Lesson-13 Current Trends and technologies
1. The activity that we perform with use of a computer is generally termed as …………..
A) computing B) computer C) data entry D) editing
2. the usage of an electronic device capable of -
A) processing B) storing C) communicating D) all of them
3. Categories of computers include-
A) super computers,mainframe computers B) mini computers,micro computers
C) mobile computers D) all of them
4. The ……….. today have revolutionized the use of computers and require minimal space.
A) super computers B) mini computers C) mobile computers D) all of them
5. The major impact of mobility came with the availability of …………
A)laptop computers B) wireless communication systems
C) (a) and (b) D) none of them
6. PDA stands for-
A) personal Digital Assistant B) personal Digital Associate
C) physically Digital Assistant D) personal Direct Assistant
7. Which of the following is example of cellular data services?
A) Wi-Fi B) GSM C) CDMA D) (b) and (c)
8. Which of the following is an example of communication technologies?
A) Bluetooth B) Wi-Fi C) GPS D)all of them
9. GSM stands for-
A) Global system for Mass communication B) Global system for Mobile communication
C) General system for Mass communication D) General system for Mobile communication
10. CDMA stands for-
A) Code Division Many Access B) Code Division Many Allowance
C) Code Division Multiple Access D) Computer Division Many Access
11. What is the full form of GPRS?
A) General Packet Radio Service B) General Personal Radio Service
C) General Packet Radio System D) Global Packet Radio Service
12. Full form of 3G-
A) 3rd Generation B) 3rd Global C) 3rd Service D) none of them
13. …………. Computing devices are indeed one of the game changing products of recent times.
A) Smart mobile B) CDMA mobile C) PDA D) None of them
14. The typical mobile computing device has …………. As primary components.
A) software B) communication C) hardware D) all of them
15. The mobile devices today come with an in-built …………. And set of applications.
A) games B) operating systems C) contacts D) PDA
16. Which of the following are the OS of mobile?
A) Android B) iOS C) Symbian D) all of them
17. The in-buit applications allow downloading ………….
A) games
B) interactive programs
C) content of newspapers,books,magazines etc
D) all of them
18. The term communication refers to capabilities such as ………….
A) internet connectivity B) Phone usage
C) (a) and (b) D) none of them
19. The mobile computing trend has become a great success due to supporting technologies like …………
A) Wi-Fi B) 3G C) (a) and (b) D) none of them
20. Which technologies allow us to be connected to the rest of the world?
A) Wi-Fi B) 3G C) (a) and (b) D) none of them
21. ………… allow an access to uninterrupted connection to the World Wide Web.
A) 3G B) PDA C) Radio D) none of them
Std 11 EM Lesson-13 Current Trends and technologies www.verymicro.com
22. Mobile networks today supports-
A) short message service B) General Packet Radio Service
C) Multimedia Messaging Service D) All of them
23. What is the full form of SMS?
A) Short Message Service B) Simple Message service
C) Short Message System D) Short Meaning Service
24. What is the full form of MMS?
A) Multimedia Messaging System B) Multimedia Messaging Service
C) Many Messaging System D) Main Messaging System
25. WAP stands for
A) Wireless Application Protocol B) Wireless Application Program
C) Wireless Assistant Program D) None of them
26. ………… is a wireless networking protocol that allows a Wi-Fi enabled devices to communicate without use of
physical cables.
A) Broadband B) Wi-Fi C) PDA D) none of them
27. Wi-fi is an industry term used to represent wireless ………… protocol based on the 802.11 IEEE network
standards.
A) local area network B) local transfer C) local receiver D) none of them
28. What is the full form of LAN?
A) Local Area Network B) Local Assistant Network
C) Large Area Network D) None of them
29. 802.11a gives the lowest rate and has an outdoor range of ……….. meters.
A) 120 B) 250 C) 360 D) 400
30. 802.11n gives the highest data rate and has an outdoor range of ……….. meters.
