..
A. capturing a physicalview or some object feature

B. identifying physical objects

C. anchoring or relating objects

D. all of the above

Answer:
D. all of the above
45. Types of active RFID tags are
……….
A. transmitter & receiver

B. transponders and beacons

C. transmiter & reader

D. none of the above

Answer:
B. transponders and beacons
46. Active transponders are woken up
…………..
A. no power source and no active transmitter

B. they typically have a read range of 20 100m

C. when they receive a signal from areader

D. none of the above

Answer:
C. when they receive a signal from areader
47. Passive RFID – Transponders can be packaged …..
A. sandwiched between an adhesive layer and apaper label

B. embedded in a plastic card

C. both a&b

D. none of the above

Answer:
C. both a&b

48. Sensors Primary Functions ……….
A. instrument and monitor environments

B. detect changes in the environment

C. control a systemwith respect to the environment

D. all of the above

Answer:
D. all of the above
49. Sensors Nodes ……
A. common nodes

B. sink nodes

C. gateway nodes

D. all of the above

Answer:
D. all of the above
50. Sensors Common Nodes …….
A. mainly responsible for collecting sensor data.

B. that are responsible for receiving, storing, processing, aggregating data

C. that connect sink nodes to external entities

D. none of the above

Answer:
A. mainly responsible for collecting sensor data.

51. Micro-Electro-Mechanical Systems (MEMS) consists of
………..
A. microelectronic elements

B. actuators, sensors

C. mechanical structures

D. all of the above

Answer:
D. all of the above
52. Micro-Electro-Mechanical Systems (MEMS) developed using
……….. techniques
A. fabrication

B. microfabrication

C. etching

D. none of the above

Answer:
B. microfabrication
53. The most common forms of
production for MEMS are ………..
A. bulk micromachining

B. surfacemicromachining

C. har fabrication

D. all of the above

Answer:
D. all of the above
54. The main components of robots
are ………..
A. end effectors oractuators

B. controller

C. sensors

D. all of the above

Answer:
D. all of the above
55. Which phase is not a part of development of Human-Centred
Design Life-Cycle .
A. requirement gathering and analysis

B. modelling and design

C. configurations & optional packages

D. implementation and testing.

Answer:
C. configurations & optional packages

56. Head(s) Up Display or HUD is
………..
A. any type of display that presents data without blocking the user’s view

B. the user looks through a display element attached to the airframe or vehicle chassis

C. that is worn in front of the eye that acts as a camera to record the scene available to the eye, and acts as adisplay

D. none of the above

Answer:
A. any type of display that presents data without blocking the user’s view
57. Gestures are expressive, meaningful body motions involving physical movements of the fingers, hands, arms, head,
face, or body.
A. true

B. false

Answer:
A. true
58. Sensors used in gestures ……..
A. magnetic field trackers

B. accelerometers

C. gyroscopes

D. all of the above

Answer:
D. all of the above
59. In Solove’s taxonomy of privacy
Surveillance & Interrogation is a part of ……….
A. information collection

B. information processing

C. information dissemination

D. invasion

Answer:
A. information collection
60. In Solove’s taxonomy of privacy
Aggregation & Identification is a part of ……….
A. information collection

B. information processing

C. information dissemination

D. invasion

Answer:
B. information processing

61. Breach of confidentiality is
…………
A. is the threat to disclose personal information

B. is breaking the promise to keep a person’s informationconfidential.

C. is amplifying the accessibility of information.

D. none of the above

Answer:
B. is breaking the promise to keep a person’s informationconfidential.
62. Decisional interference involves
………….
A. revealing another’s nudity, grief, or bodily functions

B. the revelation of truthful information about a person

C. the government’s incursion into people’s decisionsregarding their private affairs

D. the dissemination of certain information about a person to servethe aims and interests of another

Answer:
C. the government’s incursion into people’s decisionsregarding their private affairs
63. RFID privacy challenges ………
A. automation & identification

B. identification & authentication

C. integration & automation

D. all of the above

Answer:
D. all of the above
64. Clandestine Scanning is …………..
A. the tag data is scanned without the tag carrier’s consent.

B. the tag data is scanned for informationprocessing

C. both a&b

D. none of the above

Answer:
A. the tag data is scanned without the tag carrier’s consent.
65. PSTN stands for
A. public switched telephone network

B. personal switched telephone network

C. personal switched telephone node

D. public switched telephone node

Answer:
A. public switched telephone network
66. PSTN is and wireless networks are
A. highly dynamic, virtually static

B. static, virtually static

C. highly dynamic, virtually dynamic

D. virtually static, highly dynamic

Answer:
D. virtually static, highly dynamic

67. In public switched telephone network, LATA stands for
A. local access and transport area

B. land area and transport area

C. local access and telephone access

D. local area and telephone access

Answer:
A. local access and transport area
68. LATAs are connected by a
company called
A. land exchange carrier

B. local exchangecarrier

C. local controlexchange

D. land area exchange

Answer:
B. local exchangecarrier
69. A long distance telephone company that collects toll is called
A. lata

B. lec

C. pstn

D. ixc

Answer:
D. ixc
70. The technique for separate but parallel signalling channel is
called
A. common channel signalling

B. forward channel signalling

C. reverse channel signalling

D. separate channel signalling

Answer:
A. common channel signalling
71. ADLS Broadband stands for
A. asynchronous digital subscriber line

B. asemetric digital subscriber line

C. asynchronous doublesubscriber line

D. asynchronous data subscriber line

Answer:
A. asynchronous digital subscriber line
72. US cellular standard CDPD stands for
A. cellular digital packet data

B. cellular digital packet data

C. cellular digital pocket data

D. cellular discrete pocket data

Answer:
A. cellular digital packet data

73. What are the Methods to move
data through a network of links and switches?
A. packet switching and line switching

B. circuit switching and line switching

C. line switching and bit switching

D. packet switching and circuit switching

Answer:
D. packet switching and circuit switching
74. In systems, resources
are allocated on demand.
A. packet switching

B. circuit switching

C. line switching

D. frequency switching

Answer:
A. packet switching
75. WiMAX stands for
A. wireless maximum communication

B. worldwide interoperability for microwave access

C. worldwide international standard formicrowave access

D. wireless internet maximum communication

Answer:
B. worldwide interoperability for microwave access

76. WiMAX provides
A. simplex communication

B. half duplex communication

C. full duplex communication

D. no communication

Answer:
C. full duplex communication
77. Which of the following modulation schemes is supported
by WiMAX?
A. binary phase shift keying modulation

B. quadrature phase shift keyingmodulation

C. quadrature amplitudemodulation

D. all of the mentioned

Answer:
D. all of the mentioned
78. WiMAX provides
A. voip services

B. iptv services

C. both voip andiptv services

D. no iptv services

Answer:
C. both voip andiptv services
79. Which of the following frequencies is not used in WiMAX
for communication?
A. 2.3 ghz

