You are on page 1of 234

All India Shri Shivaji Memorial Society's

College of Engineering, Pune - 411 001


Department of Computer Engineering 2nd Shift
310252: Embedded Systems and Internet of Things
Multiple Choice Questions and Answers

Unit I
Introduction to Embedded System and Internet of Things

Q1 ) MQTT stands for _____________


a) MQ Telemetry Things
b) MQ Transport Telemetry
c) MQ Transport Things
d) MQ Telemetry Transport

Answer: d

Q2) MQTT is better than HTTP for sending and receiving data.

a)True
b) False

Answer: a

Q3) MQTT is _________ protocol.


a) Machine to Machine
b) Internet of Things
c) Machine to Machine and Internet of Things
d) Machine Things

Answer: c
Explanation: The MQTT protocol is a machine to machine and Internet of thing connectivity protocol.

Q4) which protocol is lightweight?


a) MQTT
b) HTTP
c) CoAP
d) SPI

Answer: a

Q5) Does Raspberry Pi need external hardware?


a) True
b) False
Answer: b

Explanation: The RPi can be used without additional hardware (except perhaps a power supply of
some kind), it won’t be much use as a general computer. As with any normal PC, it is likely you need
some additional hardware.

Q6) Does RPi have an internal memory?


a)True
b) False

Answer: a

Explanation: The RPi has no internal storage or built-in operating system it requires an SD-card that
is set up to boot the RPi.

Q7) How power supply is done to RPi?


a) USB connection
b) Internal battery
c) Charger
d) Adapter

Answer: a

Explanation: The unit uses a Micro USB connection to power itself (only the power pins are
connected so it will not transfer data over the connection). A standard modern phone charger with a
micro USB connector will do, but needs at least 700 mA at 5 volts.

Q8) Which instruction set architecture is used in Raspberry Pi?


a) X86
b) MSP
c) AVR
d) ARM

Answer: d
Explanation: ARM assembler is used in Raspberry Pi. Machine language is built up from discrete
statements or instructions implemented by a particular processor.

Q9) What is the default user in Debain on Raspberry Pi?


a) Default
b) User
c) Pi
d) Root

Answer: c
Explanation: Linux users. User management in Raspberry is done on the command line. The default
user is Pi, and the password is raspberry. You can add users and change each user’s password.

Q10). What bit processor is used in Pi 3?


a) 64-bit
b) 32-bit
c) 128-bit
d) Both 64 and 32 bit

Answer: a
Explanation: The first is a next generation Quad Core Broadcom BCM2837 64-bit ARMv8 processor,
making the processor speed increase from 900MHz on the Pi 2 to up to 1.2GHz on the Pi 3.

Unit II
Embedded IoT Platform Design Methodology

Q11) What is the speed of operation in Pi 3?


a) 900MHz
b) 1.2GHz
c) 1GHz
d) 500MHz

Answer: b
Explanation: The first is a next generation Quad Core Broadcom BCM2837 64-bit ARMv8 processor,
making the processor speed increase from 900MHz on the Pi 2 to up to 1.2GHz on the Pi 3.

Q12) How many USB ports are present in Raspberry Pi 3?


a) 5
b) 2
c) 4
d) 3
Answer: c
Explanation: In Raspberry Pi3 there is an upgraded switched power source that goes up to 2.5 Amps
instead of just 2 Amps, allowing pi to power even more powerful devices over USB ports.

Q13) Is CoAP a IETF standard?


a)True
b)False

Answer: a

Q14) Terms SSL and TLS stand for:


a. Secure Socket Layers and Transport Layer Session
b. Secure Socket Layers and Transport Layer Security
c. Secure Socket Layout and Transport Level Session
d. Session Socket Layers and Transport Layer Session

Answer: b

Q15) What is Inter Integrated Communication(I2C):


a. An application layer protocol
b. A networking communication protocol for multi-master support
c. An OS for distributed network communication
d. A cellular communication protocol

Answer: b

Q16) Which one out of these is not LPWAN technologies:


a. SigFox
b. WiFi
c. NB-IoT
d. LoRa

Answer: b

Q17) Frequency band used by 802.11 ah standard is:


a. 60 GHz
b. 2.4 GHz
c. Sub 1 GHz
d. 5 GHz

Answer: b

Q18)A start bit in UART communication is always:


a. 1
b. Neither of these
c. 0
Answer: c

Q19)A Denial of Service attack is:


a. Connection flooding
b. Bandwidth flooding
c. All of the mentioned
d. Vulnerability attack

Answer: c

Q20)A packet sniffer is


a. Active receiver
b. Both of the mentioned
c. Passive receiver
d. None of the mentioned

Answer: b

Unit III
Pillars of Embedded IoT and Physical Devices

Q21)WPA is a security mechanism in


a. WiFi
b. Cloud
c. Bluetooth
d. Ethernet

Answer: a

Q22)Raspbian is:
a. Assembler
b. Language
c. Compiler
d. OS

Answer: d

Q23)In wireless ad-hoc network


a. none of the mentioned
b. access point is not required
c. nodes are not required
d. access point is must

Answer: b
Q24)Secure shell (SSH) network protocol is used for
a. remote command-line login
b. remote command execution
c. all of the mentioned
d. secure data communication

Answer: c

Q25)Internet of Things (IoT) can be integrated with which of these separate domains:
a. Cloud-based storage and computing.
b. Cyber Physical Systems.
c. Big-data networks.
d. All of these.

Answer: d

Q26)Why is IPv6 preferred over IPv4 for IoT implementations?

a. Larger addressing range


b. More security
c. Both of the above
d. Neither a or b

Answer: c

Q27) The main function of the IoT Gateway can be summarized as:
a. Forwarding packets between LAN and WAN on the IP layer.
b. Performs application layer functions between IoT nodes and other entities.
c. Enables local, short-range communication between IoT devices.
d. All of these

Answer: a

Q28)
Q29)

Q30)

Unit IV
IoT Protocols and Security

Q31) SPI uses how many lines?


a) 4 lines
b) 1 line
c) 3 lines
d) 2 lines

Answer: d

Explanation: SPI uses separate clock and data lines, along with a select line to choose the device
we wish to talk to.

Q32) MOSI means __________


a) Line for master to send data to the slave
b) Line for the slave to send data to the master
c) Line for the clock signal
d) Line for the master to select which slave to send data to
Answer: a

Explanation: MOSI is the logic signal. The data will be sent to the slave from master.

Q33) Which of the following is an advantage of SPI?


a) No start and stop bits
b) Use 4 wires
c) Allows for single master
d) Error checking is not present

Answer: a

Explanation: As we don’t have start and stop bits, so the data can be streamed continuously without
interruption.

Q34)SPI device communicates in _________


a) Simplex
b) Half duplex
c) Full duplex
d) Both half and full duplex

Answer: c

Explanation: SPI devices communicate in full duplex mode using master-slave architecture with a
simple master.

Q35) I2c will address large number of slave devices.


a) True
b) False

Answer: a

Explanation: This protocol will address a large number of slave devices that are connected to the
same bus.

Q36) Inter Integrated Circuit is a _____________


a) Single master, single slave
b) Multi master, single slave
c) Single master, multi slave
d) Multi master, multi slave

Answer: d

Explanation: I2C pronounced as I-squared-C, is a multi master, multi salve. It is typically used for
attaching lower-speed peripheral IC’s to processors and micro controllers in short distance, intra
band communication.
Q37) Typical voltages used are ___________
a) 5v
b) 3.3v
c) 5v or 3.3v
d) 2.5v

Answer: c

Explanation: I2C uses only two bidirectional open drain lines, SDA and SCL. Typical voltages used
are 5v or 3.3v, although system with other voltages is permitted.

Q38) IoT devices are naturally vulnerable to ________ threats.


a) Sensors
b) Heterogeneity
c) Security
d) Connectivity

Answer: c

Explanation: IoT devices are naturally vulnerable to security threats. There is a high level of
transparency and privacy issues with IoT.

Q39) ___________ Service is responsible for establishing the requested service with in the cloud
database.
a) Suspend
b) Resource Discovery
c) Unregister
d) Register
Answer: d

Explanation: Register service is responsible for establishing the requested service with in the cloud
database. To this end, it initially identifies and logs all the sensors which are pertinent and or needed
for delivering the requested IoT service.

Q40) _________ service enables the previously suspended services.


a) Enable from suspension
b) Enable
c) Update
d) Registered service status

Answer: a

Explanation: Enable from suspension service enables the previously suspended services. The data
structures holding the service’s meta data in the cloud are appropriately updated.
Unit V
Web of Things and Cloud of Things

Q41) which sensor is LM35?


a) Pressure sensor
b) Humidity senso
c) Temperature sensor
d) Touch sensor

Answer: c

Q42) How many pins does temperature sensor have?


a) 5 legs
b) 4 legs
c) 2 legs
d) 3 legs

Answer: d

Q43) Gateway provides the connection between _________ and _________


a) Cloud and controller
b) Network and cloud
c) Network and controller
d) Controller and device

Answer: b

Q44)Django is based on which framework?


a) MVC
b) MVVM
c) MVT and MTV (model view template)
d) none of the above

Answer: c

Q45) What is a Django App?


a) An app is a functionality, including models and views, that lives together in a single Python
package.
b) Django app is a python package with its own components.
c) Django app is an extended package with base package is Django.
d) All of the above

Answer: d

Q46) What is Post.objects.all() is used for?


a) It is used to bring all the objects stored in Post table.
b) It is used to create a new Post object m.
c) Post object will bring objects from database with SQL Query: Select *.
d) None of the above

Answer: a

Q47) What happens when url.py file is edited while the development server is still running?

a) Development server terminates.


b) The development server automatically restarts.
c) The development server does nothing.
d) The web page is automatically reloaded.

Answer: b

Q48) What is the purpose of __init__.py in project directories?


a) It allows Python to recognise the folder as package.
b) It is useless and can be deleted.
c) It is used to initialise any empty values.
d) None of the above

Answer: a

Q49) Point out the correct statement.


a)Cloud architecture can couple software running on virtualized hardware in multiple locations to
provide an on-demand service
b) Cloud computing relies on a set of protocols needed to manage interprocess communications
c) Platforms are used to create more complex software
d) All of the mentioned

Answer: d
Explanation: The most commonly used services uses a set of discovery and description
protocols based on WSDL.
Unit VI
IoT Physical Servers, Cloud Offerings and IoT Case Studies

Q50) Communication between services is done widely using _______ protocol.


a) REST
b) SOAP
c) RESTful
d) None of the mentioned

Answer: b
Explanation: There are alternative sets of standards as well.

Q51) Applications such as a Web server or database server that can run on a virtual
machine image are referred to as ______________
a) virtual server
b) virtual appliances
c) machine imaging
d) all of the mentioned

Answer: b
Explanation: The name virtual appliance is a little misleading because it conjures up the
image of a machine that serves a narrow purpose.

Q52) Amazon Machine Images are virtual appliances that have been packaged to run on
the grid of ____ nodes.
a) Ben
b) Xen
c) Ken
d) Zen

Answer: b
Explanation: You run across virtual appliances in IaaS systems such as Amazon’s Elastic
Compute Cloud.

Q53) Point out the wrong statement.


a) Amazon Machine Instances are sized at various levels and rented on a computing/hour
basis
b) The metrics obtained by CloudWatch may be used to enable a feature called Auto
Scaling
c) A number of tools are used to support EC2 services
d) None of the mentioned

Answer: d
Explanation: Through hardware virtualization on Xen hypervisors, Amazon.com has made it
possible to create private virtual servers that you can run worldwide.
Our telegram channel - https://t.me/sppumcq
click here to join
Unit I : Fundamentals of IoT & Unit II :Sensors Networks

1. _________ allows us to control electronic components


a) RETful API
b) RESTful API
c) HTTP
d) MQTT
Answer: a
Explanation: RETful API that allows us to control electronic components connected to our Intel Galileo Gen 2
board through HTTP requests.

2. MQTT stands for _____________


a) MQ Telemetry Things
b) MQ Transport Telemetry
c) MQ Transport Things
d) MQ Telemetry Transport

Answer: d
Explanation: MQTT was known as MQ Telemetry Transport protocol. MQTT is a lightweight protocol that runs
on top of the TCP/IP protocol.

3. MQTT is better than HTTP for sending and receiving data.


a) True
b) False

Answer: a
Explanation: We want to send and receive data in real time through internet and RESTful API is not the most
appropriate option to do this. Instead, we will work on MQTT which is lighter than HTTP.

4. MQTT is _________ protocol.


a) Machine to Machine
b) Internet of Things
c) Machine to Machine and Internet of Things
d) Machine Things

Answer: c
Explanation: The MQTT protocol is a machine to machine and Internet of thing connectivity protocol.

5. Which protocol is lightweight?


a) MQTT
b) HTTP
c) CoAP
d) SPI

Answer: a
Explanation: MQTT is a lightweight protocol that runs on top of the TCP/IP protocol and works with publish subscribe
mechanism.

6. PubNub publishes and subscribes _________ in order to send and receive messages.
a) Network
b) Account
c) Portal
d) Keys

Answer: d
Explanation: It is necessary to generate our PubNub publishes and subscribes keys in order to send and receive messages
in the network.
7. By clicking which key the PubNub will display public, subscribe, and secret keys.
a) Pane
b) Demo Keyset
c) Portal
d) Network

Answer: b
Explanation: Click on Demo keyset pane and PubNub will display public, subscribe, and secret keys. We must copy and
paste each of these keys to use them in our code that will publish messages and subscribe to them.

8. The number of elements in the Open IoT Architecture?


a) 6 elements
b) 8 elements
c) 7 elements
d) 3 elements

Answer: c
Explanation: The 7 main elements are : sensor middleware (X-GSN), cloud data storage, scheduler, service delivery and
utility manager, request definition, request presentation, configuration and monitoring.

9. Global Sensor Network is built for _________


a) Reducing cost and time for development
b) Reducing cost and increasing time for development
c) Increasing cost and increasing time for development
d) Increasing cost and decreasing time for development

Answer: a
Explanation: GSN is developed on the observation that most of the requirements for the application development sensor
network are same. Having each sensor network development using its own custom software not only increases the cost but
also takes time for development and deployment.

10. One of the main characteristics of Linked Stream Data is “Live Streaming”.
a) True
b) False

Answer: a
Explanation: Most of the data on the web is from sensing devices. To facilitate the integration of data from sensed devices
and other sources, both sensor stream source and data are being enriched with schematic descriptions, creating Linked
Stream Data. It shows the live data depending on our application.

11. The huge number of devices connected to the Internet of Things has to communicate automatically, not via humans.
What is this called?
a) Skynet
b) Bot 2 Bot
c) Machine 2 Machine
d) Intercloud

Answer: c
Explanation: Devices are connected to other devices like mobiles, laptops, etc, to communicate among themselves which is
called machine to machine and that involves wireless communication techniques, serial connection and powerline
connection.

12. Internet of Things needs a lot of network connection. What is the proposed “white Space” radio standard called?
a) Bluetooth
b) WiMax
c) Weightless
d) Zigbee
Answer: c
Explanation: White space is nothing but gaps that sit in the frequency band used to broadcast digital TV. The development
of so called “Weightless standard” is for the use of TV white space and for IOT/M2M purpose. The main intention is to
reduce the cost and power utilization.

13. What is the sensor/protocol used in GSN?


a) HTTP protocol
b) CoAP protocol
c) MQTT protocol
d) XMPP protocol

Answer: b
Explanation: Constrained Application Protocol is a specialized web transfer protocol which enables constrained devices to
communicate over internet and it is required for GSN in transferring data stream.

14. Which is the core wrapper of GSN?


a) Serial
b) UDP
c) GPSTest
d) ZeroMQWrapper

Answer: d
Explanation: Wrappers are classified as remote and local wrappers in GSN. Unlike them, the ZeroMQWrapper is a core
wrapper which allows for publishing stream elements that are produced by a Virtual Sensor.

15. Open IoT ontology is extending the W3C SSN ontology which supports the description of the physical and processing
structure of sensors.
a) True
b) False

Answer: a
Explanation: Sensors are not constrained to physical sensing devices, rather a sensor is anything that can calculate the
value of the phenomenon. Thus, either a device or Computational process or a combination of them could play the role of a
sensor.

16. Open IoT manages the registration, data acquisition, deployment of sensors and interconnected of objects, through
which network?
a) GSN
b) X-GSN
c) LSM
d) HTTP

Answer: b
Explanation: The core fundamental concept in X-GSN is the virtual sensor, which can represent not only physical devices
but in general any abstract or concrete entity that observes features of any kind.

17. What happens when service providers change their operating system and communication protocols?
a) Inoperability and complexity arises
b) Only complexity arises
c) Only Inoperability arises
d) Nothing arises

Answer: a
Explanation: Complexity arises when service providers change their operating system and communication protocols, which
results in inoperability. Service providers use standard protocols and conventional interfaces to facilitate information among
diverse services.
18. In SOA, Service is termed as __________
a) Software service
b) Network service
c) Business service
d) Developer service

Answer: c
Explanation: Services are termed as business services. They are self-contained and logical.

19. Are SOA components loosely coupled.


a) True
b) False

Answer: a
Explanation: They are loosely coupled. That means every service is self-contained and exists alone logically.

20. The SOA architecture is divided into how many layers?


a) 5 layers
b) 2 layers
c) 7 layers
d) no layers ie., only one layer

Answer: b
Explanation: The first which has direct relevance to the business as it carries out business functions. The second layer is t he
technical layer which talks about managing computer resources like a database, web server etc.
21. Internet of Things (IoT) can be integrated with which of these separate domains:
a. Cloud-based storage and computing.
b. Cyber Physical Systems.
c. Big-data networks.
d. All of these.

22. In the current market scenario, IoT captures the maximum share in which one of these?
a. Industry
b. Security
c. Healthcare
d. Home automation

23.Why is IPv6 preferred over IPv4 for IoT implementations?


a. Larger addressing range
b. More security
c. Both a and b
d. Neither a or b

24. The main function of the IoT Gateway can be summarized as:
a. Forwarding packets between LAN and WAN on the IP layer.
b. Performs application layer functions between IoT nodes and other entities.
c. Enables local, short-range communication between IoT devices.
d. All of these

Ans: a

25. Scalability of IoT means:


a. Expandable/reducible in terms of scale or size.
b. Measurable
c. Increasing/decreasing monetary costs.
d. All of these.

Ans: d

26.Which one of these is the most important factor to be considered in an IoT implementation:
a. Scalability
b. Power efficiency
c. Efficient and scalable addressing schemes
d. All of these

Ans: d

27.Which statement is NOT TRUE:


a. IoT WAN connects various network segments.
b. IoT WAN is geographically wide.
c. IoT WAN is organizationally wide.
d. None of these.

Ans: d
28.Which of these statements regarding sensors is TRUE?
a. Sensors are input devices.
b. Sensors can be analog as well as digital
c. Sensors respond to some external stimuli.
d. All of these.

Ans: d

29.Which of these is NOT a feature of Shape Memory Alloys (SMA)?


a. Low density
b. Low strain recovery
c. Biocompatibility
d. Biodegradability

Ans:b

30.Which of these is a part of the Sensing Layer of the IoT Service Oriented Architecture?
a. Service integration
b. Service repository
c. Business logic
d. Data sensing and actuation protocols.

Ans: d

31.MQTT stands for:


a. Message Queue Telemetry Transport
b. Multiple Queue Telemetry Transport
c. Multiple Query Transport Technique
d. Multiple Query Transport Technique

Ans: a

32.AMQP is designed for connecting:


a. Constrained networks
b. LANs and WANs
c. Systems and Business processes
d. None of these

Ans: c

33.Which modulation scheme is followed by IEEE 802.15.4 standard?


a. BPSK
b. QPSK
c. DSSS
d. All of these

Ans: d
34.Which CoAP message transfers response from the server within the acknowledgment message?
a. Separate
b. Confirmable
c. Non-confirmable
d. Piggyback

Ans: d

35.Collision prevention in 802.15.4 standard is provided by means of:


a. CSMA-CA
b. CSMA-CD
c. ALOHA
d. None of these

Ans: a

36.Which of these is a routing protocol for low power lossy networks over IPv6?
a. RPL
b. OSPF
c. Both a and b
d. None of these

Ans: a

37. The basic unit of AMQP data is:


a. A frame
b. A packet
c. A byte
d. A bit

Ans: a

38. RPL supports:


a. Message confidentiality
b. Loop detection in the routes
c. Data path validation
d. All of these

Ans: d

39. Which statement is TRUE with respect to the IEEE 802.15.4 standard?
a. It is a low data-rate standard.
b. Used for architecting wireless PANs
c. Uses only two layers – PHY and MAC
d. All of these

Ans: d

40. LOADng routing uses:


a. AODV
b. DSDV
c. RIPv2
d. OSPF

Ans: a

41. The number of channels incorporated in physical layer of the HART standard are:
a. 10
b. 15
c. 20
d. 64

Ans: b

42.Channel hopping is performed at which HART layer?


a. Physical
b. Data link
c. Network
d. Application

Ans: b

43. This process of bypassing radio dead-spots in Z wave is done using a message called
a. Healing
b. Beacon
c. Probe
d. None of these

Ans: a

44. The difference between the wired and wireless versions of HART are at the:
a. Network layer
b. Physical layer
c. Data link layer
d. All of these

Ans: d

45.WASN stands for:


a. Wireless and Sensor networks
b. Wired and Sensor networks
c. Wireless Ad-hoc Sensor Networks
d. None of these

Ans: c

46. Class-2 Bluetooth devices have a range of:


a. 1m
b. 10m
c. 100m
d. 1000m
Ans: b

47.SOS in sensor web stands for


a. Sensor of a System
b. System of Sensors
c. Sensor Observation Service
d. None of these

Ans: C

48. Which topology is supported by Z wave:


a. Star
b. Mesh
c. Tree
d. All of these

Ans: d

49.QoS guarantees in WSNs include:


a. Offering guarantees in terms of bandwidth, delay, jitter
b. Offering guarantees in terms of packet loss probability.
c. Offering guarantees in terms of Limited bandwidth, unpredictable changes in RF channel characteristics.
d. All of these

Ans: d

50. The WSN nodes are prone to:


a. Malicious attacks
b. Eavesdropping
c. Interference
d. All of these

Ans: d

51. With respect to WSN coverage problems, the OGDC algorithm is an acronym for:
a. Optimal Geographic Density Control
b. Optimal Geographic Distance Control
c. Optimal Geographic Distance Coverage
d. Optimal geographic Density Coverage

Ans: a

52.A crossing with respect to WSN coverage is _ if it is in the interior region of at least one node’s coverage
disk.
a. Partially covered
b. Covered
c. Not covered
d. Isolated

Ans: b
53. A PIR Sensor stands for:
a. Proximity Infra-Red
b. Passive Infra-Red
c. Picture Infra-Red
d. None of these

Ans: b

54. WMSNs stand for:


a. Wired Multimedia Sensor Networks
b. Wireless Multimedia Sensor Networks
c. Wireless Mobile Sensor Networks
d. Wireless Machine Sensor Network

Ans: b

55. UAV-VANETS link-up may be used for:


a. visual guidance
b. Data-muling
c. Coverage enhancement
d. All of these

Ans: d

56. M2M stands for:


a. MAC to MAC communication
b. Machine to MAC communication
c. Machine to machine communication
d. MAC to machine communication

Ans: c

57.In WSN area coverage problem, which is TRUE?


a. Energy-efficient random coverage
b. Connected random coverage
c. A network is connected if any active node can communicate with any other active nodes
d. All of these

Ans: d

58.In a M2M ecosystem, Internet service providers:


a. Provide their infrastructures for M2M device communications.
b. are responsible for devices providing raw data.
c. is an individual or company what utilizes M2M applications.
d. None of these

Ans: a
59.With respect to stationary sensor networks, which of these points apply?
a. Easy deployment
b. Node can be placed in an optimized distance
c. Easy topology maintenance
d. All of these

Ans: d

60. High-end M2M nodes have:


a. Mobility
b. QoS guarantees
c. Low density deployment
d. All of these

Ans: d

61. A hardware code, before uploading to an embedded processor board first needs to be:
a. Verified and compiled
b. Executed
c. Both a and b
d. None of these

Ans: a

62. Why interoperability is required?


a. Heterogeneous wireless communication protocols
b. Different programming languages
c. Different control models
d. All of the above

Ans: d

63. What is the function for reading humidity from DHT sensor from Arduino?
a. dht.readHumidity()
b. dht.readTemperature()
c. dht.begin()
d. d. dht(pin,DHT22)

Ans: a

64.Device interoperability problem is between


a. Two devices
b. A device and an user
c. Both (a) and (b)
d. None of the above

Ans: a
65. Which is the following is not an Actuator?
a. Servo motor
b. Stepper motor
c. DHT
d. Relay

Ans: c

66. Which of the following is not a sensor?


a. Barometer
b. Light Dependent Resistor (LDR)
c. DHT
d. Relay

Ans: d

67. What is the servo library command to move the shaft of Servo motor back and forth across 180 degree?
a. Knob()
b. Sweep()
c. write()
d. detach()

Ans: b

68. The code written in Arduino IDE is referred to as:


a. Script
b. Block
c. Sketch
d. Arduino Script

Ans: c

69. Which of the following library functions can be used to generate a random number in Arduino?
a. randomize()
b. ran()
c. rand()
d. random()

Ans: d

70. Which pin of Arduino should be connected with the pin 3 of the DHT sensor?
a. Pint 5V
b. Pin 3.3V
c. Pin GND
d. None of the these

Ans: d

71. By default, the GPIO pins in Raspberry Pi are configured as?


a. Input except pins 14 and 15
b. Output except pins 14 and 15
c. Bcm
d. GPIO

Ans: a

72.Which of the following datatype is correct for the object below?


