326. | Virtual Reality submerges |
A. | physical user in a virtual 3D world |
B. | Virtual 3D world into physical user |
C. | Physical user into logical world |
D. | Logical world into physical user |
Answer» A. physical user in a virtual 3D world |
327. | Which device comes under MTOS ? |
A. | WearCam p |
B. | Smart Dust and Tiny OS |
C. | WearCam |
D. | Both A & C |
Answer» D. Both A & C |
328. | Head Up Display consists of |
A. | Movable HUD |
B. | Fixed HUD |
C. | Head Mounted HUD |
D. | Both B & C |
Answer» D. Both B & C |
329. | Virtual Retinal Display (VRD) is also called as a |
A. | Retinal Secure Display |
B. | Retinal Scan Display |
C. | Retinal Scan Display |
D. | Retinal Safe Display |
Answer» B. Retinal Scan Display |
330. | EyeTap Display works on sensors. |
A. | Single |
B. | Joined |
C. | Multiple |
D. | Unlimited |
Answer» A. Single |
331. | In interface electronic circuitary conection is done to the human nervous system. |
A. | Human Computer Inteface |
B. | Brain Computer Interface |
C. | Auditory Inteface |
D. | All of the above |
Answer» B. Brain Computer Interface |
332. | Human Computer Design is phase development life cycle. |
A. | Two |
B. | Three |
C. | Four |
D. | Five |
Answer» C. Four |
333. | The user activities are derived byhaving specification of goal and plans to complete goal in action. |
A. | Planned |
B. | Situated |
C. | Concept |
D. | All |
Answer» A. Planned |
334. | Soloves taxonomy of Privacy consists of |
A. | Data collection |
B. | Data process |
C. | Data Disseminati on |
D. | All of the above |
Answer» D. All of the above |
335. | Difficulties in RFID tags are |
A. | Automatio n |
B. | Identificati on |
C. | Integration |
D. | All of the above |
Answer» D. All of the above |
336. | RFID applications undermine two classes of indivitual pricacy and . |
A. | Data Privacy, Location Privacy |
B. | Data Privacy, Migration Privacy |
C. | Location Privacy,Migr ation Privacy |
D. | Data Privacy, User Privacy |
Answer» A. Data Privacy, Location Privacy |
337. | Network address divided into and |
A. | Sub network addree and host computer address |
B. | client address and server address |
C. | mac address and ip address |
D. | None of the above |
Answer» A. Sub network addree and host computer address |
338. | IPV4 supports bit address |
A. | 32 |
B. | 64 |
C. | 128 |
D. | 256 |
Answer» A. 32 |
339. | IPV6 supports bit address |
A. | 32 |
B. | 64 |
C. | 128 |
D. | 256 |
Answer» C. 128 |
340. | PSDN stands for |
A. | Packet Secure Data Network |
B. | Packet Switch Data Network |
C. | Packet Security Data Network |
D. | All of the above |
Answer» B. Packet Switch Data Network |
341. | First types of pervasive communication networks were |
A. | Video Network |
B. | Vitual Network |
C. | Audio Network |
D. | Virtual Network |
Answer» C. Audio Network |
342. | WiMAX comes under which standard ? |
A. | IEEE 802.1 |
B. | IEEE 802.16 |
C. | Both (A) and (B) |
D. | None of the above |
Answer» B. IEEE 802.16 |
343. | Root of network tree is formed by _. |
A. | ZigBee Co- ordinator |
B. | ZigBee Router |
C. | ZigBee End Device |
D. | All of the above |
Answer» A. ZigBee Co- ordinator |
344. | is used to translate information science address. |
A. | NAT |
B. | VPN |
C. | GPS |
D. | ICT |
Answer» A. NAT |
345. | State the proper opinion : A key design issues for conyext aware system is to balance the degree of user management and awareness of proper environment. |
A. | Partially True |
B. | TRUE |
C. | FALSE |
D. | Might be True |
Answer» B. TRUE |
346. | Context Awareness is nothing but |
A. | Physical Awarenes s |
B. | Virtual Awareness |
C. | Both (A) and (B) |
D. | Person Awareness |
Answer» D. Person Awareness |
Tags
Question and answers in Ubiquitous Computing System (UCS),Ubiquitous Computing System (UCS) multiple choice questions and answers,Ubiquitous Computing System (UCS) Important MCQs,Solved MCQs for Ubiquitous Computing System (UCS),Ubiquitous Computing System (UCS) MCQs with answers PDF download