B. 2.4 ghz

C. 2.5 ghz

D. 3.5 ghz

Answer:
B. 2.4 ghz
80. What is the access point (AP) in a wireless LAN?
A. device that allows wireless devices to connect to a wired network

B. wireless devices itself

C. both device that allows wireless devices to connect to a wired

D. all the nodes in the network

Answer:
A. device that allows wireless devices to connect to a wired network

81. Which multiple access technique
is used by IEEE 802.11 standard for wireless LAN?
A. cdma

B. csma/ca

C. aloha

D. csma/cd

Answer:
B. csma/ca
82. Mostly is used in wireless LAN.
A. time division multiplexing

B. orthogonalfrequency division multiplexing

C. space division multiplexing

D. channel division multiplexing

Answer:
B. orthogonalfrequency division multiplexing
83. What is WPA?
A. wi-fi protected access

B. wired protectedaccess

C. wired processaccess

D. wi-fi process access

Answer:
A. wi-fi protected access
84. In
Bluetooth,multiple form a network called a ————
A. scatternet; piconets

B. piconets: scatternet

C. piconets: bluenet

D. bluenet; scatternet

Answer:
B. piconets: scatternet
85. The bluetooth supports
A. point-to-point connections

B. point-to-multipoint connection

C. both (a) and (b)

D. none of the above

Answer:
C. both (a) and (b)

86. Frequency range supported in
Zigbee ………….
A. 2.4 ghz worldwide

B. 2.0 ghz worldwide

C. 2.1 ghzworldwide

D. 3.4 ghz worldwide

Answer:
A. 2.4 ghz worldwide
87. There is more than …………… cell
nodes in zigbee.
A. 66000

B. 65000

C. 60000

D. 70000

Answer:
B. 65000
88. ZigBee developed under …………..
A. ieee 802.15.1.

B. ieee 802.15.2.

C. ieee 802.15.3.

D. ieee 802.15.4.

Answer:
D. ieee 802.15.4.
89. A Body Area Network or BAN consists ……………
A. wireless devices to connect to a wirednetwork

B. set of mobile and compact sensors

C. sensors & communicationdevices

D. wearable device & sensors

Answer:
B. set of mobile and compact sensors
90. Body Area Network requirements
……….
A. low powerconsumption & interoperability

B. self-healing & security

C. low latency

D. all of the above

Answer:
D. all of the above
91. Find out wrong stament of Body Area Network……………
A. sensors are put on patient’s body to monitor heart rate, blood pressure and ecg.

B. provides healthcare services over a long distance with the help of it and communication.

C. sensors can be used to measure navigation, timer, distance, pulse rate and bodytemperature.

D. allowing transmission of data, voice and video via a computer

Answer:
D. allowing transmission of data, voice and video via a computer

92. WBAN(Wireless Body Area Network) allows the user to move another without having the restriction of a cable for sharing
information.
A. true

B. false

Answer:
A. true
93. Which of the following standard committee specifies Bluetooth and other Personal Area Networks
(PAN)?
A. ieee 802.11b

B. ieee 802.15.2.

C. ieee 802.11g

D. ieee 802.16

Answer:
B. ieee 802.15.2.
94. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as
A. chock point

B. meeting point

C. firewall point

D. secure point

Answer:
A. chock point
95. A proxy firewall filters at
A. physical layer

B. data link layer

C. network layer

D. application layer

Answer:
D. application layer
96. A firewall needs to be
so that it can grow proportionally with the network that it protects.
A. robust

B. expansive

C. fast

D. scalable

Answer:
B. expansive
97. provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to
the private network.
A. visual private network

B. virtual protocol network

C. virtual protocol networking

D. virtual private network

Answer:
D. virtual private network

98. Which of the statements are not true to classify VPN systems?
A. protocols used for tunnelling the traffic

B. whether vpns are providing site-to-site or remote accessconnection

C. securing the network from bots andmalwares

D. levels of security provided for sending and receiving dataprivately

Answer:
C. securing the network from bots andmalwares
99. What types of protocols are used
in VPNs?
A. application levelprotocols

B. tunnellingprotocols

C. networkprotocols

D. mailing protocols

Answer:
A. application levelprotocols
100. Which types of VPNs are used for corporate connectivity across companies residing in different
geographical location?
A. remote access vpns

B. site-to-site vpns

C. peer-to-peer vpns

D. country-to-country vpns

Answer:
B. site-to-site vpns

101. uses radio-frequency waves to transfer data between a
A. Wi-Fi

B. OCR

C. Bar Code

D. RFID

Answer:
D. RFID
102. Is fast and does not require physical sight or contact
A. Wi-Fi

B. OCR

C. Bar Code

D. RFID

Answer:
D. RFID
103. technology often used in “smart cards,” have small radio
A. Wi-Fi

B. OCR

C. Bar Code

D. RFID

Answer:
D. RFID
104. A network of physical objects or things embedded with electronics or
A. AI

B. ML

C. IoT

D. Internet

Answer:
C. IoT
105. RFID stands for .
A. Random

B. Radio

C. Random

D. Radio frequency

Answer:
B. Radio

106. Which of the following is not involved in working of IoT?
A. RFID

B. Sensors

C. Nano Tech

D. RFID

Answer:
C. Nano Tech
107. Making the smaller and smaller things have the ability to connect and interact
A. Micro Tech

B. Smart Tech

C. Nano Tech

D. RFID

Answer:
C. Nano Tech
108. Several instructions execution simultaneously in .
A. Processing

B. Parallel

C. Serial

D. Multi Tasking

Answer:
B. Parallel
109. In , data is written only once during manufacturing or
A. Read Only

B. Write Once –

C. Read/Write

D. All of above

Answer:
B. Write Once –
110. In tag data can be changed over time.
A. Read Only

B. Write Once –

C. Read/Write

D. All of above

Answer:
C. Read/Write

111. These are the functions of RFID Reader
A. Remotely

B. Establish a

C. Inventory tags,

D. All of above

Answer:
D. All of above
112. In , One antenna is used to transmit the RF signals, and the
A. Mon Static

B. Multi Static

C. Bi Static

D. None of the above

Answer:
C. Bi Static
113. propose a scheme to define labels that can be automatically
A. Semacode

B. RFID

C. IANA

D. IEEE

Answer:
A. Semacode
114. In Smart Device Form Factors, can be spread into physical
A. Smart dust

B. Smart Clay

C. Smart Skins

D. None of the above

Answer:
A. Smart dust
115. In smart device form factors, application of where paint used
A. Smart dust

B. Smart Clay

C. Smart Skins

D. None of the above

Answer:
C. Smart Skins
116. Claytronics project is application of .
A. Smart dust

