Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

Design architecture of UbiComp system consists of …………..

A. Smart Device
B. Smart Environme nt
C. Smart Interaction
D. All of the above
Answer» E.
2.

State the proper opinion : A key design issues for conyext aware system is to balance the degree of user management and awareness of proper environment.

A. Partially True
B. TRUE
C. FALSE
D. Might be True
Answer» C. FALSE
3.

Several instructions execution simultaneously in .

A. Processing
B. Parallel
C. Serial
D. Multi Tasking
Answer» C. Serial
4.

A collection of nodes used for sensing the environment is known as .

A. Voice Portal
B. Mobile Portal
C. Geolocation
D. Sensor Network
Answer» E.
5.

Ubiquitous Computing supports …….

A. Many to 1
B. 1 to 1
C. Many to Many
D. 1 to Many
Answer» E.
6.

Implicit (i)HCI indicates

A. H2H
B. H2C
C. C2H
D. C2C
Answer» D. C2C
7.

Root of network tree is formed by _.

A. ZigBee Co- ordinator
B. ZigBee Router
C. ZigBee End Device
D. All of the above
Answer» B. ZigBee Router
8.

OLED have a                  response time than an LED.

A. much lower
B. much faster
C. more
D. less
Answer» C. more
9.

Advantages Of ubiquitious computing

A. Invisible
B. Socialization
C. Decision-making
D. All of There
Answer» E.
10.

Who invented term Ubiquitous Computing ?

A. Shaun Watson
B. Mark Ciere
C. Mark Watson
D. Mark Weiser
Answer» E.
11.

In user performs an action which is having primary aim to interact with systems.

A. iHCI
B. eHCI
C. CCI
D. HHI
Answer» B. eHCI
12.

RFID applications undermine two classes of indivitual pricacy                   and .

A. Data Privacy, Location Privacy
B. Data Privacy, Migration Privacy
C. Location Privacy,Migr ation Privacy
D. Data Privacy, User Privacy
Answer» B. Data Privacy, Migration Privacy
13.

First types of pervasive communication networks were

A. Video Network
B. Vitual Network
C. Audio Network
D. Virtual Network
Answer» D. Virtual Network
14.

Ubiquitous computing is the method of ........

A. enhancing computer use by making many computers available throughout the physical environment
B. wireless communication and carry-around computers.
C. allowing transmission of data, voice and video via a computer
D. interact with a variety of users via the internet.
Answer» B. wireless communication and carry-around computers.
15.

Among the various wireless options for wearable devices, which one needs to connect to a smart phone and is the most popular?

A. bluetooth
B. wifi
C. rfid
D. none of the above
Answer» B. wifi
16.

............... main properties for UbiCom Systems were proposed by Weiser

A. 1
B. 2
C. 3
D. 4
Answer» C. 3
17.

When connecting a wearable device to the cloud, what software is required to run a custom service?

A. database
B. operating system
C. http server
D. all of the above
Answer» E.
18.

Which of the following is not a key characteristic of Ubicomp System ?

A. distributed
B. ihci
C. context- awareness
D. pay as you go
Answer» E.
19.

It takes the output signal from the transmission channel and delivers

A. transmitter
B. transmission channel
C. receiver
D. hardware
Answer» D. hardware
20.

What does RFID stand for?

A. radio frequency issue date
B. radio frequency identification
C. rear field identification
D. real far identification
Answer» C. rear field identification
21.

What applications run on a SMART Board?

A. any applicaiton on the computer
B. internet browsers like explorer and navigator only
C. powerpoint only
D. powerpoint only
Answer» B. internet browsers like explorer and navigator only
22.

The SMART Board Software is called

A. notepage
B. notebook
C. spiral page
D. all of the above
Answer» C. spiral page
23.

Which of the Following is used in banking industary.....

A. micr
B. omr
C. all of above
D. none of the above
Answer» B. omr
24.

The tag can be used to activate the task when the user clicks on a word on the screen?

A. true
B. false
C. both
D. none of the above
Answer» B. false
25.

Limitations of Short Messaging Service (SMS)

A. limited to 160 characters or less
B. message latency is one minute or more
C. poor security at the application level
D. all of the above
Answer» E.
26.

WAP?

A. wireless application protocol
B. wired allication protocol
C. wide application protocol
D. none of the above
Answer» B. wired allication protocol
27.

