You are on page 1of 324

1. The number of elements in the Open IoT Architecture?

a) 6 elements

b) 8 elements

c) 7 elements

d) 3 elements

View Answer

Answer: c

Explanation: The 7 main elements are : sensor middleware (X-GSN), cloud data storage, scheduler,
service delivery and utility manager, request definition, request presentation, configuration and
monitoring.

2. Global Sensor Network is built for _________

a) Reducing cost and time for development

b) Reducing cost and increasing time for development

c) Increasing cost and increasing time for development

d) Increasing cost and decreasing time for development

View Answer

Answer: a

Explanation: GSN is developed on the observation that most of the requirements for the application
development sensor network are same. Having each sensor network development using its own
custom software not only increases the cost but also takes time for development and deployment.

3. One of the main characteristics of Linked Stream Data is “Live Streaming”.

a) True

b) False

View Answer

Answer: a

Explanation: Most of the data on the web is from sensing devices. To facilitate the integration of
data from sensed devices and other sources, both sensor stream source and data are being enriched
with schematic descriptions, creating Linked Stream Data. It shows the live data depending on our
application.

4. The huge number of devices connected to the Internet of Things has to communicate
automatically, not via humans. What is this called?
a) Skynet

b) Bot 2 Bot

c) Machine 2 Machine

d) Intercloud

View Answer

Answer: c

Explanation: Devices are connected to other devices like mobiles, laptops, etc, to communicate
among themselves which is called machine to machine and that involves wireless communication
techniques, serial connection and powerline connection.

5. Internet of Things needs a lot of network connection. What is the proposed “white Space” radio
standard called?

a) Bluetooth

b) WiMax

c) Weightless

d) Zigbee

View Answer

Answer: c

Explanation: White space is nothing but gaps that sit in the frequency band used to broadcast digital
TV. The development of so called “Weightless standard” is for the use of TV white space and for
IOT/M2M purpose. The main intention is to reduce the cost and power utilization.

6. What is the sensor/protocol used in GSN?

a) HTTP protocol

b) CoAP protocol

c) MQTT protocol

d) XMPP protocol

View Answer

Answer: b

Explanation: Constrained Application Protocol is a specialized web transfer protocol which enables
constrained devices to communicate over internet and it is required for GSN in transferring data
stream.
7. Which is the core wrapper of GSN?

a) Serial

b) UDP

c) GPSTest

d) ZeroMQWrapper

View Answer

Answer: d

Explanation: Wrappers are classified as remote and local wrappers in GSN. Unlike them, the
ZeroMQWrapper is a core wrapper which allows for publishing stream elements that are produced
by a Virtual Sensor.

8. Open IoT ontology is extending the W3C SSN ontology which supports the description of the
physical and processing structure of sensors.

a) True

b) False

View Answer

Answer: a

Explanation: Sensors are not constrained to physical sensing devices, rather a sensor is anything that
can calculate the value of the phenomenon. Thus, either a device or Computational process or a
combination of them could play the role of a sensor.

9. Open IoT manages the registration, data acquisition, deployment of sensors and interconnected of
objects, through which network?

a) GSN

b) X-GSN

c) LSM

d) HTTP

View Answer

Answer: b

Explanation: The core fundamental concept in X-GSN is the virtual sensor, which can represent not
only physical devices but in general any abstract or concrete entity that observes features of any
kind.

10. Which environment does Global Sensor Network work on?


a) C++

b) JAVA

c) HTML

d) C

View Answer

Answer: b

Explanation: GSN is expected to work in all standard computing environments. As Java is portable in
nature which means that Java bytecode can execute on all platforms, GSN works on Java. C++, HTML
and C are not portable in nature.

11. ___________ is a community that is working together to establish an IoT architecture.

a) Eclipse IoT

b) Red Hat

c) Intercloud

d) Bot 2 Bot

View Answer

Answer: a

Explanation: Eclipse IoT is a community that is working together to establish an IoT architecture
based on open source technologies and standards.

12. _________ provides a middleware and application container for IoT gateway.

a) Eclipse Kura

b) Red Hat

c) Intercloud

d) Bot 2 Bot

View Answer

Answer: a

Explanation: Eclipse Kura provides a general purpose middleware and application container for IoT
gateway services and includes everything for the edge, such as an application container or runtime
environment.

13. _________ is a modular and cloud based platform.

a) Eclipse Kura
b) Red Hat

c) Intercloud

d) Eclipse Kapua

View Answer

Answer: d

Explanation: Eclipse Kapua is a module and cloud based platform that provides services required for
real time data management and analytics.

14. Kapua also provides a core integration framework.

a) True

b) False

View Answer

Answer: a

Explanation: Kapua also provides a core integration framework and an initial set of core IoT services,
including a device registry, and application enablement.

15. _________ an open source stack for gateways and the edge.

a) Eclipse Kapua

b) Red Hat

c) Intercloud

d) Eclipse Kura

View Answer

Answer: d

Explanation: Eclipse Kura, an open source stack for gateways and edge, and Eclipse Kapua, the first
open source IoT cloud platform.

