MCQOPTIONS
Saved Bookmarks
This section includes 356 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
Which of the following is example of implicit interaction ? |
| A. | Multi Tapping |
| B. | Soft Keys |
| C. | Auditory Inteface |
| D. | T9 |
| Answer» E. | |
| 102. |
is proving that a message was sent by a certain sender. |
| A. | Confidentiality |
| B. | Integrity |
| C. | Authentication |
| D. | Availability |
| Answer» D. Availability | |
| 103. |
3 basic architectural design patterns for UbiCom includes smart |
| A. | Devices, Environment, Interfaces |
| B. | Devices, Environment, Interactions |
| C. | Distributed, Energy Saving, Intelligent |
| D. | Digital, Environment, Intelligent |
| Answer» C. Distributed, Energy Saving, Intelligent | |
| 104. |
can be defined as the manipulation, precision |
| A. | a. Nano- |
| B. | b. Ubiquitous |
| C. | c. MEMS |
| D. | d. Semacode |
| Answer» B. b. Ubiquitous | |
| 105. |
A network of physical objects or things embedded with electronics or |
| A. | AI |
| B. | ML |
| C. | IoT |
| D. | Internet |
| Answer» D. Internet | |
| 106. |
Mobile Service Design consists of which of the following type ? |
| A. | User Virtual Environm ent |
| B. | Mobile Virtual Terminal |
| C. | Virtual Resource Managemen t |
| D. | All of the above |
| Answer» E. | |
| 107. |
Which are two main approaches to dynamic service announcement and discovery ? |
| A. | PUSH & POP |
| B. | PUSH & PULL |
| C. | PULL & POP |
| D. | None of the above |
| Answer» C. PULL & POP | |
| 108. |
The number of operational amplifiers require for designing of electronic PID controller is: |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 6 |
| Answer» B. 2 | |
| 109. |
In method, for getting some type of information, if |
| A. | PUSH |
| B. | PULL |
| C. | POP |
| D. | All of the Above |
| Answer» C. POP | |
| 110. |
In , One antenna is used to transmit the RF signals, and the |
| A. | Mon Static |
| B. | Multi Static |
| C. | Bi Static |
| D. | None of the above |
| Answer» D. None of the above | |
| 111. |
Proportional band of a controller is defined as the range of: |
| A. | Measured variable to the set variable |
| B. | Air output as the measured variable varies from maximum to minimum |
| C. | Measured variables through which the air output varies from maximum to minimum |
| D. | None of the above |
| Answer» D. None of the above | |
| 112. |
IPV6 supports bit address |
| A. | 32 |
| B. | 64 |
| C. | 128 |
| D. | 256 |
| Answer» D. 256 | |
| 113. |
Data integrity means |
| A. | providing first access to stored data |
| B. | ensuring correctness and consistency of |
| C. | providing data sharing |
| D. | none of the above |
| Answer» C. providing data sharing | |
| 114. |
IANA stands for: |
| A. | a. Internal |
| B. | b. Internet |
| C. | c. |
| D. | d. Internet |
| Answer» E. | |
| 115. |
Human Computer Design is phase development life cycle. |
| A. | Two |
| B. | Three |
| C. | Four |
| D. | Five |
| Answer» D. Five | |
| 116. |
In basic interaction, protocol consists |
| A. | Synchronous |
| B. | Asynchronous |
| C. | Smart Interaction |
| D. | All of the Above |
| Answer» B. Asynchronous | |
| 117. |
MVT stands for …………….. |
| A. | Mobile Virtual Terminal |
| B. | Mobile Visual Terminnal |
| C. | Mobile Video Terminal |
| D. | None of the above |
| Answer» B. Mobile Visual Terminnal | |
| 118. |
Which of the following is not Ubiquitous Device ? |
| A. | TV |
| B. | RFIDTags |
| C. | PDAs |
| D. | Smartpho ne GPS |
| Answer» B. RFIDTags | |
| 119. |
In basic interaction, protocol consists of |
| A. | Synchronous |
| B. | Asynchronous |
| C. | mart Interaction |
| Answer» C. mart Interaction | |
| 120. |
Ubiquitous Means …… |
| A. | Found Everywhere |
| B. | Found Nowhere |
| C. | Found Anyhow |
| D. | Found Veryfast |
| Answer» B. Found Nowhere | |
| 121. |
What is full form of CLR? |
| A. | Common Language Rutime |
| B. | Common Language Rellocation |
| C. | Common Language Relocation |
| D. | Common Language Resource |
| Answer» B. Common Language Rellocation | |
| 122. |
can be sprayed & embedded throughout the digital environment |
| A. | Smart Dust |
| B. | Smart Skin |
| C. | Smart Clay |
| Answer» B. Smart Skin | |
| 123. |
Is fast and does not require physical sight or contact |
| A. | Wi-Fi |
| B. | OCR |
| C. | Bar Code |
| D. | RFID |
| Answer» E. | |
| 124. |
A reader may have multiple antennas that are responsible for sending and |
| A. | a. True |
| B. | b. False |
| Answer» B. b. False | |
| 125. |
The drive to switch transistors faster and to be low-powered has been to make them smaller where electronic components approach nanometer sizes is called as |
| A. | Nano- computing |
| B. | MEMS |
| C. | Semacode |
| D. | Ubiquitous Systems |
| Answer» B. MEMS | |
| 126. |
Authentication refers to : |
| A. | methods ofrestricting user access to system |
| B. | controllingaccess to portions of |
| C. | controlling theoperation on the data |
| D. | all of the above |
| Answer» E. | |
| 127. |
is also known as Publish-and-Subscribe interaction. |
