MCQOPTIONS
Saved Bookmarks
This section includes 338 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 151. |
The measures of centrality include: |
| A. | betweenness |
| B. | closeness |
| C. | degree |
| D. | all of the above |
| Answer» E. | |
| 152. |
Nodes in the network analysis graph represent the                  and the edges represent the relationships between nodes. |
| A. | actors |
| B. | nodes |
| C. | users |
| D. | both a and b |
| Answer» E. | |
| 153. |
Which is the latest Operating System? |
| A. | real-time os |
| B. | desktop os |
| C. | mainframe os |
| D. | cloud os |
| Answer» E. | |
| 154. |
Arrange the stages in supply chain management: i. Material and Equipment Supplies ii. Delivery of Products iii. After Sale Service and Returns iv. Planning and Coordination v. Manufacturing and Testing |
| A. | iv, v, i, ii, iii |
| B. | iv, i, v, iii, ii |
| C. | iv, i, v, ii, iii |
| D. | i, ii, iv, v, ii |
| Answer» D. i, ii, iv, v, ii | |
| 155. |
Responsibility of OS developers to add new feature in existing OS are |
| A. | more reliability |
| B. | convenience and security |
| C. | compatibility |
| D. | all of the above |
| Answer» E. | |
| 156. |
CometCloud supports policy based autonomic      and |
| A. | cloudbursting |
| B. | cloudbridging |
| C. | none |
| D. | both a and b |
| Answer» E. | |
| 157. |
Which are the three conceptual layers in CometCloud? |
| A. | development, application, physical |
| B. | infrastructure, dynamic, static |
| C. | transport, network, programming |
| D. | programming, service, infrastructure |
| Answer» E. | |
| 158. |
In Comet, a tuple is a simple        string |
| A. | java |
| B. | python |
| C. | xml |
| D. | html |
| Answer» D. html | |
| 159. |
Which of the following policies is not mentioned in ‘not to violate’ regarding CloudBurst? |
| A. | deadline-based |
| B. | budget-based |
| C. | quality-based |
| D. | workload-based |
| Answer» D. workload-based | |
| 160. |
Docker can simplify both, Â Â Â Â Â Â Â Â Â and |
| A. | process, state |
| B. | behavior, aspect |
| C. | workflows, communication |
| D. | all of the above |
| Answer» D. all of the above | |
| 161. |
Basic approach of Docker as a company is: |
| A. | “batteries included but removable†|
| B. | “batteries included but non-removable†|
| C. | “batteries but chargeable†|
| D. | “battery less execution†|
| Answer» B. “batteries included but non-removable†| |
| 162. |
Two main components in Docker are: |
| A. | master, slave |
| B. | client, server |
| C. | client, master |
| D. | all of the above |
| Answer» C. client, master | |
| 163. |
Which containers are used by Docker severs? |
| A. | windows |
| B. | android |
| C. | linux |
| D. | mac |
| Answer» D. mac | |
| 164. |
Docker is generally configured to use TCP port          while executing unencrypted traffic |
| A. | 3306 |
| B. | 53378 |
| C. | 2375 |
| D. | 2376 |
| Answer» D. 2376 | |
| 165. |
Containers require less disk space as compared to virtual machine |
| A. | true |
| B. | false |
| Answer» B. false | |
| 166. |
There is no built-in framework in Docker for testing. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 167. |
Docker is generally configured to use TCP port          while managing encrypted traffic. |
| A. | 3306 |
| B. | 53378 |
| C. | 2375 |
| D. | 2376 |
| Answer» E. | |
| 168. |
systems used to track and identify the location of objects in real time |
| A. | geolocation |
| B. | geographical information system (gis) |
| C. | wireless application protocol (wap) |
| D. | real-time location system (rtls) |
| Answer» E. | |
| 169. |
Computing capabilities embedded into objects around us (mobile and stationary) |
| A. | pervasive computing |
| B. | ubiquitous computing (ubicom) |
| C. | context-aware computing |
| D. | geolocation |
| Answer» C. context-aware computing | |
| 170. |
gateway to the Internet optimized for mobility |
| A. | voice portal |
| B. | wimax |
| C. | mobile enterprise |
| D. | mobile portal |
| Answer» E. | |
| 171. |
automatically identifying a Web user's location |
| A. | voice portal |
| B. | geolocation |
| C. | sensor network |
| D. | wimax |
| Answer» C. sensor network | |
| 172. |
short-range radio frequency communication technology for remotely storing and retrieving data using devices called        tags and        readers |
| A. | network-based positioning |
| B. | real-time location system (rtls) |
| C. | radio frequency identification (rfid) |
| D. | wireless wide area network (wwan) |
| Answer» D. wireless wide area network (wwan) | |
| 173. |
Computing capabilities embedded in the environment but typically not mobile |
| A. | mobile portal |
| B. | pervasive computing |
| C. | context-aware computing |
| D. | voice portal |
| Answer» C. context-aware computing | |
| 174. |
A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes |
| A. | voice portal |
| B. | mobile portal |
| C. | geolocation |
| D. | sensor network |
| Answer» E. | |
| 175. |
Vehicle mount solutions • Handheld solutions • Hands-free and voice solutions |
| A. | mobile enterprise |
| B. | wireless wide area network (wwan) |
| C. | typical mobile devices used in warehouses |
| D. | interactive voice response (ivr) |
| Answer» D. interactive voice response (ivr) | |
| 176. |
a technology that offers Internet browsing from wireless devices |
| A. | real-time location system (rtls) |
| B. | wireless wide area network (wwan) |
| C. | wireless local area network (wlan) |
| D. | wireless application protocol (wap) |
| Answer» E. | |
