IOT Mcq of E&TC FINAL YEAR PDF

Title IOT Mcq of E&TC FINAL YEAR
Author Khushraj Chaudhari
Course Electronics Engineering
Institution Savitribai Phule Pune University
Pages 26
File Size 297.9 KB
File Type PDF
Total Downloads 93
Total Views 129

Summary

iot mcq...


Description

Unit I : Fundamentals of IoT & Unit II :Sensors Networks 1.

_________ allows us to control electronic components a) RETful API b) RESTful API c) HTTP d) MQTT Answer: a Explanation: RETful API that allows us to control electronic components connected to our Intel Galileo Gen 2 board through HTTP requests.

2.

MQTT stands for _____________ a) MQ Telemetry Things b) MQ Transport Telemetry c) MQ Transport Things d) MQ Telemetry Transport Answer: d Explanation: MQTT was known as MQ Telemetry Transport protocol. MQTT is a lightweight protocol that runs on top of the TCP/IP protocol.

3.

MQTT is better than HTTP for sending and receiving data. a) True b) False Answer: a Explanation: W e want to send and receive data in real time through internet and RESTful API is not the most appropriate option to do this. Instead, we will work on MQTT wh ich is lighter than HTTP.

4.

MQTT is _________ protocol. a) Machine to Machine b) Internet of Things c) Machine to Machine and Internet of Things d) Machine Things Answer: c Explanation: The MQTT protocol is a machine to machine and Internet of thing connectivity protocol.

5.

W hich protocol is lightweight? a) MQTT b) HTTP c) CoAP d) SPI

Answer: a Explanation: MQTT is a lightweight protocol that runs on top of the TCP/IP protocol and works with publish subscribe mechanism. 6. PubNub publishes and subscribes _________ in order to send and receive messages. a) Network b) Account c) Portal d) Keys Answer: d Explanation: It is necessary to generate our PubNub publishes and subscribes keys in order to send and receive messages in the network.

7. By clicking which key the PubNub will display public, subscribe, and secret keys. a) Pane b) Demo Keyset c) Portal d) Network Answer: b Explanation: Click on Demo keyset pane and PubNub will display public, subscribe, and secret keys. We must copy and paste each of these keys to use them in our code that will publish messages and subscribe to them. 8. The number of elements in the Open IoT Architecture? a) 6 elements b) 8 elements c) 7 elements d) 3 elements Answer: c Explanation: The 7 main elements are : sensor middleware (X-GSN), cloud data storage, scheduler, service delivery and utility manager, request definition, request presentation, configuration and monitoring. 9. Global Sensor Network is built for _________ a) Reducing cost and time for development b) Reducing cost and increasing time for development c) Increasing cost and increasing time for development d) Increasing cost and decreasing time for development Answer: a Explanation: GSN is developed on the observation that most of the requirements for the application development sensor network are same. Having each sensor network development using its own custom software not only increases the cost but also takes time for development and deployment. 10. One of the main characteristics of Linked Stream Data is “Live Streaming”. a) True b) False Answer: a Explanation: Most of the data on the web is from sensing devices. To facilitate the integration of data from sensed devices and other sources, both sensor stream source and data are being enriched with schematic descriptions, creating Linked Stream Data. It shows the live data depending on our application. 11. The huge number of devices connected to the Internet of Things has to communicate automatically, not via humans. What is this called? a) Skynet b) Bot 2 Bot c) Machine 2 Machine d) Intercloud Answer: c Explanation: Devices are connected to other devices like mobiles, laptops, etc, to communicate among themselves which is called machine to machine and that involves wireless communication techniques, serial connection and powerline connection. 12. Internet of Things needs a lot of network connection. What is the proposed “white Space” radio standard called? a) Bluetooth b) WiMax c) W eightless d) Zigbee

