Ubiquitious Computing MCQ PDF

Title Ubiquitious Computing MCQ
Author sangram shete
Course Information technology
Institution Savitribai Phule Pune University
Pages 11
File Size 326.6 KB
File Type PDF
Total Downloads 28
Total Views 141

Summary

Download Ubiquitious Computing MCQ PDF


Description

College MCQ Question Ubiquitous computing is the method of ........ ............... main properties for UbiCom Systems were proposed by Weiser Which of the following is not a key characteristic of Ubicomp System ? Among the various wireless options for wearable devices, which one needs to connect to a smart phone and is the most popular? When connecting a wearable device to the cloud, what software is required to run a custom service?

A enhancing computer use by making many computers available throughout the physical environment

B wireless communication and carry-around computers.

C allowing transmission of data, voice and video via a computer

D

Answer

interact with a variety of users via the Internet.

A

1

2

3

4

B

Distributed

iHCI

ContextAwareness

Pay as you go

D

Bluetooth

WiFi

RFID

None of the above

A

Database

Operating system

HTTP Server

All of the above

D

What does RFID stand for?

Radio frequency issue date

Radio frequency identification

Rear field identification

Real far identification

B

What applications run on a SMART Board?

Any applicaiton on the computer

Internet browsers like Explorer and Navigator only

PowerPoint only

PowerPoint only

A

Notepage

Notebook

Spiral Page

All of the above

B

transmitter

transmission channel

receiver

hardware

C

The SMART Board Software is called It takes the output signal from the transmission channel and delivers

College MCQ it to the transducer after processing it Which of the Following is used in banking industary..... WAP?

MICR

OMR

All of above

None of the Above

A

Wireless Application Protocol

Wired Allication Protocol

Wide Application Protocol

None of the above

A

The tag can be used to activate the task when the user clicks on a word on the screen? WAP is designed for?

TRUE

FALSE

Both

None of the above

A

internet explorer

web browser

macro browser

C

Limitations of Short Messaging Service (SMS)

limited to 160 characters or less

message latency is one minute or more

All of the above

D

DoCoMo Stands for ...............

documentation over the mobile network

do communications over the mobile network

micro browser poor security at the application level documentation & communications over the mobile network

None of the above

B

Mobile Web Service design often uses a three tier ...............

thin client, client proxy, server architecture

network, client proxy, server architecture

None of the above

A

In J2ME architecture Connected Device Configuration (CDC) provides ..........

fundamental services for devices

fundamental services for virtual machines

Both

None of the above

C

Java 2 Mobile Environment supports .................

development of client server system

Both

None of the above

C

J2ME is a multi layered organisation of software bundles of three types .............

Servers,Desktop Machines & High End Consumer Devices

stand alone system designs in which code is developed Configurations, Profiles and Optional Packages

J2EE,J2SE & KVM

None of the above

B

internet,cilent & server

College MCQ common language runtime & unified set of class libraries

client & server

packeges & class labraries

digital packages & digital class labraries

A

client code

managed code

server code

None of the above

B

cannot have bad pointers

cannot create memory leaks

supports strong code type safety

All of the above

D

Smart Cards

Smart Wearable Devices

PDAs and smart mobile phones.

Sensors

C

High Performance JIT Compiler Content

All of the above

D

Program

Device Specific Controls Application

All of the above

D

Sandboxes ..........

that limit the local services that code can access.

which ensures that code originates from a trusted source.

machines that can access the Internet

that carries explicit proof of its security.

A

Code Signing .........

that limit the local services that code can access.

which ensures that code originates from a trusted source.

machines that can access the Internet

that carries explicit proof of its security.

B

Firewalls ............

that limit the local services that code can access.

which ensures that code originates from a trusted source.

machines that can access the Internet

that carries explicit proof of its security.

C

that limit the local services that code can access. is a plastic card embedded with digital memory

which ensures that code originates from a trusted source.

machines that can access the Internet

that carries explicit proof of its security.

D

which store data on magnetic strips

is reprogrammable

All of the above

D

The .NET Framework consists of two main parts ............ Code written on the .NET Framework platform is called ........... Managed code ....... .NET CF designed specifically for devices, such as ............. IrDA support ........ Mobile code is any .........

Proof Carrying Code ...............

A smart card ............

