mcqpoint.com Open in urlscan Pro
139.162.24.117  Public Scan

URL: https://mcqpoint.com/mcq/ubiquitous-computing/
Submission: On February 08 via manual from IN — Scanned from DE

Form analysis 4 forms found in the DOM

POST

<form method="post" class="login">
  <p class="text-muted">Login is required in order to view results and track your progress. Please continue with your Google account.</p>
  <a href="https://mcqpoint.com/login/google/" class="social_bt google_btn"><i class="fa fa-google-plus"></i>Continue with Google</a>
</form>

POST

<form method="post" class="login">
  <p class="text-muted">Login is required in order to view results and track your progress. Please continue with your Google account.</p>
  <a href="https://mcqpoint.com/login/google/" class="social_bt google_btn"><i class="fa fa-google-plus"></i>Continue with Google</a>
</form>

Name: utf_add_commentPOST

<form id="utf_add_comment" class="utf_add_comment" name="utf_add_comment" method="post">
  <input type="hidden" name="_token" value="EvTnpHzoJto6UNdW7xJIOCgFEAEbBupaFcOGHRth">
  <input type="hidden" id="business_id" name="business_id" value="720">
  <input type="hidden" id="business_type" name="business_type" value="category">
  <fieldset>
    <div class="row">
      <div class="col-md-4">
        <label>Name:<span>*</span></label>
        <input type="text" id="name" placeholder="Name" value="">
        <span id="name_error" class="error-div text-danger"></span>
      </div>
      <div class="col-md-4">
        <label>Email:<span>*</span></label>
        <input type="text" id="email" placeholder="Email" value="">
        <span id="email_error" class="error-div text-danger"></span>
      </div>
      <div class="col-md-4">
        <label>Subject:<span>*</span></label>
        <input type="text" id="subject" placeholder="Subject" value="">
        <span id="subject_error" class="error-div text-danger"></span>
      </div>
    </div>
    <div>
      <label>Review:<span>*</span></label>
      <textarea cols="40" id="review" placeholder="Your Message..." rows="3"></textarea>
      <span id="review_error" class="error-div text-danger"></span>
    </div>
  </fieldset>
  <div id="success" class="text-success" style="display: none;"></div>
  <input type="button" class="submit button" id="submit-contact-form" value="Submit Review">
  <div class="clearfix"></div>
</form>

Name: contact-form-actionPOST

<form id="contact-form-action" name="contact-form-action" method="post">
  <input type="hidden" name="_token" value="EvTnpHzoJto6UNdW7xJIOCgFEAEbBupaFcOGHRth">
  <span class="la la-envelope-o"></span>
  <input class="text-danger" name="emails" type="emails" id="emails" placeholder="Enter your email" required="" value="">
  <span id="emails_error" class="error-div text-danger"></span>
  <div id="success" class="text-success" style="display: none;"></div>
  <button class="utf_theme_btn" type="button" id="subscribe">Subscribe</button>
</form>

Text Content

Search

Sign In /Sign Up


SIGN IN / SIGN UP

Login is required in order to view results and track your progress. Please
continue with your Google account.

Continue with Google

Search

Sign In /Sign Up


SIGN IN / SIGN UP

Login is required in order to view results and track your progress. Please
continue with your Google account.

Continue with Google



 * Home
 * Computer Science
 * Ubiquitous Computing


UBIQUITOUS COMPUTING MCQ COMPUTER SCIENCE

Attempt now to check your rank among 33 students! 50 Questions 30 Mins
 * Bookmark
 * Add Comment
 * Share With Friends
 * Ask a Question


ABOUT UBIQUITOUS COMPUTING

Following are some of the multiple choice questions on the Ubiquitous Computing
with answers that will help the students in developing their knowledge.


UBIQUITOUS COMPUTING MCQ


1. PROTOCOL IS USED FOR VOICE COMMUNICATION

 * Bookmark
 * Report
 * Discuss

 * TCP
 * RTP
 * RTSP
 * Voice Over IP


2. MAIN GOAL OF THINGS THAT THINK(TTT) WAS …….

 * Bookmark
 * Report
 * Discuss

 * See how physical world meets with logical world
 * See how logical world meets with physical world
 * See how physical world meets with logical world
 * None of the above