| 177. |
Calculating the location of a mobile device from signals sent by the device to base stations |
| A. | personal area network (pan) |
| B. | terminal-based positioning |
| C. | pervasive computing |
| D. | network-based positioning |
| Answer» C. pervasive computing | |
| 178. |
a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology |
| A. | voice portal |
| B. | mobile portal |
| C. | wimax |
| D. | geolocation |
| Answer» D. geolocation | |
| 179. |
a website with an audio interface that can be accessed through a telephone call |
| A. | wimax |
| B. | geolocation |
| C. | mobile portal |
| D. | voice portal |
| Answer» E. | |
| 180. |
a wireless version of the Ethernet networking standard |
| A. | wireless wide area network (wwan) |
| B. | wireless local area network (wlan) |
| C. | personal area network (pan) |
| D. | wireless application protocol (wap) |
| Answer» C. personal area network (pan) | |
| 181. |
computer system capable of integrating, storing, editing, analyzing, sharing, and displaying geographically referenced (spatial) information |
| A. | personal area network (pan) |
| B. | interactive voice response (ivr) |
| C. | real-time location system (rtls) |
| D. | geographical information system (gis) |
| Answer» E. | |
| 182. |
a voice system enables users to request/receive info, enter/change data through a telephone to a computerized system |
| A. | pervasive computing |
| B. | real-time location system (rtls) |
| C. | personal area network (pan) |
| D. | interactive voice response (ivr) |
| Answer» E. | |
| 183. |
a wireless telecommunications network for device-to-device connections within a very short range |
| A. | wireless wide area network (wwan) |
| B. | personal area network (pan) |
| C. | wireless local area network (wlan) |
| D. | sensor network |
| Answer» C. wireless local area network (wlan) | |
| 184. |
Which of the following is a specification for multicast discovery on a LAN? |
| A. | ws-agent |
| B. | ws-discovery |
| C. | ws-soap |
| D. | all of the mentioned |
| Answer» C. ws-soap | |
| 185. |
ability to detect and react to a set of environmental variables that is described as context (which can be sensor info or users' attitudes) |
| A. | mobile portal |
| B. | context-aware computing |
| C. | pervasive computing |
| D. | network-based positioning |
| Answer» C. pervasive computing | |
| 186. |
Calculating the location of a mobile device from signals sent by the device to base stations |
| A. | personal area network (pan) |
| B. | terminal-based positioning |
| C. | pervasive computing |
| D. | network-based positioning |
| Answer» C. pervasive computing | |
| 187. |
delivery of m-commerce transactions to individuals in a specific location, at a specific time |
| A. | location-based m- commerce (l- commerce) |
| B. | context-aware computing |
| C. | ubiquitous computing (ubicom) |
| D. | network-based positioning |
| Answer» B. context-aware computing | |
| 188. |
CNS stands for |
| A. | consumption near sweet-spot |
| B. | continuous network system |
| C. | compact neural system |
| D. | compound near sweet-sp0t |
| Answer» B. continuous network system | |
| 189. |
short-range radio frequency communication technology for remotely storing and retrieving data using devices called tags and readers |
| A. | network-based positioning |
| B. | real-time location system (rtls) |
| C. | radio frequency identification (rfid) |
| D. | wireless wide area network (wwan) |
| Answer» D. wireless wide area network (wwan) | |
| 190. |
Docker is generally configured to use TCP port while managing encrypted traffic. |
| A. | 3306 |
| B. | 53378 |
| C. | 2375 |
| D. | 2376 |
| Answer» E. | |
| 191. |
Docker is generally configured to use TCP port while executing unencrypted traffic |
| A. | 3306 |
| B. | 53378 |
| C. | 2375 |
| D. | 2376 |
| Answer» D. 2376 | |
| 192. |
Docker can simplify both, and |
| A. | process, state |
| B. | behavior, aspect |
| C. | workflows, communication |
| D. | all of the above |
| Answer» D. all of the above | |
| 193. |
Keywords in Docker are |
| A. | develop, ship, run anywhere |
| B. | create, export |
| C. | transport, cloud |
| D. | user, data, privacy |
| Answer» B. create, export | |
| 194. |
SEEP stands for |
| A. | system end to end protocol |
| B. | static environmental execution process |
| C. | symbolic execution and energy profiles |
| D. | state execution and energy profiles |
| Answer» D. state execution and energy profiles | |
| 195. |
SEEP is used in |
| A. | energy optimization |
| B. | multimedia |
| C. | information leakage |
| D. | cost reduction |
| Answer» B. multimedia | |
| 196. |
KPI stands for |
| A. | key practices in industry |
| B. | key performance index |
| C. | key performance indicators |
| D. | key parameters in information |
| Answer» D. key parameters in information | |
| 197. |
The cloud media services are: |
| A. | cloud gaming |
| B. | experiencing multi- screens |
| C. | image processing |
| D. | all of the above |
| Answer» E. | |
| 198. |
CometCloud supports policy based autonomic and |
| A. | cloudbursting |
| B. | cloudbridging |
| C. | none |
| D. | both a and b |
| Answer» E. | |
| 199. |
In Comet, a tuple is a simple string |
| A. | java |
| B. | python |
| C. | xml |
| D. | html |
| Answer» D. html | |
| 200. |
In future, companies wont worry about the capital for large data center because of |
| A. | saas solution |
| B. | paas solution |
| C. | iaas solution |
| D. | none of the above |
| Answer» C. iaas solution | |