MCQOPTIONS
Saved Bookmarks
This section includes 356 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
............... main properties for UbiCom Systems were proposedby Weiser |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» C. 3 | |
| 52. |
The information on read-only chips be changed. |
| A. | a. Can |
| B. | b. Cannot |
| C. | c. Sometimes |
| D. | d. None of the |
| Answer» C. c. Sometimes | |
| 53. |
is technique in which human sense input and control motor output. |
| A. | Multi Modal |
| B. | Multi functional manipulato r |
| C. | Multi Chording |
| D. | multi tier |
| Answer» B. Multi functional manipulato r | |
| 54. |
Network address divided into and |
| A. | Sub network addree and host computer address |
| B. | client address and server address |
| C. | mac address and ip address |
| D. | None of the above |
| Answer» B. client address and server address | |
| 55. |
Tangible Bits converts …… |
| A. | tangible bits into painted bits |
| B. | Painted bits into tangible bits |
| C. | All of the above |
| D. | None of the above |
| Answer» C. All of the above | |
| 56. |
process two or more combined user input modes, such as |
| A. | a. Multimodal |
| B. | b. Gesture |
| C. | c. Reflective |
| D. | d. Active Interfaces |
| Answer» B. b. Gesture | |
| 57. |
is the act of taking data and rendering it unreadable to anyone except for the intended recipient. While on the other hand, is the act of a user proving that they are who they are, and that they can |
| A. | Encryption, Decryption |
| B. | Encryption, Availability |
| C. | Authentication, Encryption |
| D. | Encryption, Authentication |
| Answer» E. | |
| 58. |
Ubiquitous computing interaction to the devices is minimum or zero in . |
| A. | M2M |
| B. | H2M |
| C. | M2H |
| D. | H2H |
| Answer» E. | |
| 59. |
micron- to millimetre-scale electronic |
| A. | Nano- |
| B. | MEMS |
| C. | Semacode |
| D. | Ubiquitous |
| Answer» C. Semacode | |
| 60. |
deals with the protection of an individual’s information which is implemented while using |
| A. | Digital agony |
| B. | Digital privacy |
| C. | Digital secrecy |
| D. | Digital protection |
| Answer» C. Digital secrecy | |
| 61. |
WearCamp and WearCam comes under …….. |
| A. | CCI |
| B. | CPI |
| C. | iHCI |
| D. | ICT |
| Answer» D. ICT | |
| 62. |
Which of the following is characteritics of ICT devices |
| A. | Size |
| B. | Connectivit y |
| C. | Haptic Input |
| D. | All of the above |
| Answer» E. | |
| 63. |
The technique has various dimension. |
| A. | VR |
| B. | RJ |
| C. | Calm |
| D. | Real |
| Answer» D. Real | |
| 64. |
technology often used in "smart cards," have small radio |
| A. | Wi-Fi |
| B. | OCR |
| C. | Bar Code |
| D. | RFID |
| Answer» E. | |
| 65. |
In smart device form factors, application of where paint used |
| A. | Smart dust |
| B. | Smart Clay |
| C. | Smart Skins |
| D. | None of the above |
| Answer» D. None of the above | |
| 66. |
is a feature of systems which adapt |
| A. | Mobility |
| B. | Intelligence |
| C. | Distributed |
| D. | Pervasive |
| Answer» C. Distributed | |
| 67. |
IPV4 supports bit address |
| A. | 32 |
| B. | 64 |
| C. | 128 |
| D. | 256 |
| Answer» B. 64 | |
| 68. |
Context Awareness is nothing but |
| A. | Physical Awarenes s |
| B. | Virtual Awareness |
| C. | Both (A) and (B) |
| D. | Person Awareness |
| Answer» E. | |
| 69. |
CPI stands for |
| A. | Computer Physical World Ineraction |
| B. | Human Computer Intraction |
| C. | Computer Physical Interface |
| D. | None of the above |
| Answer» B. Human Computer Intraction | |
| 70. |
The transmission medium that consists of strands of clear glass fibre, each of |
| A. | a. Fiber Optics |
| B. | b. Twisted |
| C. | c. Microwave |
| D. | d. None of the |
| Answer» B. b. Twisted | |
| 71. |
is breaking the promise to stay a person’s data confidential. |
| A. | Breach of confidentially. |
| B. | Disclosure |
| C. | Exposure |
| D. | Increased accessibility |
| Answer» B. Disclosure | |
| 72. |
In , reasons for which personal information are gathered ought to be indicated not later than at the season of information accumulation and the consequent utilize constrained to the satisfaction of those reasons or such others are not inconsistent with those |
| A. | Gathering Limitation Principle |
| B. | Information Quality Principle |
| C. | Reason Specification Principle |
| D. | Utilize Limitation Principle. |
| Answer» D. Utilize Limitation Principle. | |
| 73. |
The wireless networking standard that is useful for creating small personal |
| A. | a. Toothless |
| B. | b. Whitetooth |
| C. | c. Bluetooth |
| D. | d. None of the |
| Answer» D. d. None of the | |
| 74. |
can be sprayed & embedded throughout the digital |
| A. | a. Smart dust |
| B. | b. Smart Clay |
| C. | c. Smart Skin |
| D. | d. Smart Object |
| Answer» B. b. Smart Clay | |
| 75. |
The method of slicing digital messages into parcels, sending them along |
| A. | a. TCP/IP |
| B. | b. Packet |
