IT1452 Fundamentals Of Pervasive Computing B.E Question Bank : roeverengg.edu.in
Name of the College : ROEVER ENGINEERING COLLEGE
University : Anna University
Subject Code/Name : IT1452 – Fundamentals Of Pervasive Computing
Dept : Information Technology
Degree : BE
Sem: VIII
Website : roeverengg.edu.in
Document Type : Question Bank
Download Model/Sample Question Paper : https://www.pdfquestion.in/uploads/roeverengg.edu.in/3364-IT1452%20-%20FUNDAMENTALS%20OF%20PERVASIVE%20COMPUTING%202MARS.pdf
ROEVER Pervasive Computing Question Paper
UNIT – I
PART –A : (1 MARK)
1. A computer communication technology that provides a way to interconnect multiple computer across short distance is
a. LAN b. MAN c. WAN d. Wireless network
2. What is the standard for Ethernet
a. IEEE 802.1 b. IEEE 802.2 c. IEEE 802.3 d. IEEE 802.5
3. What type of Ethernet is 10BASE 5
a. thick b. thin c. moderate d. none of the above
4. 1000Mbps of LAN is known as
a. fast Ethernet b. gigabit Ethernet c. thick Ethernet d. thin Ethernet
5. IEEE 802.5 is a standard for
a. Ethernet b. token bus c. wireless LAN d. token ring
6. The total number of class of IP address are
a.1 to 127 b. 127 to 191 c.224 to 239 d. 192 to 223
7. Which of the following are regarded as WAN
a. frame relay b. slip c. IEEE 802.5 D. x.25
8. HTTP transfer data in
a.LAN b. MAN c. WAN d. all the above
9. A network is defined as
a.Set of points b.An area of working c.Set of nodes or devices d.None of the above
10. If a network genarates only a minimum (less frequent)numbers of failure between the nodes it is called as
a.Reliable network b.Secured network c.Non secured network d.Local area network
UNIT – II
11. HIPERLAN is a standard used for
a.WLAN b.LAN alone c.MAN alome d.LAN and MAN
12. DHCP stands for
a. Dynamic Host Control Protocol b. Dynamic Host Configuration Protocol.
c. Dynamic Host Connect ion Protocol. d. None of the above.
13. Protocol used to monitor and control network devices operates at :
a. Application layer b. Transport layer c. Network layer d. Data Link layer
14. FTP does not use
a. Two transfer mode. b. Control connect ion to remote computer before file can be transferred c. User Datagram Protocol. d. Authorization of a user through login and password verification.
15. Kerberos is an encryption-based system that uses
a. Secret key encryption b. Public key encryption
c. Private key encryption d. Data key encryption
16. SMTP is a
a. Networking Protocol b. Protocol used for transferring message between end user & Mail Server c. Protocol used for smart card message interchange d. Encryption Standard
17. HTML is a
a. Programming Language b. Scripting Language c. Web Browser d. Network Protocol
18. Mechanism to protect private networks from outside attack is
a.Firewall b. Antivirus c. Digital signature d. formatting
19. Which type of web document is run at the client site
a. Static b. Dynamic c. Active d. All of the above
20. The main function of a browser is to
a. compile HTML b. interpret HTML c. de-compile HTML d. interpret CGI program
PART –B :
(2MARKS)
21. Define pervasive computing. (AU-APR/MAY 2011)
** Everywhere, anywhere, always on, anytime Pervasive computing is the third wave of computing technologies to emerge since computers first appeared.
** Pervasive – all around us, Human Centered, Computers should adapt to the humans
** Computations enter our world, Better ways of Computer-Human interaction
22. What are the ways of pervasive computing approach?
First Wave-Mainframe computing era: 1computer shared by many people, via workstations.
Second Wave – Personal computing era: one computer used by one person, requiring a conscious interaction. Users largely bound to desktop.
Third Wave–Pervasive (initially called ubiquitous) computing era: 1person, many computers.
23. What is the aim of ubiquitous computing? (AUT-NOV/DEC 2012)
** The aim of ubiquitous computing is to design computing infrastructures in such a manner that they integrate seamlessly with the environment and become almost invisible.
** Present Everywhere Bringing mobile, wireless and sensor Ubiquitous computing (ubicomp) integrates computation into the environment, rather than having computers which are distinct objects
24. What are the principles of pervasive computing?
** Creation of environments saturated with computing and communication capability, yet gracefully integrated with human users.
** The purpose of a computer is to help you do something else.
** The best computer is a quiet, invisible servant. Technology should create calm.
** Calm technology- A technology that which informs but doesn’t demand our focus/ attention
** Pervasive computing integrates computation into the environment, rather than having computers which are distinct objects.