MCQOPTIONS
Saved Bookmarks
This section includes 356 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.
| 251. |
Design architecture of UbiComp system consists of ………….. |
| A. | Smart Device |
| B. | Smart Environme nt |
| C. | Smart Interaction |
| D. | All of the above |
| Answer» E. | |
| 252. |
State the proper opinion : A key design issues for conyext aware system is to balance the degree of user management and awareness of proper environment. |
| A. | Partially True |
| B. | TRUE |
| C. | FALSE |
| D. | Might be True |
| Answer» C. FALSE | |
| 253. |
Several instructions execution simultaneously in . |
| A. | Processing |
| B. | Parallel |
| C. | Serial |
| D. | Multi Tasking |
| Answer» C. Serial | |
| 254. |
A collection of nodes used for sensing the environment is known as . |
| A. | Voice Portal |
| B. | Mobile Portal |
| C. | Geolocation |
| D. | Sensor Network |
| Answer» E. | |
| 255. |
Ubiquitous Computing supports ……. |
| A. | Many to 1 |
| B. | 1 to 1 |
| C. | Many to Many |
| D. | 1 to Many |
| Answer» E. | |
| 256. |
Implicit (i)HCI indicates |
| A. | H2H |
| B. | H2C |
| C. | C2H |
| D. | C2C |
| Answer» D. C2C | |
| 257. |
Root of network tree is formed by _. |
| A. | ZigBee Co- ordinator |
| B. | ZigBee Router |
| C. | ZigBee End Device |
| D. | All of the above |
| Answer» B. ZigBee Router | |
| 258. |
OLED have a response time than an LED. |
| A. | much lower |
| B. | much faster |
| C. | more |
| D. | less |
| Answer» C. more | |
| 259. |
Advantages Of ubiquitious computing |
| A. | Invisible |
| B. | Socialization |
| C. | Decision-making |
| D. | All of There |
| Answer» E. | |
| 260. |
Who invented term Ubiquitous Computing ? |
| A. | Shaun Watson |
| B. | Mark Ciere |
| C. | Mark Watson |
| D. | Mark Weiser |
| Answer» E. | |
| 261. |
In user performs an action which is having primary aim to interact with systems. |
| A. | iHCI |
| B. | eHCI |
| C. | CCI |
| D. | HHI |
| Answer» B. eHCI | |
| 262. |
RFID applications undermine two classes of indivitual pricacy and . |
| A. | Data Privacy, Location Privacy |
| B. | Data Privacy, Migration Privacy |
| C. | Location Privacy,Migr ation Privacy |
| D. | Data Privacy, User Privacy |
| Answer» B. Data Privacy, Migration Privacy | |
| 263. |
First types of pervasive communication networks were |
| A. | Video Network |
| B. | Vitual Network |
| C. | Audio Network |
| D. | Virtual Network |
| Answer» D. Virtual Network | |
| 264. |
Ubiquitous computing is the method of ........ |
| A. | enhancing computer use by making many computers available throughout the physical environment |
| B. | wireless communication and carry-around computers. |
| C. | allowing transmission of data, voice and video via a computer |
| D. | interact with a variety of users via the internet. |
| Answer» B. wireless communication and carry-around computers. | |
| 265. |
Among the various wireless options for wearable devices, which one needs to connect to a smart phone and is the most popular? |
| A. | bluetooth |
| B. | wifi |
| C. | rfid |
| D. | none of the above |
| Answer» B. wifi | |
| 266. |
............... main properties for UbiCom Systems were proposed by Weiser |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» C. 3 | |
| 267. |
When connecting a wearable device to the cloud, what software is required to run a custom service? |
| A. | database |
| B. | operating system |
| C. | http server |
| D. | all of the above |
| Answer» E. | |
| 268. |
Which of the following is not a key characteristic of Ubicomp System ? |
| A. | distributed |
| B. | ihci |
| C. | context- awareness |
| D. | pay as you go |
| Answer» E. | |
| 269. |
It takes the output signal from the transmission channel and delivers |
| A. | transmitter |
| B. | transmission channel |
| C. | receiver |
| D. | hardware |
| Answer» D. hardware | |
| 270. |
What does RFID stand for? |
| A. | radio frequency issue date |
| B. | radio frequency identification |
| C. | rear field identification |
| D. | real far identification |
| Answer» C. rear field identification | |
| 271. |
What applications run on a SMART Board? |
| A. | any applicaiton on the computer |
| B. | internet browsers like explorer and navigator only |
| C. | powerpoint only |
| D. | powerpoint only |
| Answer» B. internet browsers like explorer and navigator only | |
| 272. |
The SMART Board Software is called |
| A. | notepage |
| B. | notebook |
| C. | spiral page |
| D. | all of the above |
| Answer» C. spiral page | |
| 273. |
Which of the Following is used in banking industary..... |
| A. | micr |
| B. | omr |
| C. | all of above |
| D. | none of the above |
| Answer» B. omr | |
| 274. |
The tag can be used to activate the task when the user clicks on a word on the screen? |
| A. | true |
| B. | false |
| C. | both |
| D. | none of the above |
| Answer» B. false | |
| 275. |
Limitations of Short Messaging Service (SMS) |
| A. | limited to 160 characters or less |
| B. | message latency is one minute or more |
| C. | poor security at the application level |
| D. | all of the above |
| Answer» E. | |
| 276. |
WAP? |
| A. | wireless application protocol |
| B. | wired allication protocol |
| C. | wide application protocol |
| D. | none of the above |
| Answer» B. wired allication protocol | |
| 277. |
WAP is designed for? |
| A. | internet explorer |
| B. | web browser |
| C. | micro browser |
| D. | macro browser |
| Answer» D. macro browser | |
| 278. |
DoCoMo Stands for ............... |
| A. | documentation over the mobile network |
