Explore topic-wise MCQs in Technical Programming.

This section includes 1361 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following is a specification for multicast discovery on a LAN?

A. ws-agent
B. ws-discovery
C. ws-soap
D. all of the mentioned
Answer» C. ws-soap
2.

ability to detect and react to a set of environmental variables that is described as context (which can be sensor info or users' attitudes)

A. mobile portal
B. context-aware computing
C. pervasive computing
D. network-based positioning
Answer» C. pervasive computing
3.

a wireless telecommunications network for device-to-device connections within a very short range

A. wireless wide area network (wwan)
B. personal area network (pan)
C. wireless local area network (wlan)
D. sensor network
Answer» C. wireless local area network (wlan)
4.

a telecommunications network that offers wireless coverage over a large geographical area, typically over a cellular phone network

A. personal area network (pan)
B. wireless application protocol (wap)
C. wireless wide area network (wwan)
D. wireless local area network (wlan)
Answer» D. wireless local area network (wlan)
5.

a voice system enables users to request/receive info, enter/change data through a telephone to a computerized system

A. pervasive computing
B. real-time location system (rtls)
C. personal area network (pan)
D. interactive voice response (ivr)
Answer» E.
6.

a wireless version of the Ethernet networking standard

A. wireless wide area network (wwan)
B. wireless local area network (wlan)
C. personal area network (pan)
D. wireless application protocol (wap)
Answer» C. personal area network (pan)
7.

a website with an audio interface that can be accessed through a telephonecall

A. wimax
B. geolocation
C. mobile portal
D. voice portal
Answer» E.
8.

a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology

A. voice portal
B. mobile portal
C. wimax
D. geolocation
Answer» D. geolocation
9.

Calculating the location of a mobile device from signals sent by the device tobase stations

A. personal areanetwork (pan)
B. terminal-basedpositioning
C. pervasive computing
D. network-basedpositioning
Answer» C. pervasive computing
10.

a technology that offers Internet browsing from wireless devices

A. real-time location system (rtls)
B. wireless wide area network (wwan)
C. wireless local area network (wlan)
D. wireless application protocol (wap)
Answer» E.
11.

short-range radio frequency communication technology for remotely storing and retrieving data using devices called        tags and        readers

A. network-based positioning
B. real-time location system (rtls)
C. radio frequency identification (rfid)
D. wireless wide area network (wwan)
Answer» D. wireless wide area network (wwan)
12.

A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes

A. voice portal
B. mobile portal
C. geolocation
D. sensor network
Answer» E.
13.

Vehicle mount solutions• Handheld solutions• Hands-free and voice solutions

A. mobile enterprise
B. wireless wide area network (wwan)
C. typical mobile devices used in warehouses
D. interactive voice response (ivr)
Answer» D. interactive voice response (ivr)
14.

Computing capabilities embedded in the environment but typically not mobile

A. mobile portal
B. pervasive computing
C. context-aware computing
D. voice portal
Answer» C. context-aware computing
15.

Computing capabilities embedded into objects around us (mobile and stationary)

A. pervasive computing
B. ubiquitous computing (ubicom)
C. context-aware computing
D. geolocation
Answer» C. context-aware computing
16.

automatically identifying a Web user's location

A. voice portal
B. geolocation
C. sensor network
D. wimax
Answer» C. sensor network
17.

gateway to the Internet optimized for mobility

A. voice portal
B. wimax
C. mobile enterprise
D. mobile portal
Answer» E.
18.

systems used to track and identify the location of objects in real time

A. geolocation
B. geographical information system (gis)
C. wireless application protocol (wap)
D. real-time location system (rtls)
Answer» E.
19.

The examples of deployment tools are:

A. docker’s storm
B. new relic’s centurion
C. spotify’s helios
D. all of the above
Answer» E.
20.

Docker provides simple one-line deployment strategy.

A. true
B. false
Answer» B. false
21.

There is no built-in framework in Docker for testing.

A. true
B. false
Answer» B. false
22.

Containers require less disk space as compared to virtual machine

A. true
B. false
Answer» B. false
23.

Docker is generally configured to use TCP port          while managing encrypted traffic.

A. 3306
B. 53378
C. 2375
D. 2376
Answer» E.
24.

Docker is generally configured to use TCP port          while executing unencrypted traffic

A. 3306
B. 53378
C. 2375
D. 2376
Answer» D. 2376
25.

Two main components in Docker are:

A. master, slave
B. client, server
C. client, master
D. all of the above
Answer» C. client, master
26.

Which containers are used by Docker severs?