D = [‘python’, 3.43, ‘p’, 100]
a. Array
b. Dictionary
c. Tuple
d. List

Ans: b

73.What does the method readline() return:


a. One line
b. One byte
c. One character
d. Bool

Ans: a

74. What is the maximum peripheral current draw allowed in Raspberry pi 3?


a. 1200mA
b. 700mA
c. 500mA
d. 100mA

Ans: a

75. Data collected by Raspberry Pi from the sensor can be


a. Processed in Raspberry Pi
b. Sent to other devices connected to the network
c. Used to control/activate other devices in the network
d. All of the above

Ans: d

76. Relay is a kind of:


a. Sensor
b. Actuator
c. Hub
d. Router

Ans: b

77. What are the mode/modes used for addressing the pins in Raspberry Pi?
a. GPIO
b. BCM
c. GPIO and BCM
d. GPIO, BCM and CAN
Ans: c

78. Which of the following variants of Raspberry Pi has an inbuilt wi-fi?


a. Raspberry Pi 2
b. Raspberry Pi 3
c. Raspberry Pi A+
d. Raspberry Pi Zero

Ans: b

79. Internet of Things refers to:


a. Interconnection of devices in a network
b. Exchange of data between devices in a network
c. An ecosystem of devices, accessible through internet
d. All of the above

Ans: d

80. IoT devices must have:


a. A USB port
b. A unique identification
c. Wired connectivity
d. All of the above

Ans: b

81.Server is a:
a. Computer
b. Any device/program which serves or responds to the request from client
c. A data center
d. Cloud

Ans: b

82. The split() function in Python programming language breaks the string on the basis of:
a. Blank Space
b. Comma
c. Any specified delimiter
d. Hyphen

Ans: c

83. Bind() function in Python socket programming is used to:


a. Specify the port for service on the specified host
b. Read data from the socket
c. Send data to the socket
d. Initiate the connection

Ans: a
84. Application program interface (API) used between data and control planes in SDN is known as:
a. Northbound API
b. Eastbound API
c. Southbound API
d. Westbound API

Ans:c

85. When does a switch send PAKCET-IN message to a controller in SDN:


a. Flow-rule associated with a received flow does not exist
b. All the time
c. After deleting a flow-rule
d. None of the above

Ans: a

86. In SDN, does the control overhead increase compared to the traditional network:
a. Depends on application and network topology
b. Yes, always
c. Not at all
d. Depends on OpenFlow protocol

Ans: a

87. One of the advantages of SDN-based sensor network is:


a. Real-time programmability
b. No need to replace any node
c. Both a & b
d. None of the above

Ans: a

88. Application program interface (API) used between application and control planes is known as:
a. Northbound API
b. Eastbound API
c. Southbound API
d. Westbound API

Ans: a

89. An SDN Controller can be placed based on:


a. Hierarchical manner
b. Star-topology
c. Mesh topology
d. All of the above

Ans: d
90. Typically, __ protocol is used in low-rate wireless PANs:
a. IEEE 802.15.4
b. IEEE 802.11
c. IEC 6250
d. None of the above

Ans: a

91.Using SDN, the following can be managed:


a. Network partition
b. Network matching
c. Load balancing
d. All of the above

Ans: d

92. From the below given options, which is not a characteristic of cloud computing?
a. Low management effort
b. Low level generalization of computation
c. On-demand network access
d. Configurable computing resources

Ans: b

93. Pre-configure facility for allocation of virtualized resources comes under


a. Availability and reliability
b. Scalability and elasticity
c. Manageability and interoperability
d. Measured Services

Ans: c

94. Service Management mainly focusses on


a. Importance to desired outcomes of customers
b. Importance to desired outcomes of organizations
c. Both (a) and (b)
d. none of the above

Ans: a

95. Broad network access in cloud deals with


a. Dynamic allocation for scale out
b. Recorded resource usage
c. Availability of cloud resources over the network
d. All of the above

Ans: c
96. Billing information is calculated using
a. Accounting Records only
b. Billing rules and Accounting records
c. Billing rules, Accounting records and Resource prices
d. None of the above

Ans: c

97. Integrity in data security is :


a. Detecting unauthorized data modification
b. Sending secure data to cloud
c. Preserving the privacy of data
d. None of the above

Ans: a

98. Cloud Analyst provides


a. Support for large scale cloud applications
b. GUI based control
c. Flexible and repeatable environment
d. All of these

Ans: d

99. GreenCloud Simulator is designed based on


a. NS-3
b. NS-2
c. CloudSim
d. DCSim

Ans: b

100. Which of the following is not a cloud simulator?


a. CloudSim
b. NS-3
c. DCSim
d. GroudSim

Ans: b

101. What is the purpose of floating IP in Openstack?


a. To connect the instance with the external network
b. To interconnect among instances
c. To connect among instances inside a same network
d. None of them

Ans: a
102. We normally take snapshot in Openstack, _.
a. After the installation of an instance
b. Before the installation of an instance
c. It is an inbuilt image in Openstack
d. It should be downloaded from the internet

Ans: a

103. Sensor-Cloud deals with


a. Sensor-for-Service
b. Sensor-as-a-Service
c. Sensor-in-Cloud
d. None of these

Ans: b

104. Which of the following statement is true in sensor-cloud


a. End user procures sensors and lend these to sensor-cloud service provider
b. Sensor-cloud is based only on dumping the sensor data to the cloud
c. Single sensor nodes is shared dedicatedly with only one end user
d. None of these

Ans: d

105. What are the three main issues faced by cloud while handling IoT data?
a. speed, volume, bandwidth
b. speed, quality of service, volume
c. volume, latency, bandwidth
d. none of the above

Ans: c

106. Why data volume is a problem in IoT-based cloud computing?


a. because data are encrypted and hard to analyze
b. because data coming from IoT devices are always in raw format and difficult to store
c. because the density of IoT devices is increasing each day and in turn the volume of generated data is
growing very fast
d. because IoT device density is decreasing each day and in turn the volume of generated data are decreasing very
fast

Ans: c

107. If the time-sensitive data are sent to cloud for analysis, the latency will be __
a. Increased
b. Decreased
c. neither increase nor decrease
d. first increase, then decreased

Ans: a
108. What is a good approach to reduce latency?
a. Analyzing data close to the data source
b. Analyzing data in cloud
c. Increasing number of nodes
d. Decreasing number of nodes

Ans: a

109. What are less time-sensitive data?


a. Data which can be analyzed after seconds or minutes
b. Data which should be analyzed within fraction of a second
c. Data which can be wait for hours, days, weeks
d. Data which can be wait for months

Ans: a

110. How fog provide better privacy to industries and companies?


a. By providing the facility to store confidential data in their local servers
b. By providing more secure communication system
c. By providing a secured VPN network
d. All of the above

Ans: a

111.Which of these can be considered as the skeleton for smart cities?


a. Buildings
b. Transportation
c. Banks
d. Sensors

Ans: a

112. Which of these can be considered as the sensory organs for smart cities?
a. Buildings
b. Transportation
c. Banks
d. Sensors

Ans: d
113. Smart Agriculture incorporates:
a. Alert generation in case of above-threshold pollutants in the air or water.
b. Scheduling harvesting and arranging proper transfer of harvests to
warehouses or markets.
c. Both the above
d. None of these

Ans: b

114. Heterogeneity for IoT in smart cities stands for:


a. Integration of varying hardware platforms and specifications.
b. Integration of different radio specifications.
c. Integration of various software platforms.
d. All of these

Ans: d

115. Which of these can be categorized as AI based mathematical model for data fusion?
a. CNN
b. Recursive methods
c. Bayesian analysis
d. Belief networks

Ans: a

116. Which of these connects cable-based networks with wireless networks for increased sharing of media,
control and access and can share network media resources?
a. UPnP
b. DLNA
c. LAN
d. WiFi

Ans: b

117. Which of these is NOT a feature of VANETs?


a. High Dynamic Topology
b. High transmission and computation capability
c. Stable connectivity
d. Predictable mobility pattern

Ans: c

118. X-10 protocol is characterized by:


a. Low-speed and low data rate.
b. Low speed and high data rate
c. High speed and low data rate
d. High speed and high data rate

Ans: a
119. The V2X paradigm is not restricted to a single source information provider.
a. True
b. False
c. Sometimes True, mostly False
d. Sometimes False, mostly True

Ans: a

120. TCP/IP fails in V2X because:


a. TCP/IP is designed mainly for handling information exchange between a single pair of entities.
b. Information exchanges in TCP/IP are dependent on the location of data.
c. TCP/IP can only identify the addresses of endpoints, which alone is not useful for content distribution.
d. All of these

Ans: d

121. Net metering depends on –


a. Energy consumed by the consumers and energy generated by the consumers
b. Energy consumed by the consumers and energy supplied back to the grid
c. Only energy consumed by the consumer
d. None of the above

Ans: b

122. Smart grid enables –


a. Distributed energy management
b. Centralized energy management
c. Either of these
d. None of these

Ans: a

123. In smart grid, gateways communicate using –


a. IEEE 802.15.4
b. IEEE 802.15.6
c. 6LowPAN
d. IEEE 802.11

Ans: d

124. Full form of SANETs –


a. Sensors and Actions Networks
b. Sensors and Actuator Networks
c. Smart and Active Networks
d. None of these

Ans: b
125. In IIoT environment, networks can
a. Communicate with each other, external environment and people.
b. Communicate with each other, but not with external environment and people.
c. Does not communicate with each other, but communicates with external
environment.
d. Communicate with each other, but not with people.

Ans: a

126. IIoT is mainly focused on


a. Convenience of individuals
b. Efficiency, safety and security of operation and individuals.
c. Efficiency of the system.
d. Data security.

Ans: b

127. What is the key technology to enable V2V and V2R communication?
a. Short Range Communication
b. Dedicated Short Range Communication
c. Long Range Communication
d. Medium Range Communication

Ans: b

128. What do you mean by service management in IIoT?


a. Implementation and management of the quality of services
b. Collection of services
c. Features extracted from data received
d. Services which do not meet the demand of end-users.

Ans: a

129. Traditional RDBMS unable to process –


a. Structured data
b. Unstructured data
c. Both structured and unstructured data
d. None of these

Ans: b

130.Structured data is managed in database using –


a. .NET Framework
b. Structured Query Language
c. Normal Language Processing
d. All of these

Ans: b
131.Mathematical model, which represents the relationship between variables, is termed as –
a. Mathematical model
b. Statistical model
c. Variability model
d. None of the above

Ans: b

132. ANOVA has –


a. Two types
b. Three Types
c. Four Types
d. Any finite value

Ans: b

133. Which of the following option supports a long-range communication


a. ZigBee
b. GPRS
c. Bluetooth
d. All of the above

Ans: b

134. The primary challenges of an embedded operating system for WSN are
a. Small memory footprint
b. Low power and computing capability
c. Lack hardware parallelism
d. All of these

Ans: d

135. What is the network topology of Ambusens WBAN devices


a. Bus topology
b. Star Topology
c. Mesh Topology
d. None of the above

Ans: b

136. Which communication protocol is used between sensor devices in Ambusens WBAN system
a. 3G
b. WLAN/Wi-fi
c. IEEE 802.15.4
d. IEEE 802.15.1

Ans: d
137. Which privacy-aware scheme is used in Ambusens cloud framework
a. Hashing and reverse hashing of patient physiological data
b. Patient identity masking by hashing-based mechanism
c. Hashing and reverse hashing of physiological sensor ID
d. All of the above

Ans: b

138. Activity monitoring:


a. Provides better quality of life
b. Provides information accurately in a reliable manner
c. Provides continuous monitoring support.
d. All of these

Ans: d

139. Which of these sensors can be most appropriately used for activity monitoring in wearables?
a. Accelerometer
b. Cameras
c. LIDARs
d. LED

Ans: a

140. Statistical methods of activity recognition can work on:


a. Videos
b. Images
c. Scalar sensor data
d. All of these

Ans: c

141. Which indicates the communication between internetworking devices and applications. a. Internet b.
Communication Devices c. Internet of things d. None of the above

Which indicates the computations at device level before the computed data is communicated through internet
a. Computing
b. Edge Computing
c. Communication
d. Internetworking

Ans: b

142. The levels of IoT are called as


a. Nodes
b. Tires
c. Items
d. Blocks

Ans: b
143. Which are the devices that sense the physical environments
a. Control units
b. Sensors
c. Firmware
d. PDU’s

Ans: b

144. Which IoT block contains the MCU or Customer chip


a. Control units
b. Sensors
c. Firmware
d. PDU’s

Ans: a

145. REST stands for


a. Raspbian state transfer
b. Raspberry state transfer
c. Representational state transfer
d. Raswik state transfer

Ans: c

146. Which is an operating system for IOT


a. Contiki
b. RIOT
c. Spark
d. Allyoyn

Ans: a

147. Which is an open data platform with open API


a. Thingspeak
b. Nimbits
c. IoT toolkit
d. Site Where

Ans: a

148. Which provides complete platform for managing IoT Devices


a. Thingspeak
b. Nimbits
c. IoT toolkit
d. Site Where

Ans: d
IOT
Unit 3 & 4

1. What is NFC?
a)Short distance wireless communication technology
b)enhancement of ISO/IEC14443 standard
c)both a & b
d) cannot say
Answer: c

2. NFC stands for ________


a) Near Fast Communication
b) Near Field Communication
c) Near Field Customer
d) Near Field Connection
Answer: b
3. HART stands for_________
a) Highway Addressable Remote Transducer
b) High Addressable Remote Transducer
c) High Application Remote Transducer
d) Highway Application Remote Transducer
Answer:a
4. Which of the following is application of IEEE 802.14.5
a) Zigbee
b) wireless HART
c) both a&b
d) none
Answer: c

5. Zigbee commonly deployed in ……….topology to extend coverage by relaying


sensor data over multiple sensor nodes.
a) star
b) mesh
c) mix
d) none
Answer:b

6. _________ allows us to control electronic components


a) RETful API
b) RESTful API
c) HTTP
d) MQTT
Answer: a
7. MQTT stands for _____________
a) MQ Telemetry Things
b) MQ Transport Telemetry
c) MQ Transport Things
d) MQ Telemetry Transport
Answer: d

8. MQTT is better than HTTP for sending and receiving data.


a) True
b) False
Answer:a

9. MQTT is _________ protocol.


a) Machine to Machine
b) Internet of Things
c) Machine to Machine and Internet of Things
d) Machine Things
Answer: d

10. Which protocol is lightweight?


a) MQTT
b) HTTP
c) CoAP
d) SPI
Answer: a

11. PubNub publishes and subscribes _________ in order to send and receive
messages.
a) Network
b) Account
c) Portal
d) Keys
Answer: d

12. CoAP is specialized in ___________


a) Internet applications
b) Device applications
c) Wireless applications
d) Wired applications
Answer: a
13. CoAP is designed for use between devices on the same constrained network.
a) True
b) False
Answer: a
14. Which layer is CoAP?
a) Control layer
b) Transport layer
c) Service layer
d) Application layer
Answer: c

15. CoAP provides which of the following requirements?


a) Multicast support and simplicity
b) Low overhead and multicast support
c) Simplicity and low overhead
d) Multicast support, Low over head, and simplicity
Answer: d

16. Do CoAP has memory?


a) True
b) False
Answer: a

17. What is the RAM and ROM size in CoAP?


a) 100 KiB of RAM and 10 KiB of ROM
b) 10 KiB of RAM and 100 KiB of ROM
c) 10 KiB of RAM and 250 KiB of ROM
d) 250 KiB of RAM and 10 KiB of ROM
Answer: b

18. CoAP feels very much like HTTP.


a) True
b) False
Answer: a

19. Which is an open standard?


a) HTTP
b) MQTT
c) XMPP
d) CoAP
Answer: d

20. HART stands for_________


a) Highway Addressable Remote Transducer
b) High Addressable Remote Transducer
c) High Application Remote Transducer
d) Highway Application Remote Transducer
Answer: a
21. LTP stands for _________
a) Lean Transducer Protocol
b) Lean Transport Protocol
c) Layer Transport Protocol
d) Layer Transducer Protocol
Answer: b

22. CoAP is a specialized _________ protocol.


a) Web Transfer
b) Power
c) Application
d) Resource
Answer: a

23. MQTT is mainly used for __________


a) M2M communication
b) Device communication
c) Internet communication
d) Wireless communication
Answer: a

24. Which is an open standard?


a) CoAP
b) MQTT
c) XMPP
d) HTTP
Answer: b

25. MQTT is _________ oriented.


a) Data
b) Message
c) Network
d) Device
Answer: b

26. Does MQTT support security.


a) True
b) False
Answer: a

27. Standard ports of MQTT are __________


a) I2C
b) SSL
c) USART
d) TCP/IP
Answer :d
28. Full form of MQTT _____
a) Message Queuing Telemetry Transport
b) Message Queuing Telegram Transport
c) Message Queue Telegram Transport
d) Message Queue Telemetry Transport
Answer:c

29. Does HTTP protocol take more power.


a) True
b) False
Answer: a

30. What does HTTP do?


a) Enables network resources and reduces perception of latency
b) Reduces perception of latency and allows multiple concurrency exchange
c) Allows multiple concurrent exchange and enables network resources
d) Enables network resources and reduces perception of latency and Allows
multiple concurrent exchange
Answer :d

31. A request from client is basically made of ______


a) Method
b) Task
c) Event
d) Signal
Answer: a

32. Response is made up of a ________ status code.


a) two-digit
b) three-digit
c) five-digit
d) six-digit
Answer: b

33. Which protocol provides server push?


a) SPI
b) MQTT
c) CoAP
d) HTTP
Answer: d

34. HTTP expands?


a) HyperText Transfer Protocol
b) HyperTerminal Transfer Protocol
c) HyperText Terminal Protocol
d) HyperTerminal Text Protocol
Answer: a
35. How many types of message formats are there in HTTP protocol?
a) 4 types
b) 3 types
c) 2 types
d) 5 types
Answer: c

36. Statue line is present in which message format?


a) Request message
b) Response message
c) Both request and response
d) Neither request nor response
Answer: b

37. Request field is present in which message format?


a) Request message
b) Response message
c) Both request and response
d) Neither request nor response
Answer: a

38. Does HTTP protocol have _________ handshakes.


a) 2 way
b) 1 way
c) 3 way
d) 5 way
Answer: c

39. Does HTTP has pipelining.


a) True
b) False
Answer: a

40. What is the sensor/protocol used in GSN?


a) HTTP protocol
b) CoAP protocol
c) MQTT protocol
d) XMPP protocol
Answer:b

41. AMQP stands for ____________


a) Advanced Message Queuing Protocol
b) Application Message Queuing Protocol
c) Advanced Mailing Queuing Protocol
d) Application Mailing Queuing Protocol
Answer : a
42. The best example for interoperability at the application layer is?
a) Data
b) Net
c) File
d) Web
Answer:d

43. Services provided by application layer?


a) Web chat
b) Error control
c) Connection services
d) Congestion control
Answer:a

44. How many protocols are used in the application layer?


a) 15
b) 10
c) More than 15
d) More than 10
Answer: c
45. What is the main responsibility of application layer?
a) Error handling
b) Web surfing
c) Virtual terminal
d) Network data sharing
Answer: a