WAP is designed for?

A. internet explorer
B. web browser
C. micro browser
D. macro browser
Answer» D. macro browser
28.

DoCoMo Stands for ...............

A. documentation over the mobile network
B. do communications over the mobile network
C. documentation & communications over the mobile network
D. none of the above
Answer» C. documentation & communications over the mobile network
29.

Mobile Web Service design often uses a three tier ...............

A. thin client, client proxy, server architecture
B. network, client proxy, server architecture
C. internet,cilent & server
D. none of the above
Answer» B. network, client proxy, server architecture
30.

In J2ME architecture Connected Device Configuration (CDC) provides ..........

A. fundamental services for devices
B. fundamental services for virtual machines
C. both
D. none of the above
Answer» D. none of the above
31.

Java 2 Mobile Environment supports .................

A. development of client server system
B. stand alone system designs in which code is developed
C. both
D. none of the above
Answer» D. none of the above
32.

The .NET Framework consists of two main parts ............

A. common language runtime & unified set of class libraries
B. client & server
C. packeges & class labraries
D. digital packages & digital class labraries
Answer» B. client & server
33.

Code written on the .NET Framework platform is called ...........

A. client code
B. managed code
C. server code
D. none of the above
Answer» C. server code
34.

J2ME is a multi layered organisation of software bundles of three types .............

A. servers,desktop machines & high end consumer devices
B. configurations, profiles and optional packages
C. j2ee,j2se & kvm
D. none of the above
Answer» C. j2ee,j2se & kvm
35.

Managed code .......

A. cannot have bad pointers
B. cannot create memory leaks
C. supports strong code type safety
D. all of the above
Answer» E.
36.

.NET CF designed specifically for devices, such as .............

A. smart cards
B. smart wearable devices
C. pdas and smart mobile phones.
D. sensors
Answer» D. sensors
37.

IrDA support ........

A. sql server ce
B. device specific controls
C. high performance jit compiler
D. all of the above
Answer» E.
38.

Mobile code is any .........

A. program
B. application
C. content
D. all of the above
Answer» E.
39.

Sandboxes ..........

A. that limit the local services that code can access.
B. which ensures that code originates from a trusted source.
C. machines that can access the internet
D. that carries explicit proof of its security.
Answer» B. which ensures that code originates from a trusted source.
40.

Firewalls ............

A. that limit the local services that code can access.
B. which ensures that code originates from a trusted source.
C. machines that can access the internet
D. that carries explicit proof of its security.
Answer» D. that carries explicit proof of its security.
41.

A smart card ............

A. is a plastic card embedded with digital memory
B. which store data on magnetic strips
C. is reprogrammable
D. all of the above
Answer» E.
42.

Proof Carrying Code ...............

A. that limit the local services that code can access.
B. which ensures that code originates from a trusted source.
C. machines that can access the internet
D. that carries explicit proof of its security.
Answer» E.
43.

Code Signing .........

A. that limit the local services that code can access.
B. which ensures that code originates from a trusted source.
C. machines that can access the internet
D. that carries explicit proof of its security.
Answer» C. machines that can access the internet
44.

The primary tasks of a smart card operating system .............

A. transferring data to and from the smart card
B. controlling the execution of commands
C. managing and executing cryptographic algorithms
D. all of the above
Answer» E.
45.

Java Card widely used in ...........

A. sim cards
B. atm cards
C. both
D. none of the above
Answer» D. none of the above
46.

The Home Electronic System (HES) defines the system components .........

A. residential gateway, homegate
B. standard interfaces
C. both
D. none of the above
Answer» D. none of the above
47.

Jini consists of three Java language protocols ...............

A. discovery, join and lookup
B. discovery, configuration and lookup
C. discovery, join and installation
D. find , join and lookup
Answer» B. discovery, configuration and lookup
48.

UPnP Stands for ..........

A. united plug and play protocol
B. undirectional plug and play protocol
C. universal plug and play protocol
D. unidirectional plug and play protocol
Answer» D. unidirectional plug and play protocol
49.

Benefit of UPnP .............

A. media and device independence
B. platform independence
C. internet-based technologies
D. all of the above
Answer» E.
50.

OSGi’s core component is ...........

A. server
B. bundle
C. node
D. gateway
Answer» C. node