Ubiquitous Computing System Set 4
On This Page
This set of Ubiquitous Computing System UCS Multiple Choice Questions & Answers (MCQs) focuses on Ubiquitous Computing System Set 4
Q1 | WiMAX provides
- simplex communication
- half duplex communication
- full duplex communication
- no communication
Q2 | Which of the following modulation schemes is supportedby WiMAX?
- binary phase shift keying modulation
- quadrature phase shift keyingmodulation
- quadrature amplitudemodulation
- all of the mentioned
Q3 | WiMAX provides
- voip services
- iptv services
- both voip andiptv services
- no iptv services
Q4 | Which of the following frequencies is not used in WiMAXfor communication?
- 2.3 ghz
- 2.4 ghz
- 2.5 ghz
- 3.5 ghz
Q5 | What is the access point (AP) in a wireless LAN?
- device that allows wireless devices to connect to a wired network
- wireless devices itself
- both device that allows wireless devices to connect to a wired
- all the nodes in the network
Q6 | Which multiple access techniqueis used by IEEE 802.11 standard for wireless LAN?
- cdma
- csma/ca
- aloha
- csma/cd
Q7 | Mostly is used in wireless LAN.
- time division multiplexing
- orthogonalfrequency division multiplexing
- space division multiplexing
- channel division multiplexing
Q8 | What is WPA?
- wi-fi protected access
- wired protectedaccess
- wired processaccess
- wi-fi process access
Q9 | InBluetooth,multiple form a network called a ------------
- scatternet; piconets
- piconets: scatternet
- piconets: bluenet
- bluenet; scatternet
Q10 | The bluetooth supports
- point-to-point connections
- point-to-multipoint connection
- both (a) and (b)
- none of the above
Q11 | Frequency range supported inZigbee .............
- 2.4 ghz worldwide
- 2.0 ghz worldwide
- 2.1 ghzworldwide
- 3.4 ghz worldwide
Q12 | There is more than ............... cellnodes in zigbee.
- 66000
- 65000
- 60000
- 70000
Q13 | ZigBee developed under ..............
- ieee 802.15.1.
- ieee 802.15.2.
- ieee 802.15.3.
- ieee 802.15.4.
Q14 | A Body Area Network or BAN consists ...............
- wireless devices to connect to a wirednetwork
- set of mobile and compact sensors
- sensors & communicationdevices
- wearable device & sensors
Q15 | Body Area Network requirements..........
- low powerconsumption & interoperability
- self-healing & security
- low latency
- all of the above
Q16 | Find out wrong stament of Body Area Network...............
- sensors are put on patient’s body to monitor heart rate, blood pressure and ecg.
- provides healthcare services over a long distance with the help of it and communication.
- sensors can be used to measure navigation, timer, distance, pulse rate and bodytemperature.
- allowing transmission of data, voice and video via a computer
Q17 | WBAN(Wireless Body Area Network) allows the user to move another without having the restriction of a cable for sharinginformation.
- true
- false
Q18 | Which of the following standard committee specifies Bluetooth and other Personal Area Networks(PAN)?
- ieee 802.11b
- ieee 802.15.2.
- ieee 802.11g
- ieee 802.16
Q19 | A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as
- chock point
- meeting point
- firewall point
- secure point
Q20 | A proxy firewall filters at
- physical layer
- data link layer
- network layer
- application layer
Q21 | A firewall needs to be so that it can grow proportionally with the network that it protects.
- robust
- expansive
- fast
- scalable
Q22 | provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected tothe private network.
- visual private network
- virtual protocol network
- virtual protocol networking
- virtual private network
Q23 | Which of the statements are not true to classify VPN systems?
- protocols used for tunnelling the traffic
- whether vpns are providing site-to-site or remote accessconnection
- securing the network from bots andmalwares
- levels of security provided for sending and receiving dataprivately
Q24 | What types of protocols are usedin VPNs?
- application levelprotocols
- tunnellingprotocols
- networkprotocols
- mailing protocols
Q25 | Which types of VPNs are used for corporate connectivity across companies residing in differentgeographical location?
- remote access vpns
- site-to-site vpns
- peer-to-peer vpns
- country-to-country vpns