46. Reoccurring problems can be achieved using __________


a) DNS
b) Telnet
c) BOOTP
d) Patterns
Answer:d

47. Application layer is the ending of the data layer.


a) True
b) False
Answer: a

48. Application layer interacts directly with the ________


a) front user
b) end user
c) sensors
d) wired link
Answer : b
49. RPL stands for
a) Routing Protocol for Low-Power and Lossy Network
b) Routing Protocol for Low-Power and Least Network
c) Routing Principle for Low-Power and Lossy Network
d)Routing Protocol for Low-Power and Least Network
Answer : A

50. Which protocol is used to link all the devices in the IoT?
a) TCP/IP
b) Network
c) UDP
d) HTTP
Answer : a

51. ________ enables seamless integration of LoWPAN devices with internet


leveraging.
a) IETF 6LoWPAN
b) IEFT CoAP
c) RFID/NFC
d) IEEE 802.15.4.LoWPAN
Answer : a

52. ________ enables open application layer for constrained nodes.


a) IETF 6LoWPAN
b) IEFT CoAP
c) RFID/NFC
d) IEEE 802.15.4.LoWPAN
Answer: b

53. _______ tags, devices, smart phones useful in identification.


a) IETF 6LoWPAN
b) IEFT CoAP
c) RFID/NFC
d) IEEE 802.15.4.LoWPAN
Answer : c

54. ________ supports low energy radio operation.


a) IETF 6LoWPAN
b) IEFT CoAP
c) RFID/NFC
d) Bluetooth
Answer : d

55. ________ specification defining the PHY and MAC layer of low power devices.
a) IETF 6LoWPAN
b) IEFT CoAP
c) RFID/NFC
d) IEEE 802.15.4.LoWPAN
Answer: d

56. 6LoWPAN Adaption layer contains?


a) Header compression
b) Fragmentation
c) Layer 2 forwarding
d) Header compression, Fragmentation, and Layer 2 forwarding
Answer: d

57. ________ is an application layer protocol for resource constrained devices.


a) CoAP
b) HMTP
c) MQTT
d) TCP/IP
Answer: a

58. Adheres to ________ approach for managing resources and support mapping to
HTTP.
a) RETful
b) IoT
c) Restful
d) RESTful
Answer : d

59. . ________ resources are identified by Uniform Resource Identifiers.


a) CoAP
b) HMTP
c) MQTT
d) TCP/IP
Answer : a

60. CoAP messages are short.


a) True
b) False
Answer: a

61. Which protocol interacts asynchronously over UDP?


a) HMTP
b) CoAP
c) MQTT
d) TCP/IP
Answer: b

62. How many messages types are there in CoAP?


a) 2
b) 5
c) 3
d) 4
Answer : d

63. How many messages types are there in CoAP?


a) 2
b) 5
c) 3
d) 4
Answer: c

64. Many desktops and operating systems include which protocol?


a) IPv6 protocol
b) IPv4 protocol
c) Both IPv6 and IPv4 protocol
d) IPv3 protocol
Answer : a

65. The original IEEE 802 MAC address comes from________


a) MAC address
b) IP address
c) Ethernet address
d) Http
Answer : c

66. Web applications support ___________ API.


a) RESTful
b) RESful
c) Class
d) Lua
Answer: a

67. Version 6 of IP address has how many bits.


a) 64 bits
b) 128 bits
c) 32 bits
d) 256 bits
Answer: b

68. Many desktops and operating systems include which protocol?


a) IPv6 protocol
b) IPv4 protocol
c) Both IPv6 and IPv4 protocol
d) IPv3 protocol
Answer : A

69. Application layer interacts directly with the ________


a) front user
b) end user
c) sensors
d) wired link
Answer : b

70. IPv6 has a larger address space of _________


a) 216
b) 2128
c) 232
d) 28
Answer: b

71. In IPv6, real-time audio or video, particularly in digital form, requires resources
such as __________
a) Fixed Bandwidth
b) Variable Bandwidth
c) High Bandwidth
d) Low Bandwidth
Answer : c

72. In practical IPv6 application, a technology encapsulates IPv6 packets inside IPv4
packets, this technology is called _______
a) Tunneling
b) Hashing
c) Routing
d) NAT
Answer: a

73. The header length of an IPv6 datagram is ___________


a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes
Answer : d

74. In the IPv6 header, the traffic class field is similar to which field in the IPv4
header?
a) Fragmentation field
b) Fast switching
c) TOS field
d) Option field
Answer : c

75. Which are the features present in IPv4 but not in IPv6?
a) Fragmentation
b) Header checksum
c) Options
d) All of the mentioned
Answer : d
76. IPv6 is designed to allow extension of the _________
a) Protocol
b) Dataset
c) Headers
d) Routes
Answer: a

77. In IPv6, base header can be followed by, up to _________


a) Six Extension Layers
b) Six Extension Headers
c) Eight Extension headers
d) Eight Extension layers
Answer: b

78. Requests package is very popular _________ Library.


a) MQTP
b) SMTP
c) CoAP
d) HTTP
Answer : d

79. Requests package is very popular HTTP library for _________


a) C
b) Embedded c
c) Python
d) Java
Answer :c

80. Does HTTP protocol take more power.


a) True
b) False
Answer: a

81. How many messages will HQTTP will send in 1024?


a) All
b) 256
c) 240
d) 514
Answer: c

82. How many messages will HTTP will send per hour?
a) 1,708
b) 160,278
c) 3,628
d) 263,314
Answer: a
83. IP is connectionless.
a) True
b) False
Answer : a

84. Bluetooth operates at short distances.


a) True
b) False
Answer : a

85. __________ layer is the communication layer that connects the IoT devices with
WAN.
a) Internet layer
b) Application layer
c) Sensor layer
d) Network layer
Answer : d
86.
87. What is the format of IP address?
a) 34 bit
b) 64 bit
c) 16 bit
d) 32 bit
Answer: d

88. MQTT is better than HTTP for sending and receiving data.
a) True
b) False
Answer: d

89. MQTT is _________ protocol.


a) Machine to Machine
b) Internet of Things
c) Machine to Machine and Internet of Things
d) Machine Things
Answer: c

90. . Which protocol is lightweight?


a) MQTT
b) HTTP
c) CoAP
d) SPI
Answer : a
Seat No -
Total number of questions : 60

PWD11678_EMBEDDED SYSTEM AND INTERNET OF THINGS


Time : 1hr
Max Marks : 50
N.B

1) All questions are Multiple Choice Questions having single correct option.

2) Attempt any 50 questions out of 60.

3) Use of calculator is allowed.

4) Each question carries 1 Mark.

5) Specially abled students are allowed 20 minutes extra for examination.

6) Do not use pencils to darken answer.

7) Use only black/blue ball point pen to darken the appropriate circle.

8) No change will be allowed once the answer is marked on OMR Sheet.

9) Rough work shall not be done on OMR sheet or on question paper.

10) Darken ONLY ONE CIRCLE for each answer.

Q.no 1. Information model adds more details to the Virtual Entities by defining
their ----------- and relations.

A : Virtual

B : System Model

C : Attributes

D : Domain Model

Q.no 2. Which company played a key role in the development of cloud computing?

A : Microsoft

B : Google

C : Amazon

D : Cloudera
Q.no 3. MQTT protocol is based on

A : Client-Server Architecture

B : Publish-Subscribe Architecture

C : Both of the above

D : Peer to peer Architecture

Q.no 4. In M2M/ IoT protocols the payload and hearder is very __________

A : Small

B : Big

C : Same as Internet Protocol

D : Moderate

Q.no 5. IAD stands for ___________

A : Intelligent Assist Device

B : Industrial Assist Device

C : International Assist Device

D : Informative Assist Device

Q.no 6. Operational View Specification is

A : Integration of the devices

B : Integration of the Components

C : Integration of Applications

D : None of above

Q.no 7. Which layer is responsible for WAMP communication ?

A : Application

B : Physical

C : Transport

D : Session
Q.no 8. Unique ID for each device in skynet is _______

A : SSID

B : UID

C : UUID

D : ID

Q.no 9. Which of the following feature is used for scaling EC2 sites ?

A : Auto Replica

B : Auto Scaling

C : Auto Ruling

D : All of the mentioned

Q.no 10. The control in SCADA is _____________

A : a) Online control

B : b) Direct control

C : c) Supervisory control

D : d) Automatic control

Q.no 11. MQTT is _________ oriented protocol.

A : Data

B : Message

C : Network

D : Device

Q.no 12. In Core of SODA which standard is based on XML encodings

A : DDL

B : XML

C : SOA

D : SODA
Q.no 13. SOA stands for ……….

A : Solution Oriented Architecture

B : Sector Oriented Architecture

C : Source Oriented Architecture

D : Service Oriented Architecture

Q.no 14. Amazon Web Services supports which type II Audits ?

A : SAS20

B : SAS70

C : SAS702

D : None of the above

Q.no 15. What is the full form of SCADA?

A : a) Supervisory Control and Document Acquisition

B : b) Supervisory Control and Data Acquisition

C : c) Supervisory Column and Data Assessment

D : d) Supervisory Column and Data Assessment

Q.no 16. HelloWeb is an example of __________

A : HTTP

B : MQTT

C : SMTP

D : CoAP

Q.no 17. What is SCADA?

A : a) Software

B : b) Process

C : c) System

D : d) Hardware
Q.no 18. Making the smaller and smaller things have the ability to connect and
interact.

A : a) Micro Tech

B : b) Smart tech

C : c) Nano tech

D : d) RFID

Q.no 19. MQTT is _________ protocol.

A : a) Machine to Machine

B : b) Internet of Things

C : c) Machine to Machine and Internet of Things

D : d) Machine Things

Q.no 20. Which one is the Last step in IOT Platforms Design Methodology

A : Application Development

B : Purpose and Requirement

C : Domain Model Specification

D : Service Specification

Q.no 21. Which Django component concerns about metadata ?

A : Model

B : View

C : Template

D : None of the above

Q.no 22. Sensor TEDS Standardization Efforts given by

A : IEEE 1459

B : IEEE 1451

C : IEEE 1441

D : IEEE 1414
Q.no 23. WAMP uses _____ messaging pattern

A : Function call

B : Procedure call

C : RPC

D : Web based

Q.no 24. In 2008, which company launched the PaaS on-demand development
platform & become a new pillar of cloud computing?

A : Salesforce

B : The force.com

C : Amazon

D : Cloudera

Q.no 25. What are the parameters that are default values?

A : a) Port_Name and Bits

B : b) Speed and Port_Names

C : c) Speed and Parity

D : d) Stop bit and Flow Control

Q.no 26. What are the distributions supported by raspberry Pi?

A : a) Arch Linux

B : b) Debain

C : c) Fedora Remix

D : d) Arch Linux, Debain, and Fedora Remix

Q.no 27. _______________ are called as front end of IoT device

A : Sensors

B : Gateways

C : Processors

D : Applications
Q.no 28. Which one is not True regarding WebSocketAPIs

A : bi-directional

B : Full duplex

C : Not Secure

D : Exclusive Pair Communication

Q.no 29. This protocol is lightweight in nature and is ideal for connecting small
devices to constrained networks

A : MQTT

B : CoAP

C : IPv4

D : IPv6

Q.no 30. Key elements of ETSI M2M architecture are


I] M2M device & M2M gateway
II] M2M area network & M2M communication network
III] M2M application server

A : Option I , II and III

B : Option I and II

C : Option II and III

D : Option III

Q.no 31. The main importance of ARM micro-processors is providing operation


with ______

A : Low cost and low power consumption

B : Higher degree of multi-tasking

C : Lower error or glitches

D : Efficient memory management

Q.no 32. NFC stands for

A : Near Fast Communication

B : Near Field Communication


C : Near Field Consumer

D : Near Field Connection

Q.no 33. Which statement is True for Real Time Operating System (RTOS):

A : Act as interface between hardware & Application software.

B : RTOS defines the way the system work.

C : Which supervise the application software.

D : All of Above

Q.no 34. Which of the following is (are) example(s) of embedded system for data
communication? USB Mass Storage device

A : Network router

B : Digital camera

C : Music player

D : All of these

Q.no 35. Which of the following Hardware can be alone used as IoT Gateway

A : a) RaspberriPI

B : b) NodeMCU ESP8266

C : c) Arduino UNO

D : d) Both a and b

Q.no 36. Gateway provides the connection between _____ and _____

A : Cloud and controller

B : Network and Cloud

C : Network and Controller

D : Controller and Device

Q.no 37. Which of the Following are ZigBee based application

A : FM Radio

B : low-power High-bandwidth
C : Balestic Missile

D : Medical Device Data Collection

Q.no 38. ………. Middleware include all enterprise middleware, B2B, EAI, multi-
tenant App servers, etc.

A : SaaS

B : IaaS

C : FaaS

D : PaaS

Q.no 39. WAMP follows ______ approach.

A : Connectionless

B : Connection-Oriented

C : OTA

D : None of the above

Q.no 40. Which of the following is not a correct way to secure communication
layer

A : Cloud initiated communication

B : TLS/SSL

C : IPS(Intrusion Prevention System)

D : Firewalls

Q.no 41. Which one is not a type Of RTOS

A : 1)Hard RTOS

B : Soft RTOS

C : Firm RTOS

D : Embedded RTOS

Q.no 42. ………. supports virtualization creates virtual versions of the resources
like servers, storage and OS.

A : Grid Computing
B : Data Mining

C : Cloud Computing

D : Business Intelligence

Q.no 43. What bit processor is used in Pi 3?

A : a) 64-bit

B : b) 32-bit

C : c) 128-bit

D : d) Both 64 and 32 bit

Q.no 44. Two Pillars of the Web are


I ] The protocol
II] The software
III] Platform Middleware
IV] Business Intelligence

A : Option I and II

B : Option II and III

C : Option I not III

D : Option I not IV

Q.no 45. Amazon EC2 data is stored using _____

A : EBS

B : ECS

C : Cloud

D : Database

Q.no 46. Which of the following is not a characteristic of a ZigBee network?

A : Low power consumption

B : Easy installation.

C : High data rates.

D : Unlicensed radio bands.


Q.no 47. Which of there following badatabse is recommended for unstrustured
data for IoT application

A : a) Microsoft SQL

B : b) Postgres SQL

C : c) Mongo DB

D : d) None of the above

Q.no 48. Which one is not Advanced features of ARM

A : Thumb

B : Cache

C : Fast Multiplier

D : None Of Above

Q.no 49. Hybrid IoT is ……….

A : made available to general public or a large industry group.

B : shared by several organizations and supports a specific community that has shared
concerns.

C : operated solely for an organization.

D : an integrated composition of two or more of the IoT systems (private, community,


or public)

Q.no 50. DDL classifies devices into three categories

A : API, actutators and complex devices

B : Bundles, API and sensors

C : OSGI, API and actutators

D : Sensor, actutators and complex devices

Q.no 51. IoT level _______ systems are suitable for solutions where the data
involved is big and the analysis requirements are computationally intensive.

A : Level 1

B : Level 2
C : Level 3

D : Level 4

Q.no 52. From following which one is not fit for IOT Level

A : IOT LEVEL 1

B : IOT LEVEL 2

C : IOT LEVEL 3

D : IOT LEVEL 11

Q.no 53. HTTP resources are located by

A : unique resource locator

B : unique resource identifier

C : none of the mentioned

D : uniform resource identifier

Q.no 54. CoAP provides which of the following requirements?

A : Multicast support and simplicity

B : Low overhead and multicast support

C : Simplicity and low overhead

D : Multicast support, Low over head, and simplicity

Q.no 55. Which of the following describes a message-passing taxonomy for a


component-based architecture that provides services to clients upon demand?

A : SOA

B : EBS

C : GEC

D : Option 2 and 3

Q.no 56. Private cloud, public cloud, community cloud and hybrid cloud are four
…….. models of cloud.

A : deployment
B : characteristic

C : solution

D : service

Q.no 57. In threat modeling, what methodology used to perform risk analysis

A : DREAD

B : OWASP

C : STRIDE

D : DAR

Q.no 58. For.........Secure, lightweight, and efficient key exchange mechanism is


required

A : Data Availability

B : Trust Management

C : Data Confidentiality

D : Secure Storage

Q.no 59. ________ is an attack which forces an end user to execute unwanted
actions on a web application in which he/she is currently authenticated.

A : Cross-site scoring scripting

B : Cross-site request forgery

C : Two-factor authentication

D : Cross-site scripting

Q.no 60. ARM processors where basically designed for

A : Main frame systems

B : Distributed systems

C : Mobile systems

D : Super computers

Q.no 1. IoT has _________number of levels.


A:4

B:3

C:5

D:6

Q.no 2. Which one is the First step in IOT Platforms Design Methodology

A : Process Model Specification

B : Purpose and Requirement

C : Domain Model Specification

D : Service Specification

Q.no 3. SODA all stands for-

A : Service oriented data architecture

B : Service oriented device authentication

C : Service oriented device architecture

D : Service oriented device aapplication

Q.no 4. Two of the most common protocols for SCADA _______________

A : DNP3

B : T101

C : Both A & B

D : IPv4

Q.no 5. AutoBahn for IoT uses which protocol

A : WAMP

B : HTTP

C : WAMP & HTTP

D : None of the above

Q.no 6. Which is one of the open-source IaaS (Infrastructure-as-a-Service) and


PaaS (Platform-as-a-Service) projects?
A : RedHat Cloud

B : Microsoft Azure

C : AWS

D : Google Cloud Platform

Q.no 7. BRIDGE stands for

A : Building Radio-Frequency Identifier

B : Building Radio-Frequency Identification

C : Building Radio-Frequency Identity

D : Building Radio-Frequent Identification

Q.no 8. Rate monotonic scheduling algorithm is an example of ____________category

A : Static

B : Dynamic

C : Hybrid

D : Mixed

Q.no 9. Microphones usually have ____

A : Amplifier filter

B : Noise Filter

C : Round Filter

D : Frequency filter

Q.no 10. The Functional View (FV) defines the functions of the IoT systems
grouped into various ----------.

A : Network Groups (NGs)

B : Model Groups (MGs)

C : Domain Groups (DGs)

D : Functional Groups (FGs)

Q.no 11. acroname of 6LoWPAN


A : a) IPv6 over Low power wireless personal area network

B : b) IPv4 over Low power wireless private area network

C : c) IPv6 over Low energy wire personal area network

D : d) IPv4 over LongRange wireless private area network

Q.no 12. Which of the following is not involved in working of IoT?

A : a) RFID

B : b) Sensor

C : c) Nano tech

D : d) Server

Q.no 13. Wi-Fi stands for?

A : a) Wireless fidelity

B : b) Wireless Flexibility

C : c) Wide Fidelity

D : d) WAN Flexibility

Q.no 14. Which is the last layer in the WoT architecture?

A : Composition Layer

B : Sharing Layer

C : Findability Layer

D : Accessibility Layer

Q.no 15. The father of ioT.

A : a) Kevin Atrun

B : b) Kevin Atrhur

C : c) Kevin Ashton

D : d) Kevin Thomas

Q.no 16. What are advantages of Auto Scaling ?


A : Better Availability

B : Better Cost management

C : Fault Tolerance

D : All of the mentioned

Q.no 17. Process Specification is the ------ Step in IOT platforms Design
Methodology

A : First

B : Second

C : Third

D : Four

Q.no 18. Which of the following is billing and account management service ?

A : Amazon Elastic MapReduce

B : Amazon Mechanical Turk

C : Amazon DevPay

D : Multi-Factor Authentication

Q.no 19. Which of the following is not the component of IoT Endpoint

A : Sensor

B : Gateway

C : Communication Module

D : MCU

Q.no 20. Amazon EC2 configuration determined by ?

A : CPU

B : memory & storage

C : networking capability

D : All of the mentioned


Q.no 21. Amazon launched ……….. on a utility computing basis in 2006, which is
now categorized as IaaS (Infrastructure as a service).

A : Amazon Prime

B : Amazon Web Series

C : AWS Academy

D : Amazon Web Service

Q.no 22. How many EC2 instance zones or regions exist ?

A:1

B:2

C:3

D:4

Q.no 23. What kind of electronic document contains a public key?

A : PIN

B : Digital certificate

C : PAN

D : Biometrics

Q.no 24. __________ is an example of Hard Real time Systems

A :    Failure in radar functioning

B : Printer

C : Watch

D : Washing Machine

Q.no 25. Which is true about model view controller architecture of Django

A : It represents by a database

B : It is user interface that you see in browser

C : It connects view and model together

D : None of the above


Q.no 26. Which of the following in LPWAN technologies

A : a) LoRa

B : b) GSM

C : c) CDMA

D : d) LTE

Q.no 27. Some communication devices in IoT

A : Sensors

B : Actuators

C : RFID Tags

D : All of Above

Q.no 28. What is the long form of OMTP, which was a forum crated by mobile
network operators to discuss standards with manufacturers of cell phones and
other mobile devices.

A : Open Mobile Transport Protocol

B : Open Middleware Terminal Platform

C : Open Mobile Terminal Platform

D : Open Middleware Transport Protocol

Q.no 29. ………. Middleware include all Grid middleware such as MSV Cluster
middleware, SSV and schedulers, etc.

A : SaaS

B : IaaS

C : FaaS

D : PaaS

Q.no 30. Mention which markup language can be used in restful web api?

A : HTML

B:C

C : JSON and XML


D : JAVA

Q.no 31. SOAP is

A : Generic WoT data exchange protocol

B : Can tunnel over firewall and proxies of existing infrastructure

C : Faster than CORBA

D : Option 1 and 2

Q.no 32. Cloud computing is the fusion of ……..

A : EAI and grid.

B : SaaS and EAI.

C : grid and SOA.

D : SOAP and SaaS.

Q.no 33. ........... Provides mechanisms for computerized building automation


devices to exchange information

A : 802.15.4

B : SCADA

C : RFID

D : BACNet

Q.no 34. SOAP is a protocol through which two computer communicates by


sharing ------ document

A : XML

B : HTML

C : JAVA

D : API

Q.no 35. A network of physical objects or things embedded with electronics or


softwares.

A : a) AI

B : b) ML
C : c) IOT

D : d) Internet

Q.no 36. Which of the following is a structured data store that supports indexing
and data queries to both EC2 and S3?

A : CloudWatch

B : Amazon SimpleDB

C : Amazon Cloudfront

D : All of the mentioned

Q.no 37. How many levels are present in a complex SCADA system?

A : a) 3 – levels

B : b) 5 – levels

C : c) 4 – levels

D : d) 6 – levels

Q.no 38. REST is -------- than SOAP

A : Slower

B : Faster

C : none of above

D : All of Above

Q.no 39. Process Model Specification defines

A : USE Cases

B : Processes

C : Views

D : Network Topology

Q.no 40. Which of the following is an (are) an intended purpose(s) of embedded


systems?