A) 120 B) 250 C) 360 D) 400
31. ………… technology is used to allow the mobile phone connect to the Internet
A) GPRS B) GPS C) both (a) and (b) D) none of them
32. ………… offers a tenfold increase in data speed over the circuit switched technologies
A) GPRS B) GPS C) both (a) and (b) D) none of them
33. The terms 3G and 4G refer to third and fourth generation ………. Standards.
A) mobile communication B) laptop communication
C) e-mail communication D) none of them
34. The ………… service was based on analog signaling and reached the data speed of 19.2 Kbps.
A) 1G B) 2G C) 3G D) 4G
35. Digital networking and the service came to be known as ……….. and has data speed of approximately 1.2
Mbps.
A) 1G B) 2G C) 3G D) 4G
36. The …………….. offers powerful multimedia services that allow organization to develop applications such as
online billing systems and video conferences.
A) 1G B) 2G C) 3G D) 4G
37. The 3G service offers faster data transfers,up to speeds as high as …………. Mbps.
A) 2 B) 3 C) 4 D) 5
38. Using 3G technology it is also possible to devlop ………….
A) applications for mobile TV B) instant messaging
C) video chatting D) all of them
39. The ……….. sevices can offer download speed up to 100 Mbps and upload speed of 50 Mbps.
A) 1G B) 2G C) 3G D) 4G
40. A wireless technology called ………… came as boon for exchanging data over short distances.
A) Bluetooth B) Voice Call C) SMS D) none of them
41. It used the short wavelength radio transmissions in the ………… band for communication.
A) ASM B) GSM C) ISM D) GPS
Std 11 EM Lesson-13 Current Trends and technologies www.verymicro.com
42. ISM stands for-
A) Industrial,Scientific and Medical B) Identical,Scientific and Medical
C) Inductive,Scientific and Medical D) None of them
43. PAN stands for-
a) Personal Area Networking b) Personal Area Networks
c) Programmed Area Networks d) none of them
44. The idea of Bluetooth was initially conceived by a company named …………
a) IBM b) Sun c) Oracle d) Ericsson
45. A Bluetooth chip transmits data at a special ………….. to a receiver Bluetooth chip.
A) order B) speed C) frequently D) none of them
46. A ………… is a device that lets you make telephone calls,and also provides added features like personal Digital
Assistant (PDA), send and receive E-mails,edit Office documents,use mobile Apps,play games,tune in to
radio,stream movies,edit photos,get driving directions via GPS,instant messaging,provides Wi-Fi as well as
Bluetooth support and create a playlist of digital tunes.
A) smartphone B) pager C) digital diary D) none of them
47. Which of the following service available in smartphone?
A)send and receive E-mails B) edit office document and play games
C) tune into radio, stream movies,wi-fi D) all of them
48. The smartphone has an …………… mechanism
a) operating system b) touch screen c) (a) and (b) both d) none of them
49. A …………… is a portable and mobile computing device.
A) pendrive B) calculater C) tablet D) none of them
50. Which of the following can perform all the operations that can be performed by a mobile phone as well as a
computer?
A) virtual keyboard B) stylus pen or digital pen
C) both (a) and (b) D) none of them
51. which of the following can perform all the operation that can be performed be a mobile phone as well as a
computer?
A) Tablet B) Mobile C) Digital diary D) none of them
52. The ……….. have limitations that they need to be in the range of cellular towers.
A) cellular mobile phone B) land line phone
C) (a) and (b) D) none of them
53. Which of the communication technology will be helpful in a situation like oil exploration companies working
in high sea;we don’t have a provision of erecting a cellular tower in the middle of the sea?
A) satellite communication B) cellular tower
C) wi-fi D) none of them
54. A satellite phone more commonly known as ……………
A) satphone B) satlephone C) smartphone D) intelligent phone
55. Satphone provide functionality like-
A) voice calls B) text messaging service
C) low-bandwidth internet access D) all of them
56. What is the coverage range of satphones?
A) 100 km B) 10 km C) entire earth D) 1000 km
57. From whom permission should be taken to use satellite phone?
A) Local Police Station B) Government of Gujarat
C) Government of india D) state Government
58. Which of the following is the best oldest satellite phone operator?
A) Inmarsat B) Thuraya C) both (a) and (b) D) none of them
59. Thuraya is leading ………… service provider.
A) satellite phone B) ISP C) BSNL D) Loop
60. Thuraya’s powerful satellite enable ………….. of the world’s population to communicate using satellite phones.
A) one third B) two third C) half D) one fifth
Std 11 EM Lesson-13 Current Trends and technologies www.verymicro.com
61. ……….. allows users to have complete access of their data or resource from any part of the world.
