IOT Mcqs - Lecture notes 1 PDF

Title IOT Mcqs - Lecture notes 1
Author shubham Ambekar
Course Ict
Institution University of Mumbai
Pages 53
File Size 835.7 KB
File Type PDF
Total Downloads 61
Total Views 88

Summary

All India Shri Shivaji Memorial Society's College of Engineering, Pune - 411 001Department of Computer Engineering 2nd Shift310252: Embedded Systems and Internet of ThingsMultiple Choice Questions and AnswersUnit IIntroduction to Embedded System and Internet of ThingsQ1 ) MQTT stands for ___________...


Description

All India Shri Shivaji Memorial Society's College of Engineering, Pune - 411 001

Department of Computer Engineering 2nd Shift 310252: Embedded Systems and Internet of Things Multiple Choice Questions and Answers Unit I Introduction to Embedded System and Internet of Things

Q1 ) MQTT stands for _____________ a) MQ Telemetry Things b) MQ Transport Telemetry c) MQ Transport Things d) MQ Telemetry Transport Answer: d Q2) MQTT is better than HTTP for sending and receiving data. a)True b) False Answer: a

Q3) MQTT is _________ protocol. a) Machine to Machine b) Internet of Things c) Machine to Machine and Internet of Things d) Machine Things Answer: c Explanation: The MQTT protocol is a machine to machine and Internet of thing connectivity protocol.

Q4) which protocol is lightweight? a) MQTT

b) HTTP c) CoAP d) SPI Answer: a Q5) Does Raspberry Pi need external hardware? a) True b) False Answer: b Explanation: The RPi can be used without additional hardware (except perhaps a power supply of some kind), it won’t be much use as a general computer. As with any normal PC, it is likely you need some additional hardware. Q6) Does RPi have an internal memory? a)True b) False Answer: a Explanation: The RPi has no internal storage or built-in operating system it requires an SD-card that is set up to boot the RPi.

Q7) How power supply is done to RPi? a) USB connection b) Internal battery c) Charger d) Adapter Answer: a Explanation: The unit uses a Micro USB connection to power itself (only the power pins are connected so it will not transfer data over the connection). A standard modern phone charger with a micro USB connector will do, but needs at least 700 mA at 5 volts.

Q8) Which instruction set architecture is used in Raspberry Pi? a) X86 b) MSP c) AVR d) ARM Answer: d

Explanation: ARM assembler is used in Raspberry Pi. Machine language is built up from discrete statements or instructions implemented by a particular processor.

Q9) What is the default user in Debain on Raspberry Pi? a) Default b) User c) Pi d) Root Answer: c Explanation: Linux users. User management in Raspberry is done on the command line. The default user is Pi, and the password is raspberry. You can add users and change each user’s password. Q10). What bit processor is used in Pi 3? a) 64-bit b) 32-bit c) 128-bit d) Both 64 and 32 bit Answer: a Explanation: The first is a next generation Quad Core Broadcom BCM2837 64-bit ARMv8 processor, making the processor speed increase from 900MHz on the Pi 2 to up to 1.2GHz on the Pi 3.

Unit II Embedded IoT Platform Design Methodology Q11) What is the speed of operation in Pi 3? a) 900MHz b) 1.2GHz c) 1GHz d) 500MHz Answer: b Explanation: The first is a next generation Quad Core Broadcom BCM2837 64-bit ARMv8 processor, making the processor speed increase from 900MHz on the Pi 2 to up to 1.2GHz on the Pi 3. Q12) How many USB ports are present in Raspberry Pi 3? a) 5 b) 2 c) 4 d) 3

Answer: c Explanation: In Raspberry Pi3 there is an upgraded switched power source that goes up to 2.5 Amps instead of just 2 Amps, allowing pi to power even more powerful devices over USB ports. Q13) Is CoAP a IETF standard? a)True b)False Answer: a Q14) Terms SSL and TLS stand for: a. Secure Socket Layers and Transport Layer Session b. Secure Socket Layers and Transport Layer Security c. Secure Socket Layout and Transport Level Session d. Session Socket Layers and Transport Layer Session Answer: b Q15) What is Inter Integrated Communication(I2C): a. An application layer protocol b. A networking communication protocol for multi-master support c. An OS for distributed network communication d. A cellular communication protocol Answer: b Q16) Which one out of these is not LPWAN technologies: a. SigFox b. WiFi c. NB-IoT d. LoRa Answer: b Q17) Frequency band used by 802.11 ah standard is: a. 60 GHz b. 2.4 GHz c. Sub 1 GHz d. 5 GHz Answer: b Q18)A start bit in UART communication is always: a. 1 b. Neither of these c. 0