B. Smart Clay

C. Smart Skins

D. None of the above

Answer:
B. Smart Clay

117. process two or more combined user input modes, such as
A. a. Multimodal

B. b. Gesture

C. c. Reflective

D. d. Active Interfaces

Answer:
A. a. Multimodal
118. controller with control action the output of the controller
A. a. Derivative

B. b. Integral

C. c. Proportional

D. None of the above

Answer:
A. a. Derivative
119. With action, there is a continuous relationship between the
A. a. Derivative

B. b. Integral

C. c. Proportional

D. None of the above

Answer:
C. c. Proportional
120. can be defined as the manipulation, precision
A. a. Nano-

B. b. Ubiquitous

C. c. MEMS

D. d. Semacode

Answer:
A. a. Nano-
121. IANA stands for:
A. a. Internal

B. b. Internet

C. c.

D. d. Internet

Answer:
D. d. Internet
122. MQTT Stands for
A. a. MQ

B. b. MQ

C. c. MQ

D. d. MQ Telemetry

Answer:
D. d. MQ Telemetry

123. can be sprayed & embedded throughout the digital
A. a. Smart dust

B. b. Smart Clay

C. c. Smart Skin

D. d. Smart Object

Answer:
A. a. Smart dust
124. Which of the following statements about radio frequency identification
A. a. RFID

B. b. RFID

C. c. RFID

D. d. Companies may

Answer:
C. c. RFID
125. The wireless networking standard that is useful for creating small personal
A. a. Toothless

B. b. Whitetooth

C. c. Bluetooth

D. d. None of the

Answer:
C. c. Bluetooth

126. The transmission medium that consists of strands of clear glass fibre, each of
A. a. Fiber Optics

B. b. Twisted

C. c. Microwave

D. d. None of the

Answer:
A. a. Fiber Optics
127. The device that is required to translate digital signals into analogue form and
A. a. Connector

B. b. Modem

C. c. Switch

D. d. Router

Answer:
B. b. Modem
128. The TCP/IP layer that is responsible for providing the communication and
A. a. Application

B. b. Transport

C. c. Network

D. d. Data Link Layer

Answer:
B. b. Transport
129. The method of slicing digital messages into parcels, sending them along
A. a. TCP/IP

B. b. Packet

C. c. Data

D. d. Client Server

Answer:
B. b. Packet
130. Which of the following businesses benefit and implemented RFID?
A. a. Logistics

B. b. Building

C. c. IT

D. d. All of the above

Answer:
D. d. All of the above

131. There are basic types of chips available on RFID tags.
A. a. Two

B. b. Three

C. c. Five

D. d. Seven

Answer:
A. a. Two
132. Does RFID have the ability to read many tags together at once?
A. a. Yes

B. b. No

C. May Be

D. Neutral

Answer:
A. a. Yes
133. The information on read-only chips be changed.
A. a. Can

B. b. Cannot

C. c. Sometimes

D. d. None of the

Answer:
B. b. Cannot
134. A reader may have multiple antennas that are responsible for sending and
A. a. True

B. b. False

Answer:
A. a. True
135. Which of the following is not RFID type?
A. a. Ultra-Low

B. b. Low

C. c. High

D. d. Ultra-High

Answer:
A. a. Ultra-Low

136. occurs when many tags are present in a small area; but since
A. a. RFID reader

B. b. RFID Tag

C. c. RFID

D. d. None of the

Answer:
B. b. RFID Tag
137. Which of the following is correct for tactile sensors?
A. a. Touch

B. b. Pressure

C. c. Input

D. d. Humidity

Answer:
A. a. Touch
138. Change in output of sensor with change in input is
A. a. Threshold

B. b. Slew rate

C. c. Sensitivity

D. d. None of the

Answer:
C. c. Sensitivity
139. Thermocouple generate output voltage according to
A. a. Circuit

B. b. Humidity

C. c.

D. d. Voltage

Answer:
C. c.
140. Sensor is a type of transducer.
A. a. True

B. b. False

Answer:
A. a. True
141. Which of the following is not an analog sensor?
A. Potentiometer

B. Force-sensingresistors

C. Accelerometers

D. None of thementioned

Answer:
D. None of thementioned

142. Following acts as detector in Optical sensor
A. a. Light

B. b. Photo

C. c. Transistor

D. d. All of above

Answer:
B. b. Photo
143. Following is (are) the type(s) of Light sensor(s)
A. a. Photo

B. b. Photo

C. c. Photo

D. d. All of above

Answer:
D. d. All of above
144. In real time operating system
A. a. all processes

B. b. a task must

C. c. process

D. d. kernel is not

Answer:
B. b. a task must
145. Hard real time operating system has jitter than a soft real
A. a. Less

B. b. More

C. c. Equal

D. d. None of above

Answer:
A. a. Less
146. For real time operating systems, interrupt latency should be
A. a. Minimal

B. b. Maximum

C. c. Zero

D. d. Dependent onscheduling

Answer:
A. a. Minimal
147. Which one of the following is a real time operating system?
A. a. RTLinux

B. b. VxWorks

C. c. Windows

D. d. All of above

Answer:
D. d. All of above

148. Drives are also known as
A. a. Actuators

B. b. Controller

C. c. Sensors

D. d. Manipulator

Answer:
A. a. Actuators
149. A Robot is a
A. a.

B. b. Multi

C. c. Both (A)

D. d. None of the

Answer:
C. c. Both (A)
150. The main objective(s) of Industrial robot is to
A. a. Tominimize the

B. b. To increaseproductivity

C. c. To enhancethe life of

D. d. All of the above

Answer:
D. d. All of the above

151. deals with the protection of an individual’s information which is implemented while using
A. Digital agony

B. Digital privacy

C. Digital secrecy

D. Digital protection

Answer:
B. Digital privacy
152. Which of the following statements are true in case of privacy.
A. It is product of norms, legal protections and activities.

B. IT is a state type in which the identity and personal information of a person is kept confidential.

C. Privacy of anentity is the result of negotiating and enforcing when, how, to what extent and in

D. All above statements are true.

Answer:
D. All above statements are true.
153. involves the revelation of truthful
A. Breach ofconfidentially.

B. Disclosure

C. Exposure

D. Increasedaccessibility

Answer:
B. Disclosure
154. is breaking the promise to stay a person’s data confidential.
A. Breach of confidentially.