1. What happens when service providers change their operating system and communication
protocols?

a) Inoperability and complexity arises

b) Only complexity arises

c) Only Inoperability arises

d) Nothing arises
View Answer

Answer: a

Explanation: Complexity arises when service providers change their operating system and
communication protocols, which results in inoperability. Service providers use standard protocols
and conventional interfaces to facilitate information among diverse services.

2. In SOA, Service is termed as __________

a) Software service

b) Network service

c) Business service

d) Developer service

View Answer

Answer: c

Explanation: Services are termed as business services. They are self-contained and logical.

3. Are SOA components loosely coupled.

a) True

b) False

View Answer

Answer: a

Explanation: They are loosely coupled. That means every service is self-contained and exists alone
logically.

4. The SOA architecture is divided into how many layers?

a) 5 layers

b) 2 layers

c) 7 layers

d) no layers ie., only one layer

View Answer

Answer: b

Explanation: The first which has direct relevance to the business as it carries out business functions.
The second layer is the technical layer which talks about managing computer resources like a
database, web server etc.
5. Which layer in SOA delivers messages between applications?

a) ESB(Enterprise Service Bus)

b) Service Broker

c) SOA registry

d) SOA supervisor

View Answer

Answer: a

Explanation: ESB is a group of components/ software which helps us to send and receive messages
between the disparate applications. It is usually shown as a huge plump pipe in the architecture.

6. Which block is the central reference of meta-data for services?

a) ESB(Enterprise Service Bus)

b) Service Broker

c) SOA registry

d) SOA supervisor

View Answer

Answer: c

Explanation: SOA registry is like a reference database of services. It describes what each service
does, where they are located, and how they can communicate.

7. Which block ties work flow and SOA registry?

a) ESB(Enterprise Service Bus)

b) Service Broker

c) Accounting package

d) SOA supervisor

View Answer

Answer: b

Explanation: Service broker reads the work flow and takes services from the SOA registry and ties
them together. Service brokers are normally middleware like EAI(Enterprise Application Integration)
products.
8. Which blocks deals with performance issues?

a) ESB(Enterprise Service Bus)

b) Service Broker

c) SOA registry

d) SOA supervisor

View Answer

Answer: d

Explanation: SOA supervisor is a traffic cop ensuring do not having issues. It deals with performance
issues of the system so that appropriate service levels are met. If any of the services have
performance problems it sends messages to the proper infrastructure to fix the issue.

9. What are the three terminologies on which SOA service stands__________

a) Contract, Address and Building

b) Contract, Address and Service

c) Service, Contract and Building

d) Service, Building and Address

View Answer

Answer: a

Explanation: Contract-It describes parameters and return values for a method.

Address-It is a URL which points to the location of the service.

Building-It determines how the communication is done.

10. Which standard is preferable to achieve SOA?

a) Software service

b) Business service

c) Network service

d) Web service

View Answer

Answer: d

Explanation: In SOA we need services to be loosely coupled. A web service communicates using the
SOAP protocol which is XML based, Which is very loosely coupled.
11. SOA stands for _____________

a) Solution Oriented Architecture

b) Sector Oriented Architecture

c) Service Oriented Architecture

d) Source Oriented Architecture

View Answer

Answer: c

Explanation: Service Oriented Architecture (SOA) approach traditionally used to couple functionality
of heavyweight corporate IT systems, are becoming application to embedded real world devices.

12. ________ is used to describe a perceived, quickly growing set of web based applications.

a) Web 4.0

b) Web 3.5

c) Web 2.0

d) Web 4.5

View Answer

Answer: c

Explanation: Web 2.0 to describe a perceived, quickly growing set of web based applications. A topic
that has experienced extensive coverage involves the relationship between Web 2.0 and service
oriented architectures.

13. ________ is the philosophy of encapsulating application logic in services.

a) API

b) SOA

c) Both SOA and API

d) Neither SOA and API

View Answer

Answer: b

Explanation: SOA is the philosophy of encapsulating application logic in services with a uniformly
defined interface and making these publicly available via discovery mechanisms.

14. ________ are a modern interpretation of service oriented architectures used to build distributed
software systems.
a) SOA

b) API

c) Microservices

d) Web 2.0

View Answer

Answer: c

Explanation: Microservices is a modern interpretation of service oriented architectures used to build


distributed software systems. Services in the microservice architecture are processes.

15. Services in a microservice architecture are _________ that communicates with each other over
the network.

a) Microservices

b) SOA

c) API

d) Processes

View Answer

Answer: d

Explanation: Services in the microservice architecture are processes that communicate with each
other over the network in order to fulfill a goal. These services use technology agnostic protocols.

1. API enables services portability between ____________

a) Systems

b) Devices

c) Networks

d) Services

View Answer

Answer: a

Explanation: API enables services portability between sysyems, I.e., service may be allocated to end-
systems or servers, with possible relocation and replication throughout its lifecycle.

