MCQOPTIONS
Saved Bookmarks
This section includes 338 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
Network bottlenecks occur when              data sets must be transferred |
| A. | large |
| B. | small |
| C. | big |
| D. | all of the mentioned |
| Answer» B. small | |
| 102. |
Amazon AWS Consists of following services |
| A. | iaas |
| B. | paas |
| C. | saas |
| D. | all of above |
| Answer» E. | |
| 103. |
RDS is a type of database |
| A. | sql |
| B. | nonsql |
| C. | simple storage |
| D. | all of above |
| Answer» B. nonsql | |
| 104. |
Dynamodb is type of storage |
| A. | nonsql |
| B. | sql |
| C. | simple storage |
| D. | all of above |
| Answer» B. sql | |
| 105. |
Cloud                  are standardized in order to appeal to the majority of its audience. |
| A. | svas |
| B. | slas |
| C. | sals |
| D. | none of the mentioned |
| Answer» C. sals | |
| 106. |
                   computing refers to applications and services that run on a distributed network using virtualized resources. |
| A. | distributed |
| B. | cloud |
| C. | soft |
| D. | parallel |
| Answer» C. soft | |
| 107. |
The reputation for cloud computing services for the quality of those services is shared by |
| A. | replicas |
| B. | shards |
| C. | tenants |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 108. |
                       is a function of the particular enterprise and application in an on- premises deployment. |
| A. | vendor lock |
| B. | vendor lock-in |
| C. | vendor lock-ins |
| D. | none of the mentioned |
| Answer» C. vendor lock-ins | |
| 109. |
. Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â as a utility is a dream that dates from the beginning of the computing industry itself |
| A. | model |
| B. | computing |
| C. | software |
| D. | all of the mentioned |
| Answer» C. software | |
| 110. |
Point out the wrong statement |
| A. | applications benefit from deployment in the cloud |
| B. | start very small and become big very fast |
| C. | technology it is built on is evolutionary |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 111. |
Amazon Elastic Compute Cloud (Amazon EC2) is a web service based on |
| A. | iaas |
| B. | paas |
| C. | saas |
| D. | all of the mentioned |
| Answer» B. paas | |
| 112. |
Which of the following is essential concept related to Cloud? |
| A. | reliability |
| B. | productivity |
| C. | abstraction |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 113. |
The three major components of RFID hardware based on functionality include : |
| A. | rfid reader |
| B. | reader antenna |
| C. | reader |
| D. | all of the above |
| Answer» E. | |
| 114. |
Types of Zigbee devices are available as follows: i. ZigBee Coordinator ii. ZigBee Router iii. ZigBee End Device iv. ZigBee Accessor |
| A. | i, ii, iii |
| B. | i, ii, iii, iv |
| C. | ii, iii, iv |
| D. | i, ii, iv |
| Answer» B. i, ii, iii, iv | |
| 115. |
Even with two-factor authentication, users may still be vulnerable to attacks. |
| A. | scripting |
| B. | cross attack |
| C. | man-in-the-middle |
| D. | radiant |
| Answer» D. radiant | |
| 116. |
Process of identifying any individual |
| A. | auditing |
| B. | authorisation |
| C. | authentication |
| D. | accounting |
| Answer» D. accounting | |
| 117. |
Process that prevents someone from denying that she accessed resource |
| A. | accounting |
| B. | non-repudiation |
| C. | sniffing |
| D. | authorisation |
| Answer» C. sniffing | |
| 118. |
Which of the following is not a correct way to secure communication layer |
| A. | cloud initiated communication |
| B. | tls/ssl |
| C. | ips(intrusion prevention system) |
| D. | firewalls |
| Answer» B. tls/ssl | |
| 119. |
Which of the following is not the component of IoT Endpoint |
| A. | sensor |
| B. | gateway |
| C. | communication module |
| D. | mcu |
| Answer» C. communication module | |
| 120. |
Which of the following makes sure that data is not changed when it not supposed to be? |
| A. | integrity |
| B. | availability |
| C. | confidentiality |
| D. | accounting |
| Answer» B. availability | |
| 121. |
Which of the following terms indicates that information is to be read only by those people for whom it is intended? |
| A. | availability |
| B. | accounting |
| C. | integrity |
| D. | confidentiality |
| Answer» E. | |
| 122. |
When did the SCADA start? |
| A. | 1980s |
| B. | 1990s |
| C. | 1970s |
| D. | 1960s |
| Answer» C. 1970s | |
| 123. |
RFID stands for? |
| A. | random frequency identification |
| B. | radio frequency identification |
| C. | random frequency information |
| D. | radio frequency information |
| Answer» C. random frequency information | |
| 124. |
Which of the following is not involved in working of IoT? |
| A. | rfid |
| B. | sensor |
| C. | nano tech |
| D. | server |
| Answer» E. | |
| 125. |
Which of these statements regarding sensors is TRUE? |
| A. | sensors are input devices. |
| B. | sensors can be analog as well as digital |
| C. | sensors respond to some external stimuli. |
| D. | all of these |
| Answer» E. | |
| 126. |