SQL Server CE

College MCQ

All of the above

D

ATM cards

Managing and executing cryptographic algorithms Both

None of the above

C

Standard interfaces

Both

None of the above

C

discovery, join and installation

find , join and lookup

A

Universal Plug And Play protocol Internet-based technologies Node

Unidirectional Plug And Play protocol

C

All of the above

D

GateWay

B

Single-level

META-INF

D

All of the above

D

services may be put off line or terminated temporarily or permanently.

A

services may be put off line or terminated temporarily or permanently.

B

The primary tasks of a smart card operating system .............

Transferring data to and from the smart card

Controlling the execution of commands

Java Card widely used in ........... The Home Electronic System (HES) defines the system components .........

SIM cards Residential gateway, HomeGate

Jini consists of three Java language protocols ............... UPnP Stands for .......... Benefit of UPnP ............. OSGi’s core component is ........... A MANIFEST.MF file located in the ........ directory . Service Oriented Architectures Functions ,,,,,,,,,,,,,,

discovery, join and lookup United Plug And Play protocol Media and device independence Server General graph directory Service discovery

Service Provision Life-Cycle Creation Phase ...........

service processes register themselves in service directories.

Service Provision Life-Cycle Execution Phase ...........

service processes register themselves in service directories.

discovery, configuration and lookup Undirectional Plug And Play protocol Platform independence Bundle Acyclic graph directory Service invocation services are invoked and multiple interlinked services may need to be coordinated services are invoked and multiple interlinked services may need to be coordinated

Service management service processes, access configurations and service compositions service processes, access configurations and service compositions

College MCQ

Service Provision Life-Cycle Maintenance Phase .........

service processes register themselves in service directories.

Service Provision Life-Cycle Dissolution Phase ...........

service processes register themselves in service directories.

Life-Cycle for Tagging Physical Objects ..............

Capturing a physical view or some object feature

Types of active RFID tags are .......... Active transponders are woken up .............. Passive RFID - Transponders can be packaged ..... Sensors Primary Functions .......... Sensors Nodes ...... Sensors Common Nodes .......

services are invoked and multiple interlinked services may need to be coordinated services are invoked and multiple interlinked services may need to be coordinated

service processes, access configurations and service compositions service processes, access configurations and service compositions

Identifying physical objects

Anchoring or relating objects

transponders and transmiter & beacons reader they typically have a when they receive no power source and no a signal from a read range of 20 100 active transmitter reader m Sandwiched between Embedded in a an adhesive layer and a Both A&B plastic card paper label Control a system Instrument and monitor Detect changes in with respect to the environments the environment environment Common Nodes Sink Nodes Gateway Nodes transmitter & receiver

mainly responsible for collecting sensor data.

that are responsible for receiving, storing, processing, aggregating data

that connect sink nodes to external entities

services may be put off line or terminated temporarily or permanently.

C

services may be put off line or terminated temporarily or permanently.

D

All of the above

D

None of the above

B

None of the above

C

None of the above

C

All of the above

D

All of the above

D

None of the above

A

College MCQ Micro-Electro-Mechanical Systems (MEMS) consists of ........... Micro-Electro-Mechanical Systems (MEMS) developed using ........... techniques The most common forms of production for MEMS are ........... The main components of robots are ........... Which phase is not a part of development of Human-Centred Design Life-Cycle .

Head(s) Up Display or HUD is ...........

Gestures are expressive, meaningful body motions involving physical movements of the fingers, hands, arms, head, face, or body. Sensors used in gestures ........ In Solove’s taxonomy of privacy Surveillance & Interrogation is a part of ..........

microelectronic elements

actuators, sensors

mechanical structures

All of the above

D

fabrication

microfabrication

etching

None of the above

B

bulk micromachining

surface micromachining

HAR fabrication

All of the above

D

End effectors or actuators

Controller

Sensors

All of the above

D

requirement gathering and analysis

modelling and design

configurations & optional Packages

implementation and testing.

C

any type of display that presents data without blocking the user’s view

the user looks through a display element attached to the airframe or vehicle chassis

that is worn in front of the eye that acts as a camera to record the scene available to the eye, and acts as a display

None of the above

A

TRUE

FALSE

magnetic field trackers

accelerometers

gyroscopes

All of the above

D

Information Collection

Information Processing

Information Dissemination

Invasion

A

A

College MCQ In Solove’s taxonomy of privacy Aggregation & Identification is a part of ..........