2. Ubiquitous service provision depends on _________

a) QoS
b) Management

c) Interoperability

d) Routing

View Answer

Answer: c

Explanation: Ubiquitous service provision depends on interoperability, not only for provisioning of a
standard QoS controlled IP bearer, but also for cross domain naming, security, mobility, multicast,
including fair compensation for utility provisioning.

3. API architecture not only includes critical elements but also caters for _________

a) System

b) Devices

c) Network

d) Multi homing

View Answer

Answer: d

Explanation: API architecture not only includes critical elements but also caters for multi homing,
mobile networks with dynamic membership, and third party persistent storage based on indirection.

4. All portals are embedded into a single supercomputer, known as _________

a) Network

b) Web

c) Internet

d) System

View Answer

Answer: b

Explanation: The web is now one, enormous, global computer. Our devices are them phones,
tablets, TVS, watches, glasses, etc. These all are all portals into this single computer, known as Web.

5. _________ is uniquely identifiable embedded computing devices.

a) Internet

b) IoT
c) Bigdata

d) Cloud

View Answer

Answer: b

Explanation: The IoT is the part of the Internet that is made up of “uniquely identified embedded
computing devices,” as Wikipedia status. Just like the world Wide Web is a Internet, so does the IoT.

6. Web is a mesh of computers, so too is _________

a) IoT

b) Bigdata

c) Cloud

d) Internet

View Answer

Answer: a

Explanation: Just like the World Wide Web runs over the Internet, so does the IoT. Similarly to how
the Web is a mesh of computers, so too is the IoT.

7. Without _________ computers embedded in house keys are worthless.

a) Data

b) Services

c) Both Data and Services

d) Neither data nor services

View Answer

Answer: c

Explanation: Without data and services, the little computers embedded in thermostat, house keys,
baby monitors, trash cans, fire extinguishers, and store shelve are nearly worthless.

8. _________ Services are the way in which the IoT is connected to data.

a) Cloud

b) Bigdata

c) Internet

d) Network
View Answer

Answer: a

Explanation: Cloud based services are the way in which the IoT is connected to data. Just like World
Wide Web runs over the Internet, so does the IoT.

9. APIs are the skybridge.

a) True

b) False

View Answer

Answer: a

Explanation: APIs are the skybridge – IoT on one side, useful information and plentiful data
crunching capabilities on the other. APIs make IoT useful, turning limited little things into powerful
portals of possibilities.

10. IoT solutions are at the heart of IDC’s view of the _________

a) Three

b) Two

c) One

d) Four

View Answer

Answer: d

Explanation: IoT solutions are at the heart of IDC’s view of the four pillars:

Mobility

Social business

Big data

Cloud

Resulting in the millions of applications available to the billions at the end point.

11. _________ are the inter connectors.

a) Web

b) Internet

c) Network
d) APIs

View Answer

Answer: d

Explanation: APIs are the inter connector which provides the interface between the Internet and
Things.

12. Is APIs are glue?

a) True

b) False

View Answer

Answer: a

Explanation: JavaWorld’s Andrew Oliver calls APIs “the glue and interesting part where the Internet
of Things starts to become useful and more than a buzzword.”

13. Most IoT problems are addressed at _________ layer

a) TCP

b) IP

c) API

d) UDP

View Answer

Answer: c

Explanation: As more and more devices are connected to the net, however, certain recurring
problems must be solved. These problems are addressed at the API layer.

14. IoT-A stands for ________

a) Internet of Things Address

b) Internet of Things Architecture

c) Internet of Things Area

d) Industrial of things Architecture

View Answer

Answer: b
Explanation: The EU’s Internet of Things Architecture is another example of the way in which we can
solve IoT related challenges.

15. IoT-A reference model is a _________

a) Scalable

b) Secure

c) Both scalable and secure

d) Neither scalable nor secure

View Answer

Answer: c

Explanation: IoT-A architectural reference model is a scalable and secure solution intended to guide
the design of protocols, interface and algorithms necessary to scale the IoT.

1. What is the role of Bigdata in smart grid architecture of IoT?

a) Store data

b) Manage data

c) Collect data

d) Security

View Answer

Answer: a

Explanation: Bigdata stores time series data, unstructured data, provided context for analytics, API
for enterprise applications.

2. What is the role of Cloud in smart grid architecture of IoT?

a) Store data

b) Manage data

c) Collect data

d) Security

View Answer

Answer: b

Explanation: Cloud to edge Middleware: manage data and edge devices, data streaming and event
processing, control authorized access.
3. What is the role of Gateway in smart grid architecture of IoT?

a) Store data

b) Manage data

c) Collect data

d) Security

View Answer

Answer: c

Explanation: Gateway: collects data from sensors, abstract protocols, perform local autonomous
decision, transfer information.

4. What is the role of Sensor in smart grid architecture of IoT?

a) Store data

b) Manage data

c) Collect data

d) Security

View Answer

Answer: a

Explanation: Sensors and Actuators are connected, send data when needed, secure and low power,
easy to install and configure.