3. WHICH ARE THE SMART DEVICES UNDER CPI ?

 * Bookmark
 * Report
 * Discuss

 * Unimate
 * MH-1Robot
 * Smart Dust and Tiny OS
 * All of the above


4. WHICH ARE THE SMART DEVICES UNDER CCI ?

 * Bookmark
 * Report
 * Discuss

 * Smart Board
 * Smart Pad&Tabs
 * Active Badge,Bat,Fl oor
 * All of the above


5. WHICH OF THE FOLLOWING IS NOT CHARACTERISTICS OF SMART DEVICES ?

 * Bookmark
 * Report
 * Discuss

 * Mobility
 * Single Fuction
 * Dynamic Service Discovery
 * Intermitte nt Resource Access


6. CPI STANDS FOR

 * Bookmark
 * Report
 * Discuss

 * Computer Physical World Ineraction
 * Human Computer Intraction
 * Computer Physical Interface
 * None of the above


7. DESIGN ARCHITECTURE OF UBICOMP SYSTEM CONSISTS OF …………..

 * Bookmark
 * Report
 * Discuss

 * Smart Device
 * Smart Environme nt
 * Smart Interaction
 * All of the above


8. WHICH OF THE FOLLOWING ARE INTERACTION MODELS IN UBICOMP SYSTEM ?

 * Bookmark
 * Report
 * Discuss

 * HCI
 * CCI
 * CPI
 * All of the above


9. WHICH OF THE FOLLOWING IS NOT PROPERTY OF UBICOMP SYSTEM ?

 * Bookmark
 * Report
 * Discuss

 * Implicit HCI
 * Explicit HCI
 * Distributed
 * Both A & C


10. DISTRIBUTED ICT SYSTEM CONSISTS OF HOW MANY LAYES ?

 * Bookmark
 * Report
 * Discuss

 * 2
 * 3
 * 5
 * 4


11. HCI STANDS FOR

 * Bookmark
 * Report
 * Discuss

 * Human Computer Inteface
 * Human Computer Intraction
 * Both
 * None of the above


12. UBIQUITOUS COMPUTING IS ALSO CALLED AS …….

 * Bookmark
 * Report
 * Discuss

 * Cloud Computi ng
 * Grid Computin g
 * Pervasive Computing
 * Distribute d Computin g


13. UBIQUITOUS COMPUTING SUPPORTS …….

 * Bookmark
 * Report
 * Discuss

 * Many to 1
 * 1 to 1
 * Many to Many
 * 1 to Many


14. WHICH OF THE FOLLOWING IS NOT UBIQUITOUS DEVICE ?

 * Bookmark
 * Report
 * Discuss

 * TV
 * RFIDTags
 * PDAs
 * Smartpho ne GPS


15. WHO INVENTED TERM UBIQUITOUS COMPUTING ?

 * Bookmark
 * Report
 * Discuss

 * Shaun Watson
 * Mark Ciere
 * Mark Watson
 * Mark Weiser


16. THIRD ERA OF COMPUTING IS KNOWN AS THE …….

 * Bookmark
 * Report
 * Discuss

 * Mainfram e era
 * PC era
 * Ubiquitous Computing
 * None of the above


17. SECOND ERA OF COMPUTING IS KNOWN AS THE …….

 * Bookmark
 * Report
 * Discuss

 * Mainfram e era
 * PC era
 * Ubiquitous Computing
 * None of the above


18. UBIQUITOUS COMPUTING CLOSELY REALTED WITH?

 * Bookmark
 * Report
 * Discuss

 * IOT
 * M2M
 * Both IOT & M2M
 * None of the above


19. WHAT IS MAIN AIM OF UBIQUITOUS COMPUTING?

 * Bookmark
 * Report
 * Discuss

 * Creating Digital Product
 * Creating Smart Product
 * Creating Best Product
 * Creating High Quality Product


20. WHICH TWO METHODS FOLLOWED BY BUSINESS MODELS?

 * Bookmark
 * Report
 * Discuss

 * PUSH & POP
 * PUSH & PULL
 * PULL & POP
 * None of the above


21. UBIQUITOUS MEANS ……

 * Bookmark
 * Report
 * Discuss

 * Found Everywhere
 * Found Nowhere
 * Found Anyhow
 * Found Veryfast


22. . ALSO EXISTS AS A SEPARATE REALITY FROM PHYSICAL WORLD.

 * Bookmark
 * Report
 * Discuss

 * VR
 * Real
 * Calm
 * Distributed


23. THE TECHNIQUE HAS VARIOUS DIMENSION.

 * Bookmark
 * Report
 * Discuss

 * VR
 * RJ
 * Calm
 * Real


24. THE ICT SYSTEMS ARE CALLED AS WHEN SYSTEM VIEW IS AS SINGLE SYSTEM

 * Bookmark
 * Report
 * Discuss

 * Multiple
 * Single
 * Distributed
 * Disjoint


25. FOR MODELLING DIFFERENT KEY PROPERTIES OF
                                     COMPUTING THE INCREASINGLY DIGITAL WORLD IS
OCCUPIED.

