MCQOPTIONS
Saved Bookmarks
This section includes 356 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of following NOT example of Natural Language Inteface(NLI) |
| A. | SHRDLU |
| B. | IBMLanguage Access |
| C. | Ubiquity Add-on for Mozilla Firebox |
| D. | All of the above are part of NLI |
| Answer» E. | |
| 2. |
Technology which is external to body and is directly attached to it is called as |
| A. | Accompan ied Technolog y |
| B. | Wearable Technology |
| C. | Non- Wearable Technology |
| D. | Virtual Technolog y |
| Answer» C. Non- Wearable Technology | |
| 3. |
Virtual Reality submerges |
| A. | physical user in a virtual 3D world |
| B. | Virtual 3D world into physical user |
| C. | Physical user into logical world |
| D. | Logical world into physical user |
| Answer» B. Virtual 3D world into physical user | |
| 4. |
Which device comes under MTOS ? |
| A. | WearCam p |
| B. | Smart Dust and Tiny OS |
| C. | WearCam |
| D. | Both A & C |
| Answer» E. | |
| 5. |
Head Up Display consists of |
| A. | Movable HUD |
| B. | Fixed HUD |
| C. | Head Mounted HUD |
| D. | Both B & C |
| Answer» E. | |
| 6. |
Which types of VPNs are used for corporate connectivity across companies residing in differentgeographical location? |
| A. | remote access vpns |
| B. | site-to-site vpns |
| C. | peer-to-peer vpns |
| D. | country-to-country vpns |
| Answer» C. peer-to-peer vpns | |
| 7. |
What types of protocols are usedin VPNs? |
| A. | application levelprotocols |
| B. | tunnellingprotocols |
| C. | networkprotocols |
| D. | mailing protocols |
| Answer» B. tunnellingprotocols | |
| 8. |
provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected tothe private network. |
| A. | visual private network |
| B. | virtual protocol network |
| C. | virtual protocol networking |
| D. | virtual private network |
| Answer» E. | |
| 9. |
A firewall needs to be so that it can grow proportionally with the network that it protects. |
| A. | robust |
| B. | expansive |
| C. | fast |
| D. | scalable |
| Answer» C. fast | |
| 10. |
Which of the following standard committee specifies Bluetooth and other Personal Area Networks(PAN)? |
| A. | ieee 802.11b |
| B. | ieee 802.15.2. |
| C. | ieee 802.11g |
| D. | ieee 802.16 |
| Answer» C. ieee 802.11g | |
| 11. |
WBAN(Wireless Body Area Network) allows the user to move another without having the restriction of a cable for sharinginformation. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 12. |
Body Area Network requirements.......... |
| A. | low powerconsumption & interoperability |
| B. | self-healing & security |
| C. | low latency |
| D. | all of the above |
| Answer» E. | |
| 13. |
There is more than ............... cellnodes in zigbee. |
| A. | 66000 |
| B. | 65000 |
| C. | 60000 |
| D. | 70000 |
| Answer» C. 60000 | |
| 14. |
Frequency range supported inZigbee ............. |
| A. | 2.4 ghz worldwide |
| B. | 2.0 ghz worldwide |
| C. | 2.1 ghzworldwide |
| D. | 3.4 ghz worldwide |
| Answer» B. 2.0 ghz worldwide | |
| 15. |
InBluetooth,multiple form a network called a ------------ |
| A. | scatternet; piconets |
| B. | piconets: scatternet |
| C. | piconets: bluenet |
| D. | bluenet; scatternet |
| Answer» C. piconets: bluenet | |
| 16. |
Which multiple access techniqueis used by IEEE 802.11 standard for wireless LAN? |
| A. | cdma |
| B. | csma/ca |
| C. | aloha |
| D. | csma/cd |
| Answer» C. aloha | |
| 17. |
Which of the following frequencies is not used in WiMAXfor communication? |
| A. | 2.3 ghz |
| B. | 2.4 ghz |
| C. | 2.5 ghz |
| D. | 3.5 ghz |
| Answer» C. 2.5 ghz | |
| 18. |
Which of the following modulation schemes is supportedby WiMAX? |
| A. | binary phase shift keying modulation |
| B. | quadrature phase shift keyingmodulation |
| C. | quadrature amplitudemodulation |
