On This Page

This set of Ubiquitous Computing System UCS Multiple Choice Questions & Answers (MCQs) focuses on Ubiquitous Computing System Set 14

Q1 | Auditory interface is used when                        
  • user want to give visual input
  • user want to give written inout
  • user want to give oral input
  • All of the above
Q2 | Which of following NOT example of Natural Language Inteface(NLI)
  • SHRDLU
  • IBMLanguage Access
  • Ubiquity Add-on for Mozilla Firebox
  • All of the above are part of NLI
Q3 | Technology which is external to body and is directly attached to it is called as                    
  • Accompan ied Technolog y
  • Wearable Technology
  • Non- Wearable Technology
  • Virtual Technolog y
Q4 | Virtual Reality submerges                     
  • physical user in a virtual 3D world
  • Virtual 3D world into physical user
  • Physical user into logical world
  • Logical world into physical user
Q5 | Which device comes under MTOS ?
  • WearCam p
  • Smart Dust and Tiny OS
  • WearCam
  • Both A & C
Q6 | Head Up Display consists of                             
  • Movable HUD
  • Fixed HUD
  • Head Mounted HUD
  • Both B & C
Q7 | Virtual Retinal Display (VRD) is also called as a                   
  • Retinal Secure Display
  • Retinal Scan Display
  • Retinal Safe Display
Q8 | EyeTap Display works on                sensors.
  • Single
  • Joined
  • Multiple
  • Unlimited
Q9 | In interface electronic circuitary conection is done to the human nervous system.
  • Human Computer Inteface
  • Brain Computer Interface
  • Auditory Inteface
  • All of the above
Q10 | Human Computer Design is phase development life cycle.
  • Two
  • Three
  • Four
  • Five
Q11 | The user activities are derived byhaving specification of goal and plans to complete goal in                   action.
  • Planned
  • Situated
  • Concept
  • All
Q12 | Soloves taxonomy of Privacy consists of                   
  • Data collection
  • Data process
  • Data Disseminati on
  • All of the above
Q13 | Difficulties in RFID tags are                     
  • Automatio n
  • Identificati on
  • Integration
  • All of the above
Q14 | RFID applications undermine two classes of indivitual pricacy                   and .
  • Data Privacy, Location Privacy
  • Data Privacy, Migration Privacy
  • Location Privacy,Migr ation Privacy
  • Data Privacy, User Privacy
Q15 | Network address divided into and                     
  • Sub network addree and host computer address
  • client address and server address
  • mac address and ip address
  • None of the above
Q16 | IPV4 supports                              bit address
  • 32
  • 64
  • 128
  • 256
Q17 | IPV6 supports                              bit address
  • 32
  • 64
  • 128
  • 256
Q18 | PSDN stands for                     
  • Packet Secure Data Network
  • Packet Switch Data Network
  • Packet Security Data Network
  • All of the above
Q19 | First types of pervasive communication networks were                      
  • Video Network
  • Vitual Network
  • Audio Network
  • Virtual Network
Q20 | WiMAX comes under which standard ?
  • IEEE 802.1
  • IEEE 802.16
  • Both (A) and (B)
  • None of the above
Q21 | Root of network tree is formed by _.
  • ZigBee Co- ordinator
  • ZigBee Router
  • ZigBee End Device
  • All of the above
Q22 |                                   is used to translate information science address.
  • NAT
  • VPN
  • GPS
  • ICT
Q23 | State the proper opinion : A key design issues for conyext aware system is to balance the degree of user management and awareness of proper environment.
  • Partially True
  • TRUE
  • FALSE
  • Might be True
Q24 | Context Awareness is nothing but                        
  • Physical Awarenes s
  • Virtual Awareness
  • Both (A) and (B)
  • Person Awareness