Answer: c Explanation: W hite space is nothing but gaps that sit in the frequency band used to broadcast digital TV. The development of so called “W eightless standard” is for the use of TV white space and for IOT/M2M purpose. The main intention is to reduce the cost and power utilization. 13. W hat is the sensor/protocol used in GSN? a) HTTP protocol b) CoAP protocol c) MQTT protocol d) XMPP protocol Answer: b Explanation: Constrained Application Protocol is a specialized web transfer protocol which enables constrained devices to communicate over internet and it is required for GSN in transferring data stream. 14. W hich is the core wrapper of GSN? a) Serial b) UDP c) GPSTest d) ZeroMQWrapper Answer: d Explanation: W rappers are classified as remote and local wrappers in GSN. Unlike them, the ZeroMQW rapper is a core wrapper which allows for publishing stream elements that are produced by a Virtual Sensor. 15. Open IoT ontology is extending the W3C SSN ontology which supports the description of the physical and processing structure of sensors. a) True b) False Answer: a Explanation: Sensors are not constrained to physical sensing devices, rather a sensor is anything that can calculate the value of the phenomenon. Thus, either a device or Computational process or a combination of them could play the role of a sensor. 16. Open IoT manages the registration, data acquisition, deployment of sensors and interconnected of objects, through which network? a) GSN b) X-GSN c) LSM d) HTTP Answer: b Explanation: The core fundamental concept in X-GSN is the virtual sensor, which can represent not only physical devices but in general any abstract or concrete entity that observes features of any kind. 17. W hat happens when service providers change their operating system and communication protocols? a) Inoperability and complexity arises b) Only complexity arises c) Only Inoperability arises d) Nothing arises Answer: a Explanation: Complexity arises when service providers change their operating system and communication protocols, which results in inoperability. Service providers use standard protocols and conventional interfaces to facilitate information among diverse services.

18. In SOA, Service is termed as __________ a) Software service b) Network service c) Business service d) Developer service Answer: c Explanation: Services are termed as business services. They are self-contained and logical. 19. Are SOA components loosely coupled. a) True b) False Answer: a Explanation: They are loosely coupled. That means every service is self-contained and exists alone logically. 20. The SOA architecture is divided into how many layers? a) 5 layers b) 2 layers c) 7 layers d) no layers ie., only one layer Answer: b Explanation: The first which has direct relevance to the business as it carries out business functions. The second layer is the technical layer which talks about managing computer resources like a database, web server etc.

21. Internet of Things (IoT) can be integrated with which of these separate domains: a. Cloud-based storage and computing. b. Cyber Physical Systems. c. Big-data networks. d. All of these. 22. In the current market scenario, IoT captures the maximum share in which one of these? a. Industry b. Security c. Healthcare d. Home automation 23.Why is IPv6 preferred over IPv4 for IoT implementations? a. Larger addressing range b. More security c. Both a and b d. Neither a or b 24. The main function of the IoT Gateway can be summarized as: a. Forwarding packets between LAN and WAN on the IP layer. b. Performs application layer functions between IoT nodes and other entities. c. Enables local, short-range communication between IoT devices. d. All of these Ans: a 25. Scalability of IoT means: a. Expandable/reducible in terms of scale or size. b. Measurable c. Increasing/decreasing monetary costs. d. All of these. Ans: d 26.Which one of these is the most important factor to be considered in an IoT implementation: a. Scalability b. Power efficiency c. Efficient and scalable addressing schemes d. All of these Ans: d 27.Which statement is NOT TRUE: a. IoT WAN connects various network segments. b. IoT WAN is geographically wide. c. IoT WAN is organizationally wide. d. None of these. Ans: d

