MCQOPTIONS
Saved Bookmarks
This section includes 356 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.
| 151. |
Layer is always at the bottom of ubiquitous computing stack. |
| A. | Physical |
| B. | Services |
| C. | Applications |
| D. | Internet |
| Answer» B. Services | |
| 152. |
In , individual information ought not be unveiled , made accessible or generally utilized for purposes as per purpose specification rule. |
| A. | Gathering Limitation Principle |
| B. | Information Quality Principle |
| C. | Reason Specification Principle |
| D. | Utilize Limitation Principle. |
| Answer» E. | |
| 153. |
In Smart Device Form Factors, can be spread into physical |
| A. | Smart dust |
| B. | Smart Clay |
| C. | Smart Skins |
| D. | None of the above |
| Answer» B. Smart Clay | |
| 154. |
Mouse is replacement of . |
| A. | Light Pen |
| B. | Ball Pen |
| C. | Scan Pen |
| D. | Slider |
| Answer» B. Ball Pen | |
| 155. |
Hard real time operating system has jitter than a soft real |
| A. | a. Less |
| B. | b. More |
| C. | c. Equal |
| D. | d. None of above |
| Answer» B. b. More | |
| 156. |
These are the functions of RFID Reader |
| A. | Remotely |
| B. | Establish a |
| C. | Inventory tags, |
| D. | All of above |
| Answer» E. | |
| 157. |
Which of the following statements about radio frequency identification |
| A. | a. RFID |
| B. | b. RFID |
| C. | c. RFID |
| D. | d. Companies may |
| Answer» D. d. Companies may | |
| 158. |
Difficulties in RFID tags are |
| A. | Automatio n |
| B. | Identificati on |
| C. | Integration |
| D. | All of the above |
| Answer» E. | |
| 159. |
Invoke and coordinate are included in phase of service provision life cycle. |
| A. | Service creatio |
| B. | Service operatio |
| C. | Service maintenanc |
| D. | Service dissolution |
| Answer» C. Service maintenanc | |
| 160. |
Soloves taxonomy of Privacy consists of |
| A. | Data collection |
| B. | Data process |
| C. | Data Disseminati on |
| D. | All of the above |
| Answer» E. | |
| 161. |
Virtual Retinal Display (VRD) is also called as a |
| A. | Retinal Secure Display |
| B. | Retinal Scan Display |
| C. | Retinal Scan Display |
| D. | Retinal Safe Display |
| Answer» C. Retinal Scan Display | |
| 162. |
Service Provision Life Cycle consiste for phases. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» D. 5 | |
| 163. |
Mobile Web Service Design consists of Architecture |
| A. | 2 tier |
| B. | 3 tier |
| C. | 4 tier |
| D. | multi tier |
| Answer» C. 4 tier | |
| 164. |
In ubicomp system Model , Smart DEI where DEI stands for |
| A. | Devices, Environment, Interfaces |
| B. | Devices, Environment, Interactions |
| C. | Distributed, Energy Saving, Intelligent |
| D. | Digital, Environment, Intelligent |
| Answer» C. Distributed, Energy Saving, Intelligent | |
| 165. |
The term reset control refers to: |
| A. | Proportio nal |
| B. | Integral |
| C. | Derivative |
| D. | None of the above |
| Answer» C. Derivative | |
| 166. |
Thermocouple generate output voltage according to |
| A. | a. Circuit |
| B. | b. Humidity |
| C. | c. |
| D. | d. Voltage |
| Answer» D. d. Voltage | |
| 167. |
propose a scheme to define labels that can be automatically |
| A. | Semacode |
| B. | RFID |
| C. | IANA |
| D. | IEEE |
| Answer» B. RFID | |
| 168. |
PSDN stands for |
| A. | Packet Secure Data Network |
| B. | Packet Switch Data Network |
| C. | Packet Security Data Network |
| D. | All of the above |
| Answer» C. Packet Security Data Network | |
| 169. |
WIMP stands for |
| A. | Windows |
| B. | Icons |
| C. | Menu & Pointer |
| D. | All of the above |
| Answer» E. | |
| 170. |
is based upon a broader range of materials, |
| A. | Nano- |
| B. | MEMS |
| C. | Semacode |
| D. | Ubiquitous Systems |
| Answer» B. MEMS | |
| 171. |
enable computer-based services to be made available everywhere. |
| A. | Real Time Syst |
| B. | Embedded Syste |
| C. | Distributed Systems |
| D. | Ubiquitous Systems |
| Answer» E. | |
| 172. |
The First Phase Of Hacking An IT System Is Compromise Of W hich Foundation Of Security? |
| A. | Confidentiality |
| B. | Integrity |
| C. | Authentication |
| D. | Availability |
| Answer» B. Integrity | |
| 173. |
Which are the smart devices under CPI ? |
| A. | Unimate |
| B. | MH-1Robot |
| C. | Smart Dust and Tiny OS |
| D. | All of the above |
| Answer» E. | |
| 174. |
Following acts as detector in Optical sensor |
| A. | a. Light |
| B. | b. Photo |
| C. | c. Transistor |
| D. | d. All of above |
| Answer» C. c. Transistor | |
| 175. |
involves the revelation of truthful |
| A. | Breach ofconfidentially. |
