On This Page

This set of Ubiquitous Computing System UCS Multiple Choice Questions & Answers (MCQs) focuses on Ubiquitous Computing System Set 7

Q1 |                                deals with the protection of an individual’s information which is implemented while using
  • Digital agony
  • Digital privacy
  • Digital secrecy
  • Digital protection
Q2 | Which of the following statements are true in case of privacy.
  • It is product of norms, legal protections and activities.
  • IT is a state type in which the identity and personal information of a person is kept confidential.
  • Privacy of anentity is the result of negotiating and enforcing when, how, to what extent and in
  • All above statements are true.
Q3 | involves the revelation of truthful
  • Breach ofconfidentially.
  • Disclosure
  • Exposure
  • Increasedaccessibility
Q4 | is breaking the promise to stay a person’s data confidential.
  • Breach of confidentially.
  • Disclosure
  • Exposure
  • Increased accessibility
Q5 | A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic-filtering rules is
  • Gateways
  • Proxy
  • Firewall
  • DNS
Q6 | In , there ought as far as possible to the accumulation of individual information and any such information ought to be gotten by legal and reasonable means and where suitable with the learning or
  • Gathering Limitation Principle
  • Information Quality Principle
  • Reason Specification Principle
  • Utilize Limitation Principle.
Q7 | In , individual information ought to be applicable to the reasons for which they are to be utilized and to the degree important for those reasons, ought to be
  • Gathering Limitation Principle
  • Information Quality Principle
  • Reason Specification Principle
  • Utilize Limitation Principle.
Q8 | In , reasons for which personal information are gathered ought to be indicated not later than at the season of information accumulation and the consequent utilize constrained to the satisfaction of those reasons or such others are not inconsistent with those
  • Gathering Limitation Principle
  • Information Quality Principle
  • Reason Specification Principle
  • Utilize Limitation Principle.
Q9 | In , individual information ought not be unveiled , made accessible or generally utilized for purposes as per purpose specification rule.
  • Gathering Limitation Principle
  • Information Quality Principle
  • Reason Specification Principle
  • Utilize Limitation Principle.
Q10 | Systems used to track and identify the location of objects in real time is                                            
  • Geolocation
  • geographicalinformation
  • WirelessApplication
  • Real-time location system (RTLS)
Q11 | Gateway to the Internet optimized for mobility
  • Voice Portal
  • Wi-Max
  • Mobile Enterprise
  • Mobile Portal
Q12 | automatically identifying a Web user's location
  • Voice Portal
  • Geolocation
  • Sensor Network
  • Wi-Max
Q13 | Computing capabilities embedded into objects around us (mobile and stationary)                            
  • pervasive computing
  • ubiquitous computing
  • Context-aware computing
  • None of above
Q14 | Computing capabilities embedded in the environment but typically not mobile
  • pervasive computing
  • Mobile Portal
  • Context-aware computing
  • None of above
Q15 | A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes                        
  • Voice Portal
  • Mobile Portal
  • Geolocation
  • Sensor Network
Q16 | short-range radio frequency communication technology for remotely storing and retrieving data using devices called RFID tags and RFID readers
  • Network Based Positioning
  • Real Time Location Systems
  • Radio Frequency Identification
  • Wireless Network
Q17 | a technology that offers Internet browsing from wireless devices
  • Real Time Location Systems
  • RFID
  • Wireless wide Area Network
  • Wireless Application Protocol
Q18 | a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology
  • Bluetooth
  • Mobile Portal
  • Wi-Max
  • Geolocation
Q19 | a wireless version of the Ethernet networking standard
  • Wireless wide area network
  • Wireless local area network
  • Personal area network
  • Body area network
Q20 | computer system capable of integrating, storing, editing, analyzing, sharing, and displaying geographically referenced (spatial) information
  • Personal area network
  • Body area network
  • Bluetooth
  • GIS
Q21 | a voice system enables users to request/receive info, enter/change data through a telephone to a computerized
  • Bluetooth
  • Real Time location Systems
  • GIS
  • Interactive Voice response
Q22 | a telecommunications network that offers wireless coverage over a large geographical area, typically over a cellular phone network
  • Bluetooth
  • Zigbee
  • Wireless Wide Area network
  • WAP
Q23 | ability to detect and react to a set of environmental variables that is described as context (which can be sensor info or
  • Mobile Portal
  • Conext Aware Computing
  • Pervasive Computing
  • Network Based positioning
Q24 | a wireless telecommunications network for device-to-device connections within a very short range
  • Wireless Wide Area Network
  • Personal Area Network
  • Wireless Local Area Network
  • Wired Network
Q25 | a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology
  • Wi-FI
  • Wi-Max
  • Bluetooth
  • Wired LAN