5. IoT gateway must provide __________

a) Simple and fast installation

b) Security with hardware

c) Data storage

d) Protocol abstraction

View Answer

Answer: d

Explanation: IoT gateway must provide:

Protocol abstraction

Computing and I/O performance

Integration communication capability.


6. Which of the following is IoT device manageability?

a) Protocol abstraction

b) Simple and fast installation

c) Security with hardware

d) Data storage

View Answer

Answer: b

Explanation: IoT Device Manageability:

Simple and fast Installation and configuration

Enable deployment of new application

Remote administration of gateways.

7. IoT security management includes ________

a) Protocol abstraction

b) Simple and fast installation

c) Security with hardware

d) Data storage

View Answer

Answer: c

Explanation: IoT security management :

Improves security with hardware

Enable secure communication to sensors

End to End Security from Sensor to Cloud.

8. IoT data scalability includes ________

a) Protocol abstraction

b) Simple and fast installation

c) Security with hardware

d) Data storage

View Answer
Answer: d

Explanation: IoT Data Scalability:

Data and Event processing at the edge

Data storage at the edge

Hierarchical clouds.

9. What is the example for smart grid edge device for utility?

a) Smart Meters

b) Smart Home

c) Smart Car

d) Smart Collage

View Answer

Answer: a

Explanation: Examples of Smart Grid Edge Devices for Utilities:

Voltage and Current sensors

Smart Inverters

Smart Motors.

10. According to the analysis on IoT application frame work, smart grid is divided into ________
layers.

a) 2layers

b) 3 layers

c) 4 layers

d)5 layers

View Answer

Answer: b

Explanation: According to analysis on IoT application framework based on a smart grid, node
features of various parts, distinct application needs and basic IoT model, IoT based on smart grid is a
combination of :

Perception layer

Smart network layer

Smart Application layer.


11. Monitor target of the smart ________ includes sensor objects in the power link.

a) Perception layer

b) Smart network layer

c) Smart Application layer

d) Data layer

View Answer

Answer: a

Explanation: Monitor target of the smart perception layer includes sensor objects in the power link,
smart house hold objects and smart security objects.

12. ________ layer can be divided into the data access network and the core network.

a) Perception layer

b) Smart network layer

c) Smart Application layer

d) Data layer

View Answer

Answer: b

Explanation: Smart network layer can be divided into the data access network and the core network.
The data on perception terminals and interaction terminals is uploaded to the power access network
and the Internet separately according to its type and security level.

13. In ________ layer, various application platforms are built as required by the services needs of
smart grid.

a) Perception layer

b) Smart network layer

c) Smart Application layer

d) Data layer

View Answer

Answer: c

Explanation: In the smart application layer, various application platforms are built as required by the
services needs of smart grid. The application platform as required by the services needs of smart
grid.
14. ICT stands for ________

a) Information and Communication Technology

b) Internet and Communication Technology

c) Internet and Communication of Things

d) Information and Communication of Things

View Answer

Answer: a

Explanation: A hierarchical architecture of IoT that applies to all aspects of smart grid, based on
research on smart grid ICT (Information and Communication Technologies) as well as its functional
demand analysis.

15. Do we have defects with the existing power communication network?

a) True

b) False

View Answer

Answer: a

Explanation: There exists many defects with the existing power communication network. For
example, blind zones are present. Currently, high voltage transmission lines completely rely on
manual inspection.

1. Which protocol is used to link all the devices in the IoT?

a) TCP/IP

b) Network

c) UDP

d) HTTP

View Answer

Answer: a

Explanation: The internet of Thing is the global system of interconnected computer networks that
use the Internet Protocol suite (TCP/IP) to link billions of devices worldwide.

2. ________ enables seamless integration of LoWPAN devices with internet leveraging.

a) IETF 6LoWPAN
b) IEFT CoAP

c) RFID/NFC

d) IEEE 802.15.4.LoWPAN

View Answer

Answer: a

Explanation: IETF 6LoWPAN enables seamless integration of LoWPAN devices with internet
leveraging IPv6 large address space and appln. Layer protocol reuse.

3. ________ enables open application layer for constrained nodes.

a) IETF 6LoWPAN

b) IEFT CoAP

c) RFID/NFC

d) IEEE 802.15.4.LoWPAN

View Answer

Answer: b

Explanation: IETF CoAP – open application layer specification for constrained nodes supporting HTTP
and Web integration.

4. ________ tags, devices, smart phones useful in identification.

a) IETF 6LoWPAN

b) IEFT CoAP

c) RFID/NFC

d) IEEE 802.15.4.LoWPAN

View Answer

Answer: c

Explanation: RFID/NFC – tags, devices, smart phones useful in product / object identification and
gathering associated information.

5. ________ supports low energy radio operation.

a) IETF 6LoWPAN

b) IEFT CoAP

c) RFID/NFC
d) Bluetooth

View Answer

Answer: d

Explanation: Bluetooth SMART devices support low energy radio operations like, heart rate
monitors, blood glucose monitors suitable for health care and fitness etc.

