MCQOPTIONS
Saved Bookmarks
This section includes 1361 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following is a specification for multicast discovery on a LAN? |
| A. | ws-agent |
| B. | ws-discovery |
| C. | ws-soap |
| D. | all of the mentioned |
| Answer» C. ws-soap | |
| 2. |
ability to detect and react to a set of environmental variables that is described as context (which can be sensor info or users' attitudes) |
| A. | mobile portal |
| B. | context-aware computing |
| C. | pervasive computing |
| D. | network-based positioning |
| Answer» C. pervasive computing | |
| 3. |
a wireless telecommunications network for device-to-device connections within a very short range |
| A. | wireless wide area network (wwan) |
| B. | personal area network (pan) |
| C. | wireless local area network (wlan) |
| D. | sensor network |
| Answer» C. wireless local area network (wlan) | |
| 4. |
a telecommunications network that offers wireless coverage over a large geographical area, typically over a cellular phone network |
| A. | personal area network (pan) |
| B. | wireless application protocol (wap) |
| C. | wireless wide area network (wwan) |
| D. | wireless local area network (wlan) |
| Answer» D. wireless local area network (wlan) | |
| 5. |
a voice system enables users to request/receive info, enter/change data through a telephone to a computerized system |
| A. | pervasive computing |
| B. | real-time location system (rtls) |
| C. | personal area network (pan) |
| D. | interactive voice response (ivr) |
| Answer» E. | |
| 6. |
a wireless version of the Ethernet networking standard |
| A. | wireless wide area network (wwan) |
| B. | wireless local area network (wlan) |
| C. | personal area network (pan) |
| D. | wireless application protocol (wap) |
| Answer» C. personal area network (pan) | |
| 7. |
a website with an audio interface that can be accessed through a telephonecall |
| A. | wimax |
| B. | geolocation |
| C. | mobile portal |
| D. | voice portal |
| Answer» E. | |
| 8. |
a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology |
| A. | voice portal |
| B. | mobile portal |
| C. | wimax |
| D. | geolocation |
| Answer» D. geolocation | |
| 9. |
Calculating the location of a mobile device from signals sent by the device tobase stations |
| A. | personal areanetwork (pan) |
| B. | terminal-basedpositioning |
| C. | pervasive computing |
| D. | network-basedpositioning |
| Answer» C. pervasive computing | |
| 10. |
a technology that offers Internet browsing from wireless devices |
| A. | real-time location system (rtls) |
| B. | wireless wide area network (wwan) |
| C. | wireless local area network (wlan) |
| D. | wireless application protocol (wap) |
| Answer» E. | |
| 11. |
short-range radio frequency communication technology for remotely storing and retrieving data using devices called tags and readers |
| A. | network-based positioning |
| B. | real-time location system (rtls) |
| C. | radio frequency identification (rfid) |
| D. | wireless wide area network (wwan) |
| Answer» D. wireless wide area network (wwan) | |
| 12. |
A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes |
| A. | voice portal |
| B. | mobile portal |
| C. | geolocation |
| D. | sensor network |
| Answer» E. | |
| 13. |
Vehicle mount solutions• Handheld solutions• Hands-free and voice solutions |
| A. | mobile enterprise |
| B. | wireless wide area network (wwan) |
| C. | typical mobile devices used in warehouses |
| D. | interactive voice response (ivr) |
| Answer» D. interactive voice response (ivr) | |
| 14. |
Computing capabilities embedded in the environment but typically not mobile |
| A. | mobile portal |
| B. | pervasive computing |
| C. | context-aware computing |
| D. | voice portal |
| Answer» C. context-aware computing | |
| 15. |
Computing capabilities embedded into objects around us (mobile and stationary) |
| A. | pervasive computing |
| B. | ubiquitous computing (ubicom) |
| C. | context-aware computing |
| D. | geolocation |
| Answer» C. context-aware computing | |
| 16. |
automatically identifying a Web user's location |
| A. | voice portal |
| B. | geolocation |
| C. | sensor network |
| D. | wimax |
| Answer» C. sensor network | |
| 17. |
gateway to the Internet optimized for mobility |
| A. | voice portal |
| B. | wimax |
| C. | mobile enterprise |
| D. | mobile portal |
| Answer» E. | |
| 18. |
systems used to track and identify the location of objects in real time |
| A. | geolocation |
| B. | geographical information system (gis) |
| C. | wireless application protocol (wap) |
| D. | real-time location system (rtls) |
| Answer» E. | |
| 19. |
The examples of deployment tools are: |
| A. | docker’s storm |
| B. | new relic’s centurion |
| C. | spotify’s helios |
| D. | all of the above |
| Answer» E. | |
| 20. |
Docker provides simple one-line deployment strategy. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 21. |
There is no built-in framework in Docker for testing. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 22. |
Containers require less disk space as compared to virtual machine |
| A. | true |
| B. | false |
| Answer» B. false | |
| 23. |
Docker is generally configured to use TCP port while managing encrypted traffic. |
| A. | 3306 |
| B. | 53378 |
| C. | 2375 |
| D. | 2376 |
| Answer» E. | |
