1. uses radio-frequency waves to transfer data between a
Correct : D. RFID
2. Is fast and does not require physical sight or contact
Correct : D. RFID
3. technology often used in "smart cards," have small radio
Correct : D. RFID
4. A network of physical objects or things embedded with electronics or
Correct : C. IoT
5. RFID stands for .
Correct : B. Radio
6. Which of the following is not involved in working of IoT?
Correct : C. Nano Tech
7. Making the smaller and smaller things have the ability to connect and interact
Correct : C. Nano Tech
8. Several instructions execution simultaneously in .
Correct : B. Parallel
9. In , data is written only once during manufacturing or
Correct : B. Write Once –
10. In tag data can be changed over time.
Correct : C. Read/Write
11. These are the functions of RFID Reader
Correct : D. All of above
12. In , One antenna is used to transmit the RF signals, and the
Correct : C. Bi Static
13. propose a scheme to define labels that can be automatically
Correct : A. Semacode
14. In Smart Device Form Factors, can be spread into physical
Correct : A. Smart dust
15. In smart device form factors, application of where paint used
Correct : C. Smart Skins
16. Claytronics project is application of .
Correct : B. Smart Clay
17. process two or more combined user input modes, such as
Correct : A. Multimodal
18. controller with control action the output of the controller
Correct : A. Derivative
19. With action, there is a continuous relationship between the
Correct : C. Proportional
20. can be defined as the manipulation, precision
Correct : A. Nano-
21. can be sprayed & embedded throughout the digital
Correct : A. Smart dust
22. Which of the following statements about radio frequency identification
Correct : C. RFID
23. The wireless networking standard that is useful for creating small personal
Correct : C. Bluetooth
24. The transmission medium that consists of strands of clear glass fibre, each of
Correct : A. Fiber Optics
25. The device that is required to translate digital signals into analogue form and
Correct : B. Modem
26. The TCP/IP layer that is responsible for providing the communication and
Correct : B. Transport
27. The method of slicing digital messages into parcels, sending them along
Correct : B. Packet
28. Which of the following businesses benefit and implemented RFID?
Correct : D. All of the above
29. There are basic types of chips available on RFID tags.
Correct : A. Two
30. Does RFID have the ability to read many tags together at once?
Correct : A. Yes
31. The information on read-only chips be changed.
Correct : B. Cannot
32. A reader may have multiple antennas that are responsible for sending and
Correct : A. True
33. Which of the following is not RFID type?
Correct : A. Ultra-Low
34. occurs when many tags are present in a small area; but since
Correct : B. RFID Tag
35. Which of the following is correct for tactile sensors?
Correct : A. Touch
36. Change in output of sensor with change in input is
Correct : C. Sensitivity
37. Thermocouple generate output voltage according to
Correct : C. Temperature
38. Sensor is a type of transducer.
Correct : A. True
39. Which of the following is not an analog sensor?
Correct : D. None of the
mentioned
40. Following acts as detector in Optical sensor
Correct : B. Photo
41. Following is (are) the type(s) of Light sensor(s)
Correct : D. All of above
42. In real time operating system
Correct : B. a task must
43. Hard real time operating system has jitter than a soft real
Correct : A. Less
44. For real time operating systems, interrupt latency should be
Correct : A. Minimal
45. Which one of the following is a real time operating system?
Correct : D. All of above
46. Drives are also known as
Correct : A. Actuators
47. The main objective(s) of Industrial robot is to
Correct : D. All of the above
48. deals with the protection of an individual’s information which is implemented while using
Correct : B. Digital privacy
49. Which of the following statements are true in case of privacy.
Correct : D. All above statements are true.
50. involves the revelation of truthful
Correct : B. Disclosure
51. is breaking the promise to stay a person’s data confidential.
Correct : A. Breach of confidentially.
52. A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic-filtering rules is
Correct : C. Firewall
53. In , there ought as far as possible to the accumulation of individual information and any such information ought to be gotten by legal and reasonable means and where suitable with the learning or
Correct : A. Gathering Limitation Principle
54. In , individual information ought to be applicable to the reasons for which they are to be utilized and to the degree important for those reasons, ought to be
Correct : B. Information Quality Principle
55. In , reasons for which personal information are gathered ought to be indicated not later than at the season of information accumulation and the consequent utilize constrained to the satisfaction of those reasons or such others are not inconsistent with those
Correct : C. Reason Specification Principle
56. In , individual information ought not be unveiled , made accessible or generally utilized for purposes as per purpose specification rule.