| C. | c. Data |
| D. | d. Client Server |
| Answer» C. c. Data | |
| 76. |
ensures no one other our intended recipient(s) can eavesdrop on the message while provides confidentiality by scrambling the |
| A. | Encryption, Decryption |
| B. | Encryption, Availability |
| C. | Authentication, Encryption |
| D. | Confidentiality, Encryption |
| Answer» E. | |
| 77. |
In the main constraint on interactions is |
| A. | Physical |
| B. | Human context |
| C. | Virtual |
| D. | All of the Above |
| Answer» C. Virtual | |
| 78. |
HCI stands for |
| A. | Human Computer Inteface |
| B. | Human Computer Intraction |
| C. | Both |
| D. | None of the above |
| Answer» C. Both | |
| 79. |
For modelling different key properties of computing the increasingly digital world is occupied. |
| A. | Pervasive |
| B. | Ubiquitous |
| C. | Both a & b |
| D. | None of the Above |
| Answer» D. None of the Above | |
| 80. |
Gesture consists of |
| A. | Contactful Gesture |
| B. | Contactless Gesture |
| C. | Both (A) and (B) |
| D. | None of the above |
| Answer» D. None of the above | |
| 81. |
Claytronics project is application of . |
| A. | Smart dust |
| B. | Smart Clay |
| C. | Smart Skins |
| D. | None of the above |
| Answer» C. Smart Skins | |
| 82. |
is used to translate information science address. |
| A. | NAT |
| B. | VPN |
| C. | GPS |
| D. | ICT |
| Answer» B. VPN | |
| 83. |
A method which uses advertisements in electronic media, |
| A. | PUSH |
| B. | PULL |
| C. | POP |
| D. | All of the Above |
| Answer» B. PULL | |
| 84. |
Which of the following businesses benefit and implemented RFID? |
| A. | a. Logistics |
| B. | b. Building |
| C. | c. IT |
| D. | d. All of the above |
| Answer» E. | |
| 85. |
sensors are light based sensor that are used in various applications like Proximity and Object |
| A. | Temperature |
| B. | Pressure |
| C. | Infrared |
| D. | None of above |
| Answer» D. None of above | |
| 86. |
Peocess of hiting several keys at once is called |
| A. | Active Chording |
| B. | Passive Chording |
| C. | Multi Chording |
| D. | None of the above |
| Answer» C. Multi Chording | |
| 87. |
Auditory interface is used when |
| A. | user want to give visual input |
| B. | user want to give written inout |
| C. | user want to give oral input |
| D. | All of the above |
| Answer» D. All of the above | |
| 88. |
RFID stands for . |
| A. | Random |
| B. | Radio |
| C. | Random |
| D. | Radio frequency |
| Answer» C. Random | |
| 89. |
is the process of convincing a gatekeeper that you are who you say you are, typically by proving that you know a secret, I.e. password, captcha |
| A. | Authenticity |
| B. | Integrity |
| C. | Encryption |
| D. | Availability |
| Answer» B. Integrity | |
| 90. |
This is not included as a main 3 properties for UbiCom Systems were proposed by Weiser in 1991. |
| A. | Computers need to be networked, distributed and transparently accessible |
| B. | Computer Interaction with Humans needs to be more hidden |
| C. | Computers need to be aware of environment context |
| D. | Computers can operate autonomously, without human intervention, be self-governed |
| Answer» E. | |
| 91. |
The ICT systems are called as when system view is as single system |
| A. | Multiple |
| B. | Single |
| C. | Distributed |
| D. | Disjoint |
| Answer» D. Disjoint | |
| 92. |
Which of the following is not characteristics of Smart Devices ? |
| A. | Mobility |
| B. | Single Fuction |
| C. | Dynamic Service Discovery |
| D. | Intermitte nt Resource Access |
| Answer» C. Dynamic Service Discovery | |
| 93. |
short-range radio frequency communication technology for remotely storing and retrieving data using devices called RFID tags and RFID readers |
| A. | Network Based Positioning |
| B. | Real Time Location Systems |
| C. | Radio Frequency Identification |
| D. | Wireless Network |
| Answer» D. Wireless Network | |
| 94. |
There are basic types of chips available on RFID tags. |
| A. | a. Two |
| B. | b. Three |
| C. | c. Five |
| D. | d. Seven |
| Answer» B. b. Three | |
| 95. |
Which of the following technique is used to handle limited input ? |
| A. | T9 |
| B. | Soft Keys |
| C. | Auditory Inteface |
| D. | All of the above |
| Answer» E. | |
| 96. |
eHCI indicate |
| A. | H2H |
| B. | H2C |
| C. | C2H |
| D. | C2C |
| Answer» C. C2H | |
| 97. |
is metaphor having relation to the shape of object. |
| A. | Noun |
| B. | Verb |
| C. | Pronoun |
| D. | Full |
| Answer» B. Verb | |
| 98. |
systems are known as ubiquitous systems and does not involve humans to interact. |
| A. | M2M |
| B. | H2M |
| C. | M2H |
| D. | H2H |
| Answer» B. H2M | |
| 99. |
Distributed ICT system consists of how many layes ? |
| A. | 2 |
| B. | 3 |
| C. | 5 |
| D. | 4 |
| Answer» C. 5 | |
| 100. |
systems that are self governing and also they are capable of taking their own independent decisions and |
| A. | Autonomy |
| B. | Distributed |
| C. | Networked |
| D. | Context aware |
| Answer» B. Distributed | |