28.Which of these statements regarding sensors is TRUE? a. Sensors are input devices. b. Sensors can be analog as well as digital c. Sensors respond to some external stimuli. d. All of these. Ans: d 29.Which of these is NOT a feature of Shape Memory Alloys (SMA)? a. Low density b. Low strain recovery c. Biocompatibility d. Biodegradability Ans:b 30.Which of these is a part of the Sensing Layer of the IoT Service Oriented Architecture? a. Service integration b. Service repository c. Business logic d. Data sensing and actuation protocols. Ans: d 31.MQTT stands for: a. Message Queue Telemetry Transport b. Multiple Queue Telemetry Transport c. Multiple Query Transport Technique d. Multiple Query Transport Technique Ans: a 32.AMQP is designed for connecting: a. Constrained networks b. LANs and WANs c. Systems and Business processes d. None of these Ans: c 33.Which modulation scheme is followed by IEEE 802.15.4 standard? a. BPSK b. QPSK c. DSSS d. All of these Ans: d

34.Which CoAP message transfers response from the server within the acknowledgment message? a. Separate b. Confirmable c. Non-confirmable d. Piggyback Ans: d 35.Collision prevention in 802.15.4 standard is provided by means of: a. CSMA-CA b. CSMA-CD c. ALOHA d. None of these Ans: a 36.Which of these is a routing protocol for low power lossy networks over IPv6? a. RPL b. OSPF c. Both a and b d. None of these Ans: a 37. The basic unit of AMQP data is: a. A frame b. A packet c. A byte d. A bit Ans: a 38. RPL supports: a. Message confidentiality b. Loop detection in the routes c. Data path validation d. All of these Ans: d 39. Which statement is TRUE with respect to the IEEE 802.15.4 standard? a. It is a low data-rate standard. b. Used for architecting wireless PANs c. Uses only two layers – PHY and MAC d. All of these Ans: d 40. LOADng routing uses: a. AODV b. DSDV

c. RIPv2 d. OSPF Ans: a 41. The number of channels incorporated in physical layer of the HART standard are: a. 10 b. 15 c. 20 d. 64 Ans: b 42.Channel hopping is performed at which HART layer? a. Physical b. Data link c. Network d. Application Ans: b 43. This process of bypassing radio dead-spots in Z wave is done using a message called a. Healing b. Beacon c. Probe d. None of these Ans: a 44. The difference between the wired and wireless versions of HART are at the: a. Network layer b. Physical layer c. Data link layer d. All of these Ans: d 45.WASN stands for: a. Wireless and Sensor networks b. Wired and Sensor networks c. Wireless Ad-hoc Sensor Networks d. None of these Ans: c 46. Class-2 Bluetooth devices have a range of: a. 1m b. 10m c. 100m d. 1000m

Ans: b 47.SOS in sensor web stands for a. Sensor of a System b. System of Sensors c. Sensor Observation Service d. None of these Ans: C 48. Which topology is supported by Z wave: a. Star b. Mesh c. Tree d. All of these Ans: d 49.QoS guarantees in WSNs include: a. Offering guarantees in terms of bandwidth, delay, jitter b. Offering guarantees in terms of packet loss probability. c. Offering guarantees in terms of Limited bandwidth, unpredictable changes in RF channel characteristics. d. All of these Ans: d 50. The WSN nodes are prone to: a. Malicious attacks b. Eavesdropping c. Interference d. All of these Ans: d 51. With respect to WSN coverage problems, the OGDC algorithm is an acronym for: a. Optimal Geographic Density Control b. Optimal Geographic Distance Control c. Optimal Geographic Distance Coverage d. Optimal geographic Density Coverage Ans: a 52.A crossing with respect to WSN coverage is _ if it is in the interior region of at least one node’s coverage disk. a. Partially covered b. Covered c. Not covered d. Isolated Ans: b