B. Disclosure

C. Exposure

D. Increased accessibility

Answer:
A. Breach of confidentially.
155. A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic-filtering rules is
A. Gateways

B. Proxy

C. Firewall

D. DNS

Answer:
C. Firewall

156. In , there ought as far as possible to the accumulation of individual information and any such information ought to be gotten by legal and reasonable means and where suitable with the learning or
A. Gathering Limitation Principle

B. Information Quality Principle

C. Reason Specification Principle

D. Utilize Limitation Principle.

Answer:
A. Gathering Limitation Principle
157. In , individual information ought to be applicable to the reasons for which they are to be utilized and to the degree important for those reasons, ought to be
A. Gathering Limitation Principle

B. Information Quality Principle

C. Reason Specification Principle

D. Utilize Limitation Principle.

Answer:
B. Information Quality Principle
158. In , reasons for which personal information are gathered ought to be indicated not later than at the season of information accumulation and the consequent utilize constrained to the satisfaction of those reasons or such others are not inconsistent with those
A. Gathering Limitation Principle

B. Information Quality Principle

C. Reason Specification Principle

D. Utilize Limitation Principle.

Answer:
C. Reason Specification Principle
159. In , individual information ought not be unveiled , made accessible or generally utilized for purposes as per purpose specification rule.
A. Gathering Limitation Principle

B. Information Quality Principle

C. Reason Specification Principle

D. Utilize Limitation Principle.

Answer:
D. Utilize Limitation Principle.
160. Systems used to track and identify the location of objects in real time is
A. Geolocation

B. geographicalinformation

C. WirelessApplication

D. Real-time location system (RTLS)

Answer:
D. Real-time location system (RTLS)

161. Gateway to the Internet optimized for mobility
A. Voice Portal

B. Wi-Max

C. Mobile Enterprise

D. Mobile Portal

Answer:
D. Mobile Portal
162. automatically identifying a Web user’s location
A. Voice Portal

B. Geolocation

C. Sensor Network

D. Wi-Max

Answer:
B. Geolocation
163. Computing capabilities embedded into objects around us (mobile and stationary)
A. pervasive computing

B. ubiquitous computing

C. Context-aware computing

D. None of above

Answer:
B. ubiquitous computing
164. Computing capabilities embedded in the environment but typically not mobile
A. pervasive computing

B. Mobile Portal

C. Context-aware computing

D. None of above

Answer:
A. pervasive computing
165. A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes
A. Voice Portal

B. Mobile Portal

C. Geolocation

D. Sensor Network

Answer:
D. Sensor Network
166. short-range radio frequency communication technology for remotely storing and retrieving data using devices called RFID tags and RFID readers
A. Network Based Positioning

B. Real Time Location Systems

C. Radio Frequency Identification

D. Wireless Network

Answer:
C. Radio Frequency Identification

167. a technology that offers Internet browsing from wireless devices
A. Real Time Location Systems

B. RFID

C. Wireless wide Area Network

D. Wireless Application Protocol

Answer:
D. Wireless Application Protocol
168. a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology
A. Bluetooth

B. Mobile Portal

C. Wi-Max

D. Geolocation

Answer:
C. Wi-Max
169. a wireless version of the Ethernet networking standard
A. Wireless wide area network

B. Wireless local area network

C. Personal area network

D. Body area network

Answer:
B. Wireless local area network
170. computer system capable of integrating, storing, editing, analyzing, sharing, and displaying geographically referenced (spatial) information
A. Personal area network

B. Body area network

C. Bluetooth

D. GIS

Answer:
D. GIS
171. a voice system enables users to request/receive info, enter/change data through a telephone to a computerized
A. Bluetooth

B. Real Time location Systems

C. GIS

D. Interactive Voice response

Answer:
D. Interactive Voice response
172. a telecommunications network that offers wireless coverage over a large geographical area, typically over a cellular phone network
A. Bluetooth

B. Zigbee

C. Wireless Wide Area network

D. WAP

Answer:
C. Wireless Wide Area network

173. ability to detect and react to a set of environmental variables that is described as context (which can be sensor info or
A. Mobile Portal

B. Conext Aware Computing

C. Pervasive Computing

D. Network Based positioning

Answer:
B. Conext Aware Computing
174. a wireless telecommunications network for device-to-device connections within a very short range
A. Wireless Wide Area Network

B. Personal Area Network

C. Wireless Local Area Network

D. Wired Network

Answer:
B. Personal Area Network
175. a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology
A. Wi-FI

B. Wi-Max

C. Bluetooth

D. Wired LAN

Answer:
B. Wi-Max

176. When you use the word it means you are protecting your data from getting disclosed.
A. Confidentiality

B. Integrity

C. Authentication

D. Availability

Answer:
A. Confidentiality
177. is what every individual prefer in terms of physical privacy as well as digital privacy.
A. Confidentiality

B. Integrity

C. Authentication

D. Availability

Answer:
A. Confidentiality
178. means the protection of data from modification by unknown users.
A. Confidentiality

B. Integrity

C. Authentication

D. Availability

Answer:
B. Integrity
179. of information means, only authorised users are capable of accessing the information.
A. Confidentiality

B. Integrity

C. Authentication

D. Availability

Answer:
D. Availability
180. This helps in identifying the origin of information and
A. Confidentiality

B. Integrity

C. Authentication

D. Availability

Answer:
C. Authentication

181. Data is used to ensure confidentiality.
A. Encryption

B. Locking

C. Deleting

D. Backup

Answer:
A. Encryption
182. One common way to maintain data availability is
A. Data Clustering

B. Data backup

C. Data Altering

D. Data recovery

Answer:
B. Data backup
183. The First Phase Of Hacking An IT System Is Compromise Of W hich Foundation Of Security?
A. Confidentiality

B. Integrity

C. Authentication

D. Availability

Answer:
A. Confidentiality
184. Data integrity means
A. providing first access to stored data

B. ensuring correctness and consistency of

C. providing data sharing

D. none of the above

Answer:
B. ensuring correctness and consistency of
185. Authentication refers to :
A. methods ofrestricting user access to system

B. controllingaccess to portions of

C. controlling theoperation on the data

D. all of the above

Answer:
D. all of the above

186. does not have any management flow.
A. Synchronous

B. Casual

C. Asynchronous

D. Smart Interaction

Answer:
C. Asynchronous
187. is proving that a message was sent by a certain sender.
A. Confidentiality

B. Integrity

C. Authentication

D. Availability

Answer:
C. Authentication
188. means hiding contents of a message so that nobody else but the intended recipient can read it.
A. Authenticity

B. Integrity

C. Encryption

D. Availability

Answer:
C. Encryption
189. is the act of taking data and rendering it unreadable to anyone except for the intended recipient. While on the other hand, is the act of a user proving that they are who they are, and that they can
A. Encryption, Decryption

B. Encryption, Availability

C. Authentication, Encryption

D. Encryption, Authentication

Answer:
D. Encryption, Authentication
190. ensures no one other our intended recipient(s) can eavesdrop on the message while provides confidentiality by scrambling the
A. Encryption, Decryption

B. Encryption, Availability

C. Authentication, Encryption

D. Confidentiality, Encryption

Answer:
D. Confidentiality, Encryption
191. ensures no one can alter the message before our intended recipient(s) sees it.
A. Authenticity

