

MCQOPTIONS
Saved Bookmarks
This section includes 1361 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of the following is a specification for multicast discovery on a LAN? |
A. | ws-agent |
B. | ws-discovery |
C. | ws-soap |
D. | all of the mentioned |
Answer» C. ws-soap | |
2. |
ability to detect and react to a set of environmental variables that is described as context (which can be sensor info or users' attitudes) |
A. | mobile portal |
B. | context-aware computing |
C. | pervasive computing |
D. | network-based positioning |
Answer» C. pervasive computing | |
3. |
a wireless telecommunications network for device-to-device connections within a very short range |
A. | wireless wide area network (wwan) |
B. | personal area network (pan) |
C. | wireless local area network (wlan) |
D. | sensor network |
Answer» C. wireless local area network (wlan) | |
4. |
a telecommunications network that offers wireless coverage over a large geographical area, typically over a cellular phone network |
A. | personal area network (pan) |
B. | wireless application protocol (wap) |
C. | wireless wide area network (wwan) |
D. | wireless local area network (wlan) |
Answer» D. wireless local area network (wlan) | |
5. |
a voice system enables users to request/receive info, enter/change data through a telephone to a computerized system |
A. | pervasive computing |
B. | real-time location system (rtls) |
C. | personal area network (pan) |
D. | interactive voice response (ivr) |
Answer» E. | |
6. |
a wireless version of the Ethernet networking standard |
A. | wireless wide area network (wwan) |
B. | wireless local area network (wlan) |
C. | personal area network (pan) |
D. | wireless application protocol (wap) |
Answer» C. personal area network (pan) | |
7. |
a website with an audio interface that can be accessed through a telephonecall |
A. | wimax |
B. | geolocation |
C. | mobile portal |
D. | voice portal |
Answer» E. | |
8. |
a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology |
A. | voice portal |
B. | mobile portal |
C. | wimax |
D. | geolocation |
Answer» D. geolocation | |
9. |
Calculating the location of a mobile device from signals sent by the device tobase stations |
A. | personal areanetwork (pan) |
B. | terminal-basedpositioning |
C. | pervasive computing |
D. | network-basedpositioning |
Answer» C. pervasive computing | |
10. |
a technology that offers Internet browsing from wireless devices |
A. | real-time location system (rtls) |
B. | wireless wide area network (wwan) |
C. | wireless local area network (wlan) |
D. | wireless application protocol (wap) |
Answer» E. | |
11. |
short-range radio frequency communication technology for remotely storing and retrieving data using devices called tags and readers |
A. | network-based positioning |
B. | real-time location system (rtls) |
C. | radio frequency identification (rfid) |
D. | wireless wide area network (wwan) |
Answer» D. wireless wide area network (wwan) | |
12. |
A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes |
A. | voice portal |
B. | mobile portal |
C. | geolocation |
D. | sensor network |
Answer» E. | |
13. |
Vehicle mount solutions• Handheld solutions• Hands-free and voice solutions |
A. | mobile enterprise |
B. | wireless wide area network (wwan) |
C. | typical mobile devices used in warehouses |
D. | interactive voice response (ivr) |
Answer» D. interactive voice response (ivr) | |
14. |
Computing capabilities embedded in the environment but typically not mobile |
A. | mobile portal |
B. | pervasive computing |
C. | context-aware computing |
D. | voice portal |
Answer» C. context-aware computing | |
15. |
Computing capabilities embedded into objects around us (mobile and stationary) |
A. | pervasive computing |
B. | ubiquitous computing (ubicom) |
C. | context-aware computing |
D. | geolocation |
Answer» C. context-aware computing | |
16. |
automatically identifying a Web user's location |
A. | voice portal |
B. | geolocation |
C. | sensor network |
D. | wimax |
Answer» C. sensor network | |
17. |
gateway to the Internet optimized for mobility |
A. | voice portal |
B. | wimax |
C. | mobile enterprise |
D. | mobile portal |
Answer» E. | |
18. |
systems used to track and identify the location of objects in real time |
A. | geolocation |
B. | geographical information system (gis) |
C. | wireless application protocol (wap) |
D. | real-time location system (rtls) |
Answer» E. | |
19. |
The examples of deployment tools are: |
A. | docker’s storm |
B. | new relic’s centurion |
C. | spotify’s helios |
D. | all of the above |
Answer» E. | |
20. |
Docker provides simple one-line deployment strategy. |
A. | true |
B. | false |
Answer» B. false | |
21. |
There is no built-in framework in Docker for testing. |
A. | true |
B. | false |
Answer» B. false | |
22. |
Containers require less disk space as compared to virtual machine |
A. | true |
B. | false |
Answer» B. false | |
23. |
Docker is generally configured to use TCP port while managing encrypted traffic. |
A. | 3306 |
B. | 53378 |
