

MCQOPTIONS
Saved Bookmarks
This section includes 338 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
101. |
Network bottlenecks occur when              data sets must be transferred |
A. | large |
B. | small |
C. | big |
D. | all of the mentioned |
Answer» B. small | |
102. |
Amazon AWS Consists of following services |
A. | iaas |
B. | paas |
C. | saas |
D. | all of above |
Answer» E. | |
103. |
RDS is a type of database |
A. | sql |
B. | nonsql |
C. | simple storage |
D. | all of above |
Answer» B. nonsql | |
104. |
Dynamodb is type of storage |
A. | nonsql |
B. | sql |
C. | simple storage |
D. | all of above |
Answer» B. sql | |
105. |
Cloud                  are standardized in order to appeal to the majority of its audience. |
A. | svas |
B. | slas |
C. | sals |
D. | none of the mentioned |
Answer» C. sals | |
106. |
                   computing refers to applications and services that run on a distributed network using virtualized resources. |
A. | distributed |
B. | cloud |
C. | soft |
D. | parallel |
Answer» C. soft | |
107. |
The reputation for cloud computing services for the quality of those services is shared by |
A. | replicas |
B. | shards |
C. | tenants |
D. | all of the mentioned |
Answer» D. all of the mentioned | |
108. |
                       is a function of the particular enterprise and application in an on- premises deployment. |
A. | vendor lock |
B. | vendor lock-in |
C. | vendor lock-ins |
D. | none of the mentioned |
Answer» C. vendor lock-ins | |
109. |
. Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â as a utility is a dream that dates from the beginning of the computing industry itself |
A. | model |
B. | computing |
C. | software |
D. | all of the mentioned |
Answer» C. software | |
110. |
Point out the wrong statement |
A. | applications benefit from deployment in the cloud |
B. | start very small and become big very fast |
C. | technology it is built on is evolutionary |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
111. |
Amazon Elastic Compute Cloud (Amazon EC2) is a web service based on |
A. | iaas |
B. | paas |
C. | saas |
D. | all of the mentioned |
Answer» B. paas | |
112. |
Which of the following is essential concept related to Cloud? |
A. | reliability |
B. | productivity |
C. | abstraction |
D. | all of the mentioned |
Answer» D. all of the mentioned | |
113. |
The three major components of RFID hardware based on functionality include : |
A. | rfid reader |
B. | reader antenna |
C. | reader |
D. | all of the above |
Answer» E. | |
114. |
Types of Zigbee devices are available as follows: i. ZigBee Coordinator ii. ZigBee Router iii. ZigBee End Device iv. ZigBee Accessor |
A. | i, ii, iii |
B. | i, ii, iii, iv |
C. | ii, iii, iv |
D. | i, ii, iv |
Answer» B. i, ii, iii, iv | |
115. |
Even with two-factor authentication, users may still be vulnerable to attacks. |
A. | scripting |
B. | cross attack |
C. | man-in-the-middle |
D. | radiant |
Answer» D. radiant | |
116. |
Process of identifying any individual |
A. | auditing |
B. | authorisation |
C. | authentication |
D. | accounting |
Answer» D. accounting | |
117. |
Process that prevents someone from denying that she accessed resource |
A. | accounting |
B. | non-repudiation |
C. | sniffing |
D. | authorisation |
Answer» C. sniffing | |
118. |
Which of the following is not a correct way to secure communication layer |
A. | cloud initiated communication |
B. | tls/ssl |
C. | ips(intrusion prevention system) |
D. | firewalls |
Answer» B. tls/ssl | |
119. |
Which of the following is not the component of IoT Endpoint |
A. | sensor |
B. | gateway |
C. | communication module |
D. | mcu |
Answer» C. communication module | |
120. |
Which of the following makes sure that data is not changed when it not supposed to be? |
A. | integrity |
B. | availability |
C. | confidentiality |
D. | accounting |
Answer» B. availability | |
121. |
Which of the following terms indicates that information is to be read only by those people for whom it is intended? |
A. | availability |
B. | accounting |
C. | integrity |
D. | confidentiality |
Answer» E. | |
122. |
When did the SCADA start? |
A. | 1980s |
B. | 1990s |
C. | 1970s |
D. | 1960s |
Answer» C. 1970s | |
123. |
RFID stands for? |
A. | random frequency identification |
B. | radio frequency identification |
C. | random frequency information |
D. | radio frequency information |
Answer» C. random frequency information | |
124. |
Which of the following is not involved in working of IoT? |
A. | rfid |
B. | sensor |
C. | nano tech |
D. | server |
Answer» E. | |
125. |
Which of these statements regarding sensors is TRUE? |
A. | sensors are input devices. |
B. | sensors can be analog as well as digital |
C. | sensors respond to some external stimuli. |
D. | all of these |
Answer» E. | |
