Explore topic-wise MCQs in Information Technology Engineering (IT).

This section includes 356 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.

301.

A MANIFEST.MF file located in the ........ directory .

A. general graph directory
B. acyclic graph directory
C. single-level
D. meta-inf
Answer» E.
302.

Service Provision Life-Cycle - Creation Phase ...........

A. service processes register themselves in service directories.
B. services are invoked and multiple interlinked services may need to be coordinated
C. service processes, access configurations and service compositions
D. services may be put off line or terminated temporarily or permanently.
Answer» B. services are invoked and multiple interlinked services may need to be coordinated
303.

Service Oriented Architectures Functions ,,,,,,,,,,,,,,

A. service discovery
B. service invocation
C. service management
D. all of the above
Answer» E.
304.

Service Provision Life-Cycle - Maintenance Phase .........

A. service processes register themselves in service directories.
B. services are invoked and multiple interlinked services may need to be coordinated
C. service processes, access configurations and service compositions
D. services may be put off line or terminated temporarily or permanently.
Answer» D. services may be put off line or terminated temporarily or permanently.
305.

Service Provision Life-Cycle - Execution Phase ...........

A. service processes register themselves in service directories.
B. services are invoked and multiple interlinked services may need to be coordinated
C. service processes, access configurations and service compositions
D. services may be put off line or terminated temporarily or permanently.
Answer» C. service processes, access configurations and service compositions
306.

Service Provision Life-Cycle - Dissolution Phase ...........

A. service processes register themselves in service directories.
B. services are invoked and multiple interlinked services may need to be coordinated
C. service processes, access configurations and service compositions
D. services may be put off line or terminated temporarily or permanently.
Answer» E.
307.

Life-Cycle for Tagging Physical Objects ..............

A. capturing a physical view or some object feature
B. identifying physical objects
C. anchoring or relating objects
D. all of the above
Answer» E.
308.

Active transponders are woken up ..............

A. no power source and no active transmitter
B. they typically have a read range of 20 100 m
C. when they receive a signal from a reader
D. none of the above
Answer» D. none of the above
309.

Types of active RFID tags are ..........

A. transmitter & receiver
B. transponders and beacons
C. transmiter & reader
D. none of the above
Answer» C. transmiter & reader
310.

Passive RFID - Transponders can be packaged .....

A. sandwiched between an adhesive layer and a paper label
B. embedded in a plastic card
C. both a&b
D. none of the above
Answer» D. none of the above
311.

Sensors Primary Functions ..........

A. instrument and monitor environments
B. detect changes in the environment
C. control a system with respect to the environment
D. all of the above
Answer» E.
312.

Sensors Nodes ......

A. common nodes
B. sink nodes
C. gateway nodes
D. all of the above
Answer» E.
313.

Sensors Common Nodes .......

A. mainly responsible for collecting sensor data.
B. that are responsible for receiving, storing, processing, aggregating data
C. that connect sink nodes to external entities
D. none of the above
Answer» B. that are responsible for receiving, storing, processing, aggregating data
314.

Micro-Electro-Mechanical Systems (MEMS) consists of ...........

A. microelectronic elements
B. actuators, sensors
C. mechanical structures
D. all of the above
Answer» E.
315.

The main components of robots are ...........

A. end effectors or actuators
B. controller
C. sensors
D. all of the above
Answer» E.
316.

Micro-Electro-Mechanical Systems (MEMS) developed using ........... techniques

A. fabrication
B. microfabrication
C. etching
D. none of the above
Answer» C. etching
317.

Which phase is not a part of development of Human-Centred Design Life-Cycle .

A. requirement gathering and analysis
B. modelling and design
C. configurations & optional packages
D. implementation and testing.
Answer» D. implementation and testing.
318.

The most common forms of production for MEMS are ...........

A. bulk micromachining
B. surface micromachining
C. har fabrication
D. all of the above
Answer» E.
319.

Head(s) Up Display or HUD is ...........

A. any type of display that presents data without blocking the user’s view
B. the user looks through a display element attached to the airframe or vehicle chassis
C. that is worn in front of the eye that acts as a camera to record the scene available to the eye, and acts as a display
D. none of the above
Answer» B. the user looks through a display element attached to the airframe or vehicle chassis
320.

Gestures are expressive, meaningful body motions involving physical movements of the fingers, hands, arms, head, face, or body.

A. true
B. false
Answer» B. false
321.

Sensors used in gestures ........

A. magnetic field trackers
B. accelerometers
C. gyroscopes
D. all of the above
Answer» E.
322.

In Solove’s taxonomy of privacy Surveillance & Interrogation is a part of ..........

A. information collection
B. information processing
C. information dissemination
D. invasion
Answer» B. information processing
323.

In Solove’s taxonomy of privacy Aggregation & Identification is a part of ..........

A. information collection
B. information processing
C. information dissemination
D. invasion
Answer» C. information dissemination
324.

Breach of confidentiality is ............

A. is the threat to disclose personal information
B. is breaking the promise to keep a person’s information confidential.
C. is amplifying the accessibility of information.
D. none of the above
Answer» C. is amplifying the accessibility of information.
325.