 * Bookmark
 * Report
 * Discuss

 * Pervasive
 * Ubiquitous
 * Both a & b
 * None of the Above


26. ADVANTAGES OF UBIQUITIOUS COMPUTING

 * Bookmark
 * Report
 * Discuss

 * Invisible
 * Socialization
 * Decision-making
 * All of There


27. UBIQUITOUS COMPUTING CONNECTS ENVIRONMENT AND IN UNOBTRUSIVE WAYS.

 * Bookmark
 * Report
 * Discuss

 * User
 * Cloud
 * Resource
 * Data


28. . MAINLY ALLOWS YOU TO CONNECT ON THE MOVE.

 * Bookmark
 * Report
 * Discuss

 * Scalability
 * Portability
 * Mobility
 * Flexibility


29. THE ASSUMPTION OF PERVASIVE COMPUTING IS ABOUT                          AND
TECHNOLOGY.

 * Bookmark
 * Report
 * Discuss

 * Information &Communicatio
 * Data , Message
 * Knowledge,Messag
 * None of the Above


30. IF THE SYSTEMS ARE MADE PROACTIVE AS PER THE REQUIREMENT OF USERS THEN THESE
EFFORTS AND ATTEMPTS ARE BUILT IN CONCEPT CALLED

 * Bookmark
 * Report
 * Discuss

 * Ubiquitous Computing
 * Mobile Computing
 * Cloud Computing
 * All of There


31. SYSTEMS ARE KNOWN AS UBIQUITOUS SYSTEMS AND DOES NOT INVOLVE HUMANS TO
INTERACT.

 * Bookmark
 * Report
 * Discuss

 * M2M
 * H2M
 * M2H
 * H2H


32. UBIQUITOUS COMPUTING INTERACTION TO THE DEVICES IS MINIMUM OR ZERO IN .

 * Bookmark
 * Report
 * Discuss

 * M2M
 * H2M
 * M2H
 * H2H


33. HUMAN / USER INTERACTION TO THE DEVICES IS MAXIMUM IN .

 * Bookmark
 * Report
 * Discuss

 * M2M
 * H2M
 * M2H
 * H2H


34. ENABLE COMPUTER-BASED SERVICES TO BE MADE AVAILABLE EVERYWHERE.

 * Bookmark
 * Report
 * Discuss

 * Real Time Syst
 * Embedded Syste
 * Distributed Systems
 * Ubiquitous Systems


35.                            SYSTEMS THAT ARE SELF GOVERNING AND ALSO THEY ARE
CAPABLE OF TAKING THEIR OWN INDEPENDENT DECISIONS AND

 * Bookmark
 * Report
 * Discuss

 * Autonomy
 * Distributed
 * Networked
 * Context aware


36. SUBSCRIBE TO BEING NOTIFIED WHEN SPECIFIED EVENTS OCCUR.

 * Bookmark
 * Report
 * Discuss

 * Layered model
 * Pipe-filter mode
 * Event-drivenAction or EDA Model
 * Shared data repositories


37. IS ALSO KNOWN AS PUBLISH-AND-SUBSCRIBE INTERACTION.

 * Bookmark
 * Report
 * Discuss

 * Layered model
 * Pipe-filter mode
 * Event-driven Action or EDA
 * Shared data repositories


38. RE-INVOKE, UPDATE DESCRIPTIONS, RECONFIGURATION AND UPDATE COMPOSITION ARE
INCLUDED IN PHASE OF SERVICE PROVISION LIFE CYCLE.

 * Bookmark
 * Report
 * Discuss

 * Service creatio
 * Service operatio
 * Service maintenanc
 * Service dissolution


39. TERMINATE AND REMOVE REGISTRATIONS ARE INCLUDED IN
                               PHASE OF SERVICE PROVISION LIFE CYCLE.

 * Bookmark
 * Report
 * Discuss

 * Service creatio
 * Service operatio
 * Service maintenanc
 * Service dissolution


40. INVOKE AND COORDINATE ARE INCLUDED IN PHASE OF SERVICE PROVISION LIFE CYCLE.

 * Bookmark
 * Report
 * Discuss

 * Service creatio
 * Service operatio
 * Service maintenanc
 * Service dissolution


41. ANNOUNCEMENT, DISCOVERY, SELECTION, CONFIGURATION AND COMPOSITION ARE
INCLUDED IN PHASE OF SERVICE PROVISION LIFE CYCLE.

