On This Page

This set of Ubiquitous Computing System UCS Multiple Choice Questions & Answers (MCQs) focuses on Ubiquitous Computing System Set 4

Q1 | WiMAX provides                  
  • simplex communication
  • half duplex communication
  • full duplex communication
  • no communication
Q2 | Which of the following modulation schemes is supportedby WiMAX?
  • binary phase shift keying modulation
  • quadrature phase shift keyingmodulation
  • quadrature amplitudemodulation
  • all of the mentioned
Q3 | WiMAX provides                
  • voip services
  • iptv services
  • both voip andiptv services
  • no iptv services
Q4 | Which of the following frequencies is not used in WiMAXfor communication?
  • 2.3 ghz
  • 2.4 ghz
  • 2.5 ghz
  • 3.5 ghz
Q5 | What is the access point (AP) in a wireless LAN?
  • device that allows wireless devices to connect to a wired network
  • wireless devices itself
  • both device that allows wireless devices to connect to a wired
  • all the nodes in the network
Q6 | Which multiple access techniqueis used by IEEE 802.11 standard for wireless LAN?
  • cdma
  • csma/ca
  • aloha
  • csma/cd
Q7 | Mostly                  is used in wireless LAN.
  • time division multiplexing
  • orthogonalfrequency division multiplexing
  • space division multiplexing
  • channel division multiplexing
Q8 | What is WPA?
  • wi-fi protected access
  • wired protectedaccess
  • wired processaccess
  • wi-fi process access
Q9 | InBluetooth,multiple                  form a network called a ------------
  • scatternet; piconets
  • piconets: scatternet
  • piconets: bluenet
  • bluenet; scatternet
Q10 | The bluetooth supports
  • point-to-point connections
  • point-to-multipoint connection
  • both (a) and (b)
  • none of the above
Q11 | Frequency range supported inZigbee .............
  • 2.4 ghz worldwide
  • 2.0 ghz worldwide
  • 2.1 ghzworldwide
  • 3.4 ghz worldwide
Q12 | There is more than ............... cellnodes in zigbee.
  • 66000
  • 65000
  • 60000
  • 70000
Q13 | ZigBee developed under ..............
  • ieee 802.15.1.
  • ieee 802.15.2.
  • ieee 802.15.3.
  • ieee 802.15.4.
Q14 | A Body Area Network or BAN consists ...............
  • wireless devices to connect to a wirednetwork
  • set of mobile and compact sensors
  • sensors & communicationdevices
  • wearable device & sensors
Q15 | Body Area Network requirements..........
  • low powerconsumption & interoperability
  • self-healing & security
  • low latency
  • all of the above
Q16 | Find out wrong stament of Body Area Network...............
  • sensors are put on patient’s body to monitor heart rate, blood pressure and ecg.
  • provides healthcare services over a long distance with the help of it and communication.
  • sensors can be used to measure navigation, timer, distance, pulse rate and bodytemperature.
  • allowing transmission of data, voice and video via a computer
Q17 | WBAN(Wireless Body Area Network) allows the user to move another without having the restriction of a cable for sharinginformation.
  • true
  • false
Q18 | Which of the following standard committee specifies Bluetooth and other Personal Area Networks(PAN)?
  • ieee 802.11b
  • ieee 802.15.2.
  • ieee 802.11g
  • ieee 802.16
Q19 | A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as
  • chock point
  • meeting point
  • firewall point
  • secure point
Q20 | A proxy firewall filters at
  • physical layer
  • data link layer
  • network layer
  • application layer
Q21 | A firewall needs to be                     so that it can grow proportionally with the network that it protects.
  • robust
  • expansive
  • fast
  • scalable
Q22 |                      provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected tothe private network.
  • visual private network
  • virtual protocol network
  • virtual protocol networking
  • virtual private network
Q23 | Which of the statements are not true to classify VPN systems?
  • protocols used for tunnelling the traffic
  • whether vpns are providing site-to-site or remote accessconnection
  • securing the network from bots andmalwares
  • levels of security provided for sending and receiving dataprivately
Q24 | What types of protocols are usedin VPNs?
  • application levelprotocols
  • tunnellingprotocols
  • networkprotocols
  • mailing protocols
Q25 | Which types of VPNs are used for corporate connectivity across companies residing in differentgeographical location?
  • remote access vpns
  • site-to-site vpns
  • peer-to-peer vpns
  • country-to-country vpns