Ubiquitous Computing System Set 2
On This Page
This set of Ubiquitous Computing System UCS Multiple Choice Questions & Answers (MCQs) focuses on Ubiquitous Computing System Set 2
Q1 | Sandboxes ..........
- that limit the local services that code can access.
- which ensures that code originates from a trusted source.
- machines that can access the internet
- that carries explicit proof of its security.
Q2 | Code Signing .........
- that limit the local services that code can access.
- which ensures that code originates from a trusted source.
- machines that can access the internet
- that carries explicit proof of its security.
Q3 | Firewalls ............
- that limit the local services that code can access.
- which ensures that code originates from a trusted source.
- machines that can access the internet
- that carries explicit proof of its security.
Q4 | Proof Carrying Code ...............
- that limit the local services that code can access.
- which ensures that code originates from a trusted source.
- machines that can access the internet
- that carries explicit proof of its security.
Q5 | A smart card ............
- is a plastic cardembedded with digital memory
- which store data on magnetic strips
- is reprogrammable
- all of the above
Q6 | The primary tasks of a smart card operating system .............
- transferring data to and from the smart card
- controlling the execution of commands
- managing and executing cryptographicalgorithms
- all of the above
Q7 | Java Card widely used in ...........
- sim cards
- atm cards
- both
- none of the above
Q8 | The Home Electronic System (HES) defines the systemcomponents .........
- residential gateway, homegate
- standard interfaces
- both
- none of the above
Q9 | Jini consists of three Java language protocols ...............
- discovery, join and lookup
- discovery, configuration andlookup
- discovery, join and installation
- find , join and lookup
Q10 | UPnP Stands for ..........
- united plug and play protocol
- undirectional plug and play protocol
- universal plug and play protocol
- unidirectional plug and play protocol
Q11 | Benefit of UPnP .............
- media and deviceindependence
- platformindependence
- internet-basedtechnologies
- all of the above
Q12 | OSGi’s core component is ...........
- server
- bundle
- node
- gateway
Q13 | A MANIFEST.MF file located inthe ........ directory .
- general graph directory
- acyclic graphdirectory
- single-level
- meta-inf
Q14 | Service Oriented ArchitecturesFunctions ,,,,,,,,,,,,,,
- service discovery
- service invocation
- servicemanagement
- all of the above
Q15 | Service Provision Life-Cycle - Creation Phase ...........
- service processes register themselves in service directories.
- services are invoked and multiple interlinked services may need to becoordinated
- service processes, access configurations and servicecompositions
- services may be put off line or terminated temporarily or permanently.
Q16 | Service Provision Life-Cycle - Execution Phase ...........
- service processes register themselves in service directories.
- services are invoked and multiple interlinked servicesmay need to be coordinated
- service processes, access configurationsand service compositions
- services may be put off line or terminated temporarily or permanently.
Q17 | Service Provision Life-Cycle - Maintenance Phase .........
- service processes register themselves in service directories.
- services are invoked and multiple interlinked services may need to becoordinated
- service processes, access configurations and servicecompositions
- services may be put off line or terminated temporarily or permanently.
Q18 | Service Provision Life-Cycle - Dissolution Phase ...........
- service processes register themselves in service directories.
- services are invoked and multiple interlinked services may need to becoordinated
- service processes, access configurations and servicecompositions
- services may be put off line or terminated temporarily or permanently.
Q19 | Life-Cycle for Tagging Physical Objects ..............
- capturing a physicalview or some object feature
- identifying physical objects
- anchoring or relating objects
- all of the above
Q20 | Types of active RFID tags are..........
- transmitter & receiver
- transponders and beacons
- transmiter & reader
- none of the above
Q21 | Active transponders are woken up..............
- no power source and no active transmitter
- they typically have a read range of 20 100m
- when they receive a signal from areader
- none of the above
Q22 | Passive RFID - Transponders can be packaged .....
- sandwiched between an adhesive layer and apaper label
- embedded in a plastic card
- both a&b
- none of the above
Q23 | Sensors Primary Functions ..........
- instrument and monitor environments
- detect changes in the environment
- control a systemwith respect to the environment
- all of the above
Q24 | Sensors Nodes ......
- common nodes
- sink nodes
- gateway nodes
- all of the above
Q25 | Sensors Common Nodes .......
- mainly responsible for collecting sensor data.
- that are responsible for receiving, storing, processing, aggregating data
- that connect sink nodes to external entities
- none of the above