A) Cloud computing B) store computing
C) Multiple computing D) none of them
62. The cloud computing facility is available for -
A) personal usage B) official usage C) both (a) and (b) D) none of them
63. A typical example of personal cloud computing scenario is ………..
A) Google plus B) Google drive C) Google search D) Google Ad
64. Google provides free drive space of ………… shared between Google Drive and Google+.
A) 5 GB B) 1 GB C) 5 TB D) 10 GB
65. With the help of ………. We can access photo
A) cloud computing B) store computing C) Multiple computingD)none of them
66. Which option is better than carrying a pen drive?
A) cloud computing B) store computing C) Multiple computingD)none of them
67. Which feature of cloud computing helps the user to keeps copies at multiple places?
A) Google synchronization B) Mail synchronization
C) Automatic synchronization D) None of them
68. ………… feature of cloud computing in which if user download any file using web or mobile then that will
automatically download to all the devices that are linked with cloud account.
A) Google synchronization B) Mail synchronization
C) Automatic synchronization D) None of them
69. …………. Is the personal cloud platform that allows us to keep all our digital data together.
A) Ubuntu One B) ubuntu Cloud C) Ubuntu platform D) Google One
70. Ubuntu One was launched in …………… to provide sustainable revenue for Ubuntu,the free Operating System.
A) May 2009 B) May 2010 C) March 2009 D) March 2010
71. Ubuntu, the free operating on Ubuntu One, visit …………..
A) Conical B) Canonical C) james D) Microsoft
72. To create account on Ubuntu One,visit …………….
a) https://one.ubuntu.com b) https://one.ubuntu.in
c) https://one.ubuntu.org d) https://one.ubuntu.us
73. For business,the cloud computing scenario is available in different models namely-
a) software as a service b) Infrastucture as a service
c) Platform as a service d) All of them
74. Saas stands for-
a) software as a service b) Infrastucture as a service
c) Platform as a service d) All of them
75. Iaas stands for-
a) software as a service b) Infrastucture as a service
c) Platform as a service d) All of them
76. Paas stands for-
a) software as a service b) Infrastucture as a service
c) Platform as a service d) All of them
77. CRM stands for-
A) Customer Relationship Management B) Customer Regarding Management
C) Common Relationship Management D) None of them
78. …………. Is one of the most used cloud service for customer relationship management software
a) Salesforce.com b) Cloud.com c) CRMforce.com d) none of them
79. A business organization instead of developing its own software application generally uses the software by
making ………….. to the cloud service provider.
A) software B) payment C) customer D) none of them
80. In Saas, the service provider hosts the software at its ……………, so that the company does not need to install
it.
A) web server B) web page C) web client D) web making
81. In Saas, the service provider will manage the ………….. on behalf of the company.
A) software B) payment C) hardware D) none of them
Std 11 EM Lesson-13 Current Trends and technologies www.verymicro.com
82. What is needed that allows them to connect to the software and use it?
a) Internet connection b) Telephone connection
c) Mobile connection d) None of them
83. In Saas, a business organization may hire the ………….. infrastructure as a service from the cloud service
provider instead of establishing its own physical resources.
A) software B) payment C) hardware D) none of them)
84. In Saas.the hardware at cloud is used to support different operations such as-
A) computation and storage B) printing and backup
C) networking components D) all of them
85. In Saas.the service provider owns all the equipments and is responsible for -
A) housing B) running C) maintaining D) all of them
86. Some of the IaaS providers are
A) Windows Azure Virtual Machines B) Google Compute Engine
C) Hp cloud D) all of them
87. In Paas, a business organization here is generally a …………. Company that creates the software using tool
and/or libraries from the service provider.
A) software B) hardware C) both (a) and (b) D) none of them
88. In Paas, the service provider provides the …………. And other services that are required for developing
software.
A) networks B) servers C) storage D) all of them
89. Which model facilitates the deployment of software applications without the cost and complexity of buying
and managing the underlying hardware and software and provisioning hosting capabilities?