| A. | Layered model |
| B. | Pipe-filter mode |
| C. | Event-driven Action or EDA |
| D. | Shared data repositories |
| Answer» D. Shared data repositories | |
| 128. |
Systems used to track and identify the location of objects in real time is |
| A. | Geolocation |
| B. | geographicalinformation |
| C. | WirelessApplication |
| D. | Real-time location system (RTLS) |
| Answer» E. | |
| 129. |
controller with control action the output of the controller |
| A. | a. Derivative |
| B. | b. Integral |
| C. | c. Proportional |
| D. | None of the above |
| Answer» B. b. Integral | |
| 130. |
occurs when many tags are present in a small area; but since |
| A. | a. RFID reader |
| B. | b. RFID Tag |
| C. | c. RFID |
| D. | d. None of the |
| Answer» C. c. RFID | |
| 131. |
BAN stands for |
| A. | Back Area Network |
| B. | Body Area Network |
| C. | Back Air Network |
| D. | Body Air Network |
| Answer» C. Back Air Network | |
| 132. |
In , data is written only once during manufacturing or |
| A. | Read Only |
| B. | Write Once – |
| C. | Read/Write |
| D. | All of above |
| Answer» C. Read/Write | |
| 133. |
Following is (are) the type(s) of Light sensor(s) |
| A. | a. Photo |
| B. | b. Photo |
| C. | c. Photo |
| D. | d. All of above |
| Answer» E. | |
| 134. |
indicates Increasing capability to manufacture low power, micro, more complex devices. |
| A. | Smart Devices |
| B. | Smart Environments |
| C. | Smart Interactions |
| Answer» B. Smart Environments | |
| 135. |
State whether True or False : Gesture may be static or dynamic |
| A. | TRUE |
| B. | FALSE |
| C. | None of the above |
| Answer» B. FALSE | |
| 136. |
What is main aim of Ubiquitous Computing? |
| A. | Creating Digital Product |
| B. | Creating Smart Product |
| C. | Creating Best Product |
| D. | Creating High Quality Product |
| Answer» C. Creating Best Product | |
| 137. |
Sensors are those which require an external excitation signal or a power signal. |
| A. | Active |
| B. | Passive |
| C. | Active and Passive both |
| D. | All of above |
| Answer» C. Active and Passive both | |
| 138. |
In tag data can be changed over time. |
| A. | Read Only |
| B. | Write Once – |
| C. | Read/Write |
| D. | All of above |
| Answer» D. All of above | |
| 139. |
Main goal of Things That Think(TTT) was ……. |
| A. | See how physical world meets with logical world |
| B. | See how logical world meets with physical world |
| C. | See how physical world meets with logical world |
| D. | None of the above |
| Answer» B. See how logical world meets with physical world | |
| 140. |
WiMAX comes under which standard ? |
| A. | IEEE 802.1 |
| B. | IEEE 802.16 |
| C. | Both (A) and (B) |
| D. | None of the above |
| Answer» C. Both (A) and (B) | |
| 141. |
If the systems are made proactive as per the requirement of users then these efforts and attempts are built in concept called |
| A. | Ubiquitous Computing |
| B. | Mobile Computing |
| C. | Cloud Computing |
| D. | All of There |
| Answer» B. Mobile Computing | |
| 142. |
ability to detect and react to a set of environmental variables that is described as context (which can be sensor info or |
| A. | Mobile Portal |
| B. | Conext Aware Computing |
| C. | Pervasive Computing |
| D. | Network Based positioning |
| Answer» C. Pervasive Computing | |
| 143. |
In is response thats late is incorrect and |
| A. | Hard Real |
| B. | Soft Real Time |
| C. | Operating Systems |
| D. | Embedded Systems |
| Answer» B. Soft Real Time | |
| 144. |
This is not included as a properties of Ubiquitous Computing |
| A. | Remote |
| B. | Autonomous |
| C. | Distributed |
| D. | Intelligent |
| Answer» B. Autonomous | |
| 145. |
indicates Increasing capability for more interoperable distributed mobile devices |
| A. | Smart Devices |
| B. | Smart Environments |
| C. | Smart Interactions |
| Answer» D. | |
| 146. |
Digital signatures combined with digital certificates provide by giving the recipient(s) a way to tie the message to an individual or entity who signed the message. |
| A. | Authenticity |
| B. | Integrity |
| C. | Encryption |
| D. | Availability |
| Answer» B. Integrity | |
| 147. |
Input and output UI are merge in which of the following interfaces ? |
| A. | Tangible user interface |
| B. | Organic user interface |
| C. | Both (A) and (B) |
| D. | None of the above |
| Answer» D. None of the above | |
| 148. |
is what every individual prefer in terms of physical privacy as well as digital privacy. |
| A. | Confidentiality |
| B. | Integrity |
| C. | Authentication |
| D. | Availability |
| Answer» B. Integrity | |
| 149. |
Terminate and remove registrations are included in phase of service provision life cycle. |
| A. | Service creatio |
| B. | Service operatio |
| C. | Service maintenanc |
| D. | Service dissolution |
| Answer» E. | |
| 150. |
In Different Degrees of CPI complete physical interaction (no ICT mediation) specifies |
| A. | P2P |
| B. | C2P / CA(Physical Env. Context-aware) |
| C. | P2C/AR/MR |
| D. | C2C /VR |
| Answer» B. C2P / CA(Physical Env. Context-aware) | |