Decisional interference involves .............

A. revealing another’s nudity, grief, or bodily functions
B. the revelation of truthful information about a person
C. the government’s incursion into people’s decisions regarding their private affairs
D. the dissemination of certain information about a person to serve the aims and interests of another
Answer» D. the dissemination of certain information about a person to serve the aims and interests of another
326.

RFID privacy challenges .........

A. automation & identification
B. identification & authentication
C. integration & automation
D. all of the above
Answer» E.
327.

Clandestine Scanning is ..............

A. the tag data is scanned without the tag carrier’s consent.
B. the tag data is scanned for information processing
C. both a&b
D. none of the above
Answer» B. the tag data is scanned for information processing
328.

PSTN stands for

A. public switched telephone network
B. personal switched telephone network
C. personal switched telephone node
D. public switched telephone node
Answer» B. personal switched telephone network
329.

In public switched telephone network, LATA stands for

A. local access and transport area
B. land area and transport area
C. local access and telephone access
D. local area and telephone access
Answer» B. land area and transport area
330.

PSTN is              and wireless networks are

A. highly dynamic, virtually static
B. static, virtually static
C. highly dynamic, virtually dynamic
D. virtually static, highly dynamic
Answer» E.
331.

The technique for separate but parallel signalling channel is called

A. common channel signalling
B. forward channel signalling
C. reverse channel signalling
D. separate channel signalling
Answer» B. forward channel signalling
332.

LATAs are connected by a company called

A. land exchange carrier
B. local exchange carrier
C. local control exchange
D. land area exchange
Answer» C. local control exchange
333.

A long distance telephone company that collects toll is called

A. lata
B. lec
C. pstn
D. ixc
Answer» E.
334.

US cellular standard CDPD stands for

A. cellular digital packet data
B. cellular digital packet data
C. cellular digital pocket data
D. cellular discrete pocket data
Answer» B. cellular digital packet data
335.

ADLS Broadband stands for

A. asynchronous digital subscriber line
B. asemetric digital subscriber line
C. asynchronous double subscriber line
D. asynchronous data subscriber line
Answer» B. asemetric digital subscriber line
336.

What are the Methods to move data through a network of links and switches?

A. packet switching and line switching
B. circuit switching and line switching
C. line switching and bit switching
D. packet switching and circuit switching
Answer» E.
337.

In                    systems, resources are allocated on demand.

A. packet switching
B. circuit switching
C. line switching
D. frequency switching
Answer» B. circuit switching
338.

WiMAX stands for

A. wireless maximum communication
B. worldwide interoperability for microwave access
C. worldwide international standard for microwave access
D. wireless internet maximum communication
Answer» C. worldwide international standard for microwave access
339.

Which of the following modulation schemes is supported by WiMAX?

A. binary phase shift keying modulation
B. quadrature phase shift keying modulation
C. quadrature amplitude modulation
D. all of the mentioned
Answer» E.
340.

WiMAX provides

A. voip services
B. iptv services
C. both voip and iptv services
D. no iptv services
Answer» D. no iptv services
341.

Which of the following frequencies is not used in WiMAX for communication?

A. 2.3 ghz
B. 2.4 ghz
C. 2.5 ghz
D. 3.5 ghz
Answer» C. 2.5 ghz
342.

Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?

A. cdma
B. csma/ca
C. aloha
D. csma/cd
Answer» C. aloha
343.

In Bluetooth,multiple                  form a network called a ------------

A. scatternet; piconets
B. piconets: scatternet
C. piconets: bluenet
D. bluenet; scatternet
Answer» C. piconets: bluenet
344.

The bluetooth supports

A. point-to-point connections
B. point-to-multipoint connection
C. both (a) and (b)
D. none of the above
Answer» D. none of the above
345.

Frequency range supported in Zigbee .............

A. 2.4 ghz worldwide
B. 2.0 ghz worldwide
C. 2.1 ghz worldwide
D. 3.4 ghz worldwide
Answer» B. 2.0 ghz worldwide
346.

ZigBee developed under ..............

A. ieee 802.15.1.
B. ieee 802.15.2.
C. ieee 802.15.3.
D. ieee 802.15.4.
Answer» E.
347.

There is more than ............... cell nodes in zigbee.

A. 66000
B. 65000
C. 60000
D. 70000
Answer» C. 60000
348.

A Body Area Network or BAN consists ...............

A. wireless devices to connect to a wired network
B. set of mobile and compact sensors
C. sensors & communication devices
D. wearable device & sensors
Answer» C. sensors & communication devices
349.

Body Area Network requirements ..........

A. low power consumption & interoperability
B. self-healing & security
C. low latency
D. all of the above
Answer» E.
350.

Find out wrong stament of Body Area Network...............

A. sensors are put on patient’s body to monitor heart rate, blood pressure and ecg.
B. provides healthcare services over a long distance with the help of it and communication.
C. sensors can be used to measure navigation, timer, distance, pulse rate and body temperature.
D. allowing transmission of data, voice and video via a computer
Answer» E.