IOT - IOT MCQ PDF

Title IOT - IOT MCQ
Course computer engineer
Institution Savitribai Phule Pune University
Pages 202
File Size 3.9 MB
File Type PDF
Total Downloads 17
Total Views 154

Summary

IOT MCQ...


Description

Sinhgad Technical Education Society's RMD Sinhgad School of Engineering, Warje, Pune Department of Information Technology A.Y. 2019-20 (Sem-II) Subject: Internet of Things

Sr. No. 1

Question

Option a

6

7

8

9

10

11

12

13

14

15

16

HTTP

MQTT

MQTT stands for _____________

MQ Telemetry Things

MQ Transport Telemetry

MQ Transport Things

MQ Telemetry Transport

MQTT is better than HTTP for sending and receiving data.

TRUE

FALSE Machine to Machine and Internet of Things CoAP

a d

Machine Things SPI

c

MQTT is _________ protocol. Which protocol is lightweight?

Machine to Machine MQTT

Internet of Things HTTP

PubNub publishes and subscribes _________ in order to send and receive messages.

Network

Account

Portal

Keys

By clicking which key the PubNub will display public, subscribe, and secret keys. Pane

Demo Keyset

Portal

Network

The messageChannel class declares the _________ class attribute that defines the key string.

command_key

command-key commandkey

Key_command

_________ method saves the received arguments in three attributes.

__Init

Init__

_init_

_________ and _________ saves the publish and subscribe keys that we have generated with the PubNub Admin portal.

public_key and subscribe_key

Public-key and publickey and subscribe-key subscribekey

a d

b

a

c __Init__

Key_public and key_subscribe

_________ specifies the function that will be called when there is a new message received from the channel. _________ specifies the function that will be called on an error event.

Reconnect

Error

Connect

Callback

Callback

Error

Connect

Reconnect

_________ Specifies the function that will be called when a successful connection with the PubNub cloud.

Callback

Error

Connect

Reconnect

_________ specifies the function that will be called when a successful re-connection is completed. Callback

Error

Connect

Reconnect

Callback

Error

Connect

Reconnect

6 elements

8 elements

7 elements

3 elements

Global Sensor Network is built for _________

Reducing cost and time for development

Reducing cost and increasing time for development

Increasing cost and increasing time for development

Increasing cost and decreasing time for development

One of the main characteristics of Linked Stream Data is “Live Streaming”.

TRUE

FALSE

___________ specifies the function that will be called when the client disconnects. The number of elements in the Open IoT Architecture?

Ans

a

a

d

b

c

d

d

17

18

Option d

RESTful API

4

5

Option c

RETful API

2

3

Option b

_________ allows us to control electronic components

c

a

a

19

20

21 22

23

24

25

26

27

28 29 30 31 32 33 34 35 36

The huge number of devices connected to the Internet of Things has to communicate automatically, not via humans. What is this called? Skynet

Bot 2 Bot

Internet of Things needs a lot of network connection. What is the proposed “white Space” radio standard called?

WiMax

40

c Bluetooth

Weightless

Zigbee

CoAP protocol MQTT protocol

XMPP protocol

Which is the core wrapper of GSN?

UDP

ZeroMQWrapper

Open IoT ontology is extending the W3C SSN ontology which supports the description of the physical and processing structure of sensors. Open IoT manages the registration, data acquisition, deployment of sensors and interconnected of objects, through which network? Which environment does Global Sensor Network work on? ___________ is a community that is working together to establish an IoT architecture.

Serial

GPSTest

b d

a TRUE

FALSE

GSN

X-GSN

LSM

HTTP

C++

JAVA

HTML

C

Eclipse IoT

Red Hat

Intercloud

Bot 2 Bot

Red Hat

Intercloud

Bot 2 Bot

Red Hat

Intercloud

Eclipse Kapua

b

b

a

_________ provides a middleware and application container for IoT gateway. Eclipse Kura _________ is a modular and cloud based platform. Eclipse Kura Kapua also provides a core integration framework. TRUE _________ an open source stack for gateways and the edge. Eclipse Kapua Gateway provides the connection between _________ and _________ Cloud and controller Hundreds of Sensors provide _______ data per second. Hundreds of data Does IOT gateway provide security for the network. TRUE

a

FALSE

d a

Red Hat Network and Cloud

Intercloud Network and Controller

Hundreds of thousands of data

Tens of Hundreds of data

Eclipse Kura Controller and device Tens of thousands of data

FALSE

d a d a

LAN and HAN

HAN and PAN LAN and PAN

LAN, PAN and HAN

GPS

Message

Logging

Sensors

2 approaches

2 approaches

2 approaches

It should not have many gateways

3 approaches It should not have many devices

Complex circuit It should have can’t be handled many gateways

a

Central software management server communicates with the gateway devices in which approach? Factory Bootstrap

Server limited Bootstrap

Client Initiated Bootstrap

b Bootstrap

Which mode assumes that it is the gateway’s responsibility to connect to the central repository server?