A) IaaS B) SaaS C) Paas D) BaaS
90. What is/are the key characteristics of cloud computing ?
A) off site B) accessed over the internet
C) minimal IT knoeledge is required D) all of them
91. One of the major problems in ubiquitous computing domain is the identification of the objects like a-
A) specific computer B) sensor C) (a) or (b) D) none of them
92. What is the full form of RFID?
a) Radio Frequency Identification b) Radio Frequent Identification
c) Radio Frequency Identical d) None of them
93. Which of the following are techniques used for identifying objects?
a) Radiofrequency Identification and Biometrics
b) Global positioning system
c) speech Recognition
d) all of them
94. RFID Consists of …………. Parts.
A) two B) three C) four D) five
95. RFID is Consists of-
A) an antenna B) a transceiver C) transponder D) all of them
96. In Radiofrequency, …………. Is used to generate radio frequency signals within a relatively short range.
A) an antenna B) a transceiver C) transponder D) none of them
97. What is the range of antenna used to generate radio frequency signals within a relatively short range.
A) 10 cm to 200 m B) 1 m to 2000 m C) 100 cm to 200 cm D) 10 m to 200 m
98. In RFID, the antenna may be …………. And virtually can be mounted on any surface from a computer to a wall.
A) handheld B) fixed C) (a) or (b) D) none of them
99. The ………… reads the radio frequency signal and transfers the information to a processing device generally a
radio frequency reader.
A) an antenna B) a transceiver C) transponder D) all of them
100. ……….. simply works as a decoder to internet the data that is stored in the transponder.
A) Radio frequency reader B) Radio frequency writer
C) Radio frequency identifier D) None of them
101. The …………. Is the RFID tag that is attached to the object.
A) an antenna B) a transceiver C) transponder D) all of them
Std 11 EM Lesson-13 Current Trends and technologies www.verymicro.com
102. The ………….. is a programmed microchip and is capable of storing information of around 2000 bytes or less.
A) tag B) antenna C) transceiver D) sim
103. The tag is a programmed microchip and is capable of storing information of around …………..
A) 5 MB B) 5 KB or more C) 2,000 bytes or less D) 1 GB
104. The tags can be …………..
a) Active b) Passive c) (a) or (b) d) none of them
105. Which tags do not require battery for working ?
a) Active b) Passive c) (a) or (b) d) none of them
106. Which tags come along with their own battery ?
a) Active b) Passive c) (a) or (b) d) none of them
107. The transmission of data from RFID tag happens only when the tag passes through the field of the scanning
……………
A) an antenna B) a transceiver C) transponder D) all of them
108. The tag detects the ……….. from the antenna, this activates the RFID tag, and it transmits the information on
its microchip to be picked up by the scanning antenna.
A) activation signal B) red signal C) coming signal D) green signal
109. The RFID systems are used in many applications like -
A) tracking parts for just-in-time manufacturing
B) tracking purchase of customers in shopping malls
C) (a) and (b)
D) none of them
110. In which year, Beijing Summer Olympic Games RFID technology was used for high tech ticketing and food
tracking?
A) 2005 B) 2006 C) 2007 D) 2008
111. ……….. embedded tickets in Beijing games were intended to battle counterfeiting of tickets, to provide
speedy entry for visitors at venue gates and to guard against unauthorized access to specific areas of the
Olympics compound.
A) RFID B) RIFD C) RFFD D) RIID
112. ………… tracking has been one of the earliest applications of RFID.
A) Animal B) Signal C) Mobile D) None of them
113. What attached onto a livestock in form of earring, neck belt etc or implanted inside livestock as radio signals
do not harm the body ?
A) RFID tag B) HTML tag C) RIFD tag D) None of them
114. Which technology is used to track constantly moving herds?
A) RFID B) RIFD C) RIDI D) None of them
115. The ………… usage helps monitoring health of the animals and to keep individual medication and vaccination
records, and prevent the spread of disease by tracking and segregating infected livestock at early stages.
A) RFID B) Biometric C) meal D) health meter
116. Which technology used in library for tracking the movement of books and theft detection?
A) RFID technology B) RIFD technology C) RIDI technology D) none of them
117. The RFID based library system, consist of smart ………… used instead of normal bar codes, the RFID reader
(fixed or hand held) and library management software.
A) RFID labels B) Biometrics labels C) Iris Recognition D) None of them
118. The label has a …………. That stores information about the book including a unique accession number to
identify each entity.