53. A PIR Sensor stands for: a. Proximity Infra-Red b. Passive Infra-Red c. Picture Infra-Red d. None of these Ans: b 54. WMSNs stand for: a. Wired Multimedia Sensor Networks b. Wireless Multimedia Sensor Networks c. Wireless Mobile Sensor Networks d. Wireless Machine Sensor Network Ans: b 55. UAV-VANETS link-up may be used for: a. visual guidance b. Data-muling c. Coverage enhancement d. All of these Ans: d 56. M2M stands for: a. MAC to MAC communication b. Machine to MAC communication c. Machine to machine communication d. MAC to machine communication Ans: c 57.In WSN area coverage problem, which is TRUE? a. Energy-efficient random coverage b. Connected random coverage c. A network is connected if any active node can communicate with any other active nodes d. All of these Ans: d 58.In a M2M ecosystem, Internet service providers: a. Provide their infrastructures for M2M device communications. b. are responsible for devices providing raw data. c. is an individual or company what utilizes M2M applications. d. None of these Ans: a

59.With respect to stationary sensor networks, which of these points apply? a. Easy deployment b. Node can be placed in an optimized distance c. Easy topology maintenance d. All of these Ans: d 60. High-end M2M nodes have: a. Mobility b. QoS guarantees c. Low density deployment d. All of these Ans: d 61. A hardware code, before uploading to an embedded processor board first needs to be: a. Verified and compiled b. Executed c. Both a and b d. None of these Ans: a 62. Why interoperability is required? a. Heterogeneous wireless communication protocols b. Different programming languages c. Different control models d. All of the above Ans: d 63. What is the function for reading humidity from DHT sensor from Arduino? a. dht.readHumidity() b. dht.readTemperature() c. dht.begin() d. d. dht(pin,DHT22) Ans: a 64.Device interoperability problem is between a. Two devices b. A device and an user c. Both (a) and (b) d. None of the above Ans: a

65. Which is the following is not an Actuator? a. Servo motor b. Stepper motor c. DHT d. Relay Ans: c 66. Which of the following is not a sensor? a. Barometer b. Light Dependent Resistor (LDR) c. DHT d. Relay Ans: d 67. What is the servo library command to move the shaft of Servo motor back and forth across 180 degree? a. Knob() b. Sweep() c. write() d. detach() Ans: b 68. The code written in Arduino IDE is referred to as: a. Script b. Block c. Sketch d. Arduino Script Ans: c 69. Which of the following library functions can be used to generate a random number in Arduino? a. randomize() b. ran() c. rand() d. random() Ans: d 70. Which pin of Arduino should be connected with the pin 3 of the DHT sensor? a. Pint 5V b. Pin 3.3V c. Pin GND d. None of the these Ans: d 71. By default, the GPIO pins in Raspberry Pi are configured as? a. Input except pins 14 and 15 b. Output except pins 14 and 15

c. Bcm d. GPIO Ans: a 72.Which of the following datatype is correct for the object below? D = [‘python’, 3.43, ‘p’, 100] a. Array b. Dictionary c. Tuple d. List Ans: b 73.What does the method readline() return: a. One line b. One byte c. One character d. Bool Ans: a 74. What is the maximum peripheral current draw allowed in Raspberry pi 3? a. 1200mA b. 700mA c. 500mA d. 100mA Ans: a 75. Data collected by Raspberry Pi from the sensor can be a. Processed in Raspberry Pi b. Sent to other devices connected to the network c. Used to control/activate other devices in the network d. All of the above Ans: d 76. Relay is a kind of: a. Sensor b. Actuator c. Hub d. Router Ans: b 77. What are the mode/modes used for addressing the pins in Raspberry Pi? a. GPIO b. BCM c. GPIO and BCM d. GPIO, BCM and CAN