B. Integrity

C. Encryption

D. Availability

Answer:
B. Integrity

192. ensures that the message really came from the supposed sender.
A. Authenticity

B. Integrity

C. Encryption

D. Availability

Answer:
A. Authenticity
193. Digital signatures combined with digital certificates provide by giving the recipient(s) a way to tie the message to an individual or entity who signed the message.
A. Authenticity

B. Integrity

C. Encryption

D. Availability

Answer:
A. Authenticity
194. transforms meaningful data into what looks like gibberish using a secret that can also be used to reverse the process. Reversing the process is called
A. Encryption, Decryption

B. Encryption, Availability

C. Authentication, Encryption

D. Confidentiality, Encryption

Answer:
A. Encryption, Decryption
195. is the process of convincing a gatekeeper that you are who you say you are, typically by proving that you know a secret, I.e. password, captcha
A. Authenticity

B. Integrity

C. Encryption

D. Availability

Answer:
A. Authenticity
196. A collection of nodes used for sensing the environment is known as .
A. Voice Portal

B. Mobile Portal

C. Geolocation

D. Sensor Network

Answer:
D. Sensor Network
197. Sensors are those which require an external excitation signal or a power signal.
A. Active

B. Passive

C. Active and Passive both

D. All of above

Answer:
B. Passive

198. do not require any external power signal and directly generates output response.
A. Active

B. Passive

C. Active andPassive both

D. All of above

Answer:
A. Active
199. is a non-contact type sensor that detects the presence of an object.
A. Temperature

B. Pressure

C. Proximity

D. All of above

Answer:
C. Proximity
200. sensors are light based sensor that are used in various applications like Proximity and Object
A. Temperature

B. Pressure

C. Infrared

D. None of above

Answer:
C. Infrared

201. This is not included as a main 3 properties for UbiCom Systems were proposed by Weiser in 1991.
A. Computers need to be networked, distributed and transparently accessible

B. Computer Interaction with Humans needs to be more hidden

C. Computers need to be aware of environment context

D. Computers can operate autonomously, without human intervention, be self-governed

Answer:
D. Computers can operate autonomously, without human intervention, be self-governed
202. This is not included as a properties of Ubiquitous Computing
A. Remote

B. Autonomous

C. Distributed

D. Intelligent

Answer:
A. Remote
203. In ubicomp system Model , Smart DEI where DEI stands for
A. Devices, Environment, Interfaces

B. Devices, Environment, Interactions

C. Distributed, Energy Saving, Intelligent

D. Digital, Environment, Intelligent

Answer:
B. Devices, Environment, Interactions
204. Sub-Properties (sub-types of individual intelligence) of Individual Intelligence includes
A. Reactive, Reflex

B. Model-based,

C. Rule/Policy-based

D. All of above

Answer:
D. All of above
205. eHCI indicate
A. H2H

B. H2C

C. C2H

D. C2C

Answer:
B. H2C

206. Implicit (i)HCI indicates
A. H2H

B. H2C

C. C2H

D. C2C

Answer:
C. C2H
207. In Different Degrees of CPI complete physical interaction (no ICT mediation) specifies
A. P2P

B. C2P / CA(Physical Env. Context-aware)

C. P2C/AR/MR

D. C2C /VR

Answer:
A. P2P
208. 3 basic architectural design patterns for UbiCom includes smart
A. Devices, Environment, Interfaces

B. Devices, Environment, Interactions

C. Distributed, Energy Saving, Intelligent

D. Digital, Environment, Intelligent

Answer:
B. Devices, Environment, Interactions
209. Smart means systems are active, digital, networked, autonomous, reconfigurable, local control of its own resources, is this statement is true or false?
A. TRUE

B. FALSE

Answer:
A. TRUE
210. indicates Increasing capability to manufacture low power, micro, more complex devices.
A. Smart Devices

B. Smart Environments

C. Smart Interactions

Answer:
A. Smart Devices

211. indicates Increasing capability to embed devices in the physical environment.
A. Smart Devices

B. Smart Environments

C. Smart Interactions

Answer:
B. Smart Environments
212. indicates Increasing capability for more interoperable distributed mobile devices
A. Smart Devices

B. Smart Environments

C. Smart Interactions

Answer:
C. Smart Interactions
213. can be sprayed & embedded throughout the digital environment
A. Smart Dust

B. Smart Skin

C. Smart Clay

Answer:
A. Smart Dust
214. feature allows user to connect the systems on the move
A. Distributed

B. Mobility

C. Real time embedded

D. Intelligent

Answer:
B. Mobility
215. Internet of Things (IoT) systems are fully systems
A. M2M

B. H2M

C. M2H

D. H2H

Answer:
A. M2M
216. Layer is always at the bottom of ubiquitous computing stack.
A. Physical

B. Services

C. Applications

D. Internet

Answer:
A. Physical

217. In user performs an action which is having primary aim to interact with systems.
A. iHCI

B. eHCI

C. CCI

D. HHI

Answer:
A. iHCI
218. is dependent on physical dimensions like time or temperature etc.
A. Physical environment context

B. Human context

C. Virtual environment or ICT context

D. All of the Above

Answer:
A. Physical environment context
219. In the main constraint on interactions is
A. Physical

B. Human context

C. Virtual

D. All of the Above

Answer:
B. Human context
220. In any type of specific component in
A. Physical

B. Human context

C. Virtual

D. All of the Above

Answer:
C. Virtual
221. is a feature or property of system that enables
A. Mobility

B. Autonomy

C. Distributed

D. Pervasive

Answer:
B. Autonomy
222. is a feature of systems which adapt
A. Mobility

B. Intelligence

C. Distributed

D. Pervasive

Answer:
B. Intelligence

223. In basic interaction, protocol consists
A. Synchronous

B. Asynchronous

C. Smart Interaction

D. All of the Above

Answer:
A. Synchronous
224. In basic interaction, protocol consists of
A. Synchronous

B. Asynchronous

C. mart Interaction

Answer:
B. Asynchronous
225. In completely different elements act
A. Coordinated

B. Policy Based

C. Dynamic

D. Semantic and

Answer:
A. Coordinated

226. In completely different elements act
A. Coordinated

B. Policy Based

C. Dynamic

D. Semantic and

Answer:
B. Policy Based
227. In , peoples in organization interact
A. Coordinated

B. Policy Based

C. Dynamic

D. Semantic and

Answer:
C. Dynamic
228. includes communication ability and to
A. Coordinated

B. Policy Based

C. Dynamic

D. Semantic and

Answer:
D. Semantic and
229. A method which uses advertisements in electronic media,
A. PUSH

