Quiznetik

Ubiquitous Computing System (UCS) | Set 1

1. Ubiquitous computing is the method of ........

Correct : A. enhancing computer use by making many computers available throughout the physical environment

2. ............... main properties for UbiCom Systems were proposed by Weiser

Correct : B. 2

3. Which of the following is not a key characteristic of Ubicomp System ?

Correct : D. pay as you go

4. Among the various wireless options for wearable devices, which one needs to connect to a smart phone and is the most popular?

Correct : A. bluetooth

5. When connecting a wearable device to the cloud, what software is required to run a custom service?

Correct : D. all of the above

6. What does RFID stand for?

Correct : B. radio frequency identification

7. What applications run on a SMART Board?

Correct : A. any applicaiton on the computer

8. The SMART Board Software is called

Correct : B. notebook

9. It takes the output signal from the transmission channel and delivers

Correct : C. receiver

10. Which of the Following is used in banking industary.....

Correct : A. micr

11. WAP?

Correct : A. wireless application protocol

12. The tag can be used to activate the task when the user clicks on a word on the screen?

Correct : A. true

13. WAP is designed for?

Correct : C. micro browser

14. Limitations of Short Messaging Service (SMS)

Correct : D. all of the above

15. DoCoMo Stands for ...............

Correct : B. do communications over the mobile network

16. Mobile Web Service design often uses a three tier ...............

Correct : A. thin client, client proxy, server architecture

17. In J2ME architecture Connected Device Configuration (CDC) provides ..........

Correct : C. both

18. Java 2 Mobile Environment supports .................

Correct : C. both

19. J2ME is a multi layered organisation of software bundles of three types .............

Correct : B. configurations, profiles and optional packages

20. The .NET Framework consists of two main parts ............

Correct : A. common language runtime & unified set of class libraries

21. Code written on the .NET Framework platform is called ...........

Correct : B. managed code

22. Managed code .......

Correct : D. all of the above

23. .NET CF designed specifically for devices, such as .............

Correct : C. pdas and smart mobile phones.

24. IrDA support ........

Correct : D. all of the above

25. Mobile code is any .........

Correct : D. all of the above

26. Sandboxes ..........

Correct : A. that limit the local services that code can access.

27. Code Signing .........

Correct : B. which ensures that code originates from a trusted source.

28. Firewalls ............

Correct : C. machines that can access the internet

29. Proof Carrying Code ...............

Correct : D. that carries explicit proof of its security.

30. A smart card ............

Correct : D. all of the above

31. The primary tasks of a smart card operating system .............

Correct : D. all of the above

32. Java Card widely used in ...........

Correct : C. both

33. The Home Electronic System (HES) defines the system components .........

Correct : C. both

34. Jini consists of three Java language protocols ...............

Correct : A. discovery, join and lookup

35. UPnP Stands for ..........

Correct : C. universal plug and play protocol

36. Benefit of UPnP .............

Correct : D. all of the above

37. OSGi’s core component is ...........

Correct : B. bundle

38. A MANIFEST.MF file located in the ........ directory .

Correct : D. meta-inf

39. Service Oriented Architectures Functions ,,,,,,,,,,,,,,

Correct : D. all of the above

40. Service Provision Life-Cycle - Creation Phase ...........

Correct : A. service processes register themselves in service directories.

41. Service Provision Life-Cycle - Execution Phase ...........

Correct : B. services are invoked and multiple interlinked services may need to be coordinated

42. Service Provision Life-Cycle - Maintenance Phase .........

Correct : C. service processes, access configurations and service compositions

43. Service Provision Life-Cycle - Dissolution Phase ...........

Correct : D. services may be put off line or terminated temporarily or permanently.

44. Life-Cycle for Tagging Physical Objects ..............

Correct : D. all of the above

45. Types of active RFID tags are ..........

Correct : B. transponders and beacons

46. Active transponders are woken up ..............

Correct : C. when they receive a signal from a reader

47. Passive RFID - Transponders can be packaged .....

Correct : C. both a&b

48. Sensors Primary Functions ..........

Correct : D. all of the above

49. Sensors Nodes ......

Correct : D. all of the above

50. Sensors Common Nodes .......

Correct : A. mainly responsible for collecting sensor data.