| D. | all of the mentioned |
| Answer» E. | |
| 19. |
In systems, resourcesare allocated on demand. |
| A. | packet switching |
| B. | circuit switching |
| C. | line switching |
| D. | frequency switching |
| Answer» B. circuit switching | |
| 20. |
What are the Methods to movedata through a network of links and switches? |
| A. | packet switching and line switching |
| B. | circuit switching and line switching |
| C. | line switching and bit switching |
| D. | packet switching and circuit switching |
| Answer» E. | |
| 21. |
The technique for separate but parallel signalling channel iscalled |
| A. | common channel signalling |
| B. | forward channel signalling |
| C. | reverse channel signalling |
| D. | separate channel signalling |
| Answer» B. forward channel signalling | |
| 22. |
LATAs are connected by acompany called |
| A. | land exchange carrier |
| B. | local exchangecarrier |
| C. | local controlexchange |
| D. | land area exchange |
| Answer» C. local controlexchange | |
| 23. |
PSTN is and wireless networks are |
| A. | highly dynamic, virtually static |
| B. | static, virtually static |
| C. | highly dynamic, virtually dynamic |
| D. | virtually static, highly dynamic |
| Answer» E. | |
| 24. |
Decisional interference involves............. |
| A. | revealing another’s nudity, grief, or bodily functions |
| B. | the revelation of truthful information about a person |
| C. | the government’s incursion into people’s decisionsregarding their private affairs |
| D. | the dissemination of certain information about a person to servethe aims and interests of another |
| Answer» D. the dissemination of certain information about a person to servethe aims and interests of another | |
| 25. |
Breach of confidentiality is............ |
| A. | is the threat to disclose personal information |
| B. | is breaking the promise to keep a person’s informationconfidential. |
| C. | is amplifying the accessibility of information. |
| D. | none of the above |
| Answer» C. is amplifying the accessibility of information. | |
| 26. |
In Solove’s taxonomy of privacyAggregation & Identification is a part of .......... |
| A. | information collection |
| B. | information processing |
| C. | information dissemination |
| D. | invasion |
| Answer» C. information dissemination | |
| 27. |
In Solove’s taxonomy of privacySurveillance & Interrogation is a part of .......... |
| A. | information collection |
| B. | information processing |
| C. | information dissemination |
| D. | invasion |
| Answer» B. information processing | |
| 28. |
Gestures are expressive, meaningful body motions involving physical movements of the fingers, hands, arms, head,face, or body. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 29. |
Head(s) Up Display or HUD is........... |
| A. | any type of display that presents data without blocking the user’s view |
| B. | the user looks through a display element attached to the airframe or vehicle chassis |
| C. | that is worn in front of the eye that acts as a camera to record the scene available to the eye, and acts as adisplay |
| D. | none of the above |
| Answer» B. the user looks through a display element attached to the airframe or vehicle chassis | |
| 30. |
Which phase is not a part of development of Human-CentredDesign Life-Cycle . |
| A. | requirement gathering and analysis |
| B. | modelling and design |
| C. | configurations & optional packages |
| D. | implementation and testing. |
| Answer» D. implementation and testing. | |
| 31. |
The main components of robotsare ........... |
| A. | end effectors oractuators |
| B. | controller |
| C. | sensors |
| D. | all of the above |
| Answer» E. | |
| 32. |
The most common forms ofproduction for MEMS are ........... |
| A. | bulk micromachining |