 * Bookmark
 * Report
 * Discuss

 * Service creatio
 * Service operatio
 * Service maintenanc
 * Service dissolution


42. THE DRIVE TO SWITCH TRANSISTORS FASTER AND TO BE LOW-POWERED HAS BEEN TO
MAKE THEM SMALLER WHERE ELECTRONIC COMPONENTS APPROACH NANOMETER SIZES IS CALLED
AS                                

 * Bookmark
 * Report
 * Discuss

 * Nano- computing
 * MEMS
 * Semacode
 * Ubiquitous Systems


43. IS BASED UPON A BROADER RANGE OF MATERIALS,

 * Bookmark
 * Report
 * Discuss

 * Nano-
 * MEMS
 * Semacode
 * Ubiquitous Systems


44. MICRON- TO MILLIMETRE-SCALE ELECTRONIC

 * Bookmark
 * Report
 * Discuss

 * Nano-
 * MEMS
 * Semacode
 * Ubiquitous


45. IN THE USER REQUESTS THE SYSTEM TO CARRY OUT A CERTAIN

 * Bookmark
 * Report
 * Discuss

 * eHCI
 * iHCI
 * CCI
 * HHI


46. INDICATES INCREASING CAPABILITY FOR MORE INTEROPERABLE DISTRIBUTED MOBILE
DEVICES

 * Bookmark
 * Report
 * Discuss

 * Smart Devices
 * Smart Environments
 * Smart Interactions


47. CAN BE SPRAYED & EMBEDDED THROUGHOUT THE DIGITAL ENVIRONMENT

 * Bookmark
 * Report
 * Discuss

 * Smart Dust
 * Smart Skin
 * Smart Clay


48. DIGITAL SIGNATURES COMBINED WITH DIGITAL CERTIFICATES PROVIDE
                         BY GIVING THE RECIPIENT(S) A WAY TO TIE THE MESSAGE TO
AN INDIVIDUAL OR ENTITY WHO SIGNED THE MESSAGE.

 * Bookmark
 * Report
 * Discuss

 * Authenticity
 * Integrity
 * Encryption
 * Availability


49.                                TRANSFORMS MEANINGFUL DATA INTO WHAT LOOKS
LIKE GIBBERISH USING A SECRET THAT CAN ALSO BE USED TO REVERSE THE PROCESS.
REVERSING THE PROCESS IS CALLED

 * Bookmark
 * Report
 * Discuss

 * Encryption, Decryption
 * Encryption, Availability
 * Authentication, Encryption
 * Confidentiality, Encryption


50. ENSURES THAT THE MESSAGE REALLY CAME FROM THE SUPPOSED SENDER.

 * Bookmark
 * Report
 * Discuss

 * Authenticity
 * Integrity
 * Encryption
 * Availability


ENJOYED THE QUIZ. SHARE THIS WITH FRIENDS

Facebook Twitter Instagram Linkedin Youtube


COMMENTS






ADD YOUR REVIEW

Your email address will not be published.

Name:*
Email:*
Subject:*
Review:*


Ask a Question
Ask a Question and Earn 5 points


BOOK NOW & GET 50% DISCOUNT

Date of Expires 05/08/2019
How to use? Just show us this coupon on a screen

Coupon Code

DL76T



QUICK CONTACT TO HELP?

For any Query regarding a website or any issue please contact with us we are
here for solving your problem 24/7

 * 
 * 
 * 
 * 
 * 

Contact Us Now



RELATED MCQ'S

LARAVEL MCQ 80 QUESTIONS

REACT JS MCQ 37 QUESTIONS

ANGULARJS MCQ 93 QUESTIONS

NODE JS MCQ 57 QUESTIONS

ANGULAR 2 MCQ 0 QUESTIONS


SUBSCRIBE TO NEWSLETTER!

Subscribe to get latest updates and information.


Subscribe

COMPUTER SCIENCE

 * Programming
 * Database
 * Testing

SCIENCE

 * Physics
 * Chemistry
 * Botany
 * Zoology
 * Biology

COMMERCE

 * Accounting
 * Economics
 * Business Studies
 * Legal Studies

MATHEMATICS

APTITUDE

GENERAL KNOWLEDGE

Copyright 2022. All Rights Reserved.

Shares
Share
Tweet
Email
Share
Share
Share
Pin
Share
Share
Share