0% found this document useful (0 votes)
474 views12 pages

Ubiquitious Computing MCQ

Ubiquitous computing is a method of enhancing computer use by making many computers available throughout the physical environment and allowing wireless transmission of data, voice and video via a computer. The main properties for UbiCom Systems proposed by Weiser were distributed and context-awareness. Among the various wireless options for wearable devices, Bluetooth is the most popular as it needs to connect to a smartphone. When connecting a wearable device to the cloud, database, operating system, and HTTP server software is required to run custom services. RFID stands for Radio Frequency Identification.

Uploaded by

Dip
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
474 views12 pages

Ubiquitious Computing MCQ

Ubiquitous computing is a method of enhancing computer use by making many computers available throughout the physical environment and allowing wireless transmission of data, voice and video via a computer. The main properties for UbiCom Systems proposed by Weiser were distributed and context-awareness. Among the various wireless options for wearable devices, Bluetooth is the most popular as it needs to connect to a smartphone. When connecting a wearable device to the cloud, database, operating system, and HTTP server software is required to run custom services. RFID stands for Radio Frequency Identification.

Uploaded by

Dip
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

lOMoARcPSD|7874213

Ubiquitious Computing MCQ

Information technology (Savitribai Phule Pune University)

StuDocu is not sponsored or endorsed by any college or university


Downloaded by Dipali Mehta ([email protected])
lOMoARcPSD|7874213

College MCQ

Question A B C D Answer
enhancing computer allowing
wireless
use by making many transmission of
Ubiquitous computing is the communication and interact with a variety
computers available data, voice and A
method of ........ carry-around of users via the Internet.
throughout the physical video via a
computers.
environment computer
............... main properties for
UbiCom Systems were proposed 1 2 3 4 B
by Weiser
Which of the following is not a
Context-
key characteristic of Ubicomp Distributed iHCI Pay as you go D
Awareness
System ?
Among the various wireless
options for wearable devices,
which one needs to connect to a Bluetooth WiFi RFID None of the above A
smart phone and is the most
popular?
When connecting a wearable
device to the cloud, what software
Database Operating system HTTP Server All of the above D
is required to run a custom
service?
Radio frequency issue Radio frequency Rear field
What does RFID stand for? Real far identification B
date identification identification
Internet browsers
What applications run on a Any applicaiton on the
like Explorer and PowerPoint only PowerPoint only A
SMART Board? computer
Navigator only
The SMART Board Software is
Notepage Notebook Spiral Page All of the above B
called
It takes the output signal from the
transmitter transmission channel receiver hardware C
transmission channel and delivers

Downloaded by Dipali Mehta ([email protected])


lOMoARcPSD|7874213

College MCQ

it to the transducer after


processing it
Which of the Following is used in
MICR OMR All of above None of the Above A
banking industary.....
Wireless Application Wired Allication Wide Application
WAP? None of the above A
Protocol Protocol Protocol
The tag can be used to activate the
task when the user clicks on a TRUE FALSE Both None of the above A
word on the screen?
WAP is designed for? internet explorer web browser micro browser macro browser C
poor security at
Limitations of Short Messaging limited to 160 message latency is
the application All of the above D
Service (SMS) characters or less one minute or more
level
documentation &
do communications
documentation over the communications
DoCoMo Stands for ............... over the mobile None of the above B
mobile network over the mobile
network
network
network, client
Mobile Web Service design often thin client, client proxy, internet,cilent &
proxy, server None of the above A
uses a three tier ............... server architecture server
architecture
In J2ME architecture Connected
fundamental services fundamental services
Device Configuration (CDC) Both None of the above C
for devices for virtual machines
provides ..........
stand alone system
Java 2 Mobile Environment development of client
designs in which Both None of the above C
supports ................. server system
code is developed
J2ME is a multi layered Servers,Desktop Configurations,
J2EE,J2SE &
organisation of software bundles Machines & High End Profiles and None of the above B
KVM
of three types ............. Consumer Devices Optional Packages