Answer: c Q19)A Denial of Service attack is: a. Connection flooding b. Bandwidth flooding c. All of the mentioned d. Vulnerability attack Answer: c

Q20)A packet sniffer is a. Active receiver b. Both of the mentioned c. Passive receiver d. None of the mentioned Answer: b

Unit III Pillars of Embedded IoT and Physical Devices Q21)WPA is a security mechanism in a. WiFi b. Cloud c. Bluetooth d. Ethernet Answer: a Q22)Raspbian is: a. Assembler b. Language c. Compiler d. OS Answer: d Q23)In wireless ad-hoc network a. none of the mentioned b. access point is not required c. nodes are not required d. access point is must Answer: b

Q24)Secure shell (SSH) network protocol is used for a. remote command-line login b. remote command execution c. all of the mentioned d. secure data communication Answer: c Q25)Internet of Things (IoT) can be integrated with which of these separate domains: a. Cloud-based storage and computing. b. Cyber Physical Systems. c. Big-data networks. d. All of these. Answer: d Q26)Why is IPv6 preferred over IPv4 for IoT implementations? a. Larger addressing range b. More security c. Both of the above d. Neither a or b Answer: c

Q27) The main function of the IoT Gateway can be summarized as: a. Forwarding packets between LAN and WAN on the IP layer. b. Performs application layer functions between IoT nodes and other entities. c. Enables local, short-range communication between IoT devices. d. All of these Answer: a Q28)

Q29)

Q30)

Unit IV IoT Protocols and Security Q31) SPI uses how many lines? a) 4 lines b) 1 line c) 3 lines d) 2 lines Answer: d Explanation: SPI uses separate clock and data lines, along with a select line to choose the device we wish to talk to. Q32) MOSI means __________ a) Line for master to send data to the slave b) Line for the slave to send data to the master c) Line for the clock signal d) Line for the master to select which slave to send data to

Answer: a Explanation: MOSI is the logic signal. The data will be sent to the slave from master. Q33) Which of the following is an advantage of SPI? a) No start and stop bits b) Use 4 wires c) Allows for single master d) Error checking is not present Answer: a Explanation: As we don’t have start and stop bits, so the data can be streamed continuously without interruption. Q34)SPI device communicates in _________ a) Simplex b) Half duplex c) Full duplex d) Both half and full duplex Answer: c Explanation: SPI devices communicate in full duplex mode using master-slave architecture with a simple master. Q35) I2c will address large number of slave devices. a) True b) False Answer: a Explanation: This protocol will address a large number of slave devices that are connected to the same bus. Q36) Inter Integrated Circuit is a _____________ a) Single master, single slave b) Multi master, single slave c) Single master, multi slave d) Multi master, multi slave Answer: d Explanation: I2C pronounced as I-squared-C, is a multi master, multi salve. It is typically used for attaching lower-speed peripheral IC’s to processors and micro controllers in short distance, intra band communication.

Q37) Typical voltages used are ___________ a) 5v b) 3.3v c) 5v or 3.3v d) 2.5v Answer: c Explanation: I2C uses only two bidirectional open drain lines, SDA and SCL. Typical voltages used are 5v or 3.3v, although system with other voltages is permitted. Q38) IoT devices are naturally vulnerable to ________ threats. a) Sensors b) Heterogeneity c) Security d) Connectivity Answer: c Explanation: IoT devices are naturally vulnerable to security threats. There is a high level of transparency and privacy issues with IoT. Q39) ___________ Service is responsible for establishing the requested service with in the cloud database. a) Suspend b) Resource Discovery c) Unregister d) Register Answer: d Explanation: Register service is responsible for establishing the requested service with in the cloud database. To this end, it initially identifies and logs all the sensors which are pertinent and or needed for delivering the requested IoT service.

Q40) _________ service enables the previously suspended services. a) Enable from suspension b) Enable c) Update d) Registered service status Answer: a Explanation: Enable from suspension service enables the previously suspended services. The data structures holding the service’s meta data in the cloud are appropriately updated.