A : Data collection
B : Data processing

C : Data communication

D : All of these

Q.no 41. What is SCADA?

A : Software

B : Process

C : System

D : Hardware

Q.no 42. Which of the following tools are used for measuring I/O of system to
estimate transaction costs ?

A : EBS

B : IOSTAT

C : ESW

D : All of the above

Q.no 43. Applicatiion Development in IoT Design Methodology is ------- Step

A : First

B : Second

C : Third

D : Last

Q.no 44. Public IoT is …….

A : made available to general public or a large industry group.

B : shared by several organizations and supports a specific community that has shared
concerns.

C : operated solely for an organization.

D : an integrated composition of two or more of the IoT systems (private, community,


or public)

Q.no 45. IOT Life cycle Collect->Communicate->__________->Act


A : a) Acknowledge

B : b) Analyze

C : c) Examine

D : d) Rectify

Q.no 46. For Amazon EC2 instance, public and private keys are maintained by ?

A : AWS, client

B : client,AWS

C : only AWS

D : None of the above

Q.no 47. Raspbian OS used in RaspberryPi is based on which of the following OS

A : a) RTOS

B : b) Windows

C : c) Debian Linux

D : d) None of there above

Q.no 48. Which step in in the IoT design methodology is the integration of the
devices and components.

A : Application Development

B : Device & Component Integration

C : Operational View Specification

D : None of Above

Q.no 49. What does WoT do ?


(I) Re-invent completely new standards.
(II) Reuses existing and well known standards.

A : ONLY (I)

B : ONLY (II)

C : Both (I) and (II)

D : Neither (I) nor (II)


Q.no 50. In unauthorized access......should be done before granting the access
rights

A : Value-based verification

B : Identity-based verification

C : Name-based verification

D : Number-based verification

Q.no 51. which of the following are IoT Plaftorms

A : a) AWS IoT

B : b) Microsoft Azure IoT

C : c) PTC ThingWorx

D : d) All of the above

Q.no 52. Which of the following specifies a set of media access control (MAC) and
physical layer specifications for implementing WLANs?

A : IEEE 802.16

B : IEEE 802.3

C : IEEE 802.11

D : IEEE 802.15

Q.no 53. Zigbee architectures consist of which the following section

A : Physical

B : ZigBee device

C : Transport

D : IEEE 802.15.4

Q.no 54. Which system is a batch processing extension of the scatter-barrier-


reduce primitives of MPI/PVM?

A : Google Map

B : MapReduce

C : MPI and OpenMP


D : Hadoop

Q.no 55. The processor must accept and process the frame before the next frame
is called as ______________

A : Hard Real time systems

B : Real time constraints

C : Real data constraints

D : Soft real constraints

Q.no 56. Which of the following is the heart of a SCADA system?

A : PLC

B : HMI

C : Alarm task

D : I/O task

Q.no 57. IaaS, PaaS and SaaS are three ……… models of cloud.

A : deployment

B : characteristic

C : solution

D : service

Q.no 58. REST follows _____________communication model

A : Request Response model

B : Publish Subscribe model

C : Push Pull model

D : Exclusive Pair model

Q.no 59. ________ is a collection of wireless broadband standards (WiMax).

A : IEEE 802.3

B : IEEE 802.11

C : IEEE 802.16
D : IEEE 802.15.4

Q.no 60. Embedded Systems applications typically involve processing information


as ___________

A : Block

B : Logical Volumes

C : Distance

D : Signals

Q.no 1. The object in IoT will be empowered by _______

A : Network

B : Cloud

C : Devices

D : Connectivity

Q.no 2. What is the default user in Debain on Raspberry Pi?

A : a) Default

B : b) User

C : c) Pi

D : d) Root

Q.no 3. Standard ports of MQTT are

A : I2C

B : SSL

C : USART

D : TCP/IP

Q.no 4. M2M protocol standards activities include..

A : M2MXML

B : SDN

C : NFV
D : SNMP

Q.no 5. Websocket is the example of which communication model

A : Request – Response

B : Publish – Subscribe

C : Push-Pull

D : Exclusive Pair

Q.no 6. _________ is not an enabling technology of IoT

A : Cloud Computing

B : Big data Analytics

C : Wireless sensor network

D : Operating System

Q.no 7. _________ allows us to control electronic components

A : RESTful API

B : WebSocket API

C : HTTP

D : MQTT

Q.no 8. Which protocol is an open standard

A : CoAP

B : MQTT

C : XMPP

D : HTTP

Q.no 9. In 1999, Marc Benioff founded a company, which pioneered the multi-
tenant SaaS model, a new application-delivering mechanism. Which company is
that?

A : Salesforce

B : Oracle Siebel
C : SAP CRM

D : Infusionsoft

Q.no 10. Domain Model Specification is the ------ Step in IOT platforms Design
Methodology

A : First

B : Second

C : Third

D : Four

Q.no 11. MQTT stands for _____________

A : a) MQ Telemetry Things

B : b) MQ Transport Telemetry

C : c) MQ Transport Things

D : d) MQ Telemetry Transport

Q.no 12. Which of the following is storage data interchange interface for stored
data objects?

A : OCC

B : OCCI

C : OCMI

D : All of the above

Q.no 13. How many categories of storage devices broadly exist in cloud?

A:1

B:2

C:3

D:4

Q.no 14. Things in IoT refers to_____________

A : General device
B : Information

C : IoT devices

D : Object

Q.no 15. _____ is virtual server platform that allows users to create and run virtual
machines on Amazon's server farm.

A : EC2

B : Azure

C : EC5

D : None of the above

Q.no 16. Which Django component concerns about metadata ?

A : Model

B : View

C : Template

D : None of the above

Q.no 17. Amazon S3 stands for

A : Secure storage service

B : Session storage service

C : Simple storage service

D : Sample storage service

Q.no 18. Which of the following impose additional overhead on clients and offer
faster transfer?

A : Block Storage

B : File Storage

C : File Server

D : All of the above

Q.no 19. Services in Operational View Specifications are


A : Mode service

B : State service

C : Controller Service

D : All of above

Q.no 20. The process of converting data into a format that can not be read by
another user

A : Registering

B : Locking

C : Encryption

D : Keying

Q.no 21. Which of the following is not involved in working of IoT?

A : RFID

B : Sensor

C : Nano tech

D : Server

Q.no 22. Several instructions execution simultaneously in?

A : a) processing

B : b) parallel processing

C : c) serial processing

D : d) multitasking

Q.no 23. Which of the following provide access for developers to charge Amazon's
customer for their purchases ?

A : FWS

B : FAS

C : FPS

D : All of the mentioned


Q.no 24. Which of the following instance is used by default in AMI?

A : High-Memory Quadruple Extra Large Instance

B : Small Instance

C : Micro Instance

D : High-CPU Extra Large Instance

Q.no 25. Django interaction with application takes place with _____

A : Template

B : model

C : view

D : Service

Q.no 26. For constrained nodes and constrained networks in Internet of Things
which protocol is used.

A : IPv4

B : IPv6

C : CoAP

D : MQTT

Q.no 27. ________ is the instruction set used by ARM7

A : 16-bit instruction set

B : 32-bit instruction set

C : 8-bit instruction set

D : 64 Bit instruction set

Q.no 28. Which of the following is not the component of a SCADA system?

A : Database server

B : I/O system

C : PLC controller

D : Sparger controller
Q.no 29. Which of the following makes sure that data is not changed when it not
supposed to be?

A : Integrity

B : Availability

C : Confidentiality

D : Accounting

Q.no 30. Which of the following is not the component of a SCADA system?

A : a) Database server

B : b) I/O system

C : c) PLC controller

D : d) Sparger controller

Q.no 31. WiFi is not present in which of the following models?

A : a) Raspberry Pi3

B : b) Raspberry Pi Zero WH

C : c) Raspberry Pi Zero W

D : d) Raspberry Pi Zero

Q.no 32. The …….. has features such as offline support, canvas drawing based on
low footprint SVG graphics, GeolocationAPI, video and audio streaming support
with flash, WebStorage, CSS3 Selectors, 2D animation for mobile cloud
applications.

A : HTML5

B : HTML4

C : HTML3

D : HTML2

Q.no 33. Standardization is like a double-edged sword:But it may threaten ........


when standards are accepted by the market

A : innovation and inhibit change

B : innovation
C : inhibit change

D : change

Q.no 34. Applications using managed cloud storage are __________ as a Service Web
service.

A : Infrastructure

B : Platform

C : Software

D : All of the above

Q.no 35. Gateway provides the connection between _____ and _____

A : Cloud and controller

B : Network and Cloud

C : Network and Controller

D : Controller and Device

Q.no 36. List out the tools or API for developing or testing web api?

A : Spring REST web service using MVC

B : Jersey API

C : Axis

D : All of above

Q.no 37. A smart object is defined by IPSO

A : Internet Protocol Smart Object

B : Internet Protocol Sensor Object

C : International Protocol Smart Object

D : International Protocol Sensor Object

Q.no 38. Which API are supported by SkyNet ?

A : HTTP

B : REST
C : Web Socket

D : All of the above

Q.no 39. KNX protocol Standardized , ............ communications protocol for


automation

A : ISO-based network

B : OSI-based network

C : ISI-OSI-based transport

D : ISO-based transport

Q.no 40. Which of the following factors might offset the cost of offline access in
hybrid applications?

A : Scalability

B : cost

C : ubiquitous access

D : All of the above

Q.no 41. Which of the following layers are defined by the ZigBee stack?

A : Transport layer

B : Physical layer.

C : Application Support sub-layer.

D : Medium Access layer

Q.no 42. RFID stands for?

A : a) Random frequency identification

B : b) Radio frequency identification

C : c) Random frequency information

D : d) Radio frequency information

Q.no 43. The mango open source software platform for IOT and M2M has natural
fit between

A : CORBA &DOM
B : POJO & JSON

C : JASON &M2M

D : SOAP & POJO

Q.no 44. WAMP follows _____ communication model

A : Push pull model

B : Publish subscribe model

C : Request Response model

D : Exclusive pair model

Q.no 45. XMPP is an example of _________________Layer in IoT

A : Transport Layer

B : Link Layer

C : Network Layer

D : Application Layer

Q.no 46. ________ is the processor used by ARM7.

A : 8-bit CISC

B : 8-bit RISC

C : 32-bit CISC

D : 32-bit RISC

Q.no 47. Community IoT is ………

A : made available to general public or a large industry group.

B : shared by several organizations and supports a specific community that has shared
concerns.

C : operated solely for an organization.

D : an integrated composition of two or more of the IoT systems (private, community,


or public)

Q.no 48. Which of the following is the vulnerabilities of IoT


A : MALC

B : DDOS

C : DOSD

D : SSOD

Q.no 49. Amazon EC2 templates for instances are called ??

A : IASI

B : ASI

C : AMI

D : ASTI

Q.no 50. Domain Model Specification defines

A : Physical & Virtual Entity

B : Physical Entity

C : Virtual Entity

D : None of Above

Q.no 51. Frequency band used by 802.11 ah standard is:

A : 60 GHz

B : 2.4 GHz

C : Sub 1 GHz

D : 5 GHz

Q.no 52. Which if the following is Light waight protocol used of IoT Applications

A : a) MQTT

B : b) HTTP

C : c) WebSocket

D : d) All of the above

Q.no 53. Which of the following describes a message-passing taxonomy for a


component-based architecture that provides services to clients upon demand?
A : SOA

B : EBS

C : GEC

D : Option 2 and 3

Q.no 54. APS Provides services necessary for.........

A : application Management and the ZigBee layers

B : application objects(endpoints) and the ZigBee device object (ZDO)

C : application Management and security management

D : Application Management

Q.no 55. Find the correct statement with respect to SOA


I ) It describes a standard method for requesting services from distributed
components and managing the results
II) SOA provides the translation and management layer in an architecture that
removes the barrier for a client obtaining desired services
III) With SOA, clients and components can be written in different languages and
can use multiple messaging protocols

A : Option I and II

B : Option I,II and III

C : Only Option I

D : Only Option III

Q.no 56. The technological foundation of cloud computing is distributed


computing based on communication networks using……..

A : the internet of things

B : Google servers farms and Google Map

C : Amazon Web Service

D : cluster of workstations and networks of workstations

Q.no 57. MQTT protocol uses ________________communication model.

A : Publish Subscribe model

B : Push Pull model


C : Exclusive Pair model

D : Request Response model

Q.no 58. Connecting heterogeneous devices that makes the integration across
systems and applications much simpler is achieved by

A : IoT

B : WoT

C : Both (a) and (b)

D : Neither (a) nor (b).

Q.no 59. IoT level _______ systems are suitable for solutions where multiple nodes
are required, the data involved is big and the analysis requirements are
computationally intensive

A : Level1

B : Level 2

C : Level 3

D : Level 4

Q.no 60. ……. is the direct technological ancestor of cloud computing, which also
has roots in the COW technology.

A : Pervasive computing

B : Mobile computing

C : Grid computing

D : Quantum Computing

Q.no 1. AutoBahn for IoT uses which protocol

A : WAMP

B : HTTP

C : WAMP & HTTP

D : None of the above

Q.no 2. Operational View Specification consist of


A : service hosting options

B : storage options

C : device options

D : All of above

Q.no 3. WAMP stands for ____________

A : Web Analysed Messaging Protocol

B : Web Authorised Messaging Prototcol

C : Web Application Messaging Protocol

D : Web Appliance Messaging Protocol

Q.no 4. Each Functional Group either provides functionalities for


interacting with instances of concepts defined in the
-------------- or provides information related to these
concepts.

A : System Model

B : Network Model

C : Domain Model

D : Basic Model

Q.no 5. How many can you create in AWS by default

A:1

B : 10

C : 100

D : 110

Q.no 6. Which is one of the open-source IaaS (Infrastructure-as-a-Service) and


PaaS (Platform-as-a-Service) projects?

A : RedHat Cloud

B : Microsoft Azure

C : AWS
D : Google Cloud Platform

Q.no 7. The sixth step in the IoT design


methodology is to define the
------- for the system.

A : IoT level

B : IOT BASICS

C : IOT PAYLOAD

D : IOT CHECKSUM

Q.no 8. MQTT stands for

A : MQ Telemetry Things

B : MQ Transport Telemetry

C : MQ Transport Things

D : MQ Telemetry Transport

Q.no 9. Amazon S3 is

A : data storage infrastructure

B : compute capacity in the cloud

C : relational database in cloud

D : None of the above

Q.no 10. How many types of voice communications in IoT environment :

A:2

B:3

C:4

D:5

Q.no 11. ANSI/ISA-95 standard used for

A : Reduce cost, errors and risk with production process

B : Reduce errors and risk with production process


C : Reduce cost and risk with production process

D : Reduce cost,and errors and with production process

Q.no 12. SOAP stands for-

A : Simple Object Access Protocol

B : Server Object Access Protocol

C : Simple Orientation Across Protocol

D : Server Orientation Across Protocol

Q.no 13. Amazon Web Services supports which type II Audits ?

A : SAS20

B : SAS70

C : SAS702

D : None of the above

Q.no 14. DCS is a __________________

A : a) Distributed Control System

B : b) Data Control System

C : c) Data Column System

D : d) Distributed Column System

Q.no 15. Which of the following system does not provision storage to most users?

A : PaaS

B : IaaS

C : CaaS

D : SaaS

Q.no 16. How many USB ports are present in Raspberry Pi 3?

A : a) 5

B : b) 2
C : c) 4

D : d) 3

Q.no 17. This Process of identifying any individual is called as.

A : Auditing

B : Authorisation

C : Authentication

D : Accounting

Q.no 18. MQTT is _________ oriented protocol.

A : Data

B : Message

C : Network

D : Device

Q.no 19. What is the Ethernet/LAN cable used in RPi?

A : a) Cat5

B : b) Cat5e

C : c) Cat6

D : d) RJ45

Q.no 20. when you publish a message ____ is automatically created.

A : Client

B : Server

C : Process

D : Batch

Q.no 21. The process of identifying assets and threats in an organisation is known
as

A : Threat Modeling

B : Security Auditing
C : Security Planning

D : Firewalling

Q.no 22. How many virtual servers can be launch with Amazon EC2 ?

A:1

B:2

C : Infinite

D:0

Q.no 23. IPv4 is ______ bit address

A : a) 24

B : b) 32

C : c) 64

D : d) 128

Q.no 24. Wi-Fi stands for?

A : a) Wireless fidelity

B : b) Wireless Flexibility

C : c) Wide Fidelity

D : d) WAN Flexibility

Q.no 25. In microcontrollers, UART is acronym of_____

A : a) Universal Applied Receiver/Transmitter

B : b) Universal Asynchronous Rectified Transmitter

C : c)Universal Asynchronous Receiver/Transmitter

D : d) United Asynchronous Receiver/Transmitter

Q.no 26. Last step in IoT Design Methodology is

A : IoT Level Specification

B : Functional View Specification


C : Operational View Specification

D : None of Above

Q.no 27. ………. supports virtualization creates virtual versions of the resources
like servers, storage and OS.

A : Grid Computing

B : Data Mining

C : Cloud Computing

D : Business Intelligence

Q.no 28. ________ is used to describe a perceived, quickly growing set of web based
applications.

A : Web 1.0

B : Web 2.0

C : Web 3.5

D : Web 4.0

Q.no 29. Raspberry Pi Runs on customized Debian Linux called ----------

A : UNIX

B : Raspbian OS

C : MAC

D : Windows

Q.no 30. Which of the following protocol is based on REST architecture

A : a) HTTP

B : b) CoAP

C : c) Both a and b

D : d) MQTT

Q.no 31. WiFI uses how much frequency ?

A : 2.2 GHz
B : 3 GHz

C : 3.5 GHz

D : 2.4 GHz

Q.no 32. .......Involves confidentiality and integrity of sensitive information stored


in the system

A : Secure Storage

B : Secure Software Execution

C : Trust Management

D : Data Availability

Q.no 33. The approach/s to build WoT is through __________


(I) RESTful principles.
(II) REST APIs.

A : Only (I)

B : Only (II)

C : Both (I) and (II)

D : Neither (I) nor (II)

Q.no 34. DDL classifies devices into three categories

A : API, actutators and complex devices

B : Bundles, API and sensors

C : OSGI, API and actutators

D : Sensor, actutators and complex devices

Q.no 35. Which of the following Hardware can be alone used as IoT Gateway

A : a) RaspberriPI

B : b) NodeMCU ESP8266

C : c) Arduino UNO

D : d) Both a and b
Q.no 36. ………. Middleware include all Grid middleware such as MSV Cluster
middleware, SSV and schedulers, etc.

A : SaaS

B : IaaS

C : FaaS

D : PaaS

Q.no 37. IEEE 802.15.4 framework conceives a 10m communications range with a
transfer rate of

A : 250 Kbits/s

B : 520 Kbits/s

C : 205 Kbits/s

D : 250 bits/s

Q.no 38. Range of Zigbee is low-cost and low-powered mesh network ___________

A : 10-100 meters

B : 100-1000 meters

C : 10-100 cm

D : 100-1000 cm

Q.no 39. In SCADA Standardization Efforts:The standard specifies the


communication of ...............between control devices from different
manufacturers

A : plant data

B : non real-time plant data

C : real- time plant data

D : CBR Data

Q.no 40. Which of the following in LPWAN technologies

A : a) LoRa

B : b) GSM
C : c) CDMA

D : d) LTE

Q.no 41. _______________ are called as front end of IoT device

A : Sensors

B : Gateways

C : Processors

D : Applications

Q.no 42. Which one is not True regarding WebSocketAPIs

A : bi-directional

B : Full duplex

C : Not Secure

D : Exclusive Pair Communication

Q.no 43. _________ allows us to control electronic components

A : a) RETful API

B : b) RESTful API

C : c) HTTP

D : d) MQTT

Q.no 44. What is the long form of OMTP, which was a forum crated by mobile
network operators to discuss standards with manufacturers of cell phones and
other mobile devices.

A : Open Mobile Transport Protocol

B : Open Middleware Terminal Platform

C : Open Mobile Terminal Platform

D : Open Middleware Transport Protocol

Q.no 45. ________ registers are there in ARM7.

A : 35 register( 28 GPR and 7 SPR)


B : 37 registers(28 GPR and 9 SPR)

C : 37 registers(31 GPR and 6 SPR)

D : 35 register(30 GPR and 5 SPR)

Q.no 46. What is the typical range of transmission distance in a ZigBee network?

A : 5 m.

B : 50 m.

C : 500 m.

D : 5 km

Q.no 47. Which of there following wireless technology provide Mesh Network
architecture in easiest way

A : a) Bluetooth

B : b) ZigBee

C : c) Wi-Fi

D : d) None of the above

Q.no 48. WAMP is

A : Unidirectional

B : Bidirectional

C : both

D : None of the above

Q.no 49. which statement is True about RISC

A : Single Clock Cycle

B : Highly pipelined

C : Fixed Format Instruction

D : All of Above

Q.no 50. Which step in in the IoT design methodology is the integration of the
devices and components.
A : Application Development

B : Device & Component Integration

C : Operational View Specification

D : None of Above

Q.no 51. Zigbee architectures consist of which the following section

A : Physical

B : ZigBee device

C : Transport

D : IEEE 802.15.4

Q.no 52. Which system is a batch processing extension of the scatter-barrier-


reduce primitives of MPI/PVM?

A : Google Map

B : MapReduce

C : MPI and OpenMP

D : Hadoop

Q.no 53. IEEE 802.15.4 is a technical standard which defines the operation of
____________

A : LR-WPANs

B : USN

C : WSN

D : Zigbee

Q.no 54. ________ is a collection of wireless broadband standards (WiMax).

A : IEEE 802.3

B : IEEE 802.11

C : IEEE 802.16

D : IEEE 802.15.4
Q.no 55. which of the following are IoT Plaftorms

A : a) AWS IoT

B : b) Microsoft Azure IoT

C : c) PTC ThingWorx

D : d) All of the above

Q.no 56. IoT level _______ systems are suitable for solutions where the data
involved is big and the analysis requirements are computationally intensive.

A : Level 1

B : Level 2

C : Level 3

D : Level 4

Q.no 57. The cloud middleware consists of two kinds of middleware……..

A : IaaS and PaaS

B : IaaS and SaaS

C : SaaS and PaaS

D : SaaS and BaaS

Q.no 58. ARM processors where basically designed for

A : Main frame systems

B : Distributed systems

C : Mobile systems

D : Super computers

Q.no 59. HTTP resources are located by

A : unique resource locator

B : unique resource identifier

C : none of the mentioned

D : uniform resource identifier


Q.no 60. __________is not an IoT application layer protocol

A : XMPP

B : TCP

C : CoAP

D : MQTT

Q.no 1. What is the full form of SCADA?

