Explore topic-wise MCQs in Information Technology Engineering (IT).

This section includes 356 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.

51.

............... main properties for UbiCom Systems were proposedby Weiser

A. 1
B. 2
C. 3
D. 4
Answer» C. 3
52.

The information on read-only chips be changed.

A. a. Can
B. b. Cannot
C. c. Sometimes
D. d. None of the
Answer» C. c. Sometimes
53.

is technique in which human sense input and control motor output.

A. Multi Modal
B. Multi functional manipulato r
C. Multi Chording
D. multi tier
Answer» B. Multi functional manipulato r
54.

Network address divided into and

A. Sub network addree and host computer address
B. client address and server address
C. mac address and ip address
D. None of the above
Answer» B. client address and server address
55.

Tangible Bits converts ……

A. tangible bits into painted bits
B. Painted bits into tangible bits
C. All of the above
D. None of the above
Answer» C. All of the above
56.

process two or more combined user input modes, such as

A. a. Multimodal
B. b. Gesture
C. c. Reflective
D. d. Active Interfaces
Answer» B. b. Gesture
57.

is the act of taking data and rendering it unreadable to anyone except for the intended recipient. While on the other hand, is the act of a user proving that they are who they are, and that they can

A. Encryption, Decryption
B. Encryption, Availability
C. Authentication, Encryption
D. Encryption, Authentication
Answer» E.
58.

Ubiquitous computing interaction to the devices is minimum or zero in .

A. M2M
B. H2M
C. M2H
D. H2H
Answer» E.
59.

micron- to millimetre-scale electronic

A. Nano-
B. MEMS
C. Semacode
D. Ubiquitous
Answer» C. Semacode
60.

deals with the protection of an individual’s information which is implemented while using

A. Digital agony
B. Digital privacy
C. Digital secrecy
D. Digital protection
Answer» C. Digital secrecy
61.

WearCamp and WearCam comes under ……..

A. CCI
B. CPI
C. iHCI
D. ICT
Answer» D. ICT
62.

Which of the following is characteritics of ICT devices

A. Size
B. Connectivit y
C. Haptic Input
D. All of the above
Answer» E.
63.

The technique has various dimension.

A. VR
B. RJ
C. Calm
D. Real
Answer» D. Real
64.

technology often used in "smart cards," have small radio

A. Wi-Fi
B. OCR
C. Bar Code
D. RFID
Answer» E.
65.

In smart device form factors, application of where paint used

A. Smart dust
B. Smart Clay
C. Smart Skins
D. None of the above
Answer» D. None of the above
66.

is a feature of systems which adapt

A. Mobility
B. Intelligence
C. Distributed
D. Pervasive
Answer» C. Distributed
67.

IPV4 supports                              bit address

A. 32
B. 64
C. 128
D. 256
Answer» B. 64
68.

Context Awareness is nothing but

A. Physical Awarenes s
B. Virtual Awareness
C. Both (A) and (B)
D. Person Awareness
Answer» E.
69.

CPI stands for

A. Computer Physical World Ineraction
B. Human Computer Intraction
C. Computer Physical Interface
D. None of the above
Answer» B. Human Computer Intraction
70.

The transmission medium that consists of strands of clear glass fibre, each of

A. a. Fiber Optics
B. b. Twisted
C. c. Microwave
D. d. None of the
Answer» B. b. Twisted
71.

is breaking the promise to stay a person’s data confidential.

A. Breach of confidentially.
B. Disclosure
C. Exposure
D. Increased accessibility
Answer» B. Disclosure
72.

In , reasons for which personal information are gathered ought to be indicated not later than at the season of information accumulation and the consequent utilize constrained to the satisfaction of those reasons or such others are not inconsistent with those

A. Gathering Limitation Principle
B. Information Quality Principle
C. Reason Specification Principle
D. Utilize Limitation Principle.
Answer» D. Utilize Limitation Principle.
73.

The wireless networking standard that is useful for creating small personal

A. a. Toothless
B. b. Whitetooth
C. c. Bluetooth
D. d. None of the
Answer» D. d. None of the
74.

can be sprayed & embedded throughout the digital

A. a. Smart dust
B. b. Smart Clay
C. c. Smart Skin
D. d. Smart Object
Answer» B. b. Smart Clay
75.

The method of slicing digital messages into parcels, sending them along

A. a. TCP/IP
B. b. Packet
C. c. Data
D. d. Client Server
Answer» C. c. Data
76.

ensures no one other our intended recipient(s) can eavesdrop on the message while                              provides confidentiality by scrambling the

A. Encryption, Decryption
B. Encryption, Availability
C. Authentication, Encryption
D. Confidentiality, Encryption
Answer» E.
77.