Ans: c 78. Which of the following variants of Raspberry Pi has an inbuilt wi-fi? a. Raspberry Pi 2 b. Raspberry Pi 3 c. Raspberry Pi A+ d. Raspberry Pi Zero Ans: b 79. Internet of Things refers to: a. Interconnection of devices in a network b. Exchange of data between devices in a network c. An ecosystem of devices, accessible through internet d. All of the above Ans: d 80. IoT devices must have: a. A USB port b. A unique identification c. Wired connectivity d. All of the above Ans: b 81.Server is a: a. Computer b. Any device/program which serves or responds to the request from client c. A data center d. Cloud Ans: b 82. The split() function in Python programming language breaks the string on the basis of: a. Blank Space b. Comma c. Any specified delimiter d. Hyphen Ans: c 83. Bind() function in Python socket programming is used to: a. Specify the port for service on the specified host b. Read data from the socket c. Send data to the socket d. Initiate the connection Ans: a

84. Application program interface (API) used between data and control planes in SDN is known as: a. Northbound API b. Eastbound API c. Southbound API d. Westbound API Ans:c 85. When does a switch send PAKCET-IN message to a controller in SDN: a. Flow-rule associated with a received flow does not exist b. All the time c. After deleting a flow-rule d. None of the above Ans: a 86. In SDN, does the control overhead increase compared to the traditional network: a. Depends on application and network topology b. Yes, always c. Not at all d. Depends on OpenFlow protocol Ans: a 87. One of the advantages of SDN-based sensor network is: a. Real-time programmability b. No need to replace any node c. Both a & b d. None of the above Ans: a 88. Application program interface (API) used between application and control planes is known as: a. Northbound API b. Eastbound API c. Southbound API d. Westbound API Ans: a 89. An SDN Controller can be placed based on: a. Hierarchical manner b. Star-topology c. Mesh topology d. All of the above Ans: d

90. Typically, __ protocol is used in low-rate wireless PANs: a. IEEE 802.15.4 b. IEEE 802.11 c. IEC 6250 d. None of the above Ans: a 91.Using SDN, the following can be managed: a. Network partition b. Network matching c. Load balancing d. All of the above Ans: d 92. From the below given options, which is not a characteristic of cloud computing? a. Low management effort b. Low level generalization of computation c. On-demand network access d. Configurable computing resources Ans: b 93. Pre-configure facility for allocation of virtualized resources comes under a. Availability and reliability b. Scalability and elasticity c. Manageability and interoperability d. Measured Services Ans: c 94. Service Management mainly focusses on a. Importance to desired outcomes of customers b. Importance to desired outcomes of organizations c. Both (a) and (b) d. none of the above Ans: a 95. Broad network access in cloud deals with a. Dynamic allocation for scale out b. Recorded resource usage c. Availability of cloud resources over the network d. All of the above Ans: c

96. Billing information is calculated using a. Accounting Records only b. Billing rules and Accounting records c. Billing rules, Accounting records and Resource prices d. None of the above Ans: c 97. Integrity in data security is : a. Detecting unauthorized data modification b. Sending secure data to cloud c. Preserving the privacy of data d. None of the above Ans: a 98. Cloud Analyst provides a. Support for large scale cloud applications b. GUI based control c. Flexible and repeatable environment d. All of these Ans: d 99. GreenCloud Simulator is designed based on a. NS-3 b. NS-2 c. CloudSim d. DCSim Ans: b 100. Which of the following is not a cloud simulator? a. CloudSim b. NS-3 c. DCSim d. GroudSim Ans: b 101. What is the purpose of floating IP in Openstack? a. To connect the instance with the external network b. To interconnect among instances c. To connect among instances inside a same network d. None of them Ans: a

102. We normally take snapshot in Openstack, _. a. After the installation of an instance b. Before the installation of an instance c. It is an inbuilt image in Openstack d. It should be downloaded from the internet Ans: a 103. Sensor-Cloud deals with a. Sensor-for -Service b. Sensor-as-a-Service c. Sensor-in-Cloud d. None of these Ans: b 104. Which of the following statement is true in sensor-cloud a. End user procures sensors and lend these to sensor-cloud service provider b. Sensor-cloud is based only on dumping the sensor data to the cloud c. Single sensor nodes is shared dedicatedly with only one end use...


Similar Free PDFs