A) small antenna B) tiny chip C) (a) and (b) D) none of them
119. The information contained on microchips in the labels can be read from any place within the library using
………….
A) RFID scanner/reader B) Biometric reader
C) Barcode reader D) none of them
120. A ………… can be moved rapidly across a shelf of books to read all of the unique identification information.
A) hand held reader B) flat bed reader C) scanner D) none of them
Std 11 EM Lesson-13 Current Trends and technologies www.verymicro.com
121. In case someone forgets to remove the RFID tag and tries to take of the things forcibly …………..
A) the alarm is raised B) police alarm is raised
C) expire D) none of them
122. The supermarkets have shopping cart has a-
A) touch screen monitor
B) client card automatic reader
C) a positioning transmitter and a product and a product reader
D) all of them
123. With the help of ………., the customer is directed to the shelves or places where the products in list can be
found.
A) cart’s navigation trolley B) cart’s navigation system
C) cart’s moving system D) cart’s locator
124. Which of the following methods are used to control the access?
A) access rights B) password protection
C) encryption D) all of them
125. For better access control a new technique known as ……….. is now being extensively used in many
applications.
A) Biometrics B) RFID C) IRIS Recognition D) none of them
126. ……….. generally involves identification of humans based on their characteristics or behavior.
A) Biometrics B) RFID C) IRIS Recognition D) none of them
127. Human body characteristics includes -
A) fingerprints,eye retinas and irises B) voice patterns,facial patterns
C) signature and hand measurements D) all of them
128. A biometric system generally is made of …………… components
A) three B) four C) five D) six
129. In Biometrics, what is used to collect the data ?
A) sensor B) data storage C) decision process D) none of them
130. ………… performs quality control activities and develops the biometric pattern.
A) sensor B) set of signal processing algorithms
C) Data storage D) a decision process
131. …………. Keeps information to compare the new biometrics patterns with.
A) sensor B) set of signal processing algorithms
C) Data storage D) a decision process
132. A …………. Does the actual comparison.
A) sensor B) set of signal processing algorithms
C) matching algorithm D) a decision process
133. ………….. uses the result from the matching algorithm to make decisions.
A) sensor B) set of signal processing algorithms
C) matching algorithm D) a decision process
134. A decision process may be
A) automated B) human assisted C) (a) or (b) D) none of them
135. Which techniques of biometrics used in identification and authentication of users and access control?
A) fingerprint B) iris C) voice recognition D) all of them
136. …………. Has been used as an alternate to sign for more than century now.
A) fingerprint B) iris C) voice recognition D) all of them
137. A person who does not know how to write puts his/her ………… on legal document to create its impression on
the document with the help of ink pad.
A) signature B) thumb C) money D) none of them
138. Which of the following are government applications of finger print recognition?
A) Passport Control B) AADHAR Ration Card
C) Driver’s License D) All of them
Std 11 EM Lesson-13 Current Trends and technologies www.verymicro.com
139. Which of the following are forensic applications of finger print recognition?
A) Criminal Investigation B) Terrorist Identification
C) Corpse Identification D) All of them
140. Which of the following are commercial applications of finger print recognition?
A) Electronic Data Security B) ATM Cards,Debit Card
C) Personal Digital Assistant D) all of them
141. Which of the following are smart cards?
A) ATM Card B) Debit Card C) (a) and (b) D) None of them
142. The ……….. is a muscle within the eye that regulates the size of the pupil and controls the amount of light
entering the eye.
A) retina B) iris C) (a) and (b) D) none of them
143. It is the colored portion of the eye with coloring based on the amount of ……….. pigment within the muscle.
A) melatonin B) red C) green D) yellow
144. The characteristics of iris ………… after surgeries.
A) change after 5 years B) change after 12 years
C) change after 59 years D) do not change
145. IRIS has ………… unique characteristics.
A) 212 B) 253 C) 266 D) 279
146. The iris recognition systems used in the market uses up to ………… characteristics.
A) 151 B) 173 C) 195 D) 217
147. The primary visible characteristic of the iris is the ……………., tissue which gives the appearance of dividing the
iris radically.