A : a) Supervisory Control and Document Acquisition

B : b) Supervisory Control and Data Acquisition

C : c) Supervisory Column and Data Assessment

D : d) Supervisory Column and Data Assessment

Q.no 2. How many layers contain by WoT architecture ?

A:3

B:4

C:5

D:6

Q.no 3. HelloWeb is an example of __________

A : HTTP

B : MQTT

C : SMTP

D : CoAP

Q.no 4. Data stored in _______ domains doesn't require maintanance of schema.

A : SimpleDB

B : SQL Server

C : Oracle

D : RDS
Q.no 5. Which layer/layers of the OSI model does Web of Things (WoT) deals with ?

A : Application Layer

B : Network Layer

C : Transport Layer

D : Every layer

Q.no 6. Which of the following impose additional overhead on clients and offer
faster transfer?

A : Block Storage

B : File Storage

C : File Server

D : All of the above

Q.no 7. Which protocol is an open standard

A : CoAP

B : MQTT

C : XMPP

D : HTTP

Q.no 8. What are advantages of Auto Scaling ?

A : Better Availability

B : Better Cost management

C : Fault Tolerance

D : All of the mentioned

Q.no 9. Which one is the Last step in IOT Platforms Design Methodology

A : Application Development

B : Purpose and Requirement

C : Domain Model Specification

D : Service Specification
Q.no 10. Rate monotonic scheduling algorithm is an example of
____________category

A : Static

B : Dynamic

C : Hybrid

D : Mixed

Q.no 11. IoT Level_______ systems has a single node/device that performs sensing
and/ or actuation, stores data, performs analysis and hosts the application.

A : Level 1

B : Level 2

C : Level 3

D : Level 4

Q.no 12. AMIs are operating system running on ____ virtualisation hypervisor

A : Yen

B : Xen

C : Ben

D : Multi-Factor Authentication

Q.no 13. Making the smaller and smaller things have the ability to connect and
interact.

A : a) Micro Tech

B : b) Smart tech

C : c) Nano tech

D : d) RFID

Q.no 14. IoT has _________number of levels.

A:4

B:3

C:5
D:6

Q.no 15. What are the parameters that are default values?

A : a) Port_Name and Bits

B : b) Speed and Port_Names

C : c) Speed and Parity

D : d) Stop bit and Flow Control

Q.no 16. Xivety is available as _____________

A : IaaS

B : SaaS

C : CaaS

D : Paas

Q.no 17. Which protocol is lightweight?

A : a) MQTT

B : b) HTTP

C : c) CoAP

D : d) SPI

Q.no 18. _____ is virtual server platform that allows users to create and run virtual
machines on Amazon's server farm.

A : EC2

B : Azure

C : EC5

D : None of the above

Q.no 19. What do we use to connect TV to RPi?

A : a) Male HDMI

B : b) Female HDMI

C : c) Male HDMI and Adapter


D : d) Female HDMI and Adapter

Q.no 20. Amazon S3 stands for

A : Secure storage service

B : Session storage service

C : Simple storage service

D : Sample storage service

Q.no 21. In SCADA system the controlling is done by

A : Online control

B : Direct control

C : Supervisory control

D : Automatic control

Q.no 22. Amazon DynamoDB is

A : Relational database in cloud

B : No-SQL database service

C : Hierarchical Databases

D : Distributed Databses

Q.no 23. MQTT protocol is based on

A : Client-Server Architecture

B : Publish-Subscribe Architecture

C : Both of the above

D : Peer to peer Architecture

Q.no 24. MQTT stands for _____________

A : MQ Telemetry Things

B : MQ Transport Telemetry

C : MQ Transport Things
D : MQ Telemetry Transport

Q.no 25. WAMP uses _____ messaging pattern

A : Function call

B : Procedure call

C : RPC

D : Web based

Q.no 26. WAMP follows _____ communication model

A : Push pull model

B : Publish subscribe model

C : Request Response model

D : Exclusive pair model

Q.no 27. Diagnostics service for Cars.

A : a) MIPS

B : b) AutoBot

C : c) IoT Assistant

D : d) IoT

Q.no 28. A network of physical objects or things embedded with electronics or


softwares.

A : a) AI

B : b) ML

C : c) IOT

D : d) Internet

Q.no 29. DHT11 sensor is used to sens which of there wollowing parameters

A : a) Temperature

B : b) Pressure

C : c) Humidity
D : d) Both a and c

Q.no 30. Django forms and classes are created using _________

A : Template

B : view

C : Model

D : Django Services

Q.no 31. Which instruction set architecture is used in Raspberry Pi?

A : a) X86

B : b) MSP

C : c) AVR

D : d) ARM

Q.no 32. Django based on ________ architecture

A : MTV

B : REST

C : Web Socket

D : None of the above

Q.no 33. Advantage of MQTT over HTTP is

A : a) More secure

B : b) Lightweight

C : c) Polling is not requred

D : d) a and b

Q.no 34. Which one of the following is the Zigbees operating mode?

A : Beacon

B : Base

C : WiFI
D : Zigbee

Q.no 35. Community IoT is ………

A : made available to general public or a large industry group.

B : shared by several organizations and supports a specific community that has shared
concerns.

C : operated solely for an organization.

D : an integrated composition of two or more of the IoT systems (private, community,


or public)

Q.no 36. Raspbian OS used in RaspberryPi is based on which of the following OS

A : a) RTOS

B : b) Windows

C : c) Debian Linux

D : d) None of there above

Q.no 37. Which of the following makes sure that data is not changed when it not
supposed to be?

A : Integrity

B : Availability

C : Confidentiality

D : Accounting

Q.no 38. CoAP is specialized application

A : Internet applications

B : Device applications

C : Wireless applications

D : Wired applications

Q.no 39. Goal of SWE is creation of web-based sensor networks to make all
sensors and repositories of

A : Sensor data discoverable and accessible


B : Sensor data applicable, controllable

C : Providing connectivity

D : Option 1 and 2

Q.no 40. which statement is True about CISC

A : Single Clock Cycle

B : Highly pipelined

C : Fixed Format Instruction

D : None of Above

Q.no 41. Communication model which involves brokers is called as ____________

A : Request Response model

B : Publish Subscribe model

C : Push Pull model

D : Exclusive Pair model

Q.no 42. OSGi (Open services Gateway initiative framework) is used for

A : Module system and service platform , component deployment remotely

B : Standard internet protocol

C : Application life cycle management

D : Option 1 and 3

Q.no 43. XMPP is an example of _________________Layer in IoT

A : Transport Layer

B : Link Layer

C : Network Layer

D : Application Layer

Q.no 44. Domain Model Specification defines

A : Physical & Virtual Entity


B : Physical Entity

C : Virtual Entity

D : None of Above

Q.no 45. In which Step the system


purpose, behavior and requirements (such as data collection
requirements, data analysis requirements, system management
requirements, data privacy and security requirements, user interface
requirements, ...) are captured.

A : Application Development

B : Device & Component Integration

C : Operational View Specification

D : Purpose & Requirements Specification

Q.no 46. What are the essential tight constraint/s related to the design metrics of
an embedded system

A : Ability to fit on a single chip

B : Low power consumption

C : Fast data processing for real-time operations

D : All of the above

Q.no 47. Which database engines are supported by Amazon RDS ?

A : PostgreSQL

B : MariaDB

C : Oracle

D : All of the above

Q.no 48. Django is ____________kind of framework

A : Web Security

B : Web Enhancement

C : Web Messaging

D : Web application
Q.no 49. WAMP follows ______ approach.

A : Connectionless

B : Connection-Oriented

C : OTA

D : None of the above

Q.no 50. Which one is not a type Of RTOS

A : 1)Hard RTOS

B : Soft RTOS

C : Firm RTOS

D : Embedded RTOS

Q.no 51. The technological foundation of cloud computing is distributed


computing based on communication networks using……..

A : the internet of things

B : Google servers farms and Google Map

C : Amazon Web Service

D : cluster of workstations and networks of workstations

Q.no 52. CoAP provides which of the following requirements?

A : Multicast support and simplicity

B : Low overhead and multicast support

C : Simplicity and low overhead

D : Multicast support, Low over head, and simplicity

Q.no 53. Main components of USN(Ubiquitous Sensor Networks) are


I] USN applications and services platform
II] Network infrastructure
III]USN gateway

A : Only III

B : Option I and III


C : Option I not Option III

D : Option I, II and III

Q.no 54. WOT is


I] An applications’ platform
II] Explores the layer top of connectivity with things
III] fast prototyping, data integration and interaction with objects

A : Only III

B : Option I and III

C : Option I not III

D : Option I, II and III

Q.no 55. Exclusive pair communication model can be best described as ____________

A : Bidirectional , simplex

B :    Birectional , full duplex

C : Unidirectional , simplex

D : Unidirectional , full duplex

Q.no 56. Private cloud, public cloud, community cloud and hybrid cloud are four
…….. models of cloud.

A : deployment

B : characteristic

C : solution

D : service

Q.no 57. MQTT protocol uses ________________communication model.

A : Publish Subscribe model

B : Push Pull model

C : Exclusive Pair model

D : Request Response model

Q.no 58. APS Provides services necessary for.........


A : application Management and the ZigBee layers

B : application objects(endpoints) and the ZigBee device object (ZDO)

C : application Management and security management

D : Application Management

Q.no 59. Which of the following is the heart of a SCADA system?

A : PLC

B : HMI

C : Alarm task

D : I/O task

Q.no 60. ________ is an attack which forces an end user to execute unwanted
actions on a web application in which he/she is currently authenticated.

A : Cross-site scoring scripting

B : Cross-site request forgery

C : Two-factor authentication

D : Cross-site scripting

Q.no 1. Information Model defines the ------- of all the information in the IoT
system

A : Structure

B : service

C : Network

D : Device

Q.no 2. The sixth step in the IoT design


methodology is to define the
------- for the system.

A : IoT level

B : IOT BASICS

C : IOT PAYLOAD
D : IOT CHECKSUM

Q.no 3. Which of the following terms indicates that information is to be read only
by those people for whom it is intended?

A : Availability

B : Accounting

C : Integrity

D : Confidentiality

Q.no 4. SOAP stands for-

A : Simple Object Access Protocol

B : Server Object Access Protocol

C : Simple Orientation Across Protocol

D : Server Orientation Across Protocol

Q.no 5. MQTT stands for _____________

A : a) MQ Telemetry Things

B : b) MQ Transport Telemetry

C : c) MQ Transport Things

D : d) MQ Telemetry Transport

Q.no 6. Gateway softwate should be smart enough to handle _____

A : GPS

B : Message

C : Logging

D : Sensors

Q.no 7. The father of ioT.

A : a) Kevin Atrun

B : b) Kevin Atrhur

C : c) Kevin Ashton
D : d) Kevin Thomas

Q.no 8. MQTT stands for

A : MQ Telemetry Things

B : MQ Transport Telemetry

C : MQ Transport Things

D : MQ Telemetry Transport

Q.no 9. Unique ID for each device in skynet is _______

A : SSID

B : UID

C : UUID

D : ID

Q.no 10. SOA stands for ……….

A : Solution Oriented Architecture

B : Sector Oriented Architecture

C : Source Oriented Architecture

D : Service Oriented Architecture

Q.no 11. IAD stands for ___________

A : Intelligent Assist Device

B : Industrial Assist Device

C : International Assist Device

D : Informative Assist Device

Q.no 12. RFID stands for?

A : Random frequency identification

B : Radio frequency identification

C : Random frequency information


D : Radio frequency information

Q.no 13. How power supply is done to RPi?

A : a) USB connection

B : b) Internal battery

C : c) Charger

D : d) Adapter

Q.no 14. Which of the following is not the component of IoT Endpoint

A : Sensor

B : Gateway

C : Communication Module

D : MCU

Q.no 15. The entities, objects and concepts defined in the Domain Model
Specification

A : Physical Entity

B : Virtual Entity

C : Device

D : All of above

Q.no 16. when you publish a message ____ is automatically created.

A : Client

B : Server

C : Process

D : Batch

Q.no 17. Which of the following is storage data interchange interface for stored
data objects?

A : OCC

B : OCCI
C : OCMI

D : All of the above

Q.no 18. How many EC2 instance zones or regions exist ?

A:1

B:2

C:3

D:4

Q.no 19. Which of the following is not involved in working of IoT?

A : a) RFID

B : b) Sensor

C : c) Nano tech

D : d) Server

Q.no 20. Which is not a open-source SaaS (Software-as-a-Service) project?

A : Ubuntu

B : Microsoft Office 365

C : openSIS

D : Zimbra

Q.no 21. How many USB ports are present in Raspberry Pi 3?

A : a) 5

B : b) 2

C : c) 4

D : d) 3

Q.no 22. In 2008, which company launched the PaaS on-demand development
platform & become a new pillar of cloud computing?

A : Salesforce

B : The force.com
C : Amazon

D : Cloudera

Q.no 23. _________ is not an enabling technology of IoT

A : Cloud Computing

B : Big data Analytics

C : Wireless sensor network

D : Operating System

Q.no 24. In Core of SODA which standard is based on XML encodings

A : DDL

B : XML

C : SOA

D : SODA

Q.no 25. Microphones usually have ____

A : Amplifier filter

B : Noise Filter

C : Round Filter

D : Frequency filter

Q.no 26. NFC stands for

A : Near Fast Communication

B : Near Field Communication

C : Near Field Consumer

D : Near Field Connection

Q.no 27. WiFI uses how much frequency ?

A : 2.2 GHz

B : 3 GHz
C : 3.5 GHz

D : 2.4 GHz

Q.no 28. Key elements of ETSI M2M architecture are


I] M2M device & M2M gateway
II] M2M area network & M2M communication network
III] M2M application server

A : Option I , II and III

B : Option I and II

C : Option II and III

D : Option III

Q.no 29. In Unified standards .........combination of data format and exchange


protocol is the foundation pillar of WWW

A : POPMAIL

B : HTML/HTTPS

C : HTML/HTTP

D : SMTP

Q.no 30. How many levels are present in a complex SCADA system?

A : a) 3 – levels

B : b) 5 – levels

C : c) 4 – levels

D : d) 6 – levels

Q.no 31. ZigBee is based on which of the following standard

A : a) IEEE 802.15.4

B : b) IEEE 802.5

C : c) IEEE 802.4.13

D : d) Both a and b

Q.no 32. ........Commonly available for connecting industrial electronic devices


A : BACNet

B : MODBus

C : LRWPAN

D : WPAN

Q.no 33. Which of the following tools are used for measuring I/O of system to
estimate transaction costs ?

A : EBS

B : IOSTAT

C : ESW

D : All of the above

Q.no 34. _____ manages metadata of IoT services

A : Power

B : Controller

C : Scheduler

D : Package

Q.no 35. _______________ are called as front end of IoT device

A : Sensors

B : Gateways

C : Processors

D : Applications

Q.no 36. WiFi is not present in which of the following models?

A : a) Raspberry Pi3

B : b) Raspberry Pi Zero WH

C : c) Raspberry Pi Zero W

D : d) Raspberry Pi Zero

Q.no 37. For Amazon EC2 instance, public and private keys are maintained by ?
A : AWS, client

B : client,AWS

C : only AWS

D : None of the above

Q.no 38. Applications using managed cloud storage are __________ as a Service Web
service.

A : Infrastructure

B : Platform

C : Software

D : All of the above

Q.no 39. What is the speed of operation in Pi 3?

A : a) 900MHz

B : b) 1.2GHz

C : c) 1GHz

D : d) 500MHz

Q.no 40. Raspberry Pi Runs on customized Debian Linux called ----------

A : UNIX

B : Raspbian OS

C : MAC

D : Windows

Q.no 41. Which of there following wireless technology provide Mesh Network
architecture in easiest way

A : a) Bluetooth

B : b) ZigBee

C : c) Wi-Fi

D : d) None of the above


Q.no 42. Which of the following protocol is based on Publish – Subscribe
architecture

A : a) HTTP

B : b) CoAP

C : c) HTTPS

D : d) MQTT

Q.no 43. Private IoT is ……

A : made available to general public or a large industry group.

B : shared by several organizations and supports a specific community that has shared
concerns.

C : operated solely for an organization.

D : an integrated composition of two or more of the IoT systems (private, community,


or public)

Q.no 44. Process Model Specification defines

A : USE Cases

B : Processes

C : Views

D : Network Topology

Q.no 45. The main importance of ARM micro-processors is providing operation


with ______

A : Low cost and low power consumption

B : Higher degree of multi-tasking

C : Lower error or glitches

D : Efficient memory management

Q.no 46. DDL classifies devices into three categories

A : API, actutators and complex devices

B : Bundles, API and sensors


C : OSGI, API and actutators

D : Sensor, actutators and complex devices

Q.no 47. Process Specification in IOT design Methodology -------

A : Defines the IoT level


for the system

B : Shows the integration of the


devices and components.

C : Defines the use cases of the IoT system are


formally described based on and derived from the purpose and
requirement specifications.

D : None of above

Q.no 48. Standard port number for secure MQTT is _______

A : 1883

B : 8000

C : 8883

D : 8888

Q.no 49. ………. supports virtualization creates virtual versions of the resources
like servers, storage and OS.

A : Grid Computing

B : Data Mining

C : Cloud Computing

D : Business Intelligence

Q.no 50. Which of the following is a structured data store that supports indexing
and data queries to both EC2 and S3?

A : CloudWatch

B : Amazon SimpleDB

C : Amazon Cloudfront

D : All of the mentioned


Q.no 51. For.........Secure, lightweight, and efficient key exchange mechanism is
required

A : Data Availability

B : Trust Management

C : Data Confidentiality

D : Secure Storage

Q.no 52. HTTP resources are located by

A : unique resource locator

B : unique resource identifier

C : none of the mentioned

D : uniform resource identifier

Q.no 53. IoT level _______ systems are suitable for solutions where multiple nodes
are required, the data involved is big and the analysis requirements are
computationally intensive

A : Level1

B : Level 2

C : Level 3

D : Level 4

Q.no 54. Embedded Systems applications typically involve processing information


as ___________

A : Block

B : Logical Volumes

C : Distance

D : Signals

Q.no 55. ________ is a collection of wireless broadband standards (WiMax).

A : IEEE 802.3

B : IEEE 802.11
C : IEEE 802.16

D : IEEE 802.15.4

Q.no 56. ARM processors where basically designed for

A : Main frame systems

B : Distributed systems

C : Mobile systems

D : Super computers

Q.no 57. __________is not an IoT application layer protocol

A : XMPP

B : TCP

C : CoAP

D : MQTT

Q.no 58. Which of the following specifies a set of media access control (MAC) and
physical layer specifications for implementing WLANs?

A : IEEE 802.16

B : IEEE 802.3

C : IEEE 802.11

D : IEEE 802.15

Q.no 59. In threat modeling, what methodology used to perform risk analysis

A : DREAD

B : OWASP

C : STRIDE

D : DAR

Q.no 60. Connecting heterogeneous devices that makes the integration across
systems and applications much simpler is achieved by

A : IoT
B : WoT

C : Both (a) and (b)

D : Neither (a) nor (b).

Q.no 1. Wi-Fi stands for?

A : a) Wireless fidelity

B : b) Wireless Flexibility

C : c) Wide Fidelity

D : d) WAN Flexibility

Q.no 2. SODA all stands for-

A : Service oriented data architecture

B : Service oriented device authentication

C : Service oriented device architecture

D : Service oriented device aapplication

Q.no 3. _____ is virtual server platform that allows users to create and run virtual
machines on Amazon's server farm.

A : EC2

B : Azure

C : EC5

D : None of the above

Q.no 4. Each Functional Group either provides functionalities for


interacting with instances of concepts defined in the
-------------- or provides information related to these
concepts.

A : System Model

B : Network Model

C : Domain Model

D : Basic Model
Q.no 5. Which of the following is billing and account management service ?

A : Amazon Elastic MapReduce

B : Amazon Mechanical Turk

C : Amazon DevPay

D : Multi-Factor Authentication

Q.no 6. What is SCADA?

A : a) Software

B : b) Process

C : c) System

D : d) Hardware

Q.no 7. Several instructions execution simultaneously in?

A : a) processing

B : b) parallel processing

C : c) serial processing

D : d) multitasking

Q.no 8. Information model adds more details to the Virtual Entities by defining
their ----------- and relations.

A : Virtual

B : System Model

C : Attributes

D : Domain Model

Q.no 9. _________ allows us to control electronic components

A : RESTful API

B : WebSocket API

C : HTTP

D : MQTT
Q.no 10. acroname of 6LoWPAN

A : a) IPv6 over Low power wireless personal area network

B : b) IPv4 over Low power wireless private area network

C : c) IPv6 over Low energy wire personal area network

D : d) IPv4 over LongRange wireless private area network

Q.no 11. Which one is the First step in IOT Platforms Design Methodology

A : Process Model Specification

B : Purpose and Requirement

C : Domain Model Specification

D : Service Specification

Q.no 12. How many categories of storage devices broadly exist in cloud?

A:1

B:2

C:3

D:4

Q.no 13. How many types of voice communications in IoT environment :

A:2

B:3

C:4

D:5

Q.no 14. M2M protocol standards activities include..

A : M2MXML

B : SDN

C : NFV

D : SNMP
Q.no 15. In microcontrollers, UART is acronym of_____

A : a) Universal Applied Receiver/Transmitter

B : b) Universal Asynchronous Rectified Transmitter

C : c)Universal Asynchronous Receiver/Transmitter

D : d) United Asynchronous Receiver/Transmitter

Q.no 16. Sensor TEDS Standardization Efforts given by

A : IEEE 1459

B : IEEE 1451

C : IEEE 1441

D : IEEE 1414

Q.no 17. Amazon launched ……….. on a utility computing basis in 2006, which is
now categorized as IaaS (Infrastructure as a service).

A : Amazon Prime

B : Amazon Web Series

C : AWS Academy

D : Amazon Web Service

Q.no 18. In M2M/ IoT protocols the payload and hearder is very __________

A : Small

B : Big

C : Same as Internet Protocol

D : Moderate

Q.no 19. DCS is a __________________

A : a) Distributed Control System

B : b) Data Control System

C : c) Data Column System

D : d) Distributed Column System


Q.no 20. MQTT is _________ protocol.

