Quiznetik

Ubiquitous Computing System (UCS) | Set 2

1. uses radio-frequency waves to transfer data between a

Correct : D. RFID

2. Is fast and does not require physical sight or contact

Correct : D. RFID

3. technology often used in "smart cards," have small radio

Correct : D. RFID

4. A network of physical objects or things embedded with electronics or

Correct : C. IoT

5. RFID stands for .

Correct : B. Radio

6. Which of the following is not involved in working of IoT?

Correct : C. Nano Tech

7. Making the smaller and smaller things have the ability to connect and interact

Correct : C. Nano Tech

8. Several instructions execution simultaneously in .

Correct : B. Parallel

9. In , data is written only once during manufacturing or

Correct : B. Write Once –

10. In tag data can be changed over time.

Correct : C. Read/Write

11. These are the functions of RFID Reader

Correct : D. All of above

12. In , One antenna is used to transmit the RF signals, and the

Correct : C. Bi Static

13. propose a scheme to define labels that can be automatically

Correct : A. Semacode

14. In Smart Device Form Factors, can be spread into physical

Correct : A. Smart dust

15. In smart device form factors, application of where paint used

Correct : C. Smart Skins

16. Claytronics project is application of .

Correct : B. Smart Clay

17. process two or more combined user input modes, such as

Correct : A. Multimodal

18. controller with control action the output of the controller

Correct : A. Derivative

19. With action, there is a continuous relationship between the

Correct : C. Proportional

20. can be defined as the manipulation, precision

Correct : A. Nano-

21. can be sprayed & embedded throughout the digital

Correct : A. Smart dust

22. Which of the following statements about radio frequency identification

Correct : C. RFID

23. The wireless networking standard that is useful for creating small personal

Correct : C. Bluetooth

24. The transmission medium that consists of strands of clear glass fibre, each of

Correct : A. Fiber Optics

25. The device that is required to translate digital signals into analogue form and

Correct : B. Modem

26. The TCP/IP layer that is responsible for providing the communication and

Correct : B. Transport

27. The method of slicing digital messages into parcels, sending them along

Correct : B. Packet

28. Which of the following businesses benefit and implemented RFID?

Correct : D. All of the above

29. There are basic types of chips available on RFID tags.

Correct : A. Two

30. Does RFID have the ability to read many tags together at once?

Correct : A. Yes

31. The information on read-only chips be changed.

Correct : B. Cannot

32. A reader may have multiple antennas that are responsible for sending and

Correct : A. True

33. Which of the following is not RFID type?

Correct : A. Ultra-Low

34. occurs when many tags are present in a small area; but since

Correct : B. RFID Tag

35. Which of the following is correct for tactile sensors?

Correct : A. Touch

36. Change in output of sensor with change in input is

Correct : C. Sensitivity

37. Thermocouple generate output voltage according to

Correct : C. Temperature

38. Sensor is a type of transducer.

Correct : A. True

39. Which of the following is not an analog sensor?

Correct : D. None of the mentioned

40. Following acts as detector in Optical sensor

Correct : B. Photo

41. Following is (are) the type(s) of Light sensor(s)

Correct : D. All of above

42. In real time operating system

Correct : B. a task must

43. Hard real time operating system has jitter than a soft real

Correct : A. Less

44. For real time operating systems, interrupt latency should be

Correct : A. Minimal

45. Which one of the following is a real time operating system?

Correct : D. All of above

46. Drives are also known as

Correct : A. Actuators

47. The main objective(s) of Industrial robot is to

Correct : D. All of the above

48. deals with the protection of an individual’s information which is implemented while using

Correct : B. Digital privacy

49. Which of the following statements are true in case of privacy.

Correct : D. All above statements are true.

50. involves the revelation of truthful

Correct : B. Disclosure

51. is breaking the promise to stay a person’s data confidential.

Correct : A. Breach of confidentially.

52. A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic-filtering rules is

Correct : C. Firewall

53. In , there ought as far as possible to the accumulation of individual information and any such information ought to be gotten by legal and reasonable means and where suitable with the learning or

Correct : A. Gathering Limitation Principle

54. In , individual information ought to be applicable to the reasons for which they are to be utilized and to the degree important for those reasons, ought to be

Correct : B. Information Quality Principle

55. In , reasons for which personal information are gathered ought to be indicated not later than at the season of information accumulation and the consequent utilize constrained to the satisfaction of those reasons or such others are not inconsistent with those

Correct : C. Reason Specification Principle

56. In , individual information ought not be unveiled , made accessible or generally utilized for purposes as per purpose specification rule.