A) trabecular meshwork B) red colour
C) green colour D) none of them
148. Iris relies heavily on ………….. imaging to take such a picture.
A) infrared B) bluetooth C) digital D) none of them
149. IRIS recognition application are-
A) Anti-theft device B) Biometric Key Cryptography
C) Aviation security D) All of them
150. …………. Recognition is a biometric technique that uses an individual’s voice as input to control the activity.
A) IRIS B) Fingerprint C) Voice or speech D) All of them
151. Voice or speech recognition relies on features influenced by -
A) biological structure of an individual’s vocal tract
B) the behavioural characteristics of the individual
C) (a) and (b)
D) none of them
152. Which technology used by banks to verify identity of the caller when making telephone tensactions and
performing account maintenance?
A) IRIS B) Fingerprint C) Voice or speech D) All of them
153. In …………… science it is used to determine the truthfulness of responses a witness gives as part of an
investigation.
A) forensic B) life C) (a) and (b) D) none of them
154. In the training period the voice sample is first converted from an …………
A) Analog format to digital format B) digital format to analog format
C) analog format to analog format D) none of them
155. Application are for routing of regular callers to appropriate departments or person based on their voice
match which is used in customer service segment-
A) Call steering B) playing back simple information
C) Automated identification of caller D) Voice enabled operations
156. Application areas of voice / speech recognition used as forensics to identify the voice of a person-
A) Call steering B) playing back simple information
C) Automated identification of caller D) Voice enabled operations
Std 11 EM Lesson-13 Current Trends and technologies www.verymicro.com
157. ………… is used in customer service segment to identify the caller.
A) Call steering B) playing back simple information
C) Automated identification of caller D) Voice enabled operations
158. Full form of IVR-
a) Interactive Voice Response b) Intelligent Voice Response
c) Integrated Voice Response d) None of them
159. ………….. is an improvisation in IVR and automated cal handling systems that are often unpopular with
customers.
A) Removing Interactive Voice Response menus
B) playing back simple information
C) Automated identification of caller
D) Voice enabled operations
160. …………. Enables the user to dial a number or perform an operation on mobile phones by issuing a voice
command.
A) Removing Interactive Voice Response menus
B) playing back simple information
C) Automated identification of caller
D) Voice enabled operations
161. Which type of applications are very useful for blind or partially blind users?
A) Removing Interactive Voice Response menus
B) playing back simple information
C) Automated identification of caller
D) Voice enabled operations
162. The ……….. is one of the widely used systems for navigation applications.
a) Global programming System b) Global positioning System
c) General programming System d) General programming System
163. ………… is a system created by the U.S. Department of Defense.
A)GPS B) Wi-Fi C) Bluetooth D) GPRS
164. Which system consists of a network of 24 satellites placed into orbit above earth?
A)GPS B) Wi-Fi C) Bluetooth D) GPRS
165. The GPS was originally intended for military applications, but in the …………., the government made this
system available for civilian use.
A) 1980 B) 1983 C) 1987 D) 1991
166. The GPS technology has been found useful in many application areas such as-
A) fleet tracking B) cellular telephony
C) disaster relief and emergency services D) all of them
167. The GPS receiver take information and uses a process called ……….. to calculate the user’s exact location.
A) GPS Locator B) triangulation C) bi-angulation D) none of them
168. The ………….. compares the time a signal was transmitted by a satellite with the time it was received.
A) GPS receiver B) application C) GPRS receiver D) transceiver
169. To calculate only latitude and longitude the GPS receiver uses at least ………… satellites.
A) nine B) seven C) thirteen D) three
170. Which application of GPS technology is used for measuring area, preparation of digital agricultural maps and
preparation of digital land ownership maps?
A) Agriculture B) Disaster management
C) Military D) Tracking Deliveries and Shipments
171. ……….. is used in search and rescue operation, for example lost hikers and adventurers, person buried under
debris or under water can be found if they have a cell phone or GPS system that is on.
A) Agriculture B) Disaster management
C) Military D) Tracking Deliveries and Shipments
172. ………….. uses different aircrafts like fighter planes,aerial tankers,bombers etc. for accurate identification of
position of targets as well as the aircrafts.