B. PULL

C. POP

D. All of the Above

Answer:
A. PUSH
230. In method, for getting some type of information, if
A. PUSH

B. PULL

C. POP

D. All of the Above

Answer:
B. PULL

231. can be defined as the manipulation,
A. Nano-

B. MEMS

C. Semacode

D. Ubiquitous Systems

Answer:
A. Nano-
232. can be considered to be resource-
A. Wired System

B. Wireless System

C. Real Time Systems

D. None of the Above

Answer:
C. Real Time Systems
233. In is response thats late is incorrect and
A. Hard Real

B. Soft Real Time

C. Operating Systems

D. Embedded Systems

Answer:
A. Hard Real
234. protocol is used for Streaming Media over
A. TCP

B. RTP

C. RTSP

D. Voice Over IP

Answer:
B. RTP
235. Protocol is used for voice communication
A. TCP

B. RTP

C. RTSP

D. Voice Over IP

Answer:
D. Voice Over IP

236. In the user requests the system to carry out a certain
A. eHCI

B. iHCI

C. CCI

D. HHI

Answer:
A. eHCI
237. micron- to millimetre-scale electronic
A. Nano-

B. MEMS

C. Semacode

D. Ubiquitous

Answer:
B. MEMS
238. is based upon a broader range of materials,
A. Nano-

B. MEMS

C. Semacode

D. Ubiquitous Systems

Answer:
A. Nano-
239. The drive to switch transistors faster and to be low-powered has been to make them smaller where electronic components approach nanometer sizes is called as
A. Nano- computing

B. MEMS

C. Semacode

D. Ubiquitous Systems

Answer:
A. Nano- computing
240. Announcement, discovery, selection, configuration and composition are included in phase of service provision life cycle.
A. Service creatio

B. Service operatio

C. Service maintenanc

D. Service dissolution

Answer:
A. Service creatio
241. Invoke and coordinate are included in phase of service provision life cycle.
A. Service creatio

B. Service operatio

C. Service maintenanc

D. Service dissolution

Answer:
B. Service operatio

242. Terminate and remove registrations are included in phase of service provision life cycle.
A. Service creatio

B. Service operatio

C. Service maintenanc

D. Service dissolution

Answer:
D. Service dissolution
243. Re-invoke, Update descriptions, reconfiguration and update composition are included in phase of service provision life cycle.
A. Service creatio

B. Service operatio

C. Service maintenanc

D. Service dissolution

Answer:
C. Service maintenanc
244. is also known as Publish-and-Subscribe interaction.
A. Layered model

B. Pipe-filter mode

C. Event-driven Action or EDA

D. Shared data repositories

Answer:
C. Event-driven Action or EDA
245. subscribe to being notified when specified events occur.
A. Layered model

B. Pipe-filter mode

C. Event-drivenAction or EDA Model

D. Shared data repositories

Answer:
C. Event-drivenAction or EDA Model
246. systems that are self governing and also they are capable of taking their own independent decisions and
A. Autonomy

B. Distributed

C. Networked

D. Context aware

Answer:
A. Autonomy
247. enable computer-based services to be made available everywhere.
A. Real Time Syst

B. Embedded Syste

C. Distributed Systems

D. Ubiquitous Systems

Answer:
D. Ubiquitous Systems

248. Human / User interaction to the devices is maximum in .
A. M2M

B. H2M

C. M2H

D. H2H

Answer:
D. H2H
249. Ubiquitous computing interaction to the devices is minimum or zero in .
A. M2M

B. H2M

C. M2H

D. H2H

Answer:
D. H2H
250. systems are known as ubiquitous systems and does not involve humans to interact.
A. M2M

B. H2M

C. M2H

D. H2H

Answer:
A. M2M

251. If the systems are made proactive as per the requirement of users then these efforts and attempts are built in concept called
A. Ubiquitous Computing

B. Mobile Computing

C. Cloud Computing

D. All of There

Answer:
A. Ubiquitous Computing
252. The Assumption of pervasive computing is about and technology.
A. Information &Communicatio

B. Data , Message

C. Knowledge,Messag

D. None of the Above

Answer:
A. Information &Communicatio
253. . mainly allows you to connect on the move.
A. Scalability

B. Portability

C. Mobility

D. Flexibility

Answer:
C. Mobility
254. Ubiquitous Computing connects environment and in unobtrusive ways.
A. User

B. Cloud

C. Resource

D. Data

Answer:
A. User
255. Advantages Of ubiquitious computing
A. Invisible

B. Socialization

C. Decision-making

D. All of There

Answer:
D. All of There

256. For modelling different key properties of computing the increasingly digital world is occupied.
A. Pervasive

B. Ubiquitous

C. Both a & b

D. None of the Above

Answer:
C. Both a & b
257. The ICT systems are called as when system view is as single system
A. Multiple

B. Single

C. Distributed

D. Disjoint

Answer:
C. Distributed
258. The technique has various dimension.
A. VR

B. RJ

C. Calm

D. Real

Answer:
C. Calm
259. . also exists as a separate reality from physical world.
A. VR

B. Real

C. Calm

D. Distributed

Answer:
A. VR
260. Ubiquitous Means ……
A. Found Everywhere

B. Found Nowhere

C. Found Anyhow

D. Found Veryfast

Answer:
A. Found Everywhere

261. Which two methods followed by Business Models?
A. PUSH & POP

B. PUSH & PULL

C. PULL & POP

D. None of the above

Answer:
B. PUSH & PULL
262. What is main aim of Ubiquitous Computing?
A. Creating Digital Product

B. Creating Smart Product

C. Creating Best Product

D. Creating High Quality Product

Answer:
B. Creating Smart Product
263. Ubiquitous Computing closely realted with?
A. IOT

B. M2M

C. Both IOT & M2M

D. None of the above

Answer:
C. Both IOT & M2M
264. Second era of computing is known as the …….
A. Mainfram e era

B. PC era

C. Ubiquitous Computing

D. None of the above

Answer:
B. PC era
265. Third era of computing is known as the …….
A. Mainfram e era

B. PC era

C. Ubiquitous Computing

D. None of the above

Answer:
C. Ubiquitous Computing
266. Who invented term Ubiquitous Computing ?
A. Shaun Watson

B. Mark Ciere

C. Mark Watson

D. Mark Weiser

Answer:
D. Mark Weiser

267. Which of the following is not Ubiquitous Device ?
A. TV

B. RFIDTags

C. PDAs

D. Smartpho ne GPS

Answer:
A. TV
268. Ubiquitous Computing supports …….
A. Many to 1

B. 1 to 1

C. Many to Many

D. 1 to Many

Answer:
D. 1 to Many
269. Ubiquitous Computing is also called as …….
A. Cloud Computi ng

B. Grid Computin g

C. Pervasive Computing

D. Distribute d Computin g

Answer:
C. Pervasive Computing
270. Systems used to track and identify the location of objects in real time
A. Geolocati on

B. geographi cal informatio n system (GIS)

C. geographic al information system (GIS)

D. Real-time location system (RTLS)

Answer:
D. Real-time location system (RTLS)
271. gateway to the Internet optimized for mobility
A. Voice portal