Downloaded by Dipali Mehta ([email protected])


lOMoARcPSD|7874213

College MCQ

common language
The .NET Framework consists of packeges & class digital packages &
runtime & unified set client & server A
two main parts ............ labraries digital class labraries
of class libraries
Code written on the .NET
Framework platform is called client code managed code server code None of the above B
...........
cannot have bad cannot create supports strong
Managed code ....... All of the above D
pointers memory leaks code type safety
.NET CF designed specifically for Smart Wearable PDAs and smart
Smart Cards Sensors C
devices, such as ............. Devices mobile phones.
Device Specific High Performance
IrDA support ........ SQL Server CE All of the above D
Controls JIT Compiler
Mobile code is any ......... Program Application Content All of the above D
that limit the local which ensures that machines that can
that carries explicit
Sandboxes .......... services that code can code originates from access the A
proof of its security.
access. a trusted source. Internet
that limit the local which ensures that machines that can
that carries explicit
Code Signing ......... services that code can code originates from access the B
proof of its security.
access. a trusted source. Internet
that limit the local which ensures that machines that can
that carries explicit
Firewalls ............ services that code can code originates from access the C
proof of its security.
access. a trusted source. Internet
that limit the local which ensures that machines that can
that carries explicit
Proof Carrying Code ............... services that code can code originates from access the D
proof of its security.
access. a trusted source. Internet
is a plastic card
which store data on is
A smart card ............ embedded with digital All of the above D
magnetic strips reprogrammable
memory

Downloaded by Dipali Mehta ([email protected])


lOMoARcPSD|7874213

College MCQ

Managing and
Controlling the
The primary tasks of a smart card Transferring data to executing
execution of All of the above D
operating system ............. and from the smart card cryptographic
commands
algorithms
Java Card widely used in ........... SIM cards ATM cards Both None of the above C
The Home Electronic System
Residential gateway,
(HES) defines the system Standard interfaces Both None of the above C
HomeGate
components .........
discovery,
Jini consists of three Java discovery, join and discovery, join
configuration and find , join and lookup A
language protocols ............... lookup and installation
lookup
United Plug And Play Undirectional Plug Universal Plug Unidirectional Plug
UPnP Stands for .......... C
protocol And Play protocol And Play protocol And Play protocol
Media and device Platform Internet-based
Benefit of UPnP ............. All of the above D
independence independence technologies
OSGi’s core component is ........... Server Bundle Node GateWay B
A MANIFEST.MF file located in Acyclic graph
General graph directory Single-level META-INF D
the ........ directory . directory
Service Oriented Architectures Service
Service discovery Service invocation All of the above D
Functions ,,,,,,,,,,,,,, management
services are invoked service processes,
services may be put off
service processes and multiple access
Service Provision Life-Cycle - line or terminated
register themselves in interlinked services configurations A
Creation Phase ........... temporarily or
service directories. may need to be and service
permanently.
coordinated compositions
services are invoked service processes,
services may be put off
service processes and multiple access
Service Provision Life-Cycle - line or terminated
register themselves in interlinked services configurations B
Execution Phase ........... temporarily or
service directories. may need to be and service
permanently.
coordinated compositions

Downloaded by Dipali Mehta ([email protected])


lOMoARcPSD|7874213

College MCQ

services are invoked service processes,


services may be put off
service processes and multiple access
Service Provision Life-Cycle - line or terminated
register themselves in interlinked services configurations C
Maintenance Phase ......... temporarily or
service directories. may need to be and service
permanently.
coordinated compositions
services are invoked service processes,
services may be put off
service processes and multiple access
Service Provision Life-Cycle - line or terminated
register themselves in interlinked services configurations D
Dissolution Phase ........... temporarily or
service directories. may need to be and service
permanently.
coordinated compositions
Capturing a physical
Life-Cycle for Tagging Physical Identifying physical Anchoring or
view or some object All of the above D
Objects .............. objects relating objects
feature
Types of active RFID tags are transponders and transmiter &
transmitter & receiver None of the above B
.......... beacons reader
they typically have a when they receive
Active transponders are woken up no power source and no
read range of 20 100 a signal from a None of the above C
.............. active transmitter
m reader
Sandwiched between
Passive RFID - Transponders can Embedded in a
an adhesive layer and a Both A&B None of the above C
be packaged ..... plastic card
paper label
Control a system
Instrument and monitor Detect changes in
Sensors Primary Functions .......... with respect to the All of the above D
environments the environment
environment
Sensors Nodes ...... Common Nodes Sink Nodes Gateway Nodes All of the above D
that are responsible
that connect sink
mainly responsible for for receiving,
Sensors Common Nodes ....... nodes to external None of the above A
collecting sensor data. storing, processing,
entities
aggregating data