A : a) Machine to Machine

B : b) Internet of Things

C : c) Machine to Machine and Internet of Things

D : d) Machine Things

Q.no 21. Which protocol is an open standard

A : CoAP

B : MQTT

C : XMPP

D : HTTP

Q.no 22. What kind of electronic document contains a public key?

A : PIN

B : Digital certificate

C : PAN

D : Biometrics

Q.no 23. Which of the following provide access for developers to charge Amazon's
customer for their purchases ?

A : FWS

B : FAS

C : FPS

D : All of the mentioned

Q.no 24. HelloWeb is an example of __________

A : HTTP

B : MQTT

C : SMTP

D : CoAP
Q.no 25. The control in SCADA is _____________

A : a) Online control

B : b) Direct control

C : c) Supervisory control

D : d) Automatic control

Q.no 26. Which of the following in LPWAN technologies

A : a) LoRa

B : b) GSM

C : c) CDMA

D : d) LTE

Q.no 27. Standardization is like a double-edged sword:But it may threaten ........


when standards are accepted by the market

A : innovation and inhibit change

B : innovation

C : inhibit change

D : change

Q.no 28. The U.S. NIST is ………

A : National Institute of Security & Technology

B : National Institute of Standards & Technology

C : National Institute of Standards & Trends

D : National Institute of Standards & Terminologies

Q.no 29. What are the distributions supported by raspberry Pi?

A : a) Arch Linux

B : b) Debain

C : c) Fedora Remix

D : d) Arch Linux, Debain, and Fedora Remix


Q.no 30. Two Pillars of the Web are
I ] The protocol
II] The software
III] Platform Middleware
IV] Business Intelligence

A : Option I and II

B : Option II and III

C : Option I not III

D : Option I not IV

Q.no 31. Amazon EC2 templates for instances are called ??

A : IASI

B : ASI

C : AMI

D : ASTI

Q.no 32. REST is -------- than SOAP

A : Slower

B : Faster

C : none of above

D : All of Above

Q.no 33. CoAP is specialized application

A : Internet applications

B : Device applications

C : Wireless applications

D : Wired applications

Q.no 34. Which step in in the IoT design methodology is the integration of the
devices and components.

A : Application Development

B : Device & Component Integration


C : Operational View Specification

D : None of Above

Q.no 35. REST represents --------

A : REpresentational State Transfer

B : Realtime state

C : none of above

D : Repeat style Trade

Q.no 36. Which of the following is (are) example(s) of embedded system for data
communication? USB Mass Storage device

A : Network router

B : Digital camera

C : Music player

D : All of these

Q.no 37. WAMP follows ______ approach.

A : Connectionless

B : Connection-Oriented

C : OTA

D : None of the above

Q.no 38. Which of the following is the vulnerabilities of IoT

A : MALC

B : DDOS

C : DOSD

D : SSOD

Q.no 39. ___________ is the exampe of decentralised application layer protocol

A : XMPP

B : HTTP
C : CoAP

D : MQTT

Q.no 40. IEEE 802.15.4-Specifies physical layer and media access control for

A : WPANs

B : LR-WPANs

C : HR-PANs

D : PAN

Q.no 41. Applicatiion Development in IoT Design Methodology is ------- Step

A : First

B : Second

C : Third

D : Last

Q.no 42. What bit processor is used in Pi 3?

A : a) 64-bit

B : b) 32-bit

C : c) 128-bit

D : d) Both 64 and 32 bit

Q.no 43. which of protocol provide Full-Duplex communication

A : a) WebSocket

B : b) HTTP

C : c) MQTT

D : d) CoAP

Q.no 44. In SCADA and RFID the OPC stands for

A : Object Process Control

B : Object Linking and Embedding for Process Control


C : Object Controlling Process Control

D : Object Identifying Process Control

Q.no 45. Some communication devices in IoT

A : Sensors

B : Actuators

C : RFID Tags

D : All of Above

Q.no 46. What is SCADA?

A : Software

B : Process

C : System

D : Hardware

Q.no 47. In unauthorized access......should be done before granting the access


rights

A : Value-based verification

B : Identity-based verification

C : Name-based verification

D : Number-based verification

Q.no 48. .......Involves confidentiality and integrity of sensitive information stored


in the system

A : Secure Storage

B : Secure Software Execution

C : Trust Management

D : Data Availability

Q.no 49. Which instruction set architecture is used in Raspberry Pi?

A : a) X86
B : b) MSP

C : c) AVR

D : d) ARM

Q.no 50. Which of the following is the heart of a SCADA system?

A : a) PLC

B : b) HMI

C : c) Alarm task

D : d) I/O task

Q.no 51. IaaS, PaaS and SaaS are three ……… models of cloud.

A : deployment

B : characteristic

C : solution

D : service

Q.no 52. IEEE 802.15.4 is a technical standard which defines the operation of
____________

A : LR-WPANs

B : USN

C : WSN

D : Zigbee

Q.no 53. ________ is an attack which forces an end user to execute unwanted
actions on a web application in which he/she is currently authenticated.

A : Cross-site scoring scripting

B : Cross-site request forgery

C : Two-factor authentication

D : Cross-site scripting

Q.no 54. REST follows _____________communication model


A : Request Response model

B : Publish Subscribe model

C : Push Pull model

D : Exclusive Pair model

Q.no 55. Which of the following describes a message-passing taxonomy for a


component-based architecture that provides services to clients upon demand?

A : SOA

B : EBS

C : GEC

D : Option 2 and 3

Q.no 56. Private cloud, public cloud, community cloud and hybrid cloud are four
…….. models of cloud.

A : deployment

B : characteristic

C : solution

D : service

Q.no 57. MQTT protocol uses ________________communication model.

A : Publish Subscribe model

B : Push Pull model

C : Exclusive Pair model

D : Request Response model

Q.no 58. The processor must accept and process the frame before the next frame
is called as ______________

A : Hard Real time systems

B : Real time constraints

C : Real data constraints

D : Soft real constraints


Q.no 59. The technological foundation of cloud computing is distributed
computing based on communication networks using……..

A : the internet of things

B : Google servers farms and Google Map

C : Amazon Web Service

D : cluster of workstations and networks of workstations

Q.no 60. Which if the following is Light waight protocol used of IoT Applications

A : a) MQTT

B : b) HTTP

C : c) WebSocket

D : d) All of the above

Q.no 1. Amazon S3 stands for

A : Secure storage service

B : Session storage service

C : Simple storage service

D : Sample storage service

Q.no 2. Django interaction with application takes place with _____

A : Template

B : model

C : view

D : Service

Q.no 3. Websocket is the example of which communication model

A : Request – Response

B : Publish – Subscribe

C : Push-Pull

D : Exclusive Pair
Q.no 4. Which is true about model view controller architecture of Django

A : It represents by a database

B : It is user interface that you see in browser

C : It connects view and model together

D : None of the above

Q.no 5. MQTT protocol is based on

A : Client-Server Architecture

B : Publish-Subscribe Architecture

C : Both of the above

D : Peer to peer Architecture

Q.no 6. Services in Operational View Specifications are

A : Mode service

B : State service

C : Controller Service

D : All of above

Q.no 7. Which Django component concerns about metadata ?

A : Model

B : View

C : Template

D : None of the above

Q.no 8. Which of the following instance is used by default in AMI?

A : High-Memory Quadruple Extra Large Instance

B : Small Instance

C : Micro Instance

D : High-CPU Extra Large Instance


Q.no 9. ______ are integrated Antenna for longe range communication

A : BC241

B : BC154

C : BC144

D : BC118

Q.no 10. The channel between two communication nodes is _____

A : Session

B : Event

C : Transport

D : None of the above

Q.no 11. Data stored in _______ domains doesn't require maintanance of schema.

A : SimpleDB

B : SQL Server

C : Oracle

D : RDS

Q.no 12. SOA stands for ……….

A : Solution Oriented Architecture

B : Sector Oriented Architecture

C : Source Oriented Architecture

D : Service Oriented Architecture

Q.no 13. To define the information model, we first list the ------ Entities defined

A : Dynamic

B : Virtual

C : System

D : Basic
Q.no 14. In 1999, Marc Benioff founded a company, which pioneered the multi-
tenant SaaS model, a new application-delivering mechanism. Which company is
that?

A : Salesforce

B : Oracle Siebel

C : SAP CRM

D : Infusionsoft

Q.no 15. Information Model defines the ------- of all the information in the IoT
system

A : Structure

B : service

C : Network

D : Device

Q.no 16. The Functional View (FV) defines the functions of the IoT systems
grouped into various ----------.

A : Network Groups (NGs)

B : Model Groups (MGs)

C : Domain Groups (DGs)

D : Functional Groups (FGs)

Q.no 17. Which layer/layers of the OSI model does Web of Things (WoT) deals with
?

A : Application Layer

B : Network Layer

C : Transport Layer

D : Every layer

Q.no 18. Xivety is available as _____________

A : IaaS

B : SaaS
C : CaaS

D : Paas

Q.no 19. Which amongst the following is fastest Amazon Web Service ?

A : Amazon RDS

B : Amazon EC2

C : Amazon S3

D : Amazon DynamoDB

Q.no 20. In SCADA system the controlling is done by

A : Online control

B : Direct control

C : Supervisory control

D : Automatic control

Q.no 21. Amazon Web Services supports which type II Audits ?

A : SAS20

B : SAS70

C : SAS702

D : None of the above

Q.no 22. Operational View Specification is

A : Integration of the devices

B : Integration of the Components

C : Integration of Applications

D : None of above

Q.no 23. What is the default user in Debain on Raspberry Pi?

A : a) Default

B : b) User
C : c) Pi

D : d) Root

Q.no 24. Two of the most common protocols for SCADA _______________

A : DNP3

B : T101

C : Both A & B

D : IPv4

Q.no 25. The process of converting data into a format that can not be read by
another user

A : Registering

B : Locking

C : Encryption

D : Keying

Q.no 26. In SCADA Standardization Efforts:The standard specifies the


communication of ...............between control devices from different
manufacturers

A : plant data

B : non real-time plant data

C : real- time plant data

D : CBR Data

Q.no 27. Raspbian OS used in RaspberryPi is based on which of the following OS

A : a) RTOS

B : b) Windows

C : c) Debian Linux

D : d) None of there above

Q.no 28. XMPP is an example of _________________Layer in IoT

A : Transport Layer
B : Link Layer

C : Network Layer

D : Application Layer

Q.no 29. How many levels are present in a complex SCADA system?

A : a) 3 – levels

B : b) 5 – levels

C : c) 4 – levels

D : d) 6 – levels

Q.no 30. Key elements of ETSI M2M architecture are


I] M2M device & M2M gateway
II] M2M area network & M2M communication network
III] M2M application server

A : Option I , II and III

B : Option I and II

C : Option II and III

D : Option III

Q.no 31. Which one is not True regarding WebSocketAPIs

A : bi-directional

B : Full duplex

C : Not Secure

D : Exclusive Pair Communication

Q.no 32. Amazon EC2 data is stored using _____

A : EBS

B : ECS

C : Cloud

D : Database

Q.no 33. Cloud computing is the fusion of ……..


A : EAI and grid.

B : SaaS and EAI.

C : grid and SOA.

D : SOAP and SaaS.

Q.no 34. which statement is True about RISC

A : Single Clock Cycle

B : Highly pipelined

C : Fixed Format Instruction

D : All of Above

Q.no 35. ........... Provides mechanisms for computerized building automation


devices to exchange information

A : 802.15.4

B : SCADA

C : RFID

D : BACNet

Q.no 36. Private IoT, Public IoT, Community IoT and Hybrid IoT are four ……….
models of IoT.

A : deployment

B : characteristic

C : solution

D : service

Q.no 37. IEEE 802.15.4 framework conceives a 10m communications range with a
transfer rate of

A : 250 Kbits/s

B : 520 Kbits/s

C : 205 Kbits/s

D : 250 bits/s
Q.no 38. A network of physical objects or things embedded with electronics or
softwares.

A : a) AI

B : b) ML

C : c) IOT

D : d) Internet

Q.no 39. The instruction set of RISC processor is

A : a) Simple and lesser in number

B : b)Complex and lesser in number

C : c)Simple and larger in number

D : d)Complex and larger in number

Q.no 40. Which of the following makes sure that data is not changed when it not
supposed to be?

A : Integrity

B : Availability

C : Confidentiality

D : Accounting

Q.no 41. The …….. has features such as offline support, canvas drawing based on
low footprint SVG graphics, GeolocationAPI, video and audio streaming support
with flash, WebStorage, CSS3 Selectors, 2D animation for mobile cloud
applications.

A : HTML5

B : HTML4

C : HTML3

D : HTML2

Q.no 42. ZigBee is based on which of the following standard

A : a) IEEE 802.15.4

B : b) IEEE 802.5
C : c) IEEE 802.4.13

D : d) Both a and b

Q.no 43. OSGi (Open services Gateway initiative framework) is used for

A : Module system and service platform , component deployment remotely

B : Standard internet protocol

C : Application life cycle management

D : Option 1 and 3

Q.no 44. Which of the Following are ZigBee based application

A : FM Radio

B : low-power High-bandwidth

C : Balestic Missile

D : Medical Device Data Collection

Q.no 45. SOAP is a protocol through which two computer communicates by


sharing ------ document

A : XML

B : HTML

C : JAVA

D : API

Q.no 46. Which of the following is not a characteristic of a ZigBee network?

A : Low power consumption

B : Easy installation.

C : High data rates.

D : Unlicensed radio bands.

Q.no 47. Which one is loT Communication Models

A : Request-Response

B : Publish-Subscribe
C : All of Above

D : None Of Above

Q.no 48. For constrained nodes and constrained networks in Internet of Things
which protocol is used.

A : IPv4

B : IPv6

C : CoAP

D : MQTT

Q.no 49. Which API are supported by SkyNet ?

A : HTTP

B : REST

C : Web Socket

D : All of the above

Q.no 50. In which Step the system


purpose, behavior and requirements (such as data collection
requirements, data analysis requirements, system management
requirements, data privacy and security requirements, user interface
requirements, ...) are captured.

A : Application Development

B : Device & Component Integration

C : Operational View Specification

D : Purpose & Requirements Specification

Q.no 51. Find the correct statement with respect to SOA


I ) It describes a standard method for requesting services from distributed
components and managing the results
II) SOA provides the translation and management layer in an architecture that
removes the barrier for a client obtaining desired services
III) With SOA, clients and components can be written in different languages and
can use multiple messaging protocols

A : Option I and II

B : Option I,II and III


C : Only Option I

D : Only Option III

Q.no 52. Connecting heterogeneous devices that makes the integration across
systems and applications much simpler is achieved by

A : IoT

B : WoT

C : Both (a) and (b)

D : Neither (a) nor (b).

Q.no 53. In threat modeling, what methodology used to perform risk analysis

A : DREAD

B : OWASP

C : STRIDE

D : DAR

Q.no 54. Which system is a batch processing extension of the scatter-barrier-


reduce primitives of MPI/PVM?

A : Google Map

B : MapReduce

C : MPI and OpenMP

D : Hadoop

Q.no 55. WOT is


I] An applications’ platform
II] Explores the layer top of connectivity with things
III] fast prototyping, data integration and interaction with objects

A : Only III

B : Option I and III

C : Option I not III

D : Option I, II and III

Q.no 56. Zigbee architectures consist of which the following section


A : Physical

B : ZigBee device

C : Transport

D : IEEE 802.15.4

Q.no 57. APS Provides services necessary for.........

A : application Management and the ZigBee layers

B : application objects(endpoints) and the ZigBee device object (ZDO)

C : application Management and security management

D : Application Management

Q.no 58. HTTP resources are located by

A : unique resource locator

B : unique resource identifier

C : none of the mentioned

D : uniform resource identifier

Q.no 59. ________ is a collection of wireless broadband standards (WiMax).

A : IEEE 802.3

B : IEEE 802.11

C : IEEE 802.16

D : IEEE 802.15.4

Q.no 60. For.........Secure, lightweight, and efficient key exchange mechanism is


required

A : Data Availability

B : Trust Management

C : Data Confidentiality

D : Secure Storage
Q.no 1. The entities, objects and concepts defined in the Domain Model
Specification

A : Physical Entity

B : Virtual Entity

C : Device

D : All of above

Q.no 2. The control in SCADA is _____________

A : a) Online control

B : b) Direct control

C : c) Supervisory control

D : d) Automatic control

Q.no 3. Domain Model Specification is the ------ Step in IOT platforms Design
Methodology

A : First

B : Second

C : Third

D : Four

Q.no 4. The object in IoT will be empowered by _______

A : Network

B : Cloud

C : Devices

D : Connectivity

Q.no 5. This Process of identifying any individual is called as.

A : Auditing

B : Authorisation

C : Authentication
D : Accounting

Q.no 6. MQTT stands for _____________

A : a) MQ Telemetry Things

B : b) MQ Transport Telemetry

C : c) MQ Transport Things

D : d) MQ Telemetry Transport

Q.no 7. WAMP stands for ____________

A : Web Analysed Messaging Protocol

B : Web Authorised Messaging Prototcol

C : Web Application Messaging Protocol

D : Web Appliance Messaging Protocol

Q.no 8. Which one is the First step in IOT Platforms Design Methodology

A : Process Model Specification

B : Purpose and Requirement

C : Domain Model Specification

D : Service Specification

Q.no 9. Amazon EC2 configuration determined by ?

A : CPU

B : memory & storage

C : networking capability

D : All of the mentioned

Q.no 10. Which of the following impose additional overhead on clients and offer
faster transfer?

A : Block Storage

B : File Storage

C : File Server
D : All of the above

Q.no 11. IAD stands for ___________

A : Intelligent Assist Device

B : Industrial Assist Device

C : International Assist Device

D : Informative Assist Device

Q.no 12. Amazon launched ……….. on a utility computing basis in 2006, which is
now categorized as IaaS (Infrastructure as a service).

A : Amazon Prime

B : Amazon Web Series

C : AWS Academy

D : Amazon Web Service

Q.no 13. Microphones usually have ____

A : Amplifier filter

B : Noise Filter

C : Round Filter

D : Frequency filter

Q.no 14. How many virtual servers can be launch with Amazon EC2 ?

A:1

B:2

C : Infinite

D:0

Q.no 15. What is SCADA?

A : a) Software

B : b) Process

C : c) System
D : d) Hardware

Q.no 16. Which statement is wrong regarding Service Specifications

A : service inputs/output

B : service endpoints

C : Network Security

D : Service Preconditions

Q.no 17. Which of the following is not involved in working of IoT?

A : RFID

B : Sensor

C : Nano tech

D : Server

Q.no 18. How many types of voice communications in IoT environment :

A:2

B:3

C:4

D:5

Q.no 19. BRIDGE stands for

A : Building Radio-Frequency Identifier

B : Building Radio-Frequency Identification

C : Building Radio-Frequency Identity

D : Building Radio-Frequent Identification

Q.no 20. MQTT is _________ protocol.

A : a) Machine to Machine

B : b) Internet of Things

C : c) Machine to Machine and Internet of Things


D : d) Machine Things

Q.no 21. HelloWeb is an example of __________

A : HTTP

B : MQTT

C : SMTP

D : CoAP

Q.no 22. Process Specification is the ------ Step in IOT platforms Design
Methodology

A : First

B : Second

C : Third

D : Four

Q.no 23. Operational View Specification consist of

A : service hosting options

B : storage options

C : device options

D : All of above

Q.no 24. RFID stands for?

A : Random frequency identification

B : Radio frequency identification

C : Random frequency information

D : Radio frequency information

Q.no 25. In 2008, which company launched the PaaS on-demand development
platform & become a new pillar of cloud computing?

A : Salesforce

B : The force.com
C : Amazon

D : Cloudera

Q.no 26. In SCADA and RFID the OPC stands for

A : Object Process Control

B : Object Linking and Embedding for Process Control

C : Object Controlling Process Control

D : Object Identifying Process Control

Q.no 27. What does WoT do ?


(I) Re-invent completely new standards.
(II) Reuses existing and well known standards.

A : ONLY (I)

B : ONLY (II)

C : Both (I) and (II)

D : Neither (I) nor (II)

Q.no 28. WAMP is

A : Unidirectional

B : Bidirectional

C : both

D : None of the above

Q.no 29. Django forms and classes are created using _________

A : Template

B : view

C : Model

D : Django Services

Q.no 30. ………. Middleware include all enterprise middleware, B2B, EAI, multi-
tenant App servers, etc.

A : SaaS
B : IaaS

C : FaaS

D : PaaS

Q.no 31. WiFi is not present in which of the following models?

A : a) Raspberry Pi3

B : b) Raspberry Pi Zero WH

C : c) Raspberry Pi Zero W

D : d) Raspberry Pi Zero

Q.no 32. Process Specification in IOT design Methodology -------

A : Defines the IoT level


for the system

B : Shows the integration of the


devices and components.

C : Defines the use cases of the IoT system are


formally described based on and derived from the purpose and
requirement specifications.

D : None of above

Q.no 33. The main importance of ARM micro-processors is providing operation


with ______

A : Low cost and low power consumption

B : Higher degree of multi-tasking

C : Lower error or glitches

D : Efficient memory management

Q.no 34. Which of the following layers are defined by the ZigBee stack?

A : Transport layer

B : Physical layer.

C : Application Support sub-layer.

D : Medium Access layer


Q.no 35. which of protocol provide Full-Duplex communication

A : a) WebSocket

B : b) HTTP

C : c) MQTT

D : d) CoAP

Q.no 36. What are the distributions supported by raspberry Pi?

A : a) Arch Linux

B : b) Debain

C : c) Fedora Remix

D : d) Arch Linux, Debain, and Fedora Remix

Q.no 37. _____ manages metadata of IoT services

A : Power

B : Controller

C : Scheduler

D : Package

Q.no 38. Domain Model Specification defines

A : Physical & Virtual Entity

B : Physical Entity

C : Virtual Entity

D : None of Above

Q.no 39. Which of the following protocol is based on Publish – Subscribe


architecture

A : a) HTTP

B : b) CoAP

C : c) HTTPS

D : d) MQTT
Q.no 40. Standardization is like a double-edged sword:But it may threaten ........
when standards are accepted by the market

A : innovation and inhibit change

B : innovation

C : inhibit change

D : change

Q.no 41. What should be frequency of soil for hand gesturing functions ?

A : 50 Hz

B : 60 Hz

C : 35 Hz

D : 40 Hz

Q.no 42. CoAP is specialized application

A : Internet applications

B : Device applications

C : Wireless applications

D : Wired applications

Q.no 43. Hybrid IoT is ……….

A : made available to general public or a large industry group.

B : shared by several organizations and supports a specific community that has shared
concerns.

C : operated solely for an organization.

