Ubiquitous Computing System Set 14
On This Page
This set of Ubiquitous Computing System UCS Multiple Choice Questions & Answers (MCQs) focuses on Ubiquitous Computing System Set 14
Q1 | Auditory interface is used when
- user want to give visual input
- user want to give written inout
- user want to give oral input
- All of the above
Q2 | Which of following NOT example of Natural Language Inteface(NLI)
- SHRDLU
- IBMLanguage Access
- Ubiquity Add-on for Mozilla Firebox
- All of the above are part of NLI
Q3 | Technology which is external to body and is directly attached to it is called as
- Accompan ied Technolog y
- Wearable Technology
- Non- Wearable Technology
- Virtual Technolog y
Q4 | Virtual Reality submerges
- physical user in a virtual 3D world
- Virtual 3D world into physical user
- Physical user into logical world
- Logical world into physical user
Q5 | Which device comes under MTOS ?
- WearCam p
- Smart Dust and Tiny OS
- WearCam
- Both A & C
Q6 | Head Up Display consists of
- Movable HUD
- Fixed HUD
- Head Mounted HUD
- Both B & C
Q7 | Virtual Retinal Display (VRD) is also called as a
- Retinal Secure Display
- Retinal Scan Display
- Retinal Safe Display
Q8 | EyeTap Display works on sensors.
- Single
- Joined
- Multiple
- Unlimited
Q9 | In interface electronic circuitary conection is done to the human nervous system.
- Human Computer Inteface
- Brain Computer Interface
- Auditory Inteface
- All of the above
Q10 | Human Computer Design is phase development life cycle.
- Two
- Three
- Four
- Five
Q11 | The user activities are derived byhaving specification of goal and plans to complete goal in action.
- Planned
- Situated
- Concept
- All
Q12 | Soloves taxonomy of Privacy consists of
- Data collection
- Data process
- Data Disseminati on
- All of the above
Q13 | Difficulties in RFID tags are
- Automatio n
- Identificati on
- Integration
- All of the above
Q14 | RFID applications undermine two classes of indivitual pricacy and .
- Data Privacy, Location Privacy
- Data Privacy, Migration Privacy
- Location Privacy,Migr ation Privacy
- Data Privacy, User Privacy
Q15 | Network address divided into and
- Sub network addree and host computer address
- client address and server address
- mac address and ip address
- None of the above
Q16 | IPV4 supports bit address
- 32
- 64
- 128
- 256
Q17 | IPV6 supports bit address
- 32
- 64
- 128
- 256
Q18 | PSDN stands for
- Packet Secure Data Network
- Packet Switch Data Network
- Packet Security Data Network
- All of the above
Q19 | First types of pervasive communication networks were
- Video Network
- Vitual Network
- Audio Network
- Virtual Network
Q20 | WiMAX comes under which standard ?
- IEEE 802.1
- IEEE 802.16
- Both (A) and (B)
- None of the above
Q21 | Root of network tree is formed by _.
- ZigBee Co- ordinator
- ZigBee Router
- ZigBee End Device
- All of the above
Q22 | is used to translate information science address.
- NAT
- VPN
- GPS
- ICT
Q23 | State the proper opinion : A key design issues for conyext aware system is to balance the degree of user management and awareness of proper environment.
- Partially True
- TRUE
- FALSE
- Might be True
Q24 | Context Awareness is nothing but
- Physical Awarenes s
- Virtual Awareness
- Both (A) and (B)
- Person Awareness