Downloaded by Dipali Mehta ([email protected])


lOMoARcPSD|7874213

College MCQ

Micro-Electro-Mechanical
microelectronic mechanical
Systems (MEMS) consists of actuators, sensors All of the above D
elements structures
...........
Micro-Electro-Mechanical
Systems (MEMS) developed using fabrication microfabrication etching None of the above B
........... techniques
The most common forms of surface
bulk micromachining HAR fabrication All of the above D
production for MEMS are ........... micromachining
The main components of robots End effectors or
Controller Sensors All of the above D
are ........... actuators
Which phase is not a part of
requirement gathering modelling and configurations & implementation and
development of Human-Centred C
and analysis design optional Packages testing.
Design Life-Cycle .
that is worn in
front of the eye
the user looks
any type of display that that acts as a
through a display
Head(s) Up Display or HUD is presents data without camera to record
element attached to None of the above A
........... blocking the user’s the scene
the airframe or
view available to the
vehicle chassis
eye, and acts as a
display
Gestures are expressive,
meaningful body motions
involving physical movements of TRUE FALSE A
the fingers, hands, arms, head,
face, or body.
Sensors used in gestures ........ magnetic field trackers accelerometers gyroscopes All of the above D
In Solove’s taxonomy of privacy
Information Information
Surveillance & Interrogation is a Information Collection Invasion A
Processing Dissemination
part of ..........

Downloaded by Dipali Mehta ([email protected])


lOMoARcPSD|7874213

College MCQ

In Solove’s taxonomy of privacy


Information Information
Aggregation & Identification is a Information Collection Invasion B
Processing Dissemination
part of ..........
is breaking the
is amplifying the
Breach of confidentiality is is the threat to disclose promise to keep a
accessibility of None of the above B
............ personal information person’s information
information.
confidential.
the government’s the dissemination of
revealing another’s the revelation of incursion into certain information
Decisional interference involves
nudity, grief, or bodily truthful information people’s decisions about a person to serve C
.............
functions about a person regarding their the aims and interests of
private affairs another
Automation & Identification & Integration &
RFID privacy challenges ......... All of the above D
Identification Authentication Automation
The tag data is
The tag data is scanned
scanned for
Clandestine Scanning is .............. without the tag carrier’s Both A&B None of the above A
Information
consent.
Processing
Public switched Personal switched Personal switched Public switched
PSTN stands for ________ A
telephone network telephone network telephone node telephone node
PSTN is ______ and wireless Highly dynamic, Highly dynamic, Virtually static, highly
Static, virtually static D
networks are _______ virtually static virtually dynamic dynamic
In public switched telephone Local access and Land area and Local access and Local area and
A
network, LATA stands for ______ transport area transport area telephone access telephone access
LATAs are connected by a Local exchange Local control
Land exchange carrier Land area exchange B
company called ______ carrier exchange
A long distance telephone
company that collects toll is called LATA LEC PSTN IXC D
______

Downloaded by Dipali Mehta ([email protected])


lOMoARcPSD|7874213

College MCQ

The technique for separate but


Common channel Forward channel Reverse channel Separate channel
parallel signalling channel is A
signalling signalling signalling signalling
called ________
Asynchronous
ADLS Broadband stands for Asynchronous Digital Asemetric Digital Asynchronous Data
Double A
________ Subscriber Line Subscriber Line Subscriber Line
Subscriber Line
US cellular standard CDPD stands Cellular Digital Packet Cellular Digital Cellular Digital Cellular Discrete
A
for _________ Data Packet Data Pocket Data Pocket Data
What are the Methods to move
Packet switching and Circuit switching Line switching Packet switching and
data through a network of links D
Line switching and Line switching and bit switching Circuit switching
and switches?
In _________ systems, resources
packet switching circuit switching line switching frequency switching A
are allocated on demand.
worldwide
worldwide wireless internet
wireless maximum international
WiMAX stands for ___________ interoperability for maximum B
communication standard for
microwave access communication
microwave access
simplex half duplex full duplex
WiMAX provides ________ no communication C
communication communication communication
Which of the following quadrature phase quadrature
binary phase shift
modulation schemes is supported shift keying amplitude all of the mentioned D
keying modulation
by WiMAX? modulation modulation
Both VoIP and
WiMAX provides _______ VoIP services IPTV services no IPTV services C
IPTV services
Which of the following
frequencies is not used in WiMAX 2.3 GHz 2.4 GHz 2.5 GHz 3.5 GHz B
for communication?
device that allows both device that
What is the access point (AP) in a wireless devices to wireless devices allows wireless all the nodes in the
A
wireless LAN? connect to a wired itself devices to network
network connect to a wired