| B. | do communications over the mobile network |
| C. | documentation & communications over the mobile network |
| D. | none of the above |
| Answer» C. documentation & communications over the mobile network | |
| 279. |
Mobile Web Service design often uses a three tier ............... |
| A. | thin client, client proxy, server architecture |
| B. | network, client proxy, server architecture |
| C. | internet,cilent & server |
| D. | none of the above |
| Answer» B. network, client proxy, server architecture | |
| 280. |
In J2ME architecture Connected Device Configuration (CDC) provides .......... |
| A. | fundamental services for devices |
| B. | fundamental services for virtual machines |
| C. | both |
| D. | none of the above |
| Answer» D. none of the above | |
| 281. |
Java 2 Mobile Environment supports ................. |
| A. | development of client server system |
| B. | stand alone system designs in which code is developed |
| C. | both |
| D. | none of the above |
| Answer» D. none of the above | |
| 282. |
The .NET Framework consists of two main parts ............ |
| A. | common language runtime & unified set of class libraries |
| B. | client & server |
| C. | packeges & class labraries |
| D. | digital packages & digital class labraries |
| Answer» B. client & server | |
| 283. |
Code written on the .NET Framework platform is called ........... |
| A. | client code |
| B. | managed code |
| C. | server code |
| D. | none of the above |
| Answer» C. server code | |
| 284. |
J2ME is a multi layered organisation of software bundles of three types ............. |
| A. | servers,desktop machines & high end consumer devices |
| B. | configurations, profiles and optional packages |
| C. | j2ee,j2se & kvm |
| D. | none of the above |
| Answer» C. j2ee,j2se & kvm | |
| 285. |
Managed code ....... |
| A. | cannot have bad pointers |
| B. | cannot create memory leaks |
| C. | supports strong code type safety |
| D. | all of the above |
| Answer» E. | |
| 286. |
.NET CF designed specifically for devices, such as ............. |
| A. | smart cards |
| B. | smart wearable devices |
| C. | pdas and smart mobile phones. |
| D. | sensors |
| Answer» D. sensors | |
| 287. |
IrDA support ........ |
| A. | sql server ce |
| B. | device specific controls |
| C. | high performance jit compiler |
| D. | all of the above |
| Answer» E. | |
| 288. |
Mobile code is any ......... |
| A. | program |
| B. | application |
| C. | content |
| D. | all of the above |
| Answer» E. | |
| 289. |
Sandboxes .......... |
| A. | that limit the local services that code can access. |
| B. | which ensures that code originates from a trusted source. |
| C. | machines that can access the internet |
| D. | that carries explicit proof of its security. |
| Answer» B. which ensures that code originates from a trusted source. | |
| 290. |
Firewalls ............ |
| A. | that limit the local services that code can access. |
| B. | which ensures that code originates from a trusted source. |
| C. | machines that can access the internet |
| D. | that carries explicit proof of its security. |
| Answer» D. that carries explicit proof of its security. | |
| 291. |
A smart card ............ |
| A. | is a plastic card embedded with digital memory |
| B. | which store data on magnetic strips |
| C. | is reprogrammable |
| D. | all of the above |
| Answer» E. | |
| 292. |
Proof Carrying Code ............... |
| A. | that limit the local services that code can access. |
| B. | which ensures that code originates from a trusted source. |
| C. | machines that can access the internet |
| D. | that carries explicit proof of its security. |
| Answer» E. | |
| 293. |
Code Signing ......... |
| A. | that limit the local services that code can access. |
| B. | which ensures that code originates from a trusted source. |
| C. | machines that can access the internet |
| D. | that carries explicit proof of its security. |
| Answer» C. machines that can access the internet | |
| 294. |
The primary tasks of a smart card operating system ............. |
| A. | transferring data to and from the smart card |
| B. | controlling the execution of commands |
| C. | managing and executing cryptographic algorithms |
| D. | all of the above |
| Answer» E. | |
| 295. |
Java Card widely used in ........... |
| A. | sim cards |
| B. | atm cards |
| C. | both |
| D. | none of the above |
| Answer» D. none of the above | |
| 296. |
The Home Electronic System (HES) defines the system components ......... |
| A. | residential gateway, homegate |
| B. | standard interfaces |
| C. | both |
| D. | none of the above |
| Answer» D. none of the above | |
| 297. |
Jini consists of three Java language protocols ............... |
| A. | discovery, join and lookup |
| B. | discovery, configuration and lookup |
| C. | discovery, join and installation |
| D. | find , join and lookup |
| Answer» B. discovery, configuration and lookup | |
| 298. |
UPnP Stands for .......... |
| A. | united plug and play protocol |
| B. | undirectional plug and play protocol |
| C. | universal plug and play protocol |
| D. | unidirectional plug and play protocol |
| Answer» D. unidirectional plug and play protocol | |
| 299. |
Benefit of UPnP ............. |
| A. | media and device independence |
| B. | platform independence |
| C. | internet-based technologies |
| D. | all of the above |
| Answer» E. | |
| 300. |
OSGi’s core component is ........... |
| A. | server |
| B. | bundle |
| C. | node |
| D. | gateway |
| Answer» C. node | |