6. ________ specification defining the PHY and MAC layer of low power devices.

a) IETF 6LoWPAN

b) IEFT CoAP

c) RFID/NFC

d) IEEE 802.15.4.LoWPAN

View Answer

Answer: d

Explanation: IEEE 802.15.4.LoWPAN – specification defining the PHY and MAC layer of low power
devices supporting 250 Kb/s data rate, small packet size 127 bytes.

7. 6LoWPAN Adaption layer contains?

a) Header compression

b) Fragmentation

c) Layer 2 forwarding

d) Header compression, Fragmentation, and Layer 2 forwarding

View Answer

Answer: d

Explanation: 6LoWPAN Adaption Layer:

Header compression

Fragmentation

Layer 2 forwarding.

8. ________ is an application layer protocol for resource constrained devices.

a) CoAP

b) HMTP

c) MQTT
d) TCP/IP

View Answer

Answer: a

Explanation: CoAP is an application layer protocol (IETF draft) for resource constrained devices.
Adheres to the Restful approach for managing the resources and support mapping to HTTP.

9. Adheres to ________ approach for managing resources and support mapping to HTTP.

a) RETful

b) IoT

c) Restful

d) RESTful

View Answer

10. ________ resources are identified by Uniform Resource Identifiers.

a) CoAP

b) HMTP

c) MQTT

d) TCP/IP

View Answer

Answer: a

Explanation: CoAP is an application layer protocol (IETF draft) for resource constrained devices.
Adheres to Restful approach for managing resources and support mapping to HTTP. CoAP resources
are identified by Uniform Resource Identifiers.

11. Which protocol interacts asynchronously over UDP?

a) HMTP

b) CoAP

c) MQTT

d) TCP/IP

View Answer

Answer: b
Explanation: CoAP is an application layer protocol (IETF draft) for resource constrained devices. It is
Asynchronous message interactions over UDP, Request/Response semantics CoAP resources are
identified by Uniform Resource Identifiers.

12. CoAP messages are short.

a) True

b) False

View Answer

Answer: a

Explanation: CoAP messages are short – 4 bytes header followed by options (Typically, 10-20 bytes
header).

13. How many messages types are there in CoAP?

a) 2

b) 5

c) 3

d) 4

View Answer

Answer: d

Explanation: Four message types are:

Confirmable

Non confirmable

Acknowledgments

Reset.

14. Number of methods in CoAP?

a) 2

b) 5

c) 4

d) 3

View Answer

Answer: c
Explanation: Four CoAP methods:

GET

POST

PUT

DELETE.

15. WSN stands for __________

a) Wired Sensor Network

b) Wireless Sensor Network

c) Wired Service Network

d) Wireless Service Network

View Answer

Answer: b

Explanation: WSN – Wireless Sensor Network comprises of motes running a WSN application and a
light weight CoAP server.

1. The IoT platforms are mainly divided into how many types

a) 3 types

b) 5 types

c) 4 types

d) 2 types

View Answer

Answer: c

Explanation: The IoT platforms could be divided into four types:

eGovermnent related

Enterprise-based

Company based

Business oriented platform.

2. In order to promote _________ the government should employ more management.

a) eGovermnent related
b) Enterprise-based

c) Company based

d) Business oriented platform

View Answer

Answer: a

Explanation: In order to promote the eGovermnent information system evolution and improve their
management, the local/regional/ national governments should employ more management
intelligence by utilizing an IoT platform.

3. In order to improve their competitiveness and services assurance, the ________ require
independently funded IoT projects.

a) eGovermnent related

b) Enterprise-based

c) Company based

d) Business oriented platform

View Answer

Answer: b

Explanation: In order to improve their competitiveness and services assurance, the market oriented
enterprises and companies require independently funded IoT projects.

4. The ________ may become an important facilitator and stimulate for the modern economy.

a) eGovermnent related

b) Enterprise-based

c) Company based

d) Business oriented platform

View Answer

Answer: d

Explanation: The pure business oriented IoT may become an important facilitator and stimulus for
the modern economy, by attracting investments and developing strategic industry sectors.

5. ITS stands for _________

a) Internet Travel Services

b) Internet Transportation Security


c) Intelligent Transportation Security

d) Intelligent Transportation Services

View Answer

Answer: d

Explanation: The center is linked with set of services, intelligent transportation services city fire
protection and security; corporation medical services; commercial and tourism services; and tax and
fees payment services.

6. The autonomous ________ based IoT platforms are used for internal management of the
corresponding enterprise.

a) eGovermnent related

b) Enterprise-based

c) Company based

d) Business oriented platform

View Answer

Answer: c

Explanation: The autonomous enterprise based and company based IoT platforms are used for
internal management of the corresponding enterprise and as such are supported by independent
investments.

7. Does information resource management need to be integrated into market management?

a) True

b) False

View Answer

Answer: a

Explanation: The enterprise and company based platforms ultimately serve the society. Therefore,
information resource management need to be integrated into market management.

8. The use of RFID in product logistics may realize automatic acquisition of logistics information.

a) True

b) False

View Answer

Answer: a
Explanation: The use of RFID in product logistics may realize automatic acquisition of logistics
information, logo recognition, as well as reliable cargo delivery, safe customs, and tracking
visualization.

