Title | Ubiquitious Computing MCQ |
---|---|
Author | sangram shete |
Course | Information technology |
Institution | Savitribai Phule Pune University |
Pages | 11 |
File Size | 326.6 KB |
File Type | |
Total Downloads | 28 |
Total Views | 141 |
Download Ubiquitious Computing MCQ PDF
College MCQ Question Ubiquitous computing is the method of ........ ............... main properties for UbiCom Systems were proposed by Weiser Which of the following is not a key characteristic of Ubicomp System ? Among the various wireless options for wearable devices, which one needs to connect to a smart phone and is the most popular? When connecting a wearable device to the cloud, what software is required to run a custom service?
A enhancing computer use by making many computers available throughout the physical environment
B wireless communication and carry-around computers.
C allowing transmission of data, voice and video via a computer
D
Answer
interact with a variety of users via the Internet.
A
1
2
3
4
B
Distributed
iHCI
ContextAwareness
Pay as you go
D
Bluetooth
WiFi
RFID
None of the above
A
Database
Operating system
HTTP Server
All of the above
D
What does RFID stand for?
Radio frequency issue date
Radio frequency identification
Rear field identification
Real far identification
B
What applications run on a SMART Board?
Any applicaiton on the computer
Internet browsers like Explorer and Navigator only
PowerPoint only
PowerPoint only
A
Notepage
Notebook
Spiral Page
All of the above
B
transmitter
transmission channel
receiver
hardware
C
The SMART Board Software is called It takes the output signal from the transmission channel and delivers
College MCQ it to the transducer after processing it Which of the Following is used in banking industary..... WAP?
MICR
OMR
All of above
None of the Above
A
Wireless Application Protocol
Wired Allication Protocol
Wide Application Protocol
None of the above
A
The tag can be used to activate the task when the user clicks on a word on the screen? WAP is designed for?
TRUE
FALSE
Both
None of the above
A
internet explorer
web browser
macro browser
C
Limitations of Short Messaging Service (SMS)
limited to 160 characters or less
message latency is one minute or more
All of the above
D
DoCoMo Stands for ...............
documentation over the mobile network
do communications over the mobile network
micro browser poor security at the application level documentation & communications over the mobile network
None of the above
B
Mobile Web Service design often uses a three tier ...............
thin client, client proxy, server architecture
network, client proxy, server architecture
None of the above
A
In J2ME architecture Connected Device Configuration (CDC) provides ..........
fundamental services for devices
fundamental services for virtual machines
Both
None of the above
C
Java 2 Mobile Environment supports .................
development of client server system
Both
None of the above
C
J2ME is a multi layered organisation of software bundles of three types .............
Servers,Desktop Machines & High End Consumer Devices
stand alone system designs in which code is developed Configurations, Profiles and Optional Packages
J2EE,J2SE & KVM
None of the above
B
internet,cilent & server
College MCQ common language runtime & unified set of class libraries
client & server
packeges & class labraries
digital packages & digital class labraries
A
client code
managed code
server code
None of the above
B
cannot have bad pointers
cannot create memory leaks
supports strong code type safety
All of the above
D
Smart Cards
Smart Wearable Devices
PDAs and smart mobile phones.
Sensors
C
High Performance JIT Compiler Content
All of the above
D
Program
Device Specific Controls Application
All of the above
D
Sandboxes ..........
that limit the local services that code can access.
which ensures that code originates from a trusted source.
machines that can access the Internet
that carries explicit proof of its security.
A
Code Signing .........
that limit the local services that code can access.
which ensures that code originates from a trusted source.
machines that can access the Internet
that carries explicit proof of its security.
B
Firewalls ............
that limit the local services that code can access.
which ensures that code originates from a trusted source.
machines that can access the Internet
that carries explicit proof of its security.
C
that limit the local services that code can access. is a plastic card embedded with digital memory
which ensures that code originates from a trusted source.
machines that can access the Internet
that carries explicit proof of its security.
D
which store data on magnetic strips
is reprogrammable
All of the above
D
The .NET Framework consists of two main parts ............ Code written on the .NET Framework platform is called ........... Managed code ....... .NET CF designed specifically for devices, such as ............. IrDA support ........ Mobile code is any .........
Proof Carrying Code ...............
A smart card ............