| B. | Disclosure |
| C. | Exposure |
| D. | Increasedaccessibility |
| Answer» C. Exposure | |
| 176. |
is a non-contact type sensor that detects the presence of an object. |
| A. | Temperature |
| B. | Pressure |
| C. | Proximity |
| D. | All of above |
| Answer» D. All of above | |
| 177. |
In the user requests the system to carry out a certain |
| A. | eHCI |
| B. | iHCI |
| C. | CCI |
| D. | HHI |
| Answer» B. iHCI | |
| 178. |
Sub-Properties (sub-types of individual intelligence) of Individual Intelligence includes |
| A. | Reactive, Reflex |
| B. | Model-based, |
| C. | Rule/Policy-based |
| D. | All of above |
| Answer» E. | |
| 179. |
In interface user has to remember the syntax of any parameter. |
| A. | WIMPS |
| B. | PC |
| C. | Command Promp |
| D. | Human Computer |
| Answer» D. Human Computer | |
| 180. |
system does not require any some person to carry identifying task. |
| A. | Active Flore |
| B. | Smart Flore |
| C. | Both (A) and (B) |
| D. | None of the above |
| Answer» D. None of the above | |
| 181. |
Visual Modal system further consists of |
| A. | Large body movemen t |
| B. | gestures |
| C. | Eye gaze |
| D. | All of the above |
| Answer» E. | |
| 182. |
a voice system enables users to request/receive info, enter/change data through a telephone to a computerized |
| A. | Bluetooth |
| B. | Real Time location Systems |
| C. | GIS |
| D. | Interactive Voice response |
| Answer» E. | |
| 183. |
Does RFID have the ability to read many tags together at once? |
| A. | a. Yes |
| B. | b. No |
| C. | May Be |
| D. | Neutral |
| Answer» B. b. No | |
| 184. |
Which of the following is not RFID type? |
| A. | a. Ultra-Low |
| B. | b. Low |
| C. | c. High |
| D. | d. Ultra-High |
| Answer» B. b. Low | |
| 185. |
One common way to maintain data availability is |
| A. | Data Clustering |
| B. | Data backup |
| C. | Data Altering |
| D. | Data recovery |
| Answer» C. Data Altering | |
| 186. |
can be considered to be resource- |
| A. | Wired System |
| B. | Wireless System |
| C. | Real Time Systems |
| D. | None of the Above |
| Answer» D. None of the Above | |
| 187. |
OLED stands for |
| A. | Original Light Emitting Diode |
| B. | Organic Light Emitting Diode |
| C. | Both (A) and (B) |
| D. | None of the above |
| Answer» C. Both (A) and (B) | |
| 188. |
Drives are also known as |
| A. | a. Actuators |
| B. | b. Controller |
| C. | c. Sensors |
| D. | d. Manipulator |
| Answer» B. b. Controller | |
| 189. |
subscribe to being notified when specified events occur. |
| A. | Layered model |
| B. | Pipe-filter mode |
| C. | Event-drivenAction or EDA Model |
| D. | Shared data repositories |
| Answer» D. Shared data repositories | |
| 190. |
uses radio-frequency waves to transfer data between a |
| A. | Wi-Fi |
| B. | OCR |
| C. | Bar Code |
| D. | RFID |
| Answer» E. | |
| 191. |
Making the smaller and smaller things have the ability to connect and interact |
| A. | Micro Tech |
| B. | Smart Tech |
| C. | Nano Tech |
| D. | RFID |
| Answer» D. RFID | |
| 192. |
In direct manipulation technique documents arranged in which of following way ? |
| A. | Queue |
| B. | LinkedList |
| C. | Array |
| D. | Stack |
| Answer» E. | |
| 193. |
protocol is used for Streaming Media over |
| A. | TCP |
| B. | RTP |
| C. | RTSP |
| D. | Voice Over IP |
| Answer» C. RTSP | |
| 194. |
J2ME platfom distributed into which two categories? |
| A. | CDC & CLDC |
| B. | CDC & HCI |
| C. | CCI & HCI |
| D. | None of the above |
| Answer» B. CDC & HCI | |
| 195. |
Which of the following is not an analog sensor? |
| A. | Potentiometer |
| B. | Force-sensingresistors |
| C. | Accelerometers |
| D. | None of thementioned |
| Answer» E. | |
| 196. |
. mainly allows you to connect on the move. |
| A. | Scalability |
| B. | Portability |
| C. | Mobility |
| D. | Flexibility |
| Answer» D. Flexibility | |
| 197. |
In any type of specific component in |
| A. | Physical |
| B. | Human context |
| C. | Virtual |
| D. | All of the Above |
| Answer» D. All of the Above | |
| 198. |
Second era of computing is known as the ……. |
| A. | Mainfram e era |
| B. | PC era |
| C. | Ubiquitous Computing |
| D. | None of the above |
| Answer» C. Ubiquitous Computing | |
| 199. |
ensures no one can alter the message before our intended recipient(s) sees it. |
| A. | Authenticity |
| B. | Integrity |
| C. | Encryption |
| D. | Availability |
| Answer» C. Encryption | |
| 200. |
Third era of computing is known as the ……. |
| A. | Mainfram e era |
| B. | PC era |
| C. | Ubiquitous Computing |
| D. | None of the above |
| Answer» D. None of the above | |