9. An IoT ________ center is envisaged as an important part of the generic IoT platform to unify the
organization.

a) Individual Information

b) Individual Integration

c) Integrated Information

d) Individual and Integrated Information

View Answer

Answer: c

Explanation: An IoT Integrated Information centre is envisaged as an important part of the generic
IoT platform to unify the organization, implementation, and planning of the integrated IoT
application.

10. The core element of architecture of smart city is ________

a) Mobile Unified Service

b) Urban Application Platform

c) Management center

d) Integrated Information Provider

View Answer

Answer: d

Explanation: An IoT platform, which could serve as a generic architectural foundation for a smart city
development has an Integrated Information Provider as its core element.

11. The core element is operated by ________

a) PaaS

b) IoT service Provider

c) SaaS

d) IaaS

View Answer

Answer: b
Explanation: An IoT platform, which could serve as a generic architectural foundation for a smart city
development has a Integrated Information Provider as its core element. Its core element is operated
by an IoT Service Provider.

12. Supplementary platforms in the architecture provide support for these services.

a) True

b) False

View Answer

Answer: a

Explanation: Supplementary platforms in the architecture provides support for these services
include:

A cloud computing data center

A management center

An application platform.

13. Who will use their own IoT business models?

a) PaaS

b) SaaS

c) IaaS

d) Service provider

View Answer

Answer: d

Explanation: IoT service provider will use their own IoT business models, architectures, and
operating platforms.

14. Which approach is used in this architecture?

a) Top down approach

b) Bottom up approach

c) Top down and Bottom Up

d) Neither Top down nor bottom up

View Answer

Answer: a
Explanation: For the implementation of IoT architecture for smart cities, the top down approach is
used.

15. IoT promotes the creation of IoT terminal industry ________

a) Devices

b) Network

c) Clusters

d) Things

View Answer

Answer: c

Explanation: IoT platform promotes the creation of IoT terminal Industry clusters, which will greatly
attract commercial capital investments in the IoT modern services.

1. Galileo Gen 2 board was developed by which company?

a) Atmel

b) Intel

c) Motorola

d) Dallas

View Answer

Answer: b

Explanation: Intel Galileo is the first in the line of boards based on intelx86 architecture and is
designed for education communities.

2. Galileo gen 2 board is some time called as Breakout Board?

a) True

b) False

View Answer

Answer: a

Explanation: It is named as Breakout Boards.

3. Intel Galileo has the main feature of?

a) Support PCI Express


b) Intel Quart

c) Support for openCV

d) Onboard real time clock

View Answer

Answer: b

Explanation: Intel Galileo features the Intel quart SoC X1000, the first product from the Intel Quart
technology family of low power, small-core products. Intel Quart represents Intel’s attempt to
compete within markets such as the Internet of Things and Wearable Computing.

4. Which among the following is more powerful?

a) Rasberry Pi 2 Model

b) Rasberry Pi 3 Model

c) Galieo Gen 2 Board

d) Galieo Gen 1 Board

View Answer

Answer: b

Explanation: The latest iteration, the Pi 3 Model B, replaced the PI 2 Model B. It is more powerful
than the older Galieo Gen 2, featuring a 1.2 GHz CPU and 1 Gb RAM. The Pi, however, does not have
any flash memory.

5. Periferal Component Interconnect (PCI) Express interconnects which modules?

a) Serial communication

b) WIfi, Bluetooth, GSM cards

c) Micro SD card

d) Real Time Clock

View Answer

Answer: b

Explanation: PCI is a high speed serial computer expansion bus standard. It includes higher maximum
system bus throughput, lower I/O pin count and smaller physical footprint.

6. What is the frequency of the Galileo gen 2 board?

a) 250MHz

b) 400MHz
c) 450MHz

d) 300MHz

View Answer

Answer: b

Explanation: The frequency of the board gives the speed of operation of board. So, increase in
frequency increases the speed.

7. The 10/100Mbit Ethernet support enables the board to connect to _________

a) LAN

b) MAN

c) WAN

d) WLAN

View Answer

Answer: a

Explanation: The 10/100 Mbit Ethernet support enables the board to be connected to a LAN. It also
enables to accessing the linux shell.

8. What is the range of microSD card that is connected externally?

a) 16GB

b) 32Gb

c) 8Gb

d) 64Gb

View Answer

Answer: b

Explanation: The external Micro SD card has a range of 32Gb.

9. Which of the following has a real time clock?

a) Galileo Gen 2

b) Rasberry Pi

c) Arduino

d) Rasberry Pi 3

View Answer
Answer: a

Explanation: The Rasberry Pi, as well as most Arduino, does not have an on board real time clock.
The Galileo boards have a real time clock, requiring only a 3V coin cell battery. The boards can
therefore keep accurate time without being connected to either a power source or internet.