Factory Bootstrap

Server limited Bootstrap

Client Initiated Bootstrap

Bootstrap

The feature of IoT Gateway is the ability to download updates over-the-air.

TRUE

A sensor uses which network? Gateway software should be smart enough to handle ___________ Number of approaches gateway can be installed?

Drawback of Factory Bootstrap?

39

c Intercloud

What is the sensor/protocol used in GSN? HTTP protocol

37

38

Machine 2 Machine

Network Interface Card

IP Address

MAC stands for ________

Memory Memory Area Access Control Control

Media Area Control

b

a

Hardware address is known as _________ MAC address 42

c

c

FALSE

41

d

Address Resolution Protocol Media Access Control

a

d

43

What translates IP address into MAC address?

Organizationally Unique Identifier

Address Resolution Protocol

44

Networking Hardware Address is referred with ________

IP address

MAC address

45 46 47 48 49 50

Does MAC address contain characters. MAC addresses are very useful in diagnosing network issues. On wireless networks ________ filtering is the security measure.

TRUE

MAC addresses are used as ________ IEEE standards for Institute of Electrical and Electronics Engineers. The original IEEE 802 MAC address comes from________

TRUE

Network Interface Card

Burned In Address

c

NIC

Organizationally Unique Identifier

b

FALSE

a

FALSE

a

IP

NIC

MCA

d

Network addresses

IP address

Hardware address

Burned in address

a

FALSE

TRUE

OUI

MAC address

IP Address

b Ethernet address

HTTP

c

Question

a

b

c

d

Ans

Unit 1 Which characteristics involve the facility the thing to respond in an intelligent way to a particular situation?

Intelligence

_______ empowers IoT by bringing together everyday objects.

Intelligence

The collection of data is achieved with ________ changes.

Intelligence

The number of devices that need to be managed and that communicate with each other will be much larger.

Intelligence

________ Provide the means to create capability that reflects true awareness of the physical world and people. Sensors ________ in IoT as one of the key characteristics, devices have different hardware platforms and networks. Sensors

b) Connectivit c) Dynamic y Nature b) Connectivit c) Dynamic y Nature b) Connectivit c) Dynamic y Nature b) Connectivit c) Dynamic y Nature b) Heterogene ity c) Security b) Heterogene ity c) Security b) Heterogene ity c) Security c) Presence b) Security detection c) Presence b) Security detection c) Presence b) Security detection c) Presence b) Security detection

d) Enormous Scale

a

d) Enormous Scale

b

d) Enormous Scale

C

d) Enormous Scale

d

d) Connectivity a

d) Connectivity b

d) Connectivity d) Power consumption d) Power Which challenge comes under securing the information? Signaling consumption ________ gives an exact, up to the second state of al d) Power devices on a network. Signaling consumption Which challenge comes when we use many devices on d) Power the same network? Signaling consumption ________ a cellular network is expensive, especially with d) Power many IoT devices. Signaling b) Security c) Bandwidth consumption b) Reliablity c) Standard Issue d) All issues Which of the following issues are considered in IoT? Security Issue Issue Standard b) Smart c) Standard Building Business Business d) Smart Center Center Center Building Center SBC stands for? IoT is a paradigm that involves ubiquitous presence in the environment TRUE FALSE

a

Unit 2 The IoT platforms are mainly divided into how many types

c

IoT devices are naturally vulnerable to ________ threats. Sensors Which challenge comes under IoT devices, reliable bidirectional signaling. Signaling

3 types

b) 5 types

c) 4 types

b) Internet c) Intelligent Transportat Transportation ion Security Security ITS stands for _________ In order to improve their competitiveness and services b) assurance, the ________ require independently funded eGovermnent Enterprise- c) Company IoT projects. based based related . The use of RFID in product logistics may realize automatic acquisition of logistics information. True b) False Internet Travel Services

d) 2 types

c a c c d c

d

b

d) Intelligent Transportation Services d d) Business oriented platform b a

d) Individual and Integrated Information c

An IoT ________ center is envisaged as an important part of the generic IoT platform to unify the organization.

Individual Information

b) Individual c) Integrated Integration Information

The core element of architecture of smart city is ________

Mobile Unified Service

d) Integrated c) b) Urban Application Management Information Provider center Platform

d

The core element is operated by ________

PaaS

b) IoT service Provider

Who will use their own IoT business models? IoT promotes the creation of IoT terminal industry ________ Supplementary platforms in the architecture provide support for these services.

PaaS

b) SaaS

Devices

b) Network c) Clusters

Fog computing can be perceived in ___________ and ____________

TRUE

c) SaaS c) IaaS

b) Cloud c) Edge computing computing

. ____________ are rudimentary form of computing. Unit 3 ___________ enables production-ready feature to the spring boot application.