C. | 2375 |
D. | 2376 |
Answer» E. | |
24. |
Docker is generally configured to use TCP port while executing unencrypted traffic |
A. | 3306 |
B. | 53378 |
C. | 2375 |
D. | 2376 |
Answer» D. 2376 | |
25. |
Two main components in Docker are: |
A. | master, slave |
B. | client, server |
C. | client, master |
D. | all of the above |
Answer» C. client, master | |
26. |
Which containers are used by Docker severs? |
A. | windows |
B. | android |
C. | linux |
D. | mac |
Answer» D. mac | |
27. |
Basic approach of Docker as a company is: |
A. | “batteries included but removable” |
B. | “batteries included but non-removable” |
C. | “batteries but chargeable” |
D. | “battery less execution” |
Answer» B. “batteries included but non-removable” | |
28. |
Docker can simplify both, and |
A. | process, state |
B. | behavior, aspect |
C. | workflows, communication |
D. | all of the above |
Answer» D. all of the above | |
29. |
Which of the following policies is not mentioned in ‘not to violate’ regarding CloudBurst? |
A. | deadline-based |
B. | budget-based |
C. | quality-based |
D. | workload-based |
Answer» D. workload-based | |
30. |
In Comet, a tuple is a simple string |
A. | java |
B. | python |
C. | xml |
D. | html |
Answer» D. html | |
31. |
Which are the three conceptual layers in CometCloud? |
A. | development, application, physical |
B. | infrastructure, dynamic, static |
C. | transport, network, programming |
D. | programming, service, infrastructure |
Answer» E. | |
32. |
CometCloud supports policy based autonomic and |
A. | cloudbursting |
B. | cloudbridging |
C. | none |
D. | both a and b |
Answer» E. | |
33. |
Responsibility of OS developers to add new feature in existing OS are |
A. | more reliability |
B. | convenience and security |
C. | compatibility |
D. | all of the above |
Answer» E. | |
34. |
Which is the latest Operating System? |
A. | real-time os |
B. | desktop os |
C. | mainframe os |
D. | cloud os |
Answer» E. | |
35. |
Nodes in the network analysis graph represent the and the edges represent the relationships between nodes. |
A. | actors |
B. | nodes |
C. | users |
D. | both a and b |
Answer» E. | |
36. |
Arrange the stages in supply chain management:i. Material and Equipment Suppliesii. Delivery of Productsiii. After Sale Service and Returnsiv. Planning and Coordinationv. Manufacturing and Testing |
A. | iv, v, i, ii, iii |
B. | iv, i, v, iii, ii |
C. | iv, i, v, ii, iii |
D. | i, ii, iv, v, ii |
Answer» D. i, ii, iv, v, ii | |
37. |
The measures of centrality include: |
A. | betweenness |
B. | closeness |
C. | degree |
D. | all of the above |
Answer» E. | |
38. |
The social circles are loosely coupled if there is stringency of direct contact. |
A. | less |
B. | more |
C. | equal |
D. | no |
Answer» B. more | |
39. |
The degree to which actors are directly linked to one another throughcohesive bonds is called as . |
A. | closeness |
B. | cohesion |
C. | centralized |
D. | path length |
Answer» C. centralized | |
40. |
is the degree to which nodes have a common set of connections toother nodes |
A. | structural hole |
B. | structuralequivalence |
C. | structural cohesion |
D. | none of the above |
Answer» D. none of the above | |
41. |
The number of binding of a node to other actors of the graph in the graphrepresentation of a network is called as . |
A. | node degree |
B. | path length |
C. | social circle |
D. | bridge |
Answer» B. path length | |
42. |
Three parts of GPS include: |
A. | space segment |
B. | control segment |
C. | user segment |
D. | all of the above |
Answer» E. | |
43. |
_ is an attack which forces an end user to execute unwanted actions on aweb application in which he/she is currently authenticated. |
A. | cross-site scoringscripting |
B. | cross-site requestforgery |
C. | two-factorauthentication |
D. | cross-site scripting |
Answer» E. | |
44. |
What is the typical range of transmission distance in a ZigBee network? |
A. | 5 m. |
B. | 50 m. |
C. | 500 m. |
D. | 5 km |
Answer» C. 500 m. | |
45. |
Which of the following IEEE standards provides the lowest level of the ZigBeesoftware stack? |
A. | ieee 802.11. |
B. | ieee 802.15.1. |
C. | ieee 802.15.3. |
D. | ieee 802.15.4. |
Answer» E. | |
46. |
Which of the following specifies a set of media access control (MAC) andphysical layer specifications for implementing WLANs? |
A. | ieee 802.16 |
B. | ieee 802.3 |
C. | ieee 802.11 |
D. | ieee 802.15 |
Answer» D. ieee 802.15 | |
47. |
CoAP is specialized for |
A. | internet applications |
B. | device applications |
C. | wireless applications |
D. | wired applications |
Answer» B. device applications | |
48. |
Out of the following which is not element of threat modelling |
A. | asset |
B. | vulnerability |
C. | threat |
D. | time |
Answer» E. | |
49. |
In threat modeling, what methodology used to perform risk analysis |
A. | dread |
B. | owasp |
C. | stride |
D. | dar |
Answer» B. owasp | |
50. |
Which of the following is the heart of a SCADA system? |
A. | plc |
B. | hmi |
C. | alarm task |
D. | i/o task |
Answer» E. | |