In the main constraint on interactions is

A. Physical
B. Human context
C. Virtual
D. All of the Above
Answer» C. Virtual
78.

HCI stands for

A. Human Computer Inteface
B. Human Computer Intraction
C. Both
D. None of the above
Answer» C. Both
79.

For modelling different key properties of                                      computing the increasingly digital world is occupied.

A. Pervasive
B. Ubiquitous
C. Both a & b
D. None of the Above
Answer» D. None of the Above
80.

Gesture consists of

A. Contactful Gesture
B. Contactless Gesture
C. Both (A) and (B)
D. None of the above
Answer» D. None of the above
81.

Claytronics project is application of .

A. Smart dust
B. Smart Clay
C. Smart Skins
D. None of the above
Answer» C. Smart Skins
82.

is used to translate information science address.

A. NAT
B. VPN
C. GPS
D. ICT
Answer» B. VPN
83.

A method which uses advertisements in electronic media,

A. PUSH
B. PULL
C. POP
D. All of the Above
Answer» B. PULL
84.

Which of the following businesses benefit and implemented RFID?

A. a. Logistics
B. b. Building
C. c. IT
D. d. All of the above
Answer» E.
85.

sensors are light based sensor that are used in various applications like Proximity and Object

A. Temperature
B. Pressure
C. Infrared
D. None of above
Answer» D. None of above
86.

Peocess of hiting several keys at once is called

A. Active Chording
B. Passive Chording
C. Multi Chording
D. None of the above
Answer» C. Multi Chording
87.

Auditory interface is used when

A. user want to give visual input
B. user want to give written inout
C. user want to give oral input
D. All of the above
Answer» D. All of the above
88.

RFID stands for .

A. Random
B. Radio
C. Random
D. Radio frequency
Answer» C. Random
89.

is the process of convincing a gatekeeper that you are who you say you are, typically by proving that you know a secret, I.e. password, captcha

A. Authenticity
B. Integrity
C. Encryption
D. Availability
Answer» B. Integrity
90.

This is not included as a main 3 properties for UbiCom Systems were proposed by Weiser in 1991.

A. Computers need to be networked, distributed and transparently accessible
B. Computer Interaction with Humans needs to be more hidden
C. Computers need to be aware of environment context
D. Computers can operate autonomously, without human intervention, be self-governed
Answer» E.
91.

The ICT systems are called as when system view is as single system

A. Multiple
B. Single
C. Distributed
D. Disjoint
Answer» D. Disjoint
92.

Which of the following is not characteristics of Smart Devices ?

A. Mobility
B. Single Fuction
C. Dynamic Service Discovery
D. Intermitte nt Resource Access
Answer» C. Dynamic Service Discovery
93.

short-range radio frequency communication technology for remotely storing and retrieving data using devices called RFID tags and RFID readers

A. Network Based Positioning
B. Real Time Location Systems
C. Radio Frequency Identification
D. Wireless Network
Answer» D. Wireless Network
94.

There are basic types of chips available on RFID tags.

A. a. Two
B. b. Three
C. c. Five
D. d. Seven
Answer» B. b. Three
95.

Which of the following technique is used to handle limited input ?

A. T9
B. Soft Keys
C. Auditory Inteface
D. All of the above
Answer» E.
96.

eHCI indicate

A. H2H
B. H2C
C. C2H
D. C2C
Answer» C. C2H
97.

is metaphor having relation to the shape of object.

A. Noun
B. Verb
C. Pronoun
D. Full
Answer» B. Verb
98.

systems are known as ubiquitous systems and does not involve humans to interact.

A. M2M
B. H2M
C. M2H
D. H2H
Answer» B. H2M
99.

Distributed ICT system consists of how many layes ?

A. 2
B. 3
C. 5
D. 4
Answer» C. 5
100.

systems that are self governing and also they are capable of taking their own independent decisions and

A. Autonomy
B. Distributed
C. Networked
D. Context aware
Answer» B. Distributed