M2M is a term introduced by |
| A. | iot service providers |
| B. | fog computing service providers |
| C. | telecommunication service providers |
| D. | none of these |
| Answer» D. none of these | |
| 127. |
In threat modeling, what methodology used to perform risk analysis |
| A. | dread |
| B. | owasp |
| C. | stride |
| D. | dar |
| Answer» B. owasp | |
| 128. |
Out of the following which is not element of threat modelling |
| A. | asset |
| B. | vulnerability |
| C. | threat |
| D. | time |
| Answer» E. | |
| 129. |
Smart Dust can be used to measure the |
| A. | temperature of the industrial lathe machine |
| B. | heat inside a computer’s cpu |
| C. | chemical in the soil |
| D. | strength of a solid material |
| Answer» D. strength of a solid material | |
| 130. |
Request field is present in which message format? |
| A. | request message |
| B. | response message |
| C. | both request and response |
| D. | neither request nor response |
| Answer» B. response message | |
| 131. |
CoAP is specialized for |
| A. | internet applications |
| B. | device applications |
| C. | wireless applications |
| D. | wired applications |
| Answer» B. device applications | |
| 132. |
Which layer is CoAP? |
| A. | control layer |
| B. | transport layer |
| C. | service layer |
| D. | application layer |
| Answer» D. application layer | |
| 133. |
CoAP provides which of the following requirements? |
| A. | multicast support and simplicity |
| B. | low overhead and multicast support |
| C. | simplicity and low overhead |
| D. | multicast support, low over head, and simplicity |
| Answer» E. | |
| 134. |
CoAP is a specialized protocol. |
| A. | web transfer |
| B. | power |
| C. | application |
| D. | resource |
| Answer» B. power | |
| 135. |
URI and content type support is which protocol feature? |
| A. | http |
| B. | udp |
| C. | coap |
| D. | spi |
| Answer» D. spi | |
| 136. |
Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs? |
| A. | ieee 802.16 |
| B. | ieee 802.3 |
| C. | ieee 802.11 |
| D. | ieee 802.15 |
| Answer» D. ieee 802.15 | |
| 137. |
What is the full form of WLAN? |
| A. | wide local area network |
| B. | wireless local area network |
| C. | wireless land access network |
| D. | wireless local area node |
| Answer» C. wireless land access network | |
| 138. |
Which of the following is not a characteristic of a ZigBee network? |
| A. | low power consumption |
| B. | easy installation. |
| C. | high data rates. |
| D. | unlicensed radio bands. |
| Answer» D. unlicensed radio bands. | |
| 139. |
Which of the following layers are defined by the ZigBee stack? |
| A. | transport layer |
| B. | physical layer. |
| C. | application support sub-layer. |
| D. | medium access layer |
| Answer» E. | |
| 140. |
Which of the following IEEE standards provides the lowest level of the ZigBee software stack? |
| A. | ieee 802.11. |
| B. | ieee 802.15.1. |
| C. | ieee 802.15.3. |
| D. | ieee 802.15.4. |
| Answer» E. | |
| 141. |
What is the typical range of transmission distance in a ZigBee network? |
| A. | 5 m. |
| B. | 50 m. |
| C. | 500 m. |
| D. | 5 km |
| Answer» C. 500 m. | |
| 142. |
_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. |
| A. | cross-site scoring scripting |
| B. | cross-site request forgery |
| C. | two-factor authentication |
| D. | cross-site scripting |
| Answer» E. | |
| 143. |
Representational State Transfer (REST) is the standard interface between |
| A. | two machines in a lan |
| B. | http client and user |
| C. | http client and servers |
| D. | none of the above |
| Answer» D. none of the above | |
| 144. |
In 6LoWPAN address, how many bits are globally unique? |
| A. | 16 bits |
| B. | 32 bits |
| C. | 64 bits |
| D. | 128 bits |
| Answer» D. 128 bits | |
| 145. |
IEEE 802.15.4 uses which of the following for accessing the channel? |
| A. | carrier sense multiple access (csma) |
| B. | carrier sense multiple access with collision detection (csma-cd) |
| C. | carrier sense multiple access with collision avoidance (csma-ca) |
| D. | none of these |
| Answer» D. none of these | |
| 146. |
Which of the following is not a messaging mode in CoAP? |
| A. | confirmable |
| B. | separate |
| C. | direct |
| D. | piggyback |
| Answer» D. piggyback | |
| 147. |
Three parts of GPS include: |
| A. | space segment |
| B. | control segment |
| C. | user segment |
| D. | all of the above |
| Answer» E. | |
| 148. |
                 is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system |
| A. | cloud-physical system |
| B. | cyber-space system |
| C. | cyber-physical system |
| D. | none of the above |
| Answer» D. none of the above | |
| 149. |
                 is the degree to which nodes have a common set of connections to other nodes |
| A. | structural hole |
| B. | structural equivalence |
| C. | structural cohesion |
| D. | none of the above |
| Answer» D. none of the above | |
| 150. |
The social circles are loosely coupled if there is                  stringency of direct contact. |
| A. | less |
| B. | more |
| C. | equal |
| D. | no |
| Answer» B. more | |