51. Micro-Electro-Mechanical Systems (MEMS) consists of ...........

Correct : D. all of the above

52. Micro-Electro-Mechanical Systems (MEMS) developed using ........... techniques

Correct : B. microfabrication

53. The most common forms of production for MEMS are ...........

Correct : D. all of the above

54. The main components of robots are ...........

Correct : D. all of the above

55. Which phase is not a part of development of Human-Centred Design Life-Cycle .

Correct : C. configurations & optional packages

56. Head(s) Up Display or HUD is ...........

Correct : A. any type of display that presents data without blocking the user’s view

57. Gestures are expressive, meaningful body motions involving physical movements of the fingers, hands, arms, head, face, or body.

Correct : A. true

58. Sensors used in gestures ........

Correct : D. all of the above

59. In Solove’s taxonomy of privacy Surveillance & Interrogation is a part of ..........

Correct : A. information collection

60. In Solove’s taxonomy of privacy Aggregation & Identification is a part of ..........

Correct : B. information processing

61. Breach of confidentiality is ............

Correct : B. is breaking the promise to keep a person’s information confidential.

62. Decisional interference involves .............

Correct : C. the government’s incursion into people’s decisions regarding their private affairs

63. RFID privacy challenges .........

Correct : D. all of the above

64. Clandestine Scanning is ..............

Correct : A. the tag data is scanned without the tag carrier’s consent.

65. PSTN stands for

Correct : A. public switched telephone network

66. PSTN is              and wireless networks are

Correct : D. virtually static, highly dynamic

67. In public switched telephone network, LATA stands for

Correct : A. local access and transport area

68. LATAs are connected by a company called

Correct : B. local exchange carrier

69. A long distance telephone company that collects toll is called

Correct : D. ixc

70. The technique for separate but parallel signalling channel is called

Correct : A. common channel signalling

71. ADLS Broadband stands for

Correct : A. asynchronous digital subscriber line

72. US cellular standard CDPD stands for

Correct : A. cellular digital packet data

73. What are the Methods to move data through a network of links and switches?

Correct : D. packet switching and circuit switching

74. In                    systems, resources are allocated on demand.

Correct : A. packet switching

75. WiMAX stands for

Correct : B. worldwide interoperability for microwave access

76. WiMAX provides

Correct : C. full duplex communication

77. Which of the following modulation schemes is supported by WiMAX?

Correct : D. all of the mentioned

78. WiMAX provides

Correct : C. both voip and iptv services

79. Which of the following frequencies is not used in WiMAX for communication?

Correct : B. 2.4 ghz

80. What is the access point (AP) in a wireless LAN?

Correct : A. device that allows wireless devices to connect to a wired network

81. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?

Correct : B. csma/ca

82. Mostly                  is used in wireless LAN.

Correct : B. orthogonal frequency division multiplexing

83. What is WPA?

Correct : A. wi-fi protected access

84. In Bluetooth,multiple                  form a network called a ------------

Correct : B. piconets: scatternet

85. The bluetooth supports

Correct : C. both (a) and (b)

86. Frequency range supported in Zigbee .............

Correct : A. 2.4 ghz worldwide

87. There is more than ............... cell nodes in zigbee.

Correct : B. 65000

88. ZigBee developed under ..............

Correct : D. ieee 802.15.4.

89. A Body Area Network or BAN consists ...............

Correct : B. set of mobile and compact sensors

90. Body Area Network requirements ..........

Correct : D. all of the above

91. Find out wrong stament of Body Area Network...............

Correct : D. allowing transmission of data, voice and video via a computer

92. WBAN(Wireless Body Area Network) allows the user to move another without having the restriction of a cable for sharing information.

Correct : A. true

93. Which of the following standard committee specifies Bluetooth and other Personal Area Networks (PAN)?

Correct : B. ieee 802.15.2.

94. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as

Correct : A. chock point

95. A proxy firewall filters at

Correct : D. application layer

96. A firewall needs to be                      so that it can grow proportionally with the network that it protects.

Correct : B. expansive

97. provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.

Correct : D. virtual private network

98. Which of the statements are not true to classify VPN systems?

Correct : C. securing the network from bots and malwares

99. What types of protocols are used in VPNs?

Correct : A. application level protocols

100. Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?

Correct : B. site-to-site vpns