A) Agriculture B) Disaster management
C) Military D) Tracking Deliveries and Shipments
Std 11 EM Lesson-13 Current Trends and technologies www.verymicro.com
173. Most courier services uses ………….. by GPS tracking system to monitor delivery of goods to customer
A) Agriculture B) Disaster management
C) Military D) Tracking Deliveries and Shipments
174. A company using ………….. technology can find out the current location of its vehicle.
A) Agriculture B) Disaster management
C) Military D) Tracking Deliveries and Shipments
175. ……………. Is security services to determine the exact location of the stolen vehicle or a device such as mobile
phone or a laptop equipped with GPS and can find the vehicle or device very easily.
A) Agriculture B) Disaster management
C) Recovery of stolen property D) Tracking Deliveries and Shipments
176. In ……… applications one machine works as a resource provider and the other works as a resource user.
A) client-server B) general C) man-made D) super
177. ………….. is application used to provide resources to all the client machines connected to it.
A) Filer B) File server C) File client D) Folder service
178. Fiel server is a ………… that does login authentication of the users and based on the access control policy set
by the administrator allows restricted access to a file resource.
A) machine B) program C) data D) media
179. Full form of USB-
a) Universal Serial Bus b) United Serial Bus
c) Universal System Binary d) None of them
180. Use of USB supported ………… to create additional storage for our data or simply to take a backup of our data.
A) external hard drive B) external CD drive C) external DVD drive D) none of them
181. What is the full form of NAS ?
a) Network Attached System b) Network Attached Storage
c) Network Application System d) none of them
182. ………… have been used from decades to expand the capacity of computing in an organization.
A) computers B) Network C) super computer D) Micro computer
183. A …………. Printer is a printer that is connected to a network as a device, rather that being connected to a
computer
A) network B) local C) shared D) none of them
184. Full form of SAN-
a) Storage Access Network b) Storage Area Network
c) System Access Network d) none of them
185. A ……….. is a dedicated network for storage.
a) Storage Access Network b) Storage Area Network
c) System Access Network d) none of them
186. Network printer has its unique …………. That makes it works faster than a printer shared on a computer.
A) IP address B) PP address C) NP address D) NIC address
187. ………… provides access to consolidated,block level data storage.
a) SAN b) NAS c) LAN d) MAN
188. The basic idea of SAN is to allow an application server to have uniform access to different storage devices
such as-
A) hard disk arrays B) tape libraries
C) optical storage devices D) all of them
189. SAN is a type of ………… that is designed to handle large data transfers.
a) local area network b) wide area network c) system area network d) metropolitan area network
190. ………… are require to take the benefit of SAN technology.
A) High end server’s
B) multiple disk arrays
C) fiber channel interconnection mechanism of communication
D) all of them
191. Which of the following are free online storage?
A) ADrive,Microsoft Live Sky-Drive B) 4Shared, Mozy
C) Dropbox, Box D) All of them
Std 11 EM Lesson-13 Current Trends and technologies www.verymicro.com
192. Which of the following are paid online storage?
A) IBackup, Amazon S3 B) 4Shared, Mozy
C) Dropbox, Box D) All of them
193. In which application areas of robotics, doors and windows of a house can be opened automatically based on
certain activity or commands?
A) Intelligent Home B) Military Application
C) Farming and Animal husbundry D) Vehicle Industry
194. Electronic appliances such as ………… can be pre-programmed to start,stop or change its setting in between
the operation.
A) light,fans B) heaters C) air conditioners D) all of them
195. ………… is a key to safeguard from activities happening in and around your surroundings.
A) surveillance B) Primary C) Password D) None of them
196. An ……………. is a small flying machine with the shape of bird or any other objects fitted with very high
definition cameras,sensors and communication as well as networking tools.
A) airborne drone B) aircraft C) plane D) all of them
197. …………. has succeeded in introducing the Google driverless car.
A) Yahoo B) Google C) Maruti D) Tata
198. The U.S. state of Nevada passed a law on permitting the operation of driverless cars in Neveda and
California.
a) june 29th ,2011 b) January 29th,2011 c) july 29th,2011 d) june 29th ,2012
199. The Nevada law came into effect on ……………….
a) March 1,2012 b) May 1,2012 c) March 1,2009 d) March 1,2010
200. The Nevada Department of Motor Vehicles issued the first license for a self-driven car in …………
a) May 2013 b) May 2012 c) May 2010 d) March 2012
201. The first license dor a self driven car issued to a ………… prius modified with Google’s experimental driverless
technology.