126. |
M2M is a term introduced by |
A. | iot service providers |
B. | fog computing service providers |
C. | telecommunication service providers |
D. | none of these |
Answer» D. none of these | |
127. |
In threat modeling, what methodology used to perform risk analysis |
A. | dread |
B. | owasp |
C. | stride |
D. | dar |
Answer» B. owasp | |
128. |
Out of the following which is not element of threat modelling |
A. | asset |
B. | vulnerability |
C. | threat |
D. | time |
Answer» E. | |
129. |
Smart Dust can be used to measure the |
A. | temperature of the industrial lathe machine |
B. | heat inside a computer’s cpu |
C. | chemical in the soil |
D. | strength of a solid material |
Answer» D. strength of a solid material | |
130. |
Request field is present in which message format? |
A. | request message |
B. | response message |
C. | both request and response |
D. | neither request nor response |
Answer» B. response message | |
131. |
CoAP is specialized for |
A. | internet applications |
B. | device applications |
C. | wireless applications |
D. | wired applications |
Answer» B. device applications | |
132. |
Which layer is CoAP? |
A. | control layer |
B. | transport layer |
C. | service layer |
D. | application layer |
Answer» D. application layer | |
133. |
CoAP provides which of the following requirements? |
A. | multicast support and simplicity |
B. | low overhead and multicast support |
C. | simplicity and low overhead |
D. | multicast support, low over head, and simplicity |
Answer» E. | |
134. |
CoAP is a specialized protocol. |
A. | web transfer |
B. | power |
C. | application |
D. | resource |
Answer» B. power | |
135. |
URI and content type support is which protocol feature? |
A. | http |
B. | udp |
C. | coap |
D. | spi |
Answer» D. spi | |
136. |
Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs? |
A. | ieee 802.16 |
B. | ieee 802.3 |
C. | ieee 802.11 |
D. | ieee 802.15 |
Answer» D. ieee 802.15 | |
137. |
What is the full form of WLAN? |
A. | wide local area network |
B. | wireless local area network |
C. | wireless land access network |
D. | wireless local area node |
Answer» C. wireless land access network | |
138. |
Which of the following is not a characteristic of a ZigBee network? |
A. | low power consumption |
B. | easy installation. |
C. | high data rates. |
D. | unlicensed radio bands. |
Answer» D. unlicensed radio bands. | |
139. |
Which of the following layers are defined by the ZigBee stack? |
A. | transport layer |
B. | physical layer. |
C. | application support sub-layer. |
D. | medium access layer |
Answer» E. | |
140. |
Which of the following IEEE standards provides the lowest level of the ZigBee software stack? |
A. | ieee 802.11. |
B. | ieee 802.15.1. |
C. | ieee 802.15.3. |
D. | ieee 802.15.4. |
Answer» E. | |
141. |
What is the typical range of transmission distance in a ZigBee network? |
A. | 5 m. |
B. | 50 m. |
C. | 500 m. |
D. | 5 km |
Answer» C. 500 m. | |
142. |
_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. |
A. | cross-site scoring scripting |
B. | cross-site request forgery |
C. | two-factor authentication |
D. | cross-site scripting |
Answer» E. | |
143. |
Representational State Transfer (REST) is the standard interface between |
A. | two machines in a lan |
B. | http client and user |
C. | http client and servers |
D. | none of the above |
Answer» D. none of the above | |
144. |
In 6LoWPAN address, how many bits are globally unique? |
A. | 16 bits |
B. | 32 bits |
C. | 64 bits |
D. | 128 bits |
Answer» D. 128 bits | |
145. |
IEEE 802.15.4 uses which of the following for accessing the channel? |
A. | carrier sense multiple access (csma) |
B. | carrier sense multiple access with collision detection (csma-cd) |
C. | carrier sense multiple access with collision avoidance (csma-ca) |
D. | none of these |
Answer» D. none of these | |
146. |
Which of the following is not a messaging mode in CoAP? |
A. | confirmable |
B. | separate |
C. | direct |
D. | piggyback |
Answer» D. piggyback | |
147. |
Three parts of GPS include: |
A. | space segment |
B. | control segment |
C. | user segment |
D. | all of the above |
Answer» E. | |
148. |
                 is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system |
A. | cloud-physical system |
B. | cyber-space system |
C. | cyber-physical system |
D. | none of the above |
Answer» D. none of the above | |
149. |
                 is the degree to which nodes have a common set of connections to other nodes |
A. | structural hole |
B. | structural equivalence |
C. | structural cohesion |
D. | none of the above |
Answer» D. none of the above | |
150. |
The social circles are loosely coupled if there is                  stringency of direct contact. |
A. | less |
B. | more |
C. | equal |
D. | no |
Answer» B. more | |