Correct : D. Utilize Limitation Principle.

57. Systems used to track and identify the location of objects in real time is

Correct : D. Real-time location system (RTLS)

58. Gateway to the Internet optimized for mobility

Correct : D. Mobile Portal

59. automatically identifying a Web user's location

Correct : B. Geolocation

60. Computing capabilities embedded into objects around us (mobile and stationary)

Correct : B. ubiquitous computing

61. Computing capabilities embedded in the environment but typically not mobile

Correct : A. pervasive computing

62. A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes

Correct : D. Sensor Network

63. short-range radio frequency communication technology for remotely storing and retrieving data using devices called RFID tags and RFID readers

Correct : C. Radio Frequency Identification

64. a technology that offers Internet browsing from wireless devices

Correct : D. Wireless Application Protocol

65. a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology

Correct : C. Wi-Max

66. a wireless version of the Ethernet networking standard

Correct : B. Wireless local area network

67. computer system capable of integrating, storing, editing, analyzing, sharing, and displaying geographically referenced (spatial) information

Correct : D. GIS

68. a voice system enables users to request/receive info, enter/change data through a telephone to a computerized

Correct : D. Interactive Voice response

69. a telecommunications network that offers wireless coverage over a large geographical area, typically over a cellular phone network

Correct : C. Wireless Wide Area network

70. ability to detect and react to a set of environmental variables that is described as context (which can be sensor info or

Correct : B. Conext Aware Computing

71. a wireless telecommunications network for device-to-device connections within a very short range

Correct : B. Personal Area Network

72. a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology

Correct : B. Wi-Max

73. When you use the word it means you are protecting your data from getting disclosed.

Correct : A. Confidentiality

74. is what every individual prefer in terms of physical privacy as well as digital privacy.

Correct : A. Confidentiality

75. means the protection of data from modification by unknown users.

Correct : B. Integrity

76. of information means, only authorised users are capable of accessing the information.

Correct : D. Availability

77. This helps in identifying the origin of information and

Correct : C. Authentication

78. Data is used to ensure confidentiality.

Correct : A. Encryption

79. One common way to maintain data availability is

Correct : B. Data backup

80. The First Phase Of Hacking An IT System Is Compromise   Of W hich Foundation Of Security?

Correct : A. Confidentiality

81. Data integrity means

Correct : B. ensuring correctness and consistency of

82. Authentication refers to :

Correct : D. all of the above

83. does not have any management flow.

Correct : C. Asynchronous

84. is proving that a message was sent by a certain sender.

Correct : C. Authentication

85. means hiding contents of a message so that nobody else but the intended recipient can read it.

Correct : C. Encryption

86. is the act of taking data and rendering it unreadable to anyone except for the intended recipient. While on the other hand, is the act of a user proving that they are who they are, and that they can

Correct : D. Encryption, Authentication

87. ensures no one other our intended recipient(s) can eavesdrop on the message while                              provides confidentiality by scrambling the

Correct : D. Confidentiality, Encryption

88. ensures no one can alter the message before our intended recipient(s) sees it.

Correct : B. Integrity

89. ensures that the message really came from the supposed sender.

Correct : A. Authenticity

90. Digital signatures combined with digital certificates provide                          by giving the recipient(s) a way to tie the message to an individual or entity who signed the message.

Correct : A. Authenticity

91. transforms meaningful data into what looks like gibberish using a secret that can also be used to reverse the process. Reversing the process is called

Correct : A. Encryption, Decryption

92. is the process of convincing a gatekeeper that you are who you say you are, typically by proving that you know a secret, I.e. password, captcha

Correct : A. Authenticity

93. A collection of nodes used for sensing the environment is known as .

Correct : D. Sensor Network

94. Sensors are those which require an external excitation signal or a power signal.

Correct : B. Passive

95. do not require any external power signal and directly generates output response.

Correct : A. Active

96. is a non-contact type sensor that detects the presence of an object.

Correct : C. Proximity

97. sensors are light based sensor that are used in various applications like Proximity and Object

Correct : C. Infrared

98. This is not included as a main 3 properties for UbiCom Systems were proposed by Weiser in 1991.

Correct : D. Computers can operate autonomously, without human intervention, be self-governed

99. This is not included as a properties of Ubiquitous Computing

Correct : A. Remote

100. In ubicomp system Model , Smart DEI where DEI stands for

Correct : B. Devices, Environment, Interactions