Information Collection

Information Processing

Information Dissemination

Invasion

B

Breach of confidentiality is ............

is the threat to disclose personal information

is breaking the promise to keep a person’s information confidential.

is amplifying the accessibility of information.

None of the above

B

Decisional interference involves .............

revealing another’s nudity, grief, or bodily functions

the revelation of truthful information about a person

Automation & Identification

Identification & Authentication The tag data is scanned for Information Processing Personal switched telephone network

RFID privacy challenges .........

Clandestine Scanning is ..............

The tag data is scanned without the tag carrier’s consent.

PSTN stands for ________

Public switched telephone network

PSTN is ______ and wireless networks are _______

Highly dynamic, virtually static

In public switched telephone network, LATA stands for ______ LATAs are connected by a company called ______ A long distance telephone company that collects toll is called ______

Local access and transport area Land exchange carrier LATA

the dissemination of the government’s certain information incursion into people’s decisions about a person to serve the aims and interests of regarding their another private affairs Integration & All of the above Automation

C

D

Both A&B

None of the above

A

Personal switched telephone node

Public switched telephone node

A

Virtually static, highly dynamic

D

Local area and telephone access

A

Land area exchange

B

IXC

D

Highly dynamic, Static, virtually static virtually dynamic Land area and transport area Local exchange carrier

Local access and telephone access Local control exchange

LEC

PSTN

College MCQ The technique for separate but parallel signalling channel is called ________

Common channel signalling

Forward channel signalling

ADLS Broadband stands for ________

Asynchronous Digital Subscriber Line

Asemetric Digital Subscriber Line

US cellular standard CDPD stands for _________ What are the Methods to move data through a network of links and switches? In _________ systems, resources are allocated on demand.

Cellular Digital Packet Data

Cellular Digital Packet Data

Asynchronous Double Subscriber Line Cellular Digital Pocket Data

Packet switching and Line switching

Circuit switching and Line switching

packet switching

circuit switching

wireless maximum communication

worldwide interoperability for microwave access

WiMAX stands for ___________

WiMAX provides ________ Which of the following modulation schemes is supported by WiMAX? WiMAX provides _______

simplex communication binary phase shift keying modulation

half duplex communication quadrature phase shift keying modulation

Reverse channel signalling

Separate channel signalling

A

Asynchronous Data Subscriber Line

A

Cellular Discrete Pocket Data

A

Line switching and bit switching

Packet switching and Circuit switching

D

line switching

frequency switching

A

wireless internet maximum communication

B

no communication

C

all of the mentioned

D

no IPTV services

C

worldwide international standard for microwave access full duplex communication quadrature amplitude modulation Both VoIP and IPTV services

VoIP services

IPTV services

Which of the following frequencies is not used in WiMAX for communication?

2.3 GHz

2.4 GHz

2.5 GHz

3.5 GHz

B

What is the access point (AP) in a wireless LAN?

device that allows wireless devices to connect to a wired network

wireless devices itself

both device that allows wireless devices to connect to a wired

all the nodes in the network

A

College MCQ network and wireless devices itself Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? Mostly ________ is used in wireless LAN. What is WPA? In Bluetooth,multiple_________form a network called a -----------The bluetooth supports Frequency range supported in Zigbee ............. There is more than ............... cell nodes in zigbee. ZigBee developed under .............. A Body Area Network or BAN consists ............... Body Area Network requirements ..........

CDMA time division multiplexing wi-fi protected access

CSMA/CA orthogonal frequency division multiplexing wired protected access

ALOHA

CSMA/CD

B

space division multiplexing

channel division multiplexing

B

wired process access

wi-fi process access

A

scatternet; piconets

piconets: scatternet

piconets: bluenet

bluenet; scatternet

B

point-to-point connections

point-to-multipoint connection

both (a) and (b)

None of the above

C

2.4 GHz worldwide

2.0 GHz worldwide

2.1 GHz worldwide

3.4 GHz worldwide

A

66000

65000

60000

70000

B

IEEE 802.15.1. wireless devices to connect to a wired network Low power consumption & Interoperability

IEEE 802.15.2.

IEEE 802.15.3. sensors & communication devices

IEEE 802.15.4.


Similar Free PDFs