SQL Server CE
College MCQ
All of the above
D
ATM cards
Managing and executing cryptographic algorithms Both
None of the above
C
Standard interfaces
Both
None of the above
C
discovery, join and installation
find , join and lookup
A
Universal Plug And Play protocol Internet-based technologies Node
Unidirectional Plug And Play protocol
C
All of the above
D
GateWay
B
Single-level
META-INF
D
All of the above
D
services may be put off line or terminated temporarily or permanently.
A
services may be put off line or terminated temporarily or permanently.
B
The primary tasks of a smart card operating system .............
Transferring data to and from the smart card
Controlling the execution of commands
Java Card widely used in ........... The Home Electronic System (HES) defines the system components .........
SIM cards Residential gateway, HomeGate
Jini consists of three Java language protocols ............... UPnP Stands for .......... Benefit of UPnP ............. OSGi’s core component is ........... A MANIFEST.MF file located in the ........ directory . Service Oriented Architectures Functions ,,,,,,,,,,,,,,
discovery, join and lookup United Plug And Play protocol Media and device independence Server General graph directory Service discovery
Service Provision Life-Cycle Creation Phase ...........
service processes register themselves in service directories.
Service Provision Life-Cycle Execution Phase ...........
service processes register themselves in service directories.
discovery, configuration and lookup Undirectional Plug And Play protocol Platform independence Bundle Acyclic graph directory Service invocation services are invoked and multiple interlinked services may need to be coordinated services are invoked and multiple interlinked services may need to be coordinated
Service management service processes, access configurations and service compositions service processes, access configurations and service compositions
College MCQ
Service Provision Life-Cycle Maintenance Phase .........
service processes register themselves in service directories.
Service Provision Life-Cycle Dissolution Phase ...........
service processes register themselves in service directories.
Life-Cycle for Tagging Physical Objects ..............
Capturing a physical view or some object feature
Types of active RFID tags are .......... Active transponders are woken up .............. Passive RFID - Transponders can be packaged ..... Sensors Primary Functions .......... Sensors Nodes ...... Sensors Common Nodes .......
services are invoked and multiple interlinked services may need to be coordinated services are invoked and multiple interlinked services may need to be coordinated
service processes, access configurations and service compositions service processes, access configurations and service compositions
Identifying physical objects
Anchoring or relating objects
transponders and transmiter & beacons reader they typically have a when they receive no power source and no a signal from a read range of 20 100 active transmitter reader m Sandwiched between Embedded in a an adhesive layer and a Both A&B plastic card paper label Control a system Instrument and monitor Detect changes in with respect to the environments the environment environment Common Nodes Sink Nodes Gateway Nodes transmitter & receiver
mainly responsible for collecting sensor data.
that are responsible for receiving, storing, processing, aggregating data
that connect sink nodes to external entities
services may be put off line or terminated temporarily or permanently.
C
services may be put off line or terminated temporarily or permanently.
D
All of the above
D
None of the above
B
None of the above
C
None of the above
C
All of the above
D
All of the above
D
None of the above
A
College MCQ Micro-Electro-Mechanical Systems (MEMS) consists of ........... Micro-Electro-Mechanical Systems (MEMS) developed using ........... techniques The most common forms of production for MEMS are ........... The main components of robots are ........... Which phase is not a part of development of Human-Centred Design Life-Cycle .
Head(s) Up Display or HUD is ...........
Gestures are expressive, meaningful body motions involving physical movements of the fingers, hands, arms, head, face, or body. Sensors used in gestures ........ In Solove’s taxonomy of privacy Surveillance & Interrogation is a part of ..........
microelectronic elements
actuators, sensors
mechanical structures
All of the above
D
fabrication
microfabrication
etching
None of the above
B
bulk micromachining
surface micromachining
HAR fabrication
All of the above
D
End effectors or actuators
Controller
Sensors
All of the above
D
requirement gathering and analysis
modelling and design
configurations & optional Packages
implementation and testing.
C
any type of display that presents data without blocking the user’s view
the user looks through a display element attached to the airframe or vehicle chassis
that is worn in front of the eye that acts as a camera to record the scene available to the eye, and acts as a display
None of the above
A
TRUE
FALSE
magnetic field trackers
accelerometers
gyroscopes
All of the above
D
Information Collection
Information Processing
Information Dissemination
Invasion
A
A
College MCQ In Solove’s taxonomy of privacy Aggregation & Identification is a part of ..........