Unit V Web of Things and Cloud of Things Q41) which sensor is LM35? a) Pressure sensor b) Humidity senso c) Temperature sensor d) Touch sensor Answer: c Q42) How many pins does temperature sensor have? a) 5 legs b) 4 legs c) 2 legs d) 3 legs Answer: d

Q43) Gateway provides the connection between _________ and _________ a) Cloud and controller b) Network and cloud c) Network and controller d) Controller and device Answer: b

Q44)Django is based on which framework? a) MVC b) MVVM c) MVT and MTV (model view template) d) none of the above Answer: c

Q45) What is a Django App? a) An app is a functionality, including models and views, that lives together in a single Python package. b) Django app is a python package with its own components.

c) Django app is an extended package with base package is Django. d) All of the above Answer: d

Q46) What is Post.objects.all() is used for? a) It is used to bring all the objects stored in Post table. b) It is used to create a new Post object m. c) Post object will bring objects from database with SQL Query: Select *. d) None of the above Answer: a

Q47) What happens when url.py file is edited while the development server is still running? a) Development server terminates. b) The development server automatically restarts. c) The development server does nothing. d) The web page is automatically reloaded. Answer: b

Q48) What is the purpose of __init__.py in project directories? a) It allows Python to recognise the folder as package. b) It is useless and can be deleted. c) It is used to initialise any empty values. d) None of the above Answer: a

Q49) Point out the correct statement. a)Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of protocols needed to manage interprocess communications c) Platforms are used to create more complex software d) All of the mentioned

Answer: d Explanation: The most commonly used services uses a set of discovery and description protocols based on WSDL.

Unit VI IoT Physical Servers, Cloud Offerings and IoT Case Studies Q50) Communication between services is done widely using _______ protocol. a) REST b) SOAP c) RESTful d) None of the mentioned

Answer: b Explanation: There are alternative sets of standards as well.

Q51) Applications such as a Web server or database server that can run on a virtual machine image are referred to as ______________ a) virtual server b) virtual appliances c) machine imaging d) all of the mentioned

Answer: b Explanation: The name virtual appliance is a little misleading because it conjures up the image of a machine that serves a narrow purpose.

Q52) Amazon Machine Images are virtual appliances that have been packaged to run on the grid of ____ nodes. a) Ben b) Xen c) Ken d) Zen

Answer: b Explanation: You run across virtual appliances in IaaS systems such as Amazon’s Elastic Compute Cloud. Q53) Point out the wrong statement. a) Amazon Machine Instances are sized at various levels and rented on a computing/hour basis b) The metrics obtained by CloudWatch may be used to enable a feature called Auto Scaling

c) A number of tools are used to support EC2 services d) None of the mentioned Answer: d Explanation: Through hardware virtualization on Xen hypervisors, Amazon.com has made it possible to create private virtual servers that you can run worldwide.

Our telegram channel -

https://t.me/sppumcq click here to join

Unit I : Fundamentals of IoT & Unit II :Sensors Networks 1.

_________ allows us to control electronic components a) RETful API b) RESTful API c) HTTP d) MQTT Answer: a Explanation: RETful API that allows us to control electronic components connected to our Intel Galileo Gen 2 board through HTTP requests.

2.

MQTT stands for _____________ a) MQ Telemetry Things b) MQ Transport Telemetry c) MQ Transport Things d) MQ Telemetry Transport Answer: d Explanation: MQTT was known as MQ Telemetry Transport protocol. MQTT is a lightweight protocol that runs on top of the TCP/IP protocol.

3.

MQTT is better than HTTP for sending and receiving data. a) True b) False Answer: a Explanation: We want to send and receive data in real time through internet and RESTful API is not the most appropriate option to do this. Instead, we will work on MQTT which is lighter than HTTP.

4.

MQTT is _________ protocol. a) Machine to Machine b) Internet of Things c) Machine to Machine and Internet of Things d) Machine Things Answer: c Explanation: The MQTT protocol is a machine to machine and Internet of thing connectivity protocol.

5.

Which protocol is lightweight? a) MQTT b) HTTP c) CoAP d) SPI

Answer: a Explanation: MQTT is a lightweight protocol that runs on top of the TCP/IP protocol and works with publish subscribe mechanism. 6. PubNub publishes and subscribes _________ in order to send and receive messages. a) Network b) Account c) Portal d) Keys Answer: d Explanation: It is necessary to generate our PubNub publishes and subscribes keys in order to send and receive messages in the network.