B. WiMax

C. Mobile enterprise

D. Mobile Portal

Answer:
D. Mobile Portal
272. Computing capabilities embedded in the environment but typically not mobile
A. Mobile Portal

B. pervasive computing

C. Context- aware computing

D. voice portal

Answer:
B. pervasive computing

273. A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes
A. Voice portal

B. Mobile Portal

C. Geolocatio n

D. sensor network

Answer:
D. sensor network
274. ability to detect and react to a set of environmental variables that is described as context (which can be sensor info or users’ attitudes)
A. Mobile Portal

B. Context- aware computing

C. Network- based positioning

D. pervasive computin g

Answer:
B. Context- aware computing
275. HCI stands for
A. Human Computer Inteface

B. Human Computer Intraction

C. Both

D. None of the above

Answer:
B. Human Computer Intraction

276. Distributed ICT system consists of how many layes ?
A. 2

B. 3

C. 5

D. 4

Answer:
B. 3
277. Which of the following is not property of UbiComp system ?
A. Implicit HCI

B. Explicit HCI

C. Distributed

D. Both A & C

Answer:
B. Explicit HCI
278. Which of the following are Interaction Models in UbiComp System ?
A. HCI

B. CCI

C. CPI

D. All of the above

Answer:
D. All of the above
279. Design architecture of UbiComp system consists of …………..
A. Smart Device

B. Smart Environme nt

C. Smart Interaction

D. All of the above

Answer:
D. All of the above
280. CPI stands for
A. Computer Physical World Ineraction

B. Human Computer Intraction

C. Computer Physical Interface

D. None of the above

Answer:
A. Computer Physical World Ineraction

281. Which of the following is not characteristics of Smart Devices ?
A. Mobility

B. Single Fuction

C. Dynamic Service Discovery

D. Intermitte nt Resource Access

Answer:
B. Single Fuction
282. Which are the smart devices under CCI ?
A. Smart Board

B. Smart Pad&Tabs

C. Active Badge,Bat,Fl oor

D. All of the above

Answer:
D. All of the above
283. Which are the smart devices under CPI ?
A. Unimate

B. MH-1Robot

C. Smart Dust and Tiny OS

D. All of the above

Answer:
D. All of the above
284. Main goal of Things That Think(TTT) was …….
A. See how physical world meets with logical world

B. See how logical world meets with physical world

C. See how physical world meets with logical world

D. None of the above

Answer:
A. See how physical world meets with logical world
285. Tangible Bits converts ……
A. tangible bits into painted bits

B. Painted bits into tangible bits

C. All of the above

D. None of the above

Answer:
B. Painted bits into tangible bits

286. WearCamp and WearCam comes under ……..
A. CCI

B. CPI

C. iHCI

D. ICT

Answer:
C. iHCI
287. Mobile Service Design consists of which of the following type ?
A. User Virtual Environm ent

B. Mobile Virtual Terminal

C. Virtual Resource Managemen t

D. All of the above

Answer:
D. All of the above
288. MVT stands for ……………..
A. Mobile Virtual Terminal

B. Mobile Visual Terminnal

C. Mobile Video Terminal

D. None of the above

Answer:
A. Mobile Virtual Terminal
289. Mobile Web Service Design consists of
Architecture
A. 2 tier

B. 3 tier

C. 4 tier

D. multi tier

Answer:
B. 3 tier
290. J2ME platfom distributed into which two categories
?
A. CDC & CLDC

B. CDC & HCI

C. CCI & HCI

D. None of the above

Answer:
A. CDC & CLDC
291. What is full form of CLR?
A. Common Language Rutime

B. Common Language Rellocation

C. Common Language Relocation

D. Common Language Resource

Answer:
A. Common Language Rutime

292. Service Provision Life Cycle consiste for phases.
A. 2

B. 3

C. 4

D. 5

Answer:
C. 4
293. Which are two main approaches to dynamic service announcement and discovery ?
A. PUSH & POP

B. PUSH & PULL

C. PULL & POP

D. None of the above

Answer:
B. PUSH & PULL
294. Proportional band of a controller is defined as the range of:
A. Measured variable to the set variable

B. Air output as the measured variable varies from maximum to minimum

C. Measured variables through which the air output varies from maximum to minimum

D. None of the above

Answer:
C. Measured variables through which the air output varies from maximum to minimum
295. The term reset control refers to:
A. Proportio nal

B. Integral

C. Derivative

D. None of the above

Answer:
B. Integral
296. The integral control:
A. Increases the steady state error

B. Decreases the steady state error

C. Increases the noise and stability

D. Decreases the damping

Answer:
A. Increases the steady state error
297. The number of operational amplifiers require for designing of electronic PID controller is:
A. 1

B. 2

C. 3

D. 6

Answer:
A. 1

298. A Robot is a
A. Programm able

B. Multi functional

C. Both (A) and (B)

D. None of the above

Answer:
C. Both (A) and (B)
299. The main objective(s) of Industrial robot is to
A. To minimise the labour requireme nt

B. To increase productivit y

C. To enhance the life of production machines

D. All of the above

Answer:
D. All of the above
300. Which of the following is characteritics of ICT devices
A. Size

B. Connectivit y

C. Haptic Input

D. All of the above

Answer:
D. All of the above

301. system consists of desk which can operated from specific distance.
A. MEMS

B. MEMSX

C. MEMX

D. MEMES

Answer:
B. MEMSX
302. system does not require any some person to carry identifying task.
A. Active Flore

B. Smart Flore

C. Both (A) and (B)

D. None of the above

Answer:
C. Both (A) and (B)
303. In which of the following device concept of Ultrasonic Sound gets arises ?
A. Active Flore

B. Active Badge

C. Active Bat

D. All of the above

Answer:
B. Active Badge
304. In interface user has to remember the syntax of any parameter.
A. WIMPS

B. PC

C. Command Promp

D. Human Computer

Answer:
C. Command Promp
305. WIMP stands for
A. Windows

B. Icons

C. Menu & Pointer

D. All of the above

Answer:
D. All of the above

306. Mouse is replacement of
.
A. Light Pen

B. Ball Pen

C. Scan Pen

D. Slider

Answer:
A. Light Pen
307. In direct manipulation technique documents arranged in which of following way ?
A. Queue

B. LinkedList

C. Array

D. Stack

Answer:
D. Stack
308. Which of the following technique is used to handle limited input ?
A. T9

B. Soft Keys

C. Auditory Inteface

D. All of the above

Answer:
D. All of the above
309. Which of the following is example of implicit interaction ?
A. Multi Tapping