D : an integrated composition of two or more of the IoT systems (private, community,


or public)

Q.no 44. What bit processor is used in Pi 3?

A : a) 64-bit

B : b) 32-bit

C : c) 128-bit
D : d) Both 64 and 32 bit

Q.no 45. ________ is used to describe a perceived, quickly growing set of web based
applications.

A : Web 1.0

B : Web 2.0

C : Web 3.5

D : Web 4.0

Q.no 46. Communication model which involves brokers is called as ____________

A : Request Response model

B : Publish Subscribe model

C : Push Pull model

D : Exclusive Pair model

Q.no 47. NFC stands for

A : Near Fast Communication

B : Near Field Communication

C : Near Field Consumer

D : Near Field Connection

Q.no 48. KNX protocol Standardized , ............ communications protocol for


automation

A : ISO-based network

B : OSI-based network

C : ISI-OSI-based transport

D : ISO-based transport

Q.no 49. Diagnostics service for Cars.

A : a) MIPS

B : b) AutoBot
C : c) IoT Assistant

D : d) IoT

Q.no 50. What is the long form of OMTP, which was a forum crated by mobile
network operators to discuss standards with manufacturers of cell phones and
other mobile devices.

A : Open Mobile Transport Protocol

B : Open Middleware Terminal Platform

C : Open Mobile Terminal Platform

D : Open Middleware Transport Protocol

Q.no 51. The cloud middleware consists of two kinds of middleware……..

A : IaaS and PaaS

B : IaaS and SaaS

C : SaaS and PaaS

D : SaaS and BaaS

Q.no 52. which of the following are IoT Plaftorms

A : a) AWS IoT

B : b) Microsoft Azure IoT

C : c) PTC ThingWorx

D : d) All of the above

Q.no 53. __________is not an IoT application layer protocol

A : XMPP

B : TCP

C : CoAP

D : MQTT

Q.no 54. A digital multi meter is an example of an embedded system for

A : Data communication
B : Monitoring

C : Control

D : All of these

Q.no 55. From following which one is not fit for IOT Level

A : IOT LEVEL 1

B : IOT LEVEL 2

C : IOT LEVEL 3

D : IOT LEVEL 11

Q.no 56. Which if the following is Light waight protocol used of IoT Applications

A : a) MQTT

B : b) HTTP

C : c) WebSocket

D : d) All of the above

Q.no 57. Frequency band used by 802.11 ah standard is:

A : 60 GHz

B : 2.4 GHz

C : Sub 1 GHz

D : 5 GHz

Q.no 58. IoT level _______ systems are suitable for solutions where the data
involved is big and the analysis requirements are computationally intensive.

A : Level 1

B : Level 2

C : Level 3

D : Level 4

Q.no 59. Which of the following is the heart of a SCADA system?

A : PLC
B : HMI

C : Alarm task

D : I/O task

Q.no 60. MQTT protocol uses ________________communication model.

A : Publish Subscribe model

B : Push Pull model

C : Exclusive Pair model

D : Request Response model

Q.no 1. ANSI/ISA-95 standard used for

A : Reduce cost, errors and risk with production process

B : Reduce errors and risk with production process

C : Reduce cost and risk with production process

D : Reduce cost,and errors and with production process

Q.no 2. How many USB ports are present in Raspberry Pi 3?

A : a) 5

B : b) 2

C : c) 4

D : d) 3

Q.no 3. _____ is virtual server platform that allows users to create and run virtual
machines on Amazon's server farm.

A : EC2

B : Azure

C : EC5

D : None of the above

Q.no 4. To define the information model, we first list the ------ Entities defined

A : Dynamic
B : Virtual

C : System

D : Basic

Q.no 5. Which company played a key role in the development of cloud computing?

A : Microsoft

B : Google

C : Amazon

D : Cloudera

Q.no 6. SOAP stands for-

A : Simple Object Access Protocol

B : Server Object Access Protocol

C : Simple Orientation Across Protocol

D : Server Orientation Across Protocol

Q.no 7. WAMP uses _____ messaging pattern

A : Function call

B : Procedure call

C : RPC

D : Web based

Q.no 8. Which protocol is an open standard

A : CoAP

B : MQTT

C : XMPP

D : HTTP

Q.no 9. Which of the following is not involved in working of IoT?

A : a) RFID
B : b) Sensor

C : c) Nano tech

D : d) Server

Q.no 10. Which layer/layers of the OSI model does Web of Things (WoT) deals with
?

A : Application Layer

B : Network Layer

C : Transport Layer

D : Every layer

Q.no 11. Two of the most common protocols for SCADA _______________

A : DNP3

B : T101

C : Both A & B

D : IPv4

Q.no 12. Which of the following terms indicates that information is to be read
only by those people for whom it is intended?

A : Availability

B : Accounting

C : Integrity

D : Confidentiality

Q.no 13. Amazon S3 is

A : data storage infrastructure

B : compute capacity in the cloud

C : relational database in cloud

D : None of the above

Q.no 14. Which layer is responsible for WAMP communication ?


A : Application

B : Physical

C : Transport

D : Session

Q.no 15. __________ is an example of Hard Real time Systems

A :    Failure in radar functioning

B : Printer

C : Watch

D : Washing Machine

Q.no 16. IoT Level_______ systems has a single node/device that performs sensing
and/ or actuation, stores data, performs analysis and hosts the application.

A : Level 1

B : Level 2

C : Level 3

D : Level 4

Q.no 17. Things in IoT refers to_____________

A : General device

B : Information

C : IoT devices

D : Object

Q.no 18. IoT has _________number of levels.

A:4

B:3

C:5

D:6

Q.no 19. Standard ports of MQTT are


A : I2C

B : SSL

C : USART

D : TCP/IP

Q.no 20. M2M protocol standards activities include..

A : M2MXML

B : SDN

C : NFV

D : SNMP

Q.no 21. Which protocol is lightweight?

A : a) MQTT

B : b) HTTP

C : c) CoAP

D : d) SPI

Q.no 22. In Core of SODA which standard is based on XML encodings

A : DDL

B : XML

C : SOA

D : SODA

Q.no 23. SOA stands for ……….

A : Solution Oriented Architecture

B : Sector Oriented Architecture

C : Source Oriented Architecture

D : Service Oriented Architecture

Q.no 24. IPv4 is ______ bit address


A : a) 24

B : b) 32

C : c) 64

D : d) 128

Q.no 25. How many can you create in AWS by default

A:1

B : 10

C : 100

D : 110

Q.no 26. Which of the following Hardware can be alone used as IoT Gateway

A : a) RaspberriPI

B : b) NodeMCU ESP8266

C : c) Arduino UNO

D : d) Both a and b

Q.no 27. Community IoT is ………

A : made available to general public or a large industry group.

B : shared by several organizations and supports a specific community that has shared
concerns.

C : operated solely for an organization.

D : an integrated composition of two or more of the IoT systems (private, community,


or public)

Q.no 28. Public IoT is …….

A : made available to general public or a large industry group.

B : shared by several organizations and supports a specific community that has shared
concerns.

C : operated solely for an organization.


D : an integrated composition of two or more of the IoT systems (private, community,
or public)

Q.no 29. List out the tools or API for developing or testing web api?

A : Spring REST web service using MVC

B : Jersey API

C : Axis

D : All of above

Q.no 30. WiFI uses how much frequency ?

A : 2.2 GHz

B : 3 GHz

C : 3.5 GHz

D : 2.4 GHz

Q.no 31. The instruction set of RISC processor is

A : a) Simple and lesser in number

B : b)Complex and lesser in number

C : c)Simple and larger in number

D : d)Complex and larger in number

Q.no 32. ________ is the instruction set used by ARM7

A : 16-bit instruction set

B : 32-bit instruction set

C : 8-bit instruction set

D : 64 Bit instruction set

Q.no 33. The U.S. NIST is ………

A : National Institute of Security & Technology

B : National Institute of Standards & Technology

C : National Institute of Standards & Trends


D : National Institute of Standards & Terminologies

Q.no 34. Amazon EC2 data is stored using _____

A : EBS

B : ECS

C : Cloud

D : Database

Q.no 35. Range of Zigbee is low-cost and low-powered mesh network ___________

A : 10-100 meters

B : 100-1000 meters

C : 10-100 cm

D : 100-1000 cm

Q.no 36. A smart object is defined by IPSO

A : Internet Protocol Smart Object

B : Internet Protocol Sensor Object

C : International Protocol Smart Object

D : International Protocol Sensor Object

Q.no 37. SOAP is a protocol through which two computer communicates by


sharing ------ document

A : XML

B : HTML

C : JAVA

D : API

Q.no 38. Amazon EC2 templates for instances are called ??

A : IASI

B : ASI

C : AMI
D : ASTI

Q.no 39. Gateway provides the connection between _____ and _____

A : Cloud and controller

B : Network and Cloud

C : Network and Controller

D : Controller and Device

Q.no 40. The approach/s to build WoT is through __________


(I) RESTful principles.
(II) REST APIs.

A : Only (I)

B : Only (II)

C : Both (I) and (II)

D : Neither (I) nor (II)

Q.no 41. ………. Middleware include all Grid middleware such as MSV Cluster
middleware, SSV and schedulers, etc.

A : SaaS

B : IaaS

C : FaaS

D : PaaS

Q.no 42. which statement is True about RISC

A : Single Clock Cycle

B : Highly pipelined

C : Fixed Format Instruction

D : All of Above

Q.no 43. This protocol is lightweight in nature and is ideal for connecting small
devices to constrained networks

A : MQTT
B : CoAP

C : IPv4

D : IPv6

Q.no 44. Private IoT is ……

A : made available to general public or a large industry group.

B : shared by several organizations and supports a specific community that has shared
concerns.

C : operated solely for an organization.

D : an integrated composition of two or more of the IoT systems (private, community,


or public)

Q.no 45. _______________ are called as front end of IoT device

A : Sensors

B : Gateways

C : Processors

D : Applications

Q.no 46. Private IoT, Public IoT, Community IoT and Hybrid IoT are four ……….
models of IoT.

A : deployment

B : characteristic

C : solution

D : service

Q.no 47. IEEE 802.15.4-Specifies physical layer and media access control for

A : WPANs

B : LR-WPANs

C : HR-PANs

D : PAN

Q.no 48. For Amazon EC2 instance, public and private keys are maintained by ?
A : AWS, client

B : client,AWS

C : only AWS

D : None of the above

Q.no 49. Which of the following is not a characteristic of a ZigBee network?

A : Low power consumption

B : Easy installation.

C : High data rates.

D : Unlicensed radio bands.

Q.no 50. Which of the Following are ZigBee based application

A : FM Radio

B : low-power High-bandwidth

C : Balestic Missile

D : Medical Device Data Collection

Q.no 51. Which system is a batch processing extension of the scatter-barrier-


reduce primitives of MPI/PVM?

A : Google Map

B : MapReduce

C : MPI and OpenMP

D : Hadoop

Q.no 52. WOT is


I] An applications’ platform
II] Explores the layer top of connectivity with things
III] fast prototyping, data integration and interaction with objects

A : Only III

B : Option I and III

C : Option I not III


D : Option I, II and III

Q.no 53. Embedded Systems applications typically involve processing information


as ___________

A : Block

B : Logical Volumes

C : Distance

D : Signals

Q.no 54. In threat modeling, what methodology used to perform risk analysis

A : DREAD

B : OWASP

C : STRIDE

D : DAR

Q.no 55. ……. is the direct technological ancestor of cloud computing, which also
has roots in the COW technology.

A : Pervasive computing

B : Mobile computing

C : Grid computing

D : Quantum Computing

Q.no 56. ________ is an attack which forces an end user to execute unwanted
actions on a web application in which he/she is currently authenticated.

A : Cross-site scoring scripting

B : Cross-site request forgery

C : Two-factor authentication

D : Cross-site scripting

Q.no 57. Which of the following specifies a set of media access control (MAC) and
physical layer specifications for implementing WLANs?

A : IEEE 802.16
B : IEEE 802.3

C : IEEE 802.11

D : IEEE 802.15

Q.no 58. Exclusive pair communication model can be best described as ____________

A : Bidirectional , simplex

B :    Birectional , full duplex

C : Unidirectional , simplex

D : Unidirectional , full duplex

Q.no 59. IoT level _______ systems are suitable for solutions where multiple nodes
are required, the data involved is big and the analysis requirements are
computationally intensive

A : Level1

B : Level 2

C : Level 3

D : Level 4

Q.no 60. The processor must accept and process the frame before the next frame
is called as ______________