A. windows
B. android
C. linux
D. mac
Answer» D. mac
27.

Basic approach of Docker as a company is:

A. “batteries included but removable”
B. “batteries included but non-removable”
C. “batteries but chargeable”
D. “battery less execution”
Answer» B. “batteries included but non-removable”
28.

Docker can simplify both,          and

A. process, state
B. behavior, aspect
C. workflows, communication
D. all of the above
Answer» D. all of the above
29.

Which of the following policies is not mentioned in ‘not to violate’ regarding CloudBurst?

A. deadline-based
B. budget-based
C. quality-based
D. workload-based
Answer» D. workload-based
30.

In Comet, a tuple is a simple        string

A. java
B. python
C. xml
D. html
Answer» D. html
31.

Which are the three conceptual layers in CometCloud?

A. development, application, physical
B. infrastructure, dynamic, static
C. transport, network, programming
D. programming, service, infrastructure
Answer» E.
32.

CometCloud supports policy based autonomic      and

A. cloudbursting
B. cloudbridging
C. none
D. both a and b
Answer» E.
33.

Responsibility of OS developers to add new feature in existing OS are

A. more reliability
B. convenience and security
C. compatibility
D. all of the above
Answer» E.
34.

Which is the latest Operating System?

A. real-time os
B. desktop os
C. mainframe os
D. cloud os
Answer» E.
35.

Nodes in the network analysis graph represent the                   and the edges represent the relationships between nodes.

A. actors
B. nodes
C. users
D. both a and b
Answer» E.
36.

Arrange the stages in supply chain management:i. Material and Equipment Suppliesii. Delivery of Productsiii. After Sale Service and Returnsiv. Planning and Coordinationv. Manufacturing and Testing

A. iv, v, i, ii, iii
B. iv, i, v, iii, ii
C. iv, i, v, ii, iii
D. i, ii, iv, v, ii
Answer» D. i, ii, iv, v, ii
37.

The measures of centrality include:

A. betweenness
B. closeness
C. degree
D. all of the above
Answer» E.
38.

The social circles are loosely coupled if there is                   stringency of direct contact.

A. less
B. more
C. equal
D. no
Answer» B. more
39.

The degree to which actors are directly linked to one another throughcohesive bonds is called as .

A. closeness
B. cohesion
C. centralized
D. path length
Answer» C. centralized
40.

is the degree to which nodes have a common set of connections toother nodes

A. structural hole
B. structuralequivalence
C. structural cohesion
D. none of the above
Answer» D. none of the above
41.

The number of binding of a node to other actors of the graph in the graphrepresentation of a network is called as .

A. node degree
B. path length
C. social circle
D. bridge
Answer» B. path length
42.

Three parts of GPS include:

A. space segment
B. control segment
C. user segment
D. all of the above
Answer» E.
43.

_ is an attack which forces an end user to execute unwanted actions on aweb application in which he/she is currently authenticated.

A. cross-site scoringscripting
B. cross-site requestforgery
C. two-factorauthentication
D. cross-site scripting
Answer» E.
44.

What is the typical range of transmission distance in a ZigBee network?

A. 5 m.
B. 50 m.
C. 500 m.
D. 5 km
Answer» C. 500 m.
45.

Which of the following IEEE standards provides the lowest level of the ZigBeesoftware stack?

A. ieee 802.11.
B. ieee 802.15.1.
C. ieee 802.15.3.
D. ieee 802.15.4.
Answer» E.
46.

Which of the following specifies a set of media access control (MAC) andphysical layer specifications for implementing WLANs?

A. ieee 802.16
B. ieee 802.3
C. ieee 802.11
D. ieee 802.15
Answer» D. ieee 802.15
47.

CoAP is specialized for

A. internet applications
B. device applications
C. wireless applications
D. wired applications
Answer» B. device applications
48.

Out of the following which is not element of threat modelling

A. asset
B. vulnerability
C. threat
D. time
Answer» E.
49.

In threat modeling, what methodology used to perform risk analysis

A. dread
B. owasp
C. stride
D. dar
Answer» B. owasp
50.

Which of the following is the heart of a SCADA system?

A. plc
B. hmi
C. alarm task
D. i/o task
Answer» E.