Skip to main content

IoE (Internet of Everything) - RFID Question Bank and Solution (MCQs) for Mumbai University Examination Information Technology Semester 8 - Part 4

Hello Everyone!
This article is based on the Multiple Choice Questions related to IoE topic RFID.

These MCQs were given as question bank in Mumbai University-BE-Information Technology-Semester 8 Exam for the subject- Internet of Everything. These MCQs are related to topic Radio Frequency Identification.





Q 1) Which RFID Tag suitable for Production, monitoring and maintenance applications in Archive systems, asset management, facility management, airplanes, food and consumable goods?

a. Semi-passive
b. Passive
c. Semi-Active
d. Active

Solution: b) Passive

Q 2) Which of the following is not RFID type?

a. Low frequency
b. Ultra high frequency
c. High frequency
d. Ultra low frequency

Solution: d) Ultra low frequency

Q 3) RFID systems functions via ________ even without  ________.

a. Radio waves, indirect line-of-sight
b. FM waves, indirect line-of-sight
c. FM waves, direct line-of-sight
d. Radio waves, direct line-of-sight

Solution: d) Radio waves, direct line-of-sight

Q 4) The High frequency band (HF) of 13.56 MHz is also used by________.

a. ISO 17363
b. ISO 18000-3
c. ISO 18000-1
d. ISO 21007

Solution: b) ISO 18000-3

Q 5) RFID is a technology that uses _________ signals.

a. Radio Frequency signal
b. Electromagnetic signal
c. Microwave signal
d. All of the above

Solution: a) Radio Frequency signal

Q 6) RFID is a technology with great promise, but it invites numerous security and privacy issues Deployed naively, embedding of RFID tags in consumer items can present a serious danger to privacy and security of consumers and enterprises in the future. Some Technical Approaches to Enhancing RFID Privacy:
Cryptography, Pseudonym rotation, The “Blocker” Tag, Polite Blocking, Personal Simulator or Proxy for RFID etc.

a. True
b. False

Solution: a) True

Q 7) If we were to assign unique Electronic Product Code numbers to every item manufactured on the planet.

a. We would run out of numbers
b. We would not run out of numbers
c. Cannot say

Solution: b) We would not run out of numbers

Q 8) A good RFID reader can detect

a. Many tags in a second
b. Seven tags in one minute
c. Only one tag in one minute
d. Only one tag in two seconds

Solution: a) Many tags in a second

Q 9) A good bar code reader can read ______.

a. Many bar codes at once
b. Two bar codes at once
c. Many bar codes at the same time from a distance of several feet.
d. Only one bar code at a time

Solution: d) Only one bar code at a time

Q 10) The RFID chips are an important component of electronically-readable labels. The chips are ________.

a. SRAM
b. RAM
c. EEPROM
d. CDROM

Solution: c) EEPROM

Q 11) Which of the following statement is applicable to RFID active tags?

a. It is very cheap
b. It does not carry battery
c. It is not used in IoT
d. It carries batteries and tiny processors

Solution: d) It carries batteries and tiny processors

Q 12) _______ tags can be written several times.

a. Class 0
b. Class 1
c. Class 2
d. Class 6

Solution: b) Class 2

Q 13) The RFID reader generated electromagnetic field is called ________.

a. Continuous spike
b. Continuous wave
c. Surplus wave
d. Continuous field

Solution: b) Continuous wave

Q 14) An antenna is mounted on an RFID "reader". Which of these fields surrounds it?

a. Electrical fields
b. Cosmic ray fields
c. Both electrical and magnetic fields
d. Magnetic fields

Solution: c) Both electrical and magnetic fields

Q 15) An RFID reader is connected to a PC which has been infected with a virus. The reader is accessing passive, read only tags in its vicinity. Can the reader now "infect" the RFID tags?

a. Yes
b. No
c. Yes, under some conditions
d. Cannot say for sure

Solution: b) No

Q 16) During Reading cycle of RFID reader, the electromagnetic field overpowers any response a tag could give, so therefore tags reply on ___________ which are located directly __________ the frequency of the continuous wave.

a. Side channels, left and right
b. Side channels, below and above
c. Micro channels, front and back
d. Micro channels, left and right

Solution: b) Side channels, below and above

    

                PAGE 1   ||   PAGE 2   ||   PAGE 3   ||   PAGE 4


Comments

Popular posts from this blog

UML - Use Case Diagram for Vending Machine

Hello Everyone! Here is an example of an Use case Diagram of a Vending Machine System. Problem Statement - A vending machine accepts coins for variety of products. The user selects the drinks from products available through selection panel. If the drink is available the price of the product is displayed. The user then deposits the coins depending on the price of the product. Coin collector collects coin after stipulated time the controller will compare the deposited coin with price. If amount deposited is less than price then error message will be displayed and all deposited coin will be dispensed by the coin dispenser else the drink will be dispensed by the product dispenser. Check out other UML (Unified Modeling Language) Diagrams - Class Diagram   Object Diagram   Sequence Diagram Collaboration Diagram   Activity Diagram   State Diagram   Component Diagram   Deployment Diagram  

UML - Component Diagram for Intranet development of a college/school

Hello Everyone! Here is an example of an Component Diagram for Intranet development. Problem Statement - An intranet is a computer network for sharing information, collaboration tools, operational systems, and other computing services only within an organization. An Internet Service Provider (ISP) provides LAN services, Application services, Email services, Domain and Web hosting services to an organization. The LAN service is provided through Switch to the terminals using Ethernet and other cables. The firewall feature is provided for web applications through Application services. All the students and staff members are provided with an official email account through email services. The college has its own domain and web hosting package provided by the ISP. All these services maintain a database which is stored on server. The database server and all the services are controlled and handled by the Administrator of the college. Check out other UML (Unified Modeling Language)...

Connecting GitHub with Jenkins - Step by step Tutorial

Hello Everyone, In this tutorial, we will learn how to create a New Item (Project), connect Git and GitHub to Jenkins and run the files from the Git repository on Jenkins. Jenkins is an open-source automation tool written in Java with plugins built for Continuous Integration purposes. Jenkins is used to build and test your software projects continuously making it easier for developers to integrate changes to the project, and making it easier for users to obtain a fresh build. Facing trouble with the installation of Jenkins? Click here to know more. NOTE: It is mandatory to install plugins for Git and GitHub before connecting your GitHub repository to Jenkins. If you're using Jenkins for the first time, you need to install the plugins. To know more about these plugins, check out Git and GitHub Plugins for Jenkins . This tutorial demonstrates executing python code which requires separate plugins. Know more about Python Plugi...