Ubiquitous Computing System Set 3
On This Page
This set of Ubiquitous Computing System UCS Multiple Choice Questions & Answers (MCQs) focuses on Ubiquitous Computing System Set 3
Q1 | Micro-Electro-Mechanical Systems (MEMS) consists of...........
- microelectronic elements
- actuators, sensors
- mechanical structures
- all of the above
Q2 | Micro-Electro-Mechanical Systems (MEMS) developed using........... techniques
- fabrication
- microfabrication
- etching
- none of the above
Q3 | The most common forms ofproduction for MEMS are ...........
- bulk micromachining
- surfacemicromachining
- har fabrication
- all of the above
Q4 | The main components of robotsare ...........
- end effectors oractuators
- controller
- sensors
- all of the above
Q5 | Which phase is not a part of development of Human-CentredDesign Life-Cycle .
- requirement gathering and analysis
- modelling and design
- configurations & optional packages
- implementation and testing.
Q6 | Head(s) Up Display or HUD is...........
- any type of display that presents data without blocking the user’s view
- the user looks through a display element attached to the airframe or vehicle chassis
- that is worn in front of the eye that acts as a camera to record the scene available to the eye, and acts as adisplay
- none of the above
Q7 | Gestures are expressive, meaningful body motions involving physical movements of the fingers, hands, arms, head,face, or body.
- true
- false
Q8 | Sensors used in gestures ........
- magnetic field trackers
- accelerometers
- gyroscopes
- all of the above
Q9 | In Solove’s taxonomy of privacySurveillance & Interrogation is a part of ..........
- information collection
- information processing
- information dissemination
- invasion
Q10 | In Solove’s taxonomy of privacyAggregation & Identification is a part of ..........
- information collection
- information processing
- information dissemination
- invasion
Q11 | Breach of confidentiality is............
- is the threat to disclose personal information
- is breaking the promise to keep a person’s informationconfidential.
- is amplifying the accessibility of information.
- none of the above
Q12 | Decisional interference involves.............
- revealing another’s nudity, grief, or bodily functions
- the revelation of truthful information about a person
- the government’s incursion into people’s decisionsregarding their private affairs
- the dissemination of certain information about a person to servethe aims and interests of another
Q13 | RFID privacy challenges .........
- automation & identification
- identification & authentication
- integration & automation
- all of the above
Q14 | Clandestine Scanning is ..............
- the tag data is scanned without the tag carrier’s consent.
- the tag data is scanned for informationprocessing
- both a&b
- none of the above
Q15 | PSTN stands for
- public switched telephone network
- personal switched telephone network
- personal switched telephone node
- public switched telephone node
Q16 | PSTN is and wireless networks are
- highly dynamic, virtually static
- static, virtually static
- highly dynamic, virtually dynamic
- virtually static, highly dynamic
Q17 | In public switched telephone network, LATA stands for
- local access and transport area
- land area and transport area
- local access and telephone access
- local area and telephone access
Q18 | LATAs are connected by acompany called
- land exchange carrier
- local exchangecarrier
- local controlexchange
- land area exchange
Q19 | A long distance telephone company that collects toll is called
- lata
- lec
- pstn
- ixc
Q20 | The technique for separate but parallel signalling channel iscalled
- common channel signalling
- forward channel signalling
- reverse channel signalling
- separate channel signalling
Q21 | ADLS Broadband stands for
- asynchronous digital subscriber line
- asemetric digital subscriber line
- asynchronous doublesubscriber line
- asynchronous data subscriber line
Q22 | US cellular standard CDPD stands for
- cellular digital packet data
- cellular digital pocket data
- cellular discrete pocket data
Q23 | What are the Methods to movedata through a network of links and switches?
- packet switching and line switching
- circuit switching and line switching
- line switching and bit switching
- packet switching and circuit switching
Q24 | In systems, resourcesare allocated on demand.
- packet switching
- circuit switching
- line switching
- frequency switching
Q25 | WiMAX stands for
- wireless maximum communication
- worldwide interoperability for microwave access
- worldwide international standard formicrowave access
- wireless internet maximum communication