| 24. |
Docker is generally configured to use TCP port while executing unencrypted traffic |
| A. | 3306 |
| B. | 53378 |
| C. | 2375 |
| D. | 2376 |
| Answer» D. 2376 | |
| 25. |
Two main components in Docker are: |
| A. | master, slave |
| B. | client, server |
| C. | client, master |
| D. | all of the above |
| Answer» C. client, master | |
| 26. |
Which containers are used by Docker severs? |
| A. | windows |
| B. | android |
| C. | linux |
| D. | mac |
| Answer» D. mac | |
| 27. |
Basic approach of Docker as a company is: |
| A. | “batteries included but removable” |
| B. | “batteries included but non-removable” |
| C. | “batteries but chargeable” |
| D. | “battery less execution” |
| Answer» B. “batteries included but non-removable” | |
| 28. |
Docker can simplify both, and |
| A. | process, state |
| B. | behavior, aspect |
| C. | workflows, communication |
| D. | all of the above |
| Answer» D. all of the above | |
| 29. |
Which of the following policies is not mentioned in ‘not to violate’ regarding CloudBurst? |
| A. | deadline-based |
| B. | budget-based |
| C. | quality-based |
| D. | workload-based |
| Answer» D. workload-based | |
| 30. |
In Comet, a tuple is a simple string |
| A. | java |
| B. | python |
| C. | xml |
| D. | html |
| Answer» D. html | |
| 31. |
Which are the three conceptual layers in CometCloud? |
| A. | development, application, physical |
| B. | infrastructure, dynamic, static |
| C. | transport, network, programming |
| D. | programming, service, infrastructure |
| Answer» E. | |
| 32. |
CometCloud supports policy based autonomic and |
| A. | cloudbursting |
| B. | cloudbridging |
| C. | none |
| D. | both a and b |
| Answer» E. | |
| 33. |
Responsibility of OS developers to add new feature in existing OS are |
| A. | more reliability |
| B. | convenience and security |
| C. | compatibility |
| D. | all of the above |
| Answer» E. | |
| 34. |
Which is the latest Operating System? |
| A. | real-time os |
| B. | desktop os |
| C. | mainframe os |
| D. | cloud os |
| Answer» E. | |
| 35. |
Nodes in the network analysis graph represent the and the edges represent the relationships between nodes. |
| A. | actors |
| B. | nodes |
| C. | users |
| D. | both a and b |
| Answer» E. | |
| 36. |
Arrange the stages in supply chain management:i. Material and Equipment Suppliesii. Delivery of Productsiii. After Sale Service and Returnsiv. Planning and Coordinationv. Manufacturing and Testing |
| A. | iv, v, i, ii, iii |
| B. | iv, i, v, iii, ii |
| C. | iv, i, v, ii, iii |
| D. | i, ii, iv, v, ii |
| Answer» D. i, ii, iv, v, ii | |
| 37. |
The measures of centrality include: |
| A. | betweenness |
| B. | closeness |
| C. | degree |
| D. | all of the above |
| Answer» E. | |
| 38. |
The social circles are loosely coupled if there is stringency of direct contact. |
| A. | less |
| B. | more |
| C. | equal |
| D. | no |
| Answer» B. more | |
| 39. |
The degree to which actors are directly linked to one another throughcohesive bonds is called as . |
| A. | closeness |
| B. | cohesion |
| C. | centralized |
| D. | path length |
| Answer» C. centralized | |
| 40. |
is the degree to which nodes have a common set of connections toother nodes |
| A. | structural hole |
| B. | structuralequivalence |
| C. | structural cohesion |
| D. | none of the above |
| Answer» D. none of the above | |
| 41. |
The number of binding of a node to other actors of the graph in the graphrepresentation of a network is called as . |
| A. | node degree |
| B. | path length |
| C. | social circle |
| D. | bridge |
| Answer» B. path length | |
| 42. |
Three parts of GPS include: |
| A. | space segment |
| B. | control segment |
| C. | user segment |
| D. | all of the above |
| Answer» E. | |
| 43. |
_ is an attack which forces an end user to execute unwanted actions on aweb application in which he/she is currently authenticated. |
| A. | cross-site scoringscripting |
| B. | cross-site requestforgery |
| C. | two-factorauthentication |
| D. | cross-site scripting |
| Answer» E. | |
| 44. |
What is the typical range of transmission distance in a ZigBee network? |
| A. | 5 m. |
| B. | 50 m. |
| C. | 500 m. |
| D. | 5 km |
| Answer» C. 500 m. | |
| 45. |
Which of the following IEEE standards provides the lowest level of the ZigBeesoftware stack? |
| A. | ieee 802.11. |
| B. | ieee 802.15.1. |
| C. | ieee 802.15.3. |
| D. | ieee 802.15.4. |
| Answer» E. | |
| 46. |
Which of the following specifies a set of media access control (MAC) andphysical layer specifications for implementing WLANs? |
| A. | ieee 802.16 |
| B. | ieee 802.3 |
| C. | ieee 802.11 |
| D. | ieee 802.15 |
| Answer» D. ieee 802.15 | |
| 47. |
CoAP is specialized for |
| A. | internet applications |
| B. | device applications |
| C. | wireless applications |
| D. | wired applications |
| Answer» B. device applications | |
| 48. |
Out of the following which is not element of threat modelling |
| A. | asset |
| B. | vulnerability |
| C. | threat |
| D. | time |
| Answer» E. | |
| 49. |
In threat modeling, what methodology used to perform risk analysis |
| A. | dread |
| B. | owasp |
| C. | stride |
| D. | dar |
| Answer» B. owasp | |
| 50. |
Which of the following is the heart of a SCADA system? |
| A. | plc |
| B. | hmi |
| C. | alarm task |
| D. | i/o task |
| Answer» E. | |