Explore topic-wise MCQs in Information Technology Engineering (IT).

This section includes 356 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.

251.

Design architecture of UbiComp system consists of …………..

A. Smart Device
B. Smart Environme nt
C. Smart Interaction
D. All of the above
Answer» E.
252.

State the proper opinion : A key design issues for conyext aware system is to balance the degree of user management and awareness of proper environment.

A. Partially True
B. TRUE
C. FALSE
D. Might be True
Answer» C. FALSE
253.

Several instructions execution simultaneously in .

A. Processing
B. Parallel
C. Serial
D. Multi Tasking
Answer» C. Serial
254.

A collection of nodes used for sensing the environment is known as .

A. Voice Portal
B. Mobile Portal
C. Geolocation
D. Sensor Network
Answer» E.
255.

Ubiquitous Computing supports …….

A. Many to 1
B. 1 to 1
C. Many to Many
D. 1 to Many
Answer» E.
256.

Implicit (i)HCI indicates

A. H2H
B. H2C
C. C2H
D. C2C
Answer» D. C2C
257.

Root of network tree is formed by _.

A. ZigBee Co- ordinator
B. ZigBee Router
C. ZigBee End Device
D. All of the above
Answer» B. ZigBee Router
258.

OLED have a                  response time than an LED.

A. much lower
B. much faster
C. more
D. less
Answer» C. more
259.

Advantages Of ubiquitious computing

A. Invisible
B. Socialization
C. Decision-making
D. All of There
Answer» E.
260.

Who invented term Ubiquitous Computing ?

A. Shaun Watson
B. Mark Ciere
C. Mark Watson
D. Mark Weiser
Answer» E.
261.

In user performs an action which is having primary aim to interact with systems.

A. iHCI
B. eHCI
C. CCI
D. HHI
Answer» B. eHCI
262.

RFID applications undermine two classes of indivitual pricacy                   and .

A. Data Privacy, Location Privacy
B. Data Privacy, Migration Privacy
C. Location Privacy,Migr ation Privacy
D. Data Privacy, User Privacy
Answer» B. Data Privacy, Migration Privacy
263.

First types of pervasive communication networks were

A. Video Network
B. Vitual Network
C. Audio Network
D. Virtual Network
Answer» D. Virtual Network
264.

Ubiquitous computing is the method of ........

A. enhancing computer use by making many computers available throughout the physical environment
B. wireless communication and carry-around computers.
C. allowing transmission of data, voice and video via a computer
D. interact with a variety of users via the internet.
Answer» B. wireless communication and carry-around computers.
265.

Among the various wireless options for wearable devices, which one needs to connect to a smart phone and is the most popular?

A. bluetooth
B. wifi
C. rfid
D. none of the above
Answer» B. wifi
266.

............... main properties for UbiCom Systems were proposed by Weiser

A. 1
B. 2
C. 3
D. 4
Answer» C. 3
267.

When connecting a wearable device to the cloud, what software is required to run a custom service?

A. database
B. operating system
C. http server
D. all of the above
Answer» E.
268.

Which of the following is not a key characteristic of Ubicomp System ?

A. distributed
B. ihci
C. context- awareness
D. pay as you go
Answer» E.
269.

It takes the output signal from the transmission channel and delivers

A. transmitter
B. transmission channel
C. receiver
D. hardware
Answer» D. hardware
270.

What does RFID stand for?

A. radio frequency issue date
B. radio frequency identification
C. rear field identification
D. real far identification
Answer» C. rear field identification
271.

What applications run on a SMART Board?

A. any applicaiton on the computer
B. internet browsers like explorer and navigator only
C. powerpoint only
D. powerpoint only
Answer» B. internet browsers like explorer and navigator only
272.

The SMART Board Software is called

A. notepage
B. notebook
C. spiral page
D. all of the above
Answer» C. spiral page
273.

Which of the Following is used in banking industary.....

A. micr
B. omr
C. all of above
D. none of the above
Answer» B. omr
274.

The tag can be used to activate the task when the user clicks on a word on the screen?

A. true
B. false
C. both
D. none of the above
Answer» B. false
275.

Limitations of Short Messaging Service (SMS)

A. limited to 160 characters or less
B. message latency is one minute or more
C. poor security at the application level
D. all of the above
Answer» E.
276.

WAP?