Information Collection
Information Processing
Information Dissemination
Invasion
B
Breach of confidentiality is ............
is the threat to disclose personal information
is breaking the promise to keep a person’s information confidential.
is amplifying the accessibility of information.
None of the above
B
Decisional interference involves .............
revealing another’s nudity, grief, or bodily functions
the revelation of truthful information about a person
Automation & Identification
Identification & Authentication The tag data is scanned for Information Processing Personal switched telephone network
RFID privacy challenges .........
Clandestine Scanning is ..............
The tag data is scanned without the tag carrier’s consent.
PSTN stands for ________
Public switched telephone network
PSTN is ______ and wireless networks are _______
Highly dynamic, virtually static
In public switched telephone network, LATA stands for ______ LATAs are connected by a company called ______ A long distance telephone company that collects toll is called ______
Local access and transport area Land exchange carrier LATA
the dissemination of the government’s certain information incursion into people’s decisions about a person to serve the aims and interests of regarding their another private affairs Integration & All of the above Automation
C
D
Both A&B
None of the above
A
Personal switched telephone node
Public switched telephone node
A
Virtually static, highly dynamic
D
Local area and telephone access
A
Land area exchange
B
IXC
D
Highly dynamic, Static, virtually static virtually dynamic Land area and transport area Local exchange carrier
Local access and telephone access Local control exchange
LEC
PSTN
College MCQ The technique for separate but parallel signalling channel is called ________
Common channel signalling
Forward channel signalling
ADLS Broadband stands for ________
Asynchronous Digital Subscriber Line
Asemetric Digital Subscriber Line
US cellular standard CDPD stands for _________ What are the Methods to move data through a network of links and switches? In _________ systems, resources are allocated on demand.
Cellular Digital Packet Data
Cellular Digital Packet Data
Asynchronous Double Subscriber Line Cellular Digital Pocket Data
Packet switching and Line switching
Circuit switching and Line switching
packet switching
circuit switching
wireless maximum communication
worldwide interoperability for microwave access
WiMAX stands for ___________
WiMAX provides ________ Which of the following modulation schemes is supported by WiMAX? WiMAX provides _______
simplex communication binary phase shift keying modulation
half duplex communication quadrature phase shift keying modulation
Reverse channel signalling
Separate channel signalling
A
Asynchronous Data Subscriber Line
A
Cellular Discrete Pocket Data
A
Line switching and bit switching
Packet switching and Circuit switching
D
line switching
frequency switching
A
wireless internet maximum communication
B
no communication
C
all of the mentioned
D
no IPTV services
C
worldwide international standard for microwave access full duplex communication quadrature amplitude modulation Both VoIP and IPTV services
VoIP services
IPTV services
Which of the following frequencies is not used in WiMAX for communication?
2.3 GHz
2.4 GHz
2.5 GHz
3.5 GHz
B
What is the access point (AP) in a wireless LAN?
device that allows wireless devices to connect to a wired network
wireless devices itself
both device that allows wireless devices to connect to a wired
all the nodes in the network
A
College MCQ network and wireless devices itself Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? Mostly ________ is used in wireless LAN. What is WPA? In Bluetooth,multiple_________form a network called a -----------The bluetooth supports Frequency range supported in Zigbee ............. There is more than ............... cell nodes in zigbee. ZigBee developed under .............. A Body Area Network or BAN consists ............... Body Area Network requirements ..........
CDMA time division multiplexing wi-fi protected access
CSMA/CA orthogonal frequency division multiplexing wired protected access
ALOHA
CSMA/CD
B
space division multiplexing
channel division multiplexing
B
wired process access
wi-fi process access
A
scatternet; piconets
piconets: scatternet
piconets: bluenet
bluenet; scatternet
B
point-to-point connections
point-to-multipoint connection
both (a) and (b)
None of the above
C
2.4 GHz worldwide
2.0 GHz worldwide
2.1 GHz worldwide
3.4 GHz worldwide
A
66000
65000
60000
70000
B
IEEE 802.15.1. wireless devices to connect to a wired network Low power consumption & Interoperability
IEEE 802.15.2.
IEEE 802.15.3. sensors & communication devices
IEEE 802.15.4.