A) Toyota B) Maruti C) TATA D) Nano
202. To start with the driverless project team has equipped ………… vehicles.
A) 5 B) 10 C) 12 D) 15
203. Researchers have developed, …………. That enable nurses to lift patients without damaging their backs.
A) robotics suit B) patient suit C) (a) and (b) D) none of them
204. A robotic limb linked to tiny sensor in brain linked to tiny sensor in brain called …………..
A) BrainGate B) BrainEntry C) BrainLevel D) None of them
205. ………… works on thoughts of person rather than any physical action as well as a robotic arm that can perform
precision surgery.
A) BrainGate B) BrainEntry C) BrainLevel D) None of them
206. Robots can visit environments that are harmful to humans like -
A) vocanoes B) deep oceans C) moon D) all of them
207. What is the full form of ISRO?
a) Indian space Research Organization b) Indian System Research Organization
c) Intelligently space Research Organization d) None of them
208. ………….. was one of the unmanned moon misson launched by ISRO.
A) chandrayaan-1 B) chandrayaad-A C) chandrayaad-2 D) chandrayaad-3
209. India’s moon mission called chandrayaad-1 was launched in ………….. and operated until August 2009.
a) October-2008 b) October-2009 c) October-2007 d) October-2006
210. Full form of QRIO-
a) Quest for curiosity b) Question for curiosityc) Query for curiosity d) none of them
211. The robot manufactured by …………… called QRIO-
a) samsung b) Sony c) LG d) Nokia
212. The robot QRIO originally named …………. Robot is humanoid entertainment robot that can move freely, play
with a golf ball and can respond to verbal instruction.
a) SONY Dream b) Samsung Dream c) LG Dream d) Nokia Asha
Std 11 EM Lesson-13 Current Trends and technologies www.verymicro.com
213. The robot manufactured by ………….. called HEARBO can pick up, distinguish,and analyze multiple
simultaneous sound sources without difficulty.
a) Honda b) Sony c) Samsung d) LG
214. AI stands for -
a) Architectural Intelligence b) Artificial Intelligence
c) Artificial Inauguration d) None of them
215. The field of …………. Intends to provide a computer the ability to acquire knowledge and use it in real time
scenarios.
a) Real State b) Artificial Intelligence
c) Insurance d) Cloth Merchant
216. Example of adding AI to a computer is a ………….. program that stores the step it has taken against a
particular move of all opponents and its outcome.
A) chess B) word C) painting D) programming
217. Photography has started in …………., when William Henry Fox Talbot, combined light,paper, a few chemicals
and a wooden box to produce the first photographic print.
A) 1840 B) 1860 C) 1940 D) 1921
218. …………. Capture images as matrix of pixels.
a) Digital camera b) Coventional film camera
c) Matrix camera d) None of them
219. In which year Nokia came out with 41 megapixels camera?
a) 2009 b) 2010 c) 2011 d) 2012
220. Samsung has come up with an Adroid based camera called ……………
A) Moon B) GALAXY C) ASHA D) S5260
221. The television have also gone through a drastic technological change from ………….
A) CRT to LED B) LED to CRT C) LCD to CRT D) None of them
222. Full form of www-
a) World Wide Web b) Whole World Web c) World Wi-fi Web d) none of them
223. Internet-enabled TVs are capable of streaming data from
a) YouTube,Amazon Video-on-Demand b) Picasa Web Albums,Bloomberg News
c) Weather channel d) all of them
224. Internet-enabled televisions allow us access to ………… vast library of films and TV shows.
a) Inetflix’s b) Netflix’s c) Netmov’s d) None of them
225. …………. is one such side affect of excessive use of technology.
a) Global warming b) Local warming c) Green computing d) None of them
226. ………… is the term that signifies efficient use of computing resources.
a) Green computing b) Red computing c) Intelligent computing d) None of them
227. The main goal of …………. Computing initiative is to minimize economic viability when using a computing
initiative.
a) red b) green c) yellow d) black
228. IENERGY STAR program launched in ………….. was the first step towards green computing.
a) 1995 b) 1992 c) 1989 d) 1989
229. The ……….. mode function of computer monitors was one of the first results of green computing initiative.
a) active b) passive c) sleep d) silent
Std 11 EM Lesson-13 Current Trends and technologies www.verymicro.com