B. Soft Keys

C. Auditory Inteface

D. T9

Answer:
D. T9
310. Peocess of hiting several keys at once is called

A. Active Chording

B. Passive Chording

C. Multi Chording

D. None of the above

Answer:
B. Passive Chording

311. Which system is used to increase the use of low resolution screen ?
A. MEMS

B. ATOS

C. AOS

D. MTOS

Answer:
D. MTOS
312. is technique in which human sense input and control motor output.
A. Multi Modal

B. Multi functional manipulato r

C. Multi Chording

D. multi tier

Answer:
A. Multi Modal
313. Visual Modal system further consists of
A. Large body movemen t

B. gestures

C. Eye gaze

D. All of the above

Answer:
D. All of the above
314. Gesture consists of
A. Contactful Gesture

B. Contactless Gesture

C. Both (A) and (B)

D. None of the above

Answer:
C. Both (A) and (B)
315. In which type of gesture there is direct physical contact invloved
A. Contactful Gesture

B. Contactless Gesture

C. Both (A) and (B)

D. None of the above

Answer:
A. Contactful Gesture
316. is used to sense the orientation of devices.
A. Microscop e

B. Gyroscope

C. Macroscope

D. Tethoscop e

Answer:
B. Gyroscope

317. BAN stands for
A. Back Area Network

B. Body Area Network

C. Back Air Network

D. Body Air Network

Answer:
B. Body Area Network
318. State whether True or False : Gesture may be static or dynamic
A. TRUE

B. FALSE

C. None of the above

Answer:
A. TRUE
319. Input and output UI are merge in which of the following interfaces ?
A. Tangible user interface

B. Organic user interface

C. Both (A) and (B)

D. None of the above

Answer:
C. Both (A) and (B)
320. is interface in which a person interact with digital information throgh the physical environment.
A. Organic user interface

B. Tangible user interface

C. Auditory Inteface

D. WIMPSinterface

Answer:
B. Tangible user interface
321. is metaphor having relation to the shape of object.
A. Noun

B. Verb

C. Pronoun

D. Full

Answer:
A. Noun
322. is metaphor having relation to motion of object.
A. Noun

B. Verb

C. Pronoun

D. Full

Answer:
B. Verb

323. In which of the following metaphor physical system is directly totally matches with virtual system
A. Noun

B. Verb

C. Pronoun

D. Full

Answer:
D. Full
324. OLED stands for
A. Original Light Emitting Diode

B. Organic Light Emitting Diode

C. Both (A) and (B)

D. None of the above

Answer:
B. Organic Light Emitting Diode
325. OLED have a response time than an LED.
A. much lower

B. much faster

C. more

D. less

Answer:
B. much faster

326. Auditory interface is used when
A. user want to give visual input

B. user want to give written inout

C. user want to give oral input

D. All of the above

Answer:
C. user want to give oral input
327. Which of following NOT example of Natural Language Inteface(NLI)
A. SHRDLU

B. IBMLanguage Access

C. Ubiquity Add-on for Mozilla Firebox

D. All of the above are part of NLI

Answer:
D. All of the above are part of NLI
328. Technology which is external to body and is directly attached to it is called as
A. Accompan ied Technolog y

B. Wearable Technology

C. Non- Wearable Technology

D. Virtual Technolog y

Answer:
B. Wearable Technology
329. Virtual Reality submerges

A. physical user in a virtual 3D world

B. Virtual 3D world into physical user

C. Physical user into logical world

D. Logical world into physical user

Answer:
A. physical user in a virtual 3D world
330. Which device comes under MTOS ?
A. WearCam p

B. Smart Dust and Tiny OS

C. WearCam

D. Both A & C

Answer:
D. Both A & C

331. Head Up Display consists of
A. Movable HUD

B. Fixed HUD

C. Head Mounted HUD

D. Both B & C

Answer:
D. Both B & C
332. Virtual Retinal Display (VRD) is also called as a

A. Retinal Secure Display

B. Retinal Scan Display

C. Retinal Scan Display

D. Retinal Safe Display

Answer:
B. Retinal Scan Display
333. EyeTap Display works on
sensors.
A. Single

B. Joined

C. Multiple

D. Unlimited

Answer:
A. Single
334. In interface electronic circuitary conection is done to the human nervous system.
A. Human Computer Inteface

B. Brain Computer Interface

C. Auditory Inteface

D. All of the above

Answer:
B. Brain Computer Interface
335. Human Computer Design is phase development life cycle.
A. Two

B. Three

C. Four

D. Five

Answer:
C. Four

336. The user activities are derived byhaving specification of goal and plans to complete goal in
action.
A. Planned

B. Situated

C. Concept

D. All

Answer:
A. Planned
337. Soloves taxonomy of Privacy consists of

A. Data collection

B. Data process

C. Data Disseminati on

D. All of the above

Answer:
D. All of the above
338. Difficulties in RFID tags are

A. Automatio n

B. Identificati on

C. Integration

D. All of the above

Answer:
D. All of the above
339. RFID applications undermine two classes of indivitual pricacy
and .
A. Data Privacy, Location Privacy

B. Data Privacy, Migration Privacy

C. Location Privacy,Migr ation Privacy

D. Data Privacy, User Privacy

Answer:
A. Data Privacy, Location Privacy
340. Network address divided into and

A. Sub network addree and host computer address

B. client address and server address

C. mac address and ip address

D. None of the above

Answer:
A. Sub network addree and host computer address
341. IPV4 supports
bit address
A. 32

B. 64

C. 128

D. 256

Answer:
A. 32

342. IPV6 supports
bit address
A. 32

B. 64

C. 128

D. 256

Answer:
C. 128
343. PSDN stands for

A. Packet Secure Data Network

B. Packet Switch Data Network

C. Packet Security Data Network

D. All of the above

Answer:
B. Packet Switch Data Network
344. First types of pervasive communication networks were
A. Video Network

B. Vitual Network

C. Audio Network

D. Virtual Network

Answer:
C. Audio Network
345. WiMAX comes under which standard ?
A. IEEE 802.1

B. IEEE 802.16

C. Both (A) and (B)

D. None of the above

Answer:
B. IEEE 802.16

346. Root of network tree is formed by _.
A. ZigBee Co- ordinator

B. ZigBee Router

C. ZigBee End Device

D. All of the above

Answer:
A. ZigBee Co- ordinator

347. is used to translate information science address.
A. NAT

B. VPN

C. GPS

D. ICT

Answer:
A. NAT

348. State the proper opinion : A key design issues for conyext aware system is to balance the degree of user management and awareness of proper environment.
A. Partially True

B. TRUE

C. FALSE

D. Might be True

Answer:
B. TRUE

349. Context Awareness is nothing but
A. Physical Awarenes s

B. Virtual Awareness

C. Both (A) and (B)

D. Person Awareness

Answer:
D. Person Awareness

Ubiquitous Computing System Objective Questions with Answers Pdf Download Online Test

Leave a Reply

Your email address will not be published. Required fields are marked *