| B. | surfacemicromachining |
| C. | har fabrication |
| D. | all of the above |
| Answer» E. | |
| 33. |
Micro-Electro-Mechanical Systems (MEMS) developed using........... techniques |
| A. | fabrication |
| B. | microfabrication |
| C. | etching |
| D. | none of the above |
| Answer» C. etching | |
| 34. |
Micro-Electro-Mechanical Systems (MEMS) consists of........... |
| A. | microelectronic elements |
| B. | actuators, sensors |
| C. | mechanical structures |
| D. | all of the above |
| Answer» E. | |
| 35. |
Active transponders are woken up.............. |
| A. | no power source and no active transmitter |
| B. | they typically have a read range of 20 100m |
| C. | when they receive a signal from areader |
| D. | none of the above |
| Answer» D. none of the above | |
| 36. |
Types of active RFID tags are.......... |
| A. | transmitter & receiver |
| B. | transponders and beacons |
| C. | transmiter & reader |
| D. | none of the above |
| Answer» C. transmiter & reader | |
| 37. |
Service Oriented ArchitecturesFunctions ,,,,,,,,,,,,,, |
| A. | service discovery |
| B. | service invocation |
| C. | servicemanagement |
| D. | all of the above |
| Answer» E. | |
| 38. |
A MANIFEST.MF file located inthe ........ directory . |
| A. | general graph directory |
| B. | acyclic graphdirectory |
| C. | single-level |
| D. | meta-inf |
| Answer» E. | |
| 39. |
OSGi’s core component is ........... |
| A. | server |
| B. | bundle |
| C. | node |
| D. | gateway |
| Answer» C. node | |
| 40. |
The Home Electronic System (HES) defines the systemcomponents ......... |
| A. | residential gateway, homegate |
| B. | standard interfaces |
| C. | both |
| D. | none of the above |
| Answer» D. none of the above | |
| 41. |
Code written on the .NET Framework platform is called........... |
| A. | client code |
| B. | managed code |
| C. | server code |
| D. | none of the above |
| Answer» C. server code | |
| 42. |
J2ME is a multi layered organisation of software bundlesof three types ............. |
| A. | servers,desktop machines & high endconsumer devices |
| B. | configurations, profiles andoptional packages |
| C. | j2ee,j2se & kvm |
| D. | none of the above |
| Answer» C. j2ee,j2se & kvm | |
| 43. |
In J2ME architecture Connected Device Configuration (CDC)provides .......... |
| A. | fundamental services for devices |
| B. | fundamental services for virtual machines |
| C. | both |
| D. | none of the above |
| Answer» D. none of the above | |
| 44. |
The tag can be used to activate the task when the user clicks on aword on the screen? |
| A. | true |
| B. | false |
| C. | both |
| D. | none of the above |
| Answer» B. false | |
| 45. |
Which of the Following is used inbanking industary..... |
| A. | micr |
| B. | omr |
| C. | all of above |
| D. | none of the above |
| Answer» B. omr | |
| 46. |
It takes the output signal from thetransmission channel and delivers |
| A. | transmitter |
| B. | transmission channel |
| C. | receiver |
| D. | hardware |
| Answer» D. hardware | |
| 47. |
The SMART Board Software iscalled |
| A. | notepage |
| B. | notebook |
| C. | spiral page |
| D. | all of the above |
| Answer» C. spiral page | |
| 48. |
When connecting a wearable device to the cloud, what software is required to run a customservice? |
| A. | database |
| B. | operating system |
| C. | http server |
| D. | all of the above |
| Answer» E. | |
| 49. |
Among the various wireless options for wearable devices, which one needs to connect to a smart phone and is the mostpopular? |
| A. | bluetooth |
| B. | wifi |
| C. | rfid |
| D. | none of the above |
| Answer» B. wifi | |
| 50. |
Which of the following is not a key characteristic of UbicompSystem ? |
| A. | distributed |
| B. | ihci |
| C. | context- awareness |
| D. | pay as you go |
| Answer» E. | |