A. wireless application protocol
B. wired allication protocol
C. wide application protocol
D. none of the above
Answer» B. wired allication protocol
277.

WAP is designed for?

A. internet explorer
B. web browser
C. micro browser
D. macro browser
Answer» D. macro browser
278.

DoCoMo Stands for ...............

A. documentation over the mobile network
B. do communications over the mobile network
C. documentation & communications over the mobile network
D. none of the above
Answer» C. documentation & communications over the mobile network
279.

Mobile Web Service design often uses a three tier ...............

A. thin client, client proxy, server architecture
B. network, client proxy, server architecture
C. internet,cilent & server
D. none of the above
Answer» B. network, client proxy, server architecture
280.

In J2ME architecture Connected Device Configuration (CDC) provides ..........

A. fundamental services for devices
B. fundamental services for virtual machines
C. both
D. none of the above
Answer» D. none of the above
281.

Java 2 Mobile Environment supports .................

A. development of client server system
B. stand alone system designs in which code is developed
C. both
D. none of the above
Answer» D. none of the above
282.

The .NET Framework consists of two main parts ............

A. common language runtime & unified set of class libraries
B. client & server
C. packeges & class labraries
D. digital packages & digital class labraries
Answer» B. client & server
283.

Code written on the .NET Framework platform is called ...........

A. client code
B. managed code
C. server code
D. none of the above
Answer» C. server code
284.

J2ME is a multi layered organisation of software bundles of three types .............

A. servers,desktop machines & high end consumer devices
B. configurations, profiles and optional packages
C. j2ee,j2se & kvm
D. none of the above
Answer» C. j2ee,j2se & kvm
285.

Managed code .......

A. cannot have bad pointers
B. cannot create memory leaks
C. supports strong code type safety
D. all of the above
Answer» E.
286.

.NET CF designed specifically for devices, such as .............

A. smart cards
B. smart wearable devices
C. pdas and smart mobile phones.
D. sensors
Answer» D. sensors
287.

IrDA support ........

A. sql server ce
B. device specific controls
C. high performance jit compiler
D. all of the above
Answer» E.
288.

Mobile code is any .........

A. program
B. application
C. content
D. all of the above
Answer» E.
289.

Sandboxes ..........

A. that limit the local services that code can access.
B. which ensures that code originates from a trusted source.
C. machines that can access the internet
D. that carries explicit proof of its security.
Answer» B. which ensures that code originates from a trusted source.
290.

Firewalls ............

A. that limit the local services that code can access.
B. which ensures that code originates from a trusted source.
C. machines that can access the internet
D. that carries explicit proof of its security.
Answer» D. that carries explicit proof of its security.
291.

A smart card ............

A. is a plastic card embedded with digital memory
B. which store data on magnetic strips
C. is reprogrammable
D. all of the above
Answer» E.
292.

Proof Carrying Code ...............

A. that limit the local services that code can access.
B. which ensures that code originates from a trusted source.
C. machines that can access the internet
D. that carries explicit proof of its security.
Answer» E.
293.

Code Signing .........

A. that limit the local services that code can access.
B. which ensures that code originates from a trusted source.
C. machines that can access the internet
D. that carries explicit proof of its security.
Answer» C. machines that can access the internet
294.

The primary tasks of a smart card operating system .............

A. transferring data to and from the smart card
B. controlling the execution of commands
C. managing and executing cryptographic algorithms
D. all of the above
Answer» E.
295.

Java Card widely used in ...........

A. sim cards
B. atm cards
C. both
D. none of the above
Answer» D. none of the above
296.

The Home Electronic System (HES) defines the system components .........

A. residential gateway, homegate
B. standard interfaces
C. both
D. none of the above
Answer» D. none of the above
297.

Jini consists of three Java language protocols ...............

A. discovery, join and lookup
B. discovery, configuration and lookup
C. discovery, join and installation
D. find , join and lookup
Answer» B. discovery, configuration and lookup
298.

UPnP Stands for ..........

A. united plug and play protocol
B. undirectional plug and play protocol
C. universal plug and play protocol
D. unidirectional plug and play protocol
Answer» D. unidirectional plug and play protocol
299.

Benefit of UPnP .............

A. media and device independence
B. platform independence
C. internet-based technologies
D. all of the above
Answer» E.
300.

OSGi’s core component is ...........

A. server
B. bundle
C. node
D. gateway
Answer» C. node