Actuators

_________ should be added to start the existing actuators in boot.

spring-bootactuator

__________ allows us to monitor the application. Actuators Which endpoints are sensitive? /health Using which customized endpoint will be accessed over Id and HTTP? enabled

Which devices measures gases or liquid?

Proximity sensor

b

d) Things

c a

b) SPAWAR c) APWANR b) Automobile c) Automated Automated Identificati Identification Data Identification on Data Computing Data Carriers Carriers c) Mobile Mist b) Fog cloud computing computing computing

AIDC stands for ____________

d

FALSE

c) Cloud Big data and Cloud b) Big data systems and IoT systems and IoT

Which of the following computing emphasizes proximity Mist to end user? computing ____________ is prototyping and testing a scalable. Secure Distribution Tolerant Mesh Network to protect strategic military assets. SPANAR

d) IaaS d) Service provider

d) Big data, Cloud systems and IoT

a

d) Fog computing

d

d) SPANAR

b

d) Automated Identification Device Carriers a d) Cloud computing

a

b) Endpoint c) Boot d) Hyper media a b) sprintactuator- c) boot-spring- d) actuatorboot actuator spring-boot a b) Endpoints c) Boot b) /info c) /metric b) Enabled c) Sensitive c) b) Pressure Temperature sensor sensor

d) Hypermedia b d) /trace c d) Id

d

d) Touch sensor b

Absolute Which sensor measures the pressure relative to perfect pressure sensor vacuum?

c) Vacuum pressure sensor

What is the stability of pressure sensor?

b) Gauge pressure sensor b) +/-0.5% +/-0.75% FS FS

c) +/- 0.35% FS d) +/-0.125% FS c

What is the operating voltage of pressure sensor?

3.5v

c) 5v

. ENOB stands for_________

Perfect resolution is possible when? Resolution is expressed in __________ The discrete levels available are_________

b) 1.5v

Effective no b) Effective of bits no of bytes b) sampling rate greater sampling rate greater than twice the than thrice bandwidth the bandwidth of of the signal the signal Bytes b) Bits Sides b) Edges

d) Differential pressure sensor b

d) 3v

d

c) Efficient no d) Efficient no of bits of bytes

a

d) sampling rate less than thrice the bandwidth of the signal d) Nibble d) Bytes

b b c

c) sampling rate less than twice the bandwidth of the signal c) Word c) Levels

In ______ an object of type Thread in the namespace System.Threading represents and controls one thread. Number of pins in 8051 microcontroller with ________ package.

. PY 40 pin with LLC

b) .SAP b) 60 Pin with QFP

c) .NET d) .EXE c) 40 pin with d) 60 pin with DIP QFP

c c

c) Supports in d) Won’t work some devices at some only conditions

a

Unit 4

What is the use of Thermostat in Nest Thermostat E?

b) Show the use of Save energy energy

What is the main function of Nest Thermostat E?

Change the temperature c) Change the only when b) Reduce temperature d) Powers off we are at the energy from when a person home used anywhere is not present c

Function of huge light bulb?

What is the drawback of using Lockitron?

b) To create lighting scenes based on To reduce energy and your to control favourite lightning photos b) Supports in some Wastage of devices more energy only

Sonos is a system that uses ________ wireless speakers. Wifi

c) To reduce energy and to create lighting scenes based on your favourite photos and to control lightning

d) To controlling lightning and to create lighting scenes based on your favourite photos c

c) Won’t work d) Tough at some installation conditions c) Zigbee

What is the facility Sonos provides?

It provides high quality 3D audio

b) Hifi b) Can here only to a restricted area

Call connectivity

d) Choose to play what you want in different rooms d

Smart Fitness clothing mainly has which device?

Battery

b) Bluetooth

c) Sensors

d) Internet

c

There are efficiency gains from ________ all sorts of equipment.

Implementat b) Analogous c) Evolution ion

d) Digitization

d

SLA stands for ____________

b) Security Service Level Level c) System Agreement Agreement Local Area

d) Service Local Area a

The availability of ________ is the cloud services provider who will host video and data for end users.

Devices

c) Security b) Memory system

With physical security, the stakes are incredibly _______ Very high

b) Low

The most likely culprit is ________

Things

b) Network c) Device

Communication between ________ and ________ is encrypted for security.

Cloud and device

. In which phase packets are forwarded hop by hop to get closer to the sink?

b) End user and data center b) Message Initialization Relaying

c) Very low

c) Network and device c) Selective recovery

d) Bluetooth

b

d) Objects d) High d) Internet connectivity

d) Cloud and Network d) Lost message detection

b

c d d

b

b

What is the last step in algorithm for reliable data transfer? Galileo Gen 2 board was developed by which company?

Which among the following is more powerful?

Initialization Atmel

b) Message Relaying b) Intel

c) Selective recovery c) Motorola

d) Lost message detection d) Dallas

c b

b) Rasberry Pi 2 R...


Similar Free PDFs