On This Page

This set of Ubiquitous Computing System UCS Multiple Choice Questions & Answers (MCQs) focuses on Ubiquitous Computing System Set 2

Q1 | Sandboxes ..........
  • that limit the local services that code can access.
  • which ensures that code originates from a trusted source.
  • machines that can access the internet
  • that carries explicit proof of its security.
Q2 | Code Signing .........
  • that limit the local services that code can access.
  • which ensures that code originates from a trusted source.
  • machines that can access the internet
  • that carries explicit proof of its security.
Q3 | Firewalls ............
  • that limit the local services that code can access.
  • which ensures that code originates from a trusted source.
  • machines that can access the internet
  • that carries explicit proof of its security.
Q4 | Proof Carrying Code ...............
  • that limit the local services that code can access.
  • which ensures that code originates from a trusted source.
  • machines that can access the internet
  • that carries explicit proof of its security.
Q5 | A smart card ............
  • is a plastic cardembedded with digital memory
  • which store data on magnetic strips
  • is reprogrammable
  • all of the above
Q6 | The primary tasks of a smart card operating system .............
  • transferring data to and from the smart card
  • controlling the execution of commands
  • managing and executing cryptographicalgorithms
  • all of the above
Q7 | Java Card widely used in ...........
  • sim cards
  • atm cards
  • both
  • none of the above
Q8 | The Home Electronic System (HES) defines the systemcomponents .........
  • residential gateway, homegate
  • standard interfaces
  • both
  • none of the above
Q9 | Jini consists of three Java language protocols ...............
  • discovery, join and lookup
  • discovery, configuration andlookup
  • discovery, join and installation
  • find , join and lookup
Q10 | UPnP Stands for ..........
  • united plug and play protocol
  • undirectional plug and play protocol
  • universal plug and play protocol
  • unidirectional plug and play protocol
Q11 | Benefit of UPnP .............
  • media and deviceindependence
  • platformindependence
  • internet-basedtechnologies
  • all of the above
Q12 | OSGi’s core component is ...........
  • server
  • bundle
  • node
  • gateway
Q13 | A MANIFEST.MF file located inthe ........ directory .
  • general graph directory
  • acyclic graphdirectory
  • single-level
  • meta-inf
Q14 | Service Oriented ArchitecturesFunctions ,,,,,,,,,,,,,,
  • service discovery
  • service invocation
  • servicemanagement
  • all of the above
Q15 | Service Provision Life-Cycle - Creation Phase ...........
  • service processes register themselves in service directories.
  • services are invoked and multiple interlinked services may need to becoordinated
  • service processes, access configurations and servicecompositions
  • services may be put off line or terminated temporarily or permanently.
Q16 | Service Provision Life-Cycle - Execution Phase ...........
  • service processes register themselves in service directories.
  • services are invoked and multiple interlinked servicesmay need to be coordinated
  • service processes, access configurationsand service compositions
  • services may be put off line or terminated temporarily or permanently.
Q17 | Service Provision Life-Cycle - Maintenance Phase .........
  • service processes register themselves in service directories.
  • services are invoked and multiple interlinked services may need to becoordinated
  • service processes, access configurations and servicecompositions
  • services may be put off line or terminated temporarily or permanently.
Q18 | Service Provision Life-Cycle - Dissolution Phase ...........
  • service processes register themselves in service directories.
  • services are invoked and multiple interlinked services may need to becoordinated
  • service processes, access configurations and servicecompositions
  • services may be put off line or terminated temporarily or permanently.
Q19 | Life-Cycle for Tagging Physical Objects ..............
  • capturing a physicalview or some object feature
  • identifying physical objects
  • anchoring or relating objects
  • all of the above
Q20 | Types of active RFID tags are..........
  • transmitter & receiver
  • transponders and beacons
  • transmiter & reader
  • none of the above
Q21 | Active transponders are woken up..............
  • no power source and no active transmitter
  • they typically have a read range of 20 100m
  • when they receive a signal from areader
  • none of the above
Q22 | Passive RFID - Transponders can be packaged .....
  • sandwiched between an adhesive layer and apaper label
  • embedded in a plastic card
  • both a&b
  • none of the above
Q23 | Sensors Primary Functions ..........
  • instrument and monitor environments
  • detect changes in the environment
  • control a systemwith respect to the environment
  • all of the above
Q24 | Sensors Nodes ......
  • common nodes
  • sink nodes
  • gateway nodes
  • all of the above
Q25 | Sensors Common Nodes .......
  • mainly responsible for collecting sensor data.
  • that are responsible for receiving, storing, processing, aggregating data
  • that connect sink nodes to external entities
  • none of the above