Top 350+ Solved Ubiquitous Computing System (UCS) MCQ Questions Answer

From 211 to 225 of 349

Q. There is more than ............... cellnodes in zigbee.

a. 66000

b. 65000

c. 60000

d. 70000

  • b. 65000

Q. ZigBee developed under ..............

a. ieee 802.15.1.

b. ieee 802.15.2.

c. ieee 802.15.3.

d. ieee 802.15.4.

  • d. ieee 802.15.4.

Q. A Body Area Network or BAN consists ...............

a. wireless devices to connect to a wirednetwork

b. set of mobile and compact sensors

c. sensors & communicationdevices

d. wearable device & sensors

  • b. set of mobile and compact sensors

Q. Body Area Network requirements..........

a. low powerconsumption & interoperability

b. self-healing & security

c. low latency

d. all of the above

  • d. all of the above

Q. Find out wrong stament of Body Area Network...............

a. sensors are put on patient’s body to monitor heart rate, blood pressure and ecg.

b. provides healthcare services over a long distance with the help of it and communication.

c. sensors can be used to measure navigation, timer, distance, pulse rate and bodytemperature.

d. allowing transmission of data, voice and video via a computer

  • d. allowing transmission of data, voice and video via a computer

Q. Which of the following standard committee specifies Bluetooth and other Personal Area Networks(PAN)?

a. ieee 802.11b

b. ieee 802.15.2.

c. ieee 802.11g

d. ieee 802.16

  • b. ieee 802.15.2.

Q. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as

a. chock point

b. meeting point

c. firewall point

d. secure point

  • a. chock point

Q. A proxy firewall filters at

a. physical layer

b. data link layer

c. network layer

d. application layer

  • d. application layer

Q.                      provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected tothe private network.

a. visual private network

b. virtual protocol network

c. virtual protocol networking

d. virtual private network

  • d. virtual private network

Q. Which of the statements are not true to classify VPN systems?

a. protocols used for tunnelling the traffic

b. whether vpns are providing site-to-site or remote accessconnection

c. securing the network from bots andmalwares

d. levels of security provided for sending and receiving dataprivately

  • c. securing the network from bots andmalwares

Q. What types of protocols are usedin VPNs?

a. application levelprotocols

b. tunnellingprotocols

c. networkprotocols

d. mailing protocols

  • a. application levelprotocols

Q. Which types of VPNs are used for corporate connectivity across companies residing in differentgeographical location?

a. remote access vpns

b. site-to-site vpns

c. peer-to-peer vpns

d. country-to-country vpns

  • b. site-to-site vpns

Q. uses radio-frequency waves to transfer data between a

a. Wi-Fi

b. OCR

c. Bar Code

d. RFID

  • d. RFID
Subscribe Now

Get All Updates & News