10. Which bus is a standard bus derived by ARM with aim to support efficient on chip?

a) Serial Attached SCSI

b) Futurebus

c) Advanced Micro Bus

d) Scalable Coherent Interface

View Answer

Answer: c

Explanation: AMB is used for simple cost effective design transfer, pipelined transfer operation, and
multiple bus masters. It is known for high performance and high clock synthesizable design,
providing high bandwidth channel between processor and peripherals.

11. How many digital I/O pins are there in Board?

a) 29

b) 15

c) 25

d) 20

View Answer

Answer: d

Explanation: Android compatible header containing 20 digital I/O pins in which 12 are fully native
speed.

12. Does the board has UART?

a) True

b) False

View Answer

Answer: a

Explanation: Galileo Gen 2 board has 2 UARTs, one shared with console UART. Serial console UART
header is compatible with FTDI USB converter.
13. What is the storage memory of EEPROM?

a) 16kb

b) 6kb

c) 8kb

d) 12kb

View Answer

Answer: c

Explanation: The EEPROMs memory is 8kb while it has external SD card option of 32GB.

14. What is the USB version that is supported?

a) USB 4.0

b) USB 1.5

c) USB 3.0

d) USB 2.0

View Answer

Answer: d

Explanation: In addition to android hardware and software compatibility, the Intel Galileo board
includes the following industry standards I/O ports and features: USB 2.0 Host port and USB 2.0
Client port.

15. ________ bit PWM for more precise control of servos and smoother response.

a) 14-bit

b) 12-bit

c) 8-bit

d) 6-bit

View Answer

Answer: b

Explanation: 12-bit PWM for more precise control of servos and smoother response

1. LPC 2148 pro development board has _________ on chip memory.

a) 500k
b) 625k

c) 512k

d) 425k

View Answer

Answer: c

Explanation: LPC 2148 Pro Development Board is a powerful development platform based on
LPC2148 ARM7TDMI micro controller with 512k on-chip memory.

2. The USB controller provides high speed interface to laptop/PC with a speed of ________

a) On-chip USB with 12Mb/s

b) On-chip USB with 15Mb/s

c) Peripheral USB with 12Mb/s

d) Peripheral USB with 15Mb/s

View Answer

Answer: a

Explanation: The on-chip USB controller provides direct high speed interface to a PC/laptop with
speeds up to 12Mb/s.

3. Xbee/Bluetooth/Wifi wireless modules and SD/MMC card are included in the board?

a) True

b) False

View Answer

Answer: b

Explanation: Xbee/Bluetooth/Wifi wireless modules and SD/MMC card are not included in the board
and it can be separately brought from Net Robotics Website.

4. In LPC 2148 we require separate programmer?

a) True

b) False

View Answer

Answer: b
Explanation: The UART boot loader eliminates the need of an additional programmer and allows you
to program using serial port.

5. Which LCD display is present in LPC 2148 Development Board?

a) 8*8 LED

b) 2*32 LCD

c) 2*16 LCD connected peripherally

d) 2*16 LCD on-chip

View Answer

Answer: d

Explanation: On-board two line LCD Display (2*16) with jumper selection option to disable LCD when
not required.

6. Does it have in system programming or in application programming?

a) True

b) False

View Answer

Answer: a

Explanation: In system programming is generally what we do, i.e., using Jtag the program is dumped
in to the board.

In application programming means without any external devices the program can be changed (which
we already written in the original program).

7. It provides real time debugging with the on chip real monitor software.

a) True

b) False

View Answer

Answer: a

Explanation: Embedded ICE RT and Embedded Trace Interfaces offer real-time debugging with the
on chip Real monitor software and high speed tracing execution.

8. Who is the founder of LPC2148 board?

a) Intel
b) Atmel

c) Motorola

d) Philips

View Answer

Answer: d

Explanation: ARM LPC2148 is ARM7TDMI-S core board microcontroller that uses 16/32-Bit 64
pin(LQFP) microcontroller No.LPC2148 from Philips(NXP).

9. What is the program counter value when the board turns on?

a) 0x00000

b) 0xFFFFF

c) Where the previous program ends

d) At the location where we write the code

View Answer

Answer: a

Explanation: Usually the program counter will store the address of the instruction to be executed
but, when we start the board it points to the first address memory location.

10. Which IDE is supported by LPC2148 board?

a) Code Blocks

b) AVR Studio 4

c) Keil uVersion 4

d) Walldorf

View Answer

Answer: c

Explanation: Using Real view compiler the keil uVersion 4 is used. Whereas, AVR studio 4 is used for
ATmega128 microcontroller. And code block is used for c programming.

11. ________ bit ARM7TDMI controller is present?

a) 128 bit

b) 8 bit

c) 64 bit
d) 32 bit

View Answer

Answer: d

Explanation: LPC 2148 Pro Development Board is a powerful development platform based on
LPC2148 ARM7TDMI micro controller with 512k on-chip memory. With a 16-bit/32-bit ARM7TDMI-S
microcontroller is a tiny LQFP64 package.