Correct : D. Utilize Limitation Principle.
57. Systems used to track and identify the location of objects in real time is
Correct : D. Real-time location system (RTLS)
58. Gateway to the Internet optimized for mobility
Correct : D. Mobile Portal
59. automatically identifying a Web user's location
Correct : B. Geolocation
60. Computing capabilities embedded into objects around us (mobile and stationary)
Correct : B. ubiquitous computing
61. Computing capabilities embedded in the environment but typically not mobile
Correct : A. pervasive computing
62. A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes
Correct : D. Sensor Network
63. short-range radio frequency communication technology for remotely storing and retrieving data using devices called RFID tags and RFID readers
Correct : C. Radio Frequency Identification
64. a technology that offers Internet browsing from wireless devices
Correct : D. Wireless Application Protocol
65. a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology
Correct : C. Wi-Max
66. a wireless version of the Ethernet networking standard
Correct : B. Wireless local area network
67. computer system capable of integrating, storing, editing, analyzing, sharing, and displaying geographically referenced (spatial) information
Correct : D. GIS
68. a voice system enables users to request/receive info, enter/change data through a telephone to a computerized
Correct : D. Interactive Voice response
69. a telecommunications network that offers wireless coverage over a large geographical area, typically over a cellular phone network
Correct : C. Wireless Wide Area network
70. ability to detect and react to a set of environmental variables that is described as context (which can be sensor info or
Correct : B. Conext Aware Computing
71. a wireless telecommunications network for device-to-device connections within a very short range
Correct : B. Personal Area Network
72. a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology
Correct : B. Wi-Max
73. When you use the word it means you are protecting your data from getting disclosed.
Correct : A. Confidentiality
74. is what every individual prefer in terms of physical privacy as well as digital privacy.
Correct : A. Confidentiality
75. means the protection of data from modification by unknown users.
Correct : B. Integrity
76. of information means, only authorised users are capable of accessing the information.
Correct : D. Availability
77. This helps in identifying the origin of information and
Correct : C. Authentication
78. Data is used to ensure confidentiality.
Correct : A. Encryption
79. One common way to maintain data availability is
Correct : B. Data backup
80. The First Phase Of Hacking An IT System Is Compromise Of W hich Foundation Of Security?
Correct : A. Confidentiality
81. Data integrity means
Correct : B. ensuring correctness and consistency of
82. Authentication refers to :
Correct : D. all of the above
83. does not have any management flow.
Correct : C. Asynchronous
84. is proving that a message was sent by a certain sender.
Correct : C. Authentication
85. means hiding contents of a message so that nobody else but the intended recipient can read it.
Correct : C. Encryption
86. is the act of taking data and rendering it unreadable to anyone except for the intended recipient. While on the other hand, is the act of a user proving that they are who they are, and that they can
Correct : D. Encryption, Authentication
87. ensures no one other our intended recipient(s) can eavesdrop on the message while provides confidentiality by scrambling the
Correct : D. Confidentiality, Encryption
88. ensures no one can alter the message before our intended recipient(s) sees it.
Correct : B. Integrity
89. ensures that the message really came from the supposed sender.
Correct : A. Authenticity
90. Digital signatures combined with digital certificates provide by giving the recipient(s) a way to tie the message to an individual or entity who signed the message.
Correct : A. Authenticity
91. transforms meaningful data into what looks like gibberish using a secret that can also be used to reverse the process. Reversing the process is called
Correct : A. Encryption, Decryption
92. is the process of convincing a gatekeeper that you are who you say you are, typically by proving that you know a secret, I.e. password, captcha
Correct : A. Authenticity
93. A collection of nodes used for sensing the environment is known as .
Correct : D. Sensor Network
94. Sensors are those which require an external excitation signal or a power signal.
Correct : B. Passive
95. do not require any external power signal and directly generates output response.
Correct : A. Active
96. is a non-contact type sensor that detects the presence of an object.
Correct : C. Proximity
97. sensors are light based sensor that are used in various applications like Proximity and Object
Correct : C. Infrared
98. This is not included as a main 3 properties for UbiCom Systems were proposed by Weiser in 1991.
Correct : D. Computers can operate autonomously, without human intervention, be self-governed
99. This is not included as a properties of Ubiquitous Computing
Correct : A. Remote
100. In ubicomp system Model , Smart DEI where DEI stands for