A : Hard Real time systems

B : Real time constraints

C : Real data constraints

D : Soft real constraints


Answer for Question No 1. is c

Answer for Question No 2. is c

Answer for Question No 3. is b

Answer for Question No 4. is a

Answer for Question No 5. is a

Answer for Question No 6. is d

Answer for Question No 7. is c

Answer for Question No 8. is c

Answer for Question No 9. is b

Answer for Question No 10. is c

Answer for Question No 11. is b

Answer for Question No 12. is a

Answer for Question No 13. is d

Answer for Question No 14. is b

Answer for Question No 15. is b

Answer for Question No 16. is a


Answer for Question No 17. is b

Answer for Question No 18. is c

Answer for Question No 19. is c

Answer for Question No 20. is a

Answer for Question No 21. is b

Answer for Question No 22. is c

Answer for Question No 23. is c

Answer for Question No 24. is b

Answer for Question No 25. is b

Answer for Question No 26. is d

Answer for Question No 27. is a

Answer for Question No 28. is c

Answer for Question No 29. is a

Answer for Question No 30. is a

Answer for Question No 31. is a

Answer for Question No 32. is b


Answer for Question No 33. is d

Answer for Question No 34. is b

Answer for Question No 35. is d

Answer for Question No 36. is a

Answer for Question No 37. is d

Answer for Question No 38. is d

Answer for Question No 39. is b

Answer for Question No 40. is a

Answer for Question No 41. is d

Answer for Question No 42. is c

Answer for Question No 43. is a

Answer for Question No 44. is a

Answer for Question No 45. is a

Answer for Question No 46. is c

Answer for Question No 47. is c

Answer for Question No 48. is d


Answer for Question No 49. is d

Answer for Question No 50. is d

Answer for Question No 51. is c

Answer for Question No 52. is d

Answer for Question No 53. is d

Answer for Question No 54. is d

Answer for Question No 55. is a

Answer for Question No 56. is a

Answer for Question No 57. is a

Answer for Question No 58. is c

Answer for Question No 59. is d

Answer for Question No 60. is c

Answer for Question No 1. is d

Answer for Question No 2. is b

Answer for Question No 3. is c

Answer for Question No 4. is c


Answer for Question No 5. is a

Answer for Question No 6. is a

Answer for Question No 7. is b

Answer for Question No 8. is a

Answer for Question No 9. is c

Answer for Question No 10. is d

Answer for Question No 11. is a

Answer for Question No 12. is d

Answer for Question No 13. is a

Answer for Question No 14. is a

Answer for Question No 15. is c

Answer for Question No 16. is d

Answer for Question No 17. is b

Answer for Question No 18. is c

Answer for Question No 19. is b

Answer for Question No 20. is d


Answer for Question No 21. is d

Answer for Question No 22. is d

Answer for Question No 23. is b

Answer for Question No 24. is a

Answer for Question No 25. is c

Answer for Question No 26. is a

Answer for Question No 27. is d

Answer for Question No 28. is c

Answer for Question No 29. is b

Answer for Question No 30. is c

Answer for Question No 31. is d

Answer for Question No 32. is c

Answer for Question No 33. is d

Answer for Question No 34. is a

Answer for Question No 35. is c

Answer for Question No 36. is b


Answer for Question No 37. is c

Answer for Question No 38. is b

Answer for Question No 39. is a

Answer for Question No 40. is d

Answer for Question No 41. is b

Answer for Question No 42. is b

Answer for Question No 43. is d

Answer for Question No 44. is a

Answer for Question No 45. is a

Answer for Question No 46. is a

Answer for Question No 47. is c

Answer for Question No 48. is b

Answer for Question No 49. is b

Answer for Question No 50. is b

Answer for Question No 51. is d

Answer for Question No 52. is c


Answer for Question No 53. is d

Answer for Question No 54. is b

Answer for Question No 55. is a

Answer for Question No 56. is d

Answer for Question No 57. is d

Answer for Question No 58. is a

Answer for Question No 59. is c

Answer for Question No 60. is d

Answer for Question No 1. is c

Answer for Question No 2. is c

Answer for Question No 3. is d

Answer for Question No 4. is a

Answer for Question No 5. is b

Answer for Question No 6. is d

Answer for Question No 7. is a

Answer for Question No 8. is b


Answer for Question No 9. is a

Answer for Question No 10. is c

Answer for Question No 11. is d

Answer for Question No 12. is a

Answer for Question No 13. is b

Answer for Question No 14. is c

Answer for Question No 15. is a

Answer for Question No 16. is b

Answer for Question No 17. is c

Answer for Question No 18. is a

Answer for Question No 19. is d

Answer for Question No 20. is c

Answer for Question No 21. is d

Answer for Question No 22. is b

Answer for Question No 23. is c

Answer for Question No 24. is b


Answer for Question No 25. is b

Answer for Question No 26. is c

Answer for Question No 27. is a

Answer for Question No 28. is d

Answer for Question No 29. is a

Answer for Question No 30. is d

Answer for Question No 31. is d

Answer for Question No 32. is a

Answer for Question No 33. is a

Answer for Question No 34. is a

Answer for Question No 35. is a

Answer for Question No 36. is d

Answer for Question No 37. is a

Answer for Question No 38. is d

Answer for Question No 39. is b

Answer for Question No 40. is d


Answer for Question No 41. is d

Answer for Question No 42. is b

Answer for Question No 43. is c

Answer for Question No 44. is b

Answer for Question No 45. is d

Answer for Question No 46. is d

Answer for Question No 47. is b

Answer for Question No 48. is b

Answer for Question No 49. is c

Answer for Question No 50. is a

Answer for Question No 51. is c

Answer for Question No 52. is a

Answer for Question No 53. is a

Answer for Question No 54. is d

Answer for Question No 55. is b

Answer for Question No 56. is d


Answer for Question No 57. is a

Answer for Question No 58. is b

Answer for Question No 59. is d

Answer for Question No 60. is c

Answer for Question No 1. is a

Answer for Question No 2. is d

Answer for Question No 3. is c

Answer for Question No 4. is c

Answer for Question No 5. is c

Answer for Question No 6. is a

Answer for Question No 7. is a

Answer for Question No 8. is d

Answer for Question No 9. is a

Answer for Question No 10. is b

Answer for Question No 11. is a

Answer for Question No 12. is a


Answer for Question No 13. is b

Answer for Question No 14. is a

Answer for Question No 15. is b

Answer for Question No 16. is c

Answer for Question No 17. is c

Answer for Question No 18. is b

Answer for Question No 19. is d

Answer for Question No 20. is d

Answer for Question No 21. is a

Answer for Question No 22. is c

Answer for Question No 23. is b

Answer for Question No 24. is a

Answer for Question No 25. is d

Answer for Question No 26. is d

Answer for Question No 27. is c

Answer for Question No 28. is b


Answer for Question No 29. is b

Answer for Question No 30. is c

Answer for Question No 31. is d

Answer for Question No 32. is a

Answer for Question No 33. is c

Answer for Question No 34. is d

Answer for Question No 35. is d

Answer for Question No 36. is b

Answer for Question No 37. is a

Answer for Question No 38. is a

Answer for Question No 39. is c

Answer for Question No 40. is a

Answer for Question No 41. is a

Answer for Question No 42. is c

Answer for Question No 43. is a

Answer for Question No 44. is c


Answer for Question No 45. is c

Answer for Question No 46. is b

Answer for Question No 47. is b

Answer for Question No 48. is b

Answer for Question No 49. is d

Answer for Question No 50. is b

Answer for Question No 51. is d

Answer for Question No 52. is b

Answer for Question No 53. is a

Answer for Question No 54. is c

Answer for Question No 55. is d

Answer for Question No 56. is c

Answer for Question No 57. is a

Answer for Question No 58. is c

Answer for Question No 59. is d

Answer for Question No 60. is b


Answer for Question No 1. is b

Answer for Question No 2. is b

Answer for Question No 3. is a

Answer for Question No 4. is a

Answer for Question No 5. is a

Answer for Question No 6. is a

Answer for Question No 7. is b

Answer for Question No 8. is d

Answer for Question No 9. is a

Answer for Question No 10. is a

Answer for Question No 11. is a

Answer for Question No 12. is b

Answer for Question No 13. is c

Answer for Question No 14. is d

Answer for Question No 15. is b

Answer for Question No 16. is d


Answer for Question No 17. is a

Answer for Question No 18. is a

Answer for Question No 19. is c

Answer for Question No 20. is c

Answer for Question No 21. is c

Answer for Question No 22. is b

Answer for Question No 23. is b

Answer for Question No 24. is d

Answer for Question No 25. is c

Answer for Question No 26. is b

Answer for Question No 27. is b

Answer for Question No 28. is c

Answer for Question No 29. is d

Answer for Question No 30. is a

Answer for Question No 31. is d

Answer for Question No 32. is a


Answer for Question No 33. is d

Answer for Question No 34. is a

Answer for Question No 35. is b

Answer for Question No 36. is c

Answer for Question No 37. is a

Answer for Question No 38. is a

Answer for Question No 39. is d

Answer for Question No 40. is d

Answer for Question No 41. is b

Answer for Question No 42. is d

Answer for Question No 43. is d

Answer for Question No 44. is a

Answer for Question No 45. is d

Answer for Question No 46. is d

Answer for Question No 47. is d

Answer for Question No 48. is d


Answer for Question No 49. is b

Answer for Question No 50. is d

Answer for Question No 51. is d

Answer for Question No 52. is d

Answer for Question No 53. is d

Answer for Question No 54. is a

Answer for Question No 55. is b

Answer for Question No 56. is a

Answer for Question No 57. is a

Answer for Question No 58. is d

Answer for Question No 59. is d

Answer for Question No 60. is d

Answer for Question No 1. is a

Answer for Question No 2. is a

Answer for Question No 3. is d

Answer for Question No 4. is a


Answer for Question No 5. is d

Answer for Question No 6. is c

Answer for Question No 7. is c

Answer for Question No 8. is d

Answer for Question No 9. is c

Answer for Question No 10. is d

Answer for Question No 11. is a

Answer for Question No 12. is b

Answer for Question No 13. is a

Answer for Question No 14. is b

Answer for Question No 15. is d

Answer for Question No 16. is d

Answer for Question No 17. is a

Answer for Question No 18. is d

Answer for Question No 19. is d

Answer for Question No 20. is b


Answer for Question No 21. is c

Answer for Question No 22. is b

Answer for Question No 23. is d

Answer for Question No 24. is a

Answer for Question No 25. is c

Answer for Question No 26. is b

Answer for Question No 27. is d

Answer for Question No 28. is a

Answer for Question No 29. is c

Answer for Question No 30. is c

Answer for Question No 31. is a

Answer for Question No 32. is b

Answer for Question No 33. is b

Answer for Question No 34. is c

Answer for Question No 35. is a

Answer for Question No 36. is d


Answer for Question No 37. is a

Answer for Question No 38. is a

Answer for Question No 39. is b

Answer for Question No 40. is b

Answer for Question No 41. is b

Answer for Question No 42. is d

Answer for Question No 43. is c

Answer for Question No 44. is a

Answer for Question No 45. is a

Answer for Question No 46. is d

Answer for Question No 47. is c

Answer for Question No 48. is c

Answer for Question No 49. is c

Answer for Question No 50. is b

Answer for Question No 51. is c

Answer for Question No 52. is d


Answer for Question No 53. is d

Answer for Question No 54. is d

Answer for Question No 55. is c

Answer for Question No 56. is c

Answer for Question No 57. is b

Answer for Question No 58. is c

Answer for Question No 59. is a

Answer for Question No 60. is b

Answer for Question No 1. is a

Answer for Question No 2. is c

Answer for Question No 3. is a

Answer for Question No 4. is c

Answer for Question No 5. is c

Answer for Question No 6. is b

Answer for Question No 7. is b

Answer for Question No 8. is c


Answer for Question No 9. is a

Answer for Question No 10. is a

Answer for Question No 11. is b

Answer for Question No 12. is b

Answer for Question No 13. is b

Answer for Question No 14. is a

Answer for Question No 15. is d

Answer for Question No 16. is c

Answer for Question No 17. is d

Answer for Question No 18. is a

Answer for Question No 19. is a

Answer for Question No 20. is c

Answer for Question No 21. is b

Answer for Question No 22. is b

Answer for Question No 23. is c

Answer for Question No 24. is a


Answer for Question No 25. is c

Answer for Question No 26. is a

Answer for Question No 27. is a

Answer for Question No 28. is b

Answer for Question No 29. is d

Answer for Question No 30. is a

Answer for Question No 31. is c

Answer for Question No 32. is b

Answer for Question No 33. is a

Answer for Question No 34. is b

Answer for Question No 35. is a

Answer for Question No 36. is b

Answer for Question No 37. is b

Answer for Question No 38. is b

Answer for Question No 39. is a

Answer for Question No 40. is b


Answer for Question No 41. is d

Answer for Question No 42. is a

Answer for Question No 43. is a

Answer for Question No 44. is b

Answer for Question No 45. is d

Answer for Question No 46. is b

Answer for Question No 47. is b

Answer for Question No 48. is a

Answer for Question No 49. is d

Answer for Question No 50. is d

Answer for Question No 51. is d

Answer for Question No 52. is a

Answer for Question No 53. is d

Answer for Question No 54. is a

Answer for Question No 55. is a

Answer for Question No 56. is a


Answer for Question No 57. is a

Answer for Question No 58. is a

Answer for Question No 59. is d

Answer for Question No 60. is a

Answer for Question No 1. is c

Answer for Question No 2. is b

Answer for Question No 3. is b

Answer for Question No 4. is c

Answer for Question No 5. is b

Answer for Question No 6. is d

Answer for Question No 7. is b

Answer for Question No 8. is b

Answer for Question No 9. is d

Answer for Question No 10. is c

Answer for Question No 11. is a

Answer for Question No 12. is d


Answer for Question No 13. is b

Answer for Question No 14. is a

Answer for Question No 15. is a

Answer for Question No 16. is d

Answer for Question No 17. is a

Answer for Question No 18. is d

Answer for Question No 19. is b

Answer for Question No 20. is c

Answer for Question No 21. is b

Answer for Question No 22. is d

Answer for Question No 23. is c

Answer for Question No 24. is c

Answer for Question No 25. is c

Answer for Question No 26. is c

Answer for Question No 27. is c

Answer for Question No 28. is d


Answer for Question No 29. is c

Answer for Question No 30. is a

Answer for Question No 31. is c

Answer for Question No 32. is a

Answer for Question No 33. is c

Answer for Question No 34. is d

Answer for Question No 35. is d

Answer for Question No 36. is a

Answer for Question No 37. is a

Answer for Question No 38. is c

Answer for Question No 39. is a

Answer for Question No 40. is a

Answer for Question No 41. is a

Answer for Question No 42. is a

Answer for Question No 43. is d

Answer for Question No 44. is d


Answer for Question No 45. is a

Answer for Question No 46. is c

Answer for Question No 47. is c

Answer for Question No 48. is c

Answer for Question No 49. is d

Answer for Question No 50. is d

Answer for Question No 51. is b

Answer for Question No 52. is b

Answer for Question No 53. is a

Answer for Question No 54. is b

Answer for Question No 55. is a

Answer for Question No 56. is d

Answer for Question No 57. is d

Answer for Question No 58. is d

Answer for Question No 59. is c

Answer for Question No 60. is c


Answer for Question No 1. is d

Answer for Question No 2. is c

Answer for Question No 3. is c

Answer for Question No 4. is c

Answer for Question No 5. is c

Answer for Question No 6. is d

Answer for Question No 7. is c

Answer for Question No 8. is b

Answer for Question No 9. is d

Answer for Question No 10. is a

Answer for Question No 11. is a

Answer for Question No 12. is d

Answer for Question No 13. is c

Answer for Question No 14. is c

Answer for Question No 15. is b

Answer for Question No 16. is c


Answer for Question No 17. is d

Answer for Question No 18. is b

Answer for Question No 19. is b

Answer for Question No 20. is c

Answer for Question No 21. is a

Answer for Question No 22. is b

Answer for Question No 23. is d

Answer for Question No 24. is b

Answer for Question No 25. is b

Answer for Question No 26. is b

Answer for Question No 27. is b

Answer for Question No 28. is b

Answer for Question No 29. is a

Answer for Question No 30. is d

Answer for Question No 31. is d

Answer for Question No 32. is c


Answer for Question No 33. is a

Answer for Question No 34. is d

Answer for Question No 35. is a

Answer for Question No 36. is d

Answer for Question No 37. is c

Answer for Question No 38. is a

Answer for Question No 39. is d

Answer for Question No 40. is a

Answer for Question No 41. is b

Answer for Question No 42. is a

Answer for Question No 43. is d

Answer for Question No 44. is a

Answer for Question No 45. is b

Answer for Question No 46. is b

Answer for Question No 47. is b

Answer for Question No 48. is b


Answer for Question No 49. is b

Answer for Question No 50. is c

Answer for Question No 51. is a

Answer for Question No 52. is d

Answer for Question No 53. is b

Answer for Question No 54. is b

Answer for Question No 55. is d

Answer for Question No 56. is a

Answer for Question No 57. is c

Answer for Question No 58. is c

Answer for Question No 59. is d

Answer for Question No 60. is a

Answer for Question No 1. is a

Answer for Question No 2. is c

Answer for Question No 3. is a

Answer for Question No 4. is b


Answer for Question No 5. is c

Answer for Question No 6. is a

Answer for Question No 7. is c

Answer for Question No 8. is b

Answer for Question No 9. is d

Answer for Question No 10. is a

Answer for Question No 11. is c

Answer for Question No 12. is d

Answer for Question No 13. is a

Answer for Question No 14. is c

Answer for Question No 15. is a

Answer for Question No 16. is a

Answer for Question No 17. is c

Answer for Question No 18. is d

Answer for Question No 19. is d

Answer for Question No 20. is a


Answer for Question No 21. is a

Answer for Question No 22. is a

Answer for Question No 23. is d

Answer for Question No 24. is b

Answer for Question No 25. is c

Answer for Question No 26. is d

Answer for Question No 27. is b

Answer for Question No 28. is a

Answer for Question No 29. is d

Answer for Question No 30. is d

Answer for Question No 31. is a

Answer for Question No 32. is a

Answer for Question No 33. is b

Answer for Question No 34. is a

Answer for Question No 35. is a

Answer for Question No 36. is a


Answer for Question No 37. is a

Answer for Question No 38. is c

Answer for Question No 39. is a

Answer for Question No 40. is c

Answer for Question No 41. is b

Answer for Question No 42. is d

Answer for Question No 43. is a

Answer for Question No 44. is c

Answer for Question No 45. is a

Answer for Question No 46. is a

Answer for Question No 47. is b

Answer for Question No 48. is a

Answer for Question No 49. is c

Answer for Question No 50. is d

Answer for Question No 51. is b

Answer for Question No 52. is a


Answer for Question No 53. is d

Answer for Question No 54. is a

Answer for Question No 55. is c

Answer for Question No 56. is d

Answer for Question No 57. is c

Answer for Question No 58. is b

Answer for Question No 59. is d

Answer for Question No 60. is a


APR

Department of Computer Engineering


Academic Year -2019-20 SEM – II
MCQ Question Bank
Class: TE

SUB:- ESIOT

UNIT-IV

1. What is Standard

A)setup

B) collection onf material

C) common methods, norms and regulations

D) None of above

2. Standards play an important role

a) applying new technologies.

b) business

c) Techniques

d) All ofabove

3. one of the few efforts targeting a holistic architecture for all IoT sectors

a) IoT-A (Internet of Things Architecture)

b) M2M

c)RFID
APR

d) SCADA

4. The key objectives of the IoT-A

a)Manufacturing

b) Business growth

c) Create architectural foundations

d) IOT Application

5. A smart object is defined by IPSO

a) Sensor,Aculator

b) Embedded device

c) Computer

d) a&b

6. Data transport protocol standards

a) M2MXML, JavaScript Object Notation (JSON)

b)TCP

c)UDP

d)HTTP

7. There are a number of standardization bodies in the field of WSNs

a)IEEE

b) IETF

c) a&b
APR

d) ACM

8. SCADA and RFID Protocols

a) IEEE Std. C37.1

b) IEEE Std. C37.2

c) IEEE Std. C37.2

d) IEEE Std. C37.3

9. ISA100, Wireless Systems for Industrial Automation developed by

a) Industrial Society for Automation

b) IEEE

c)IEFT

d)ACM

10. IEEE 802.15.4 provides

a) very high cost communication

b) very low cost communication

c) communication

d) None of above

11. IEEE 802.15.4 is to provide communications over distances up

a) 10 meter

b)15 Meter

c) 30 meter
APR

d)40 Meter

12. IEEE 802.15.4 is to provide transfer data rates of

a) 450 kbps

b) 350 kbps

c) 250 kbps

d) 150 kbps

13. IEEE 802.15.4

a) Low Rate Wireless Personal Area Network

b) zigbee

c)WAN

d)MAN

14. Modbus protocol is defined as

a) a slave protocol

b) a master protocol

c) a master/slave protocol

d) All,

15. In RTU (Remote Terminal Unit) transmission mode, the message is transmitted

a) a continuous stream

b) frequently

c) a discontinuous stream
APR

d) None of above

16. ZigBee / ZigBee Pro are

a) protocol

b) communication protocol

c) mesh communication protocol

d) mesh protocol

17. DigiMesh is an alternative

a) ZigBee

b)WAN

c)MAN

d)WAN

18. Zigbee Protocol Layers

a) ZigBee Device Object(ZDO)

b) ZigBee Cluster Library (ZCL)

c) Application Framework

d) all

19. BACnet (Building Automation and Control Network)

a)Protocol

b) communications protocol

c)IEEE
APR

d)IEFT

20. BACnet offers

a) flexible range of networking options

b) communication

c) protocol

d)Standard

21. BACnet can be implemented on top of

a) IEEE802.1 data link layer.

b) IEEE802.2 data link layer.

c) IEEE802.3 data link layer.

d) IEEE802.4 data link layer.

22. KNX system, devices fall into categories:

a) system devices sensors, and actuators

b)Communication

c) Embedded System

d)None of above

23. IoT security challenges

a) Secure constrained devices

b) Authorize and authenticate devices


APR

c) Manage device updates

d) All of above

24. A major advantage of KNX’s

a)decentralised structure

b) centralised structure

c)a&B

d)None of above

25. Modbus is a serial

communications protocol

26. BACnet (Building Automation and Control Network) is

a communications protocol

27. Scheduling allows BACnet devices to

establish and edit schedules

28. A service is the mechanism which a building automation system

29. BACnet specifies 123 properties of objects.


APR

30. BACnet focuses on network layer and above

31. Each BACnet device contains a collection of information

32. Modbus TCP/IP uses Port 502

33. BACnet enables interoperability between different building systems and devices

34 ITU-T has a few study groups (SGs 2, 3, 5, 9, 11, 12, 13, 15, 16, and 17,

35. IPSO Alliance, formed in 2008

36. A BACnet device is often comprised of a microprocessor-based controller and software.

37.. Every BACnet device contains a device object that defines certain device information,.

39. Each BACnet device contains a collection of information about the device and any input and
output points that it monitors and controls.

40. The IoT-A (Internet of Things Architecture) is one of the few efforts targeting a holistic
architecture for all IoT sectors.

41. The IoT-A (Internet of Things Architecture consists of 17 European organizations from
nine countries.
APR

42. Create the architectural foundations of an interoperable Internet of Things as a key


dimension of the larger future Internet

43. IPv4, IPv6, and 6LoWPAN were all developed by engineers within IETF

44. Data transport protocol standards: M2MXML, JavaScript Object Notation (JSON),
BiTXML, WMMP, MDMP, open Building Information Exchange (oBIX), EEML, open M2M
Information exchange (oMIX)
Sinhgad Technical Education Society’s
Sinhgad Academy of Engineering, Kondhwa [BK], Pune-48
Department of Computer Engineering
Subject: Embedded System and Internet of Things
Unit III MCQ’s

Sr. Question Option A Option B Option C Option D Answer


No
1 A PIR Sensor stands Proximity Passive Picture None of B
for: Infra-Red Infra-Red Infra-Red these
2 Machine-to-Machine isolated cross home none of B
(M2M) is designed for systems platform automatio the above
using integration n only
proprietar
y solutions

3 Which of the following Nodes Nodes Nodes None of C


is the advantages in cannot be can switch can be the above
static deployment of faulty its mode placed in
sensor nodes in WSN? during the from an
communic active to optimized
ation passive at distance -
any time Reduce
instant the total
number
of nodes
4 Which of the following Always Not just Centraliz None of B
is the primary goal of get collect ed data these
participatory sensing? connected data, but collection
with the allow
network common
people to
access
data and
share
knowledg
Sinhgad Technical Education Society’s
Sinhgad Academy of Engineering, Kondhwa [BK], Pune-48
Department of Computer Engineering
Subject: Embedded System and Internet of Things
Unit III MCQ’s

5 In M2M Low-end Mid-end High-end All the A


communications, which sensor sensor sensor above
of the following nodes nodes nodes nodes
is/are typically used for
general environmental
monitoring?
6 In M2M, which of the Low-end Both mid- Both Only D
following is true? sensor end and low-end High-end
nodes are high-end and high- sensor
always sensor end nodes are
mobile nodes are sensor mobile
always nodes are
static always
mobile
7 SCADA is designed for Healthcare Isolated Cross All the B
industries systems platform above
integratio
n
8 Tic-tac-toe-architecture Terrestrial Underwat FANET Vehicular B
is designed for WSN er WSN Networks

9 Which of the following Python S R All of the A


language is preferred mentione
for IoT analytics ? d
10 Raspbian is: Assembler Language Compiler OS D
11 Which of the following IoT is M2M is IoT is CPS is B
is true? subset of subset of subset of subset of
M2M Iot CPS WoT
Sinhgad Technical Education Society’s
Sinhgad Academy of Engineering, Kondhwa [BK], Pune-48
Department of Computer Engineering
Subject: Embedded System and Internet of Things
Unit III MCQ’s

12 1. What is the full form Supervisor Supervisor Superviso B


of SCADA? y Control y Control ry Superviso
and and Data Column ry
Document Acquisitio and Data Column
Acquisitio n Assessme and Data
n nt Assessme
nt
13 What is SCADA? Software Process System Hardware B
14 The control in SCADA Online Direct Superviso Automati C
is _____________ control control ry control c control
15 Which of the following Emerson Honeywel D
is an example of the Delta V l Yokogaw PowerStu
SCADA system? PlantScap a dio
e CENTU Deluxe
M
16 How many levels are 3 – levels 5 – levels 4– 6– C
present in a complex levels levels
SCADA system?
17 Which of the following Database I/O system PLC Sparger D
is not the component of server controller controller
a SCADA system?
18 RFID is a part of IoT. True False A
19 RFID stands for? Random Radio Random Radio B
frequency frequency frequency frequency
identificati identificati informati informati
on on on on
20 Which of the following RFID Sensor Nano Server D
is not involved in tech
working of IoT?
Sinhgad Technical Education Society’s
Sinhgad Academy of Engineering, Kondhwa [BK], Pune-48
Department of Computer Engineering
Subject: Embedded System and Internet of Things
Unit III MCQ’s

21 What attains the Transpond Pacemake Receiver Retreiver C


information on er r
the RFID tag
22 What issues are there Country Identity Magnetic Dead B
with RFID? Language Aquisition removal Zone
of
informati
on
23 RFID can scan up to 1 20 25 40 D
_________ items per
second.
24 Which of the following Storage of Television Checking Payment B
is not a possible use of patient Usage out books at the
RFID? medical at the grocery
records Library store
25 What current uses are Traffic Hospital Passport Mp3 C
there for RFID patterns Helocopte Verificati Usage
rs on
Sinhgad Technical Education Society’s
Sinhgad Academy of Engineering, Kondhwa [BK], Pune-48
Department of Computer Engineering
Subject: Embedded System and Internet of Things
Unit III MCQ’s

26 Which of the following RFID RFID Compani RFID A


statements about radio systems systems es may be systems
frequency identification transmit use tiny required provide a
(RFID) is not true? radio tags with to powerful
signals embedded upgrade technolog
over long microchip hardware y for
distances. s and tracking
containing software the
data about to movemen
an item accommo t of goods
and its date the througho
location massive ut the
amounts supply
data that chain.
are being
produced
by RFID
system
27 WSN stands for Wired Wireless Wired Wireless B
__________ Sensor Sensor Service Service
Network Network Network Network
28 What is the wireless RFID UNII ISM Micro A
communications technol sensors
ogy used in retail
operations to identify
and secure
merchandise?
Sinhgad Technical Education Society’s
Sinhgad Academy of Engineering, Kondhwa [BK], Pune-48
Department of Computer Engineering
Subject: Embedded System and Internet of Things
Unit III MCQ’s

29 What industry IEEE UNII FCC ISM A


association develops,
publishes, and
maintains the standards
for wireless networks?
30 _______ Multiplexi Half Full Radio B
communications mode ng Duples Duplex
means that it can both
transmit and receive,
but only one action at a
time.
31 Microwaves use Space Line of Space Ground B
________ propagation sight
32 Radio communication 3 KHz to 3 KHz to 300 KHz None of B
frequencies range from 300 KGHz 300 GHz to 3 GHz these
___________.
33 Does Raspberry Pi need TRUE FALSE B
external hardware?
34 Does RPi have an TRUE FALSE A
internal memory?
35 What do we use to Male Female Male Female C
connect TV to RPi? HDMI HDMI HDMI HDMI
and and
Adapter Adapter
36 Which instruction set X86 MSP AVR ARM D
architecture is used in
Raspberry Pi?
Sinhgad Technical Education Society’s
Sinhgad Academy of Engineering, Kondhwa [BK], Pune-48
Department of Computer Engineering
Subject: Embedded System and Internet of Things
Unit III MCQ’s

37 What is the default user Default User Pi Root C


in Debain on Raspberry
Pi?
38 What are the Arch Debain Fedora Arch D
distributions are Linux Remix Linux,
supported by raspberry Debain,
Pi? and
Fedora
Remix

39 What bit processor is 64 bit 32 bit 16 bit both a A


used in Pi 3? and b
40 What is the speed of 900MHz 1.2GHz 1GHz 500MHz B
operation in Pi 3?
41 WiFi is not present in Raspberry Raspberry Raspberr Raspberr D
which of the following Pi3 Pi Zero y Pi Zero y Pi Zero
models? WH W
42 Does micro SD card TRUE FALSE A
present in all modules?
43 ow many USB ports are 5 2 3 4 B
present in Raspberry Pi
3?
44 API enables services Systems Devices Networks Services A
portability between
____________
45 _________ Services are Cloud Bigdata Internet Network A
the way in which the
IoT is connected to
data.
Sinhgad Technical Education Society’s
Sinhgad Academy of Engineering, Kondhwa [BK], Pune-48
Department of Computer Engineering
Subject: Embedded System and Internet of Things
Unit III MCQ’s

46 _________ are the inter Web Internet Network APIs D


connectors.
47 Which of the following IEC 61158 IEC 6158 IEC 6115 IEC A
standard is known as 61155
FieldBus?
48 Which of the following IEEE IEEE DSSS IEEE C
WLAN standard has 802.6 802.15.4 IEEE 802.11g
been named Wi-Fi? 802.11b
49 How many types of 5 6 8 6 C
arduinos do we have?
50 What is the AT91SA A
microcontroller used in ATmega3 ATmega2 ATmega3 M3x8E
Arduino UNO? 28p 560 2114
51 Arduino shields are also Extra Add on Another B
called as _________ peripheral modules Connecti Arduinos
s vity
modules
52 Which is the software or Assembly C AVA Any D
a programming Language Languages Language
language used for
controlling of Arduino?
53 Do Arduino provides TRUE FALSE A
IDE Environment?
54 A program written with IDE Sketch Cryptogr Source B
the IDE for Arduino is source aphy code
called _________
Sinhgad Technical Education Society’s
Sinhgad Academy of Engineering, Kondhwa [BK], Pune-48
Department of Computer Engineering
Subject: Embedded System and Internet of Things
Unit III MCQ’s

55 ___________ are pre Sensor Data Breadboa Sheilds D


built circuit boards that types rd
fit on top of Android.
56 PiCam uses a: USB port Specific Both a None of B
for CSI port and b the above
connectio for
n connectio
n
57 Which of the following It is like a It is a Low cost It can be B
is not true for Raspberry mini microcont used
pi? computer roller without a
monitor
58 Which of the following It It is same It None of B
is false for an actuator? converts as a provides the above
energy sensor. controlle
into d motion
motion. to other
objects

You might also like