7. By clicking which key the PubNub will display public, subscribe, and secret keys. a) Pane b) Demo Keyset c) Portal d) Network Answer: b Explanation: Click on Demo keyset pane and PubNub will display public, subscribe, and secret keys. We must copy and paste each of these keys to use them in our code that will publish messages and subscribe to them. 8. The number of elements in the Open IoT Architecture? a) 6 elements b) 8 elements c) 7 elements d) 3 elements Answer: c Explanation: The 7 main elements are : sensor middleware (X-GSN), cloud data storage, scheduler, service delivery and utility manager, request definition, request presentation, configuration and monitoring. 9. Global Sensor Network is built for _________ a) Reducing cost and time for development b) Reducing cost and increasing time for development c) Increasing cost and increasing time for development d) Increasing cost and decreasing time for development Answer: a Explanation: GSN is developed on the observation that most of the requirements for the application development sensor network are same. Having each sensor network development using its own custom software not only increases the cost but also takes time for development and deployment. 10. One of the main characteristics of Linked Stream Data is “Live Streaming”. a) True b) False Answer: a Explanation: Most of the data on the web is from sensing devices. To facilitate the integration of data from sensed devices and other sources, both sensor stream source and data are being enriched with schematic descriptions, creating Linked Stream Data. It shows the live data depending on our application. 11. The huge number of devices connected to the Internet of Things has to communicate automatically, not via humans. What is this called? a) Skynet b) Bot 2 Bot c) Machine 2 Machine d) Intercloud Answer: c Explanation: Devices are connected to other devices like mobiles, laptops, etc, to communicate among themselves which is called machine to machine and that involves wireless communication techniques, serial connection and powerline connection. 12. Internet of Things needs a lot of network connection. What is the proposed “white Space” radio standard called? a) Bluetooth b) WiMax c) Weightless d) Zigbee

Answer: c Explanation: White space is nothing but gaps that sit in the frequency band used to broadcast digital TV. The development of so called “Weightless standard” is for the use of TV white space and for IOT/M2M purpose. The main intention is to reduce the cost and power utilization. 13. What is the sensor/protocol used in GSN? a) HTTP protocol b) CoAP protocol c) MQTT protocol d) XMPP protocol Answer: b Explanation: Constrained Application Protocol is a specialized web transfer protocol which enables constrained devices to communicate over internet and it is required for GSN in transferring data stream. 14. Which is the core wrapper of GSN? a) Serial b) UDP c) GPSTest d) ZeroMQWrapper Answer: d Explanation: Wrappers are classified as remote and local wrappers in GSN. Unlike them, the ZeroMQWrapper is a core wrapper which allows for publishing stream elements that are produced by a Virtual Sensor. 15. Open IoT ontology is extending the W3C SSN ontology which supports the description of the physical and processing structure of sensors. a) True b) False Answer: a Explanation: Sensors are not constrained to physical sensing devices, rather a sensor is anything that can calculate the value of the phenomenon. Thus, either a device or Computational process or a combination of them could play the role of a sensor. 16. Open IoT manages the registration, data acquisition, deployment of sensors and interconnected of objects, through which network? a) GSN b) X-GSN c) LSM d) HTTP Answer: b Explanation: The core fundamental concept in X-GSN is the virtual sensor, which can represent not only physical devices but in general any abstract or concrete entity that observes features of any kind. 17. What happens when service providers change their operating system and communication protocols? a) Inoperability and complexity arises b) Only complexity arises c) Only Inoperability arises d) Nothing arises Answer: a Explanation: Complexity arises when service providers change their operating system and communication protocols, which results in inoperability. Service providers use standard protocols and conventional interfaces to facilitate information among diverse services.

18. In SOA, Service is termed as __________ a) Software service b) Network service c) Business service d) Developer service Answer: c Explanation: Services are termed as business services. They are self-contained and logical. 19. Are SOA components loosely coupled. a) True b) False Answer: a Explanation: They are loosely coupled. That means every service is self-contained and exists alone logically. 20. The SOA architecture is divided into how many layers? a) 5 layers b) 2 layers c) 7 layers d) no layers ie., only one layer Answer: b Explanation: The first which has direct relevance to the business as it carries out business functions. The second layer is the technical layer which talks about managing computer resources like a database, web server etc.

21. Internet of Things (IoT) can be integrated with which of these separate domains: a. Cloud-based storage and computing. b. Cyber Physical Systems. c. Big-data networks. d. All of these. 22. In the current market scenario, IoT captures the maximum share in which one of these? a. Industry b. Security c. Healthcare d. Home automation 23.Why is IPv6 preferred over IPv4 for IoT implementations? a. Larger addressing range b. More security c. Both a and b d. Neither a or b 24. The main function of the IoT Gateway can be summarized as: a. Forwarding packets between LAN and WAN on the IP layer. b. Performs application layer functions between IoT nodes and other entities. c. Enables local, short-range communication between IoT devices. d. All of these Ans: a 25. Scalability of IoT means: a. Expandable/reducible in terms of scale or size. b. Measurable c. Increasing/decreasing monetary costs. d. All of these. Ans: d 26.Which one of these is the most important factor to be considered in an IoT implementation: a. Scalability b. Power efficiency c. Efficient and scalable addressing schemes d. All of these Ans: d 27.Which statemen...


Similar Free PDFs