Downloaded by Dipali Mehta ([email protected])


lOMoARcPSD|7874213

College MCQ

network and
wireless devices
itself

Which multiple access technique


is used by IEEE 802.11 standard CDMA CSMA/CA ALOHA CSMA/CD B
for wireless LAN?
orthogonal
Mostly ________ is used in time division space division channel division
frequency division B
wireless LAN. multiplexing multiplexing multiplexing
multiplexing
wired protected wired process
What is WPA? wi-fi protected access wi-fi process access A
access access
In
Bluetooth,multiple_________form scatternet; piconets piconets: scatternet piconets: bluenet bluenet; scatternet B
a network called a ------------
point-to-point point-to-multipoint
The bluetooth supports both (a) and (b) None of the above C
connections connection
Frequency range supported in 2.1 GHz
2.4 GHz worldwide 2.0 GHz worldwide 3.4 GHz worldwide A
Zigbee ............. worldwide
There is more than ............... cell
66000 65000 60000 70000 B
nodes in zigbee.
ZigBee developed under .............. IEEE 802.15.1. IEEE 802.15.2. IEEE 802.15.3. IEEE 802.15.4. D
wireless devices to sensors &
A Body Area Network or BAN set of mobile and wearable device &
connect to a wired communication B
consists ............... compact sensors sensors
network devices
Low power
Body Area Network requirements Self-healing &
consumption & Low latency All of the above D
.......... Security
Interoperability

Downloaded by Dipali Mehta ([email protected])


lOMoARcPSD|7874213

College MCQ

Sensors can be
Sensors are put on Provides healthcare
used to measure
patient’s body to services over a long allowing transmission
Find out wrong stament of Body navigation, timer,
monitor heart rate, distance with the of data, voice and video D
Area Network............... distance, pulse
blood pressure and help of IT and via a computer
rate and body
ECG. communication.
temperature.
WBAN(Wireless Body Area
Network) allows the user to move
another without having the TRUE FALSE A
restriction of a cable for sharing
information.
Which of the following standard
committee specifies Bluetooth and
IEEE 802.11b IEEE 802.15.2. IEEE 802.11g IEEE 802.16 B
other Personal Area Networks
(PAN)?
A firewall is installed at the point
where the secure internal network
and untrusted external network Chock point Meeting point Firewall point Secure point A
meet which is also known as
__________
A proxy firewall filters at
Physical layer Data link layer Network layer Application layer D
_________
A firewall needs to be
__________ so that it can grow
Robust Expansive Fast Scalable B
proportionally with the network
that it protects.
__________ provides an isolated
tunnel across a public network for
sending and receiving data Virtual Protocol Virtual Protocol
Visual Private Network Virtual Private Network D
privately as if the computing Network Networking
devices were directly connected to
the private network.

Downloaded by Dipali Mehta ([email protected])


lOMoARcPSD|7874213

College MCQ

Whether VPNs are Securing the Levels of security


Which of the statements are not Protocols used for providing site-to-site network from provided for sending
C
true to classify VPN systems? tunnelling the traffic or remote access bots and and receiving data
connection malwares privately
What types of protocols are used Application level Tunnelling Network
Mailing protocols A
in VPNs? protocols protocols protocols
Which types of VPNs are used for
corporate connectivity across Peer-to-Peer Country-to-country
Remote access VPNs Site-to-site VPNs B
companies residing in different VPNs VPNs
geographical location?

Downloaded by Dipali Mehta ([email protected])

You might also like