12. USB 2.0 full speed compliant device controller with _________ of end point RAM.

a) 6 kB

b) 4 kB

c) 2 kB

d) 8 kB

View Answer

Answer: c

Explanation: The on-chip USB controller provides direct high speed interface to a PC/laptop with
speeds up to 12 Mb/s. USB 2.0 full speed compliant device controllers with 2 kB of end point RAM.

13. Single 10-bit DAC provides variable _________ output.

a) Digital

b) Analog

c) Analog and digital

d) Neither analog nor digital

View Answer

Answer: b

Explanation: Two 10-bit ADCs provide a total of 14 analog inputs whereas single 10-bit DAC provides
variable analog output.

14. Timer in the board has _________ compare and _________ capture channels.

a) 3 and 4

b) 4 and 3

c) 4 and 4

d) 3 and 3
View Answer

Answer: c

Explanation: Two 32-bit timer/external event counters have four capture and four compare channels
each and also a PWM unit with six outputs and a watchdog.

15. What is the operating voltage of the board?

a) 5v

b) 2.5v

c) 3v

d) 4.5v

View Answer

Answer: c

Explanation: Single power supply with POR and BOD circuits and operated at the supply voltage of
3.0 to 3.6v with 5v tolerant I/O pads.

1. What do you mean by micro in microcontroller?

a) Distance between 2 IC’s

b) Distance between 2 transistors

c) Size of a controller

d) Distance between 2 pins

View Answer

Answer: b

Explanation: Micro means 10-6 which gives the distance between 2 element transistors which is
called as Micron Technology.

2. What is the bit size of the 8051 microcontroller?

a) 8-bit

b) 4-bit

c) 16-bit

d) 32-bit

View Answer

Answer: a
Explanation: It is an 8-bit microcontroller which means most of the operations are limited to 8 bit
only.

3. Name the architecture and the instruction set for microcontroller?

a) Van- Neumann Architecture with CISC Instruction Set

b) Harvard Architecture with CISC Instruction Set

c) Van- Neumann Architecture with RISC Instruction Set

d) Harvard Architecture with RISC Instruction Set

View Answer

Answer: b

Explanation: Harvard architecture has different memory spaces for both program memory and data
memory with Complex Instruction Set Computer(CISC). The difference between CISC and RISC is RISC
has few instructions than CISC. Where as in Van- Neumann, program and data memory are same.
Van- Neumann is also called as Princeton architecture.

4. Number of I/O ports in the 8051 microcontroller?

a) 3 ports

b) 4 ports

c) 5 ports

d) 4 ports with last port having 5 pins

View Answer

Answer: b

Explanation: It has 4 ports with port0 act as I/O port and also multiplexing of address and data bus.
Port1act as I/O port. Port 2 act as I/O and also like address lines. Port 3 act as I/O and also for
external peripherals.

5. Is ROM is used for storing data storage?

a) True

b) False

View Answer

Answer: b

Explanation: RAM is used for storing data storage and ROM is used for storing program memory.
6. SCON in serial port is used for which operation?

a) Transferring data

b) Receiving data

c) Controlling

d) Controlling and transferring

View Answer

Answer: c

Explanation: There are 2 pins available in serial port. One is used for transmission and other is used
for receiving data. SCON is the bit in the serial port which is used for controlling the operation.

7. Program counter stores what?

a) Address of before instruction

b) Address of the next instruction

c) Data of the before execution to be executed

d) Data of the execution instruction

View Answer

Answer: b

Explanation: Points to the address of the next instruction to be executed from ROM. It is 16 bit
register means the 8051 can access program address from 0000H to FFFFH. Total 64KB of code.

8. Auxiliary carry is set during which condition?

a) When carry is generated from D3 to D4

b) When carry is generated from D7

c) When carry is generated from both D3 to D4 and D7

d) When carry is generated at either D3 to D4 or D7

View Answer

Answer: a

Explanation: When carry is generated from D3 to D4, it is set to 1, it is used in BCD arithmetic.

9. What is order of the assembly and running 8051 program?

i) Myfile.asm

ii) Myfile.lst
iii) Myfile.obj

iv) Myfile.hex

a) i,ii,iii,iv

b) ii,iii,I,iv

c) iv,ii,I,iii

d) iii,ii,I,iv

View Answer

Answer: a

Explanation: After writing the program in editor and compilation first .asm, .lst, .obj, .hex are
created.

10. The use of Address Latch Enable is to multiplex address and data memory.

a) True

b) False

View Answer

Answer: a

Explanation: That is used for multiplexting address and data ie., the same line carries address and
data. To indicate when it carries address, ALE is emitted by 8051.

11. Which pin provides a reset option in 8051?

a) Pin 1

b) Pin 8

c) Pin 11

d) Pin 9

View Answer

Answer: d

Explanation: Reset pin is utilized to set the micro controller 8051 to its primary values, whereas the
micro controller is functioning or at the early beginning of application. The reset pin has to be set
elevated for two machine rotations.

12. External Access is used to permit ____________

a) Peripherals
b) Power supply

c) ALE

d) Memory interfacing

View Answer

Answer: d

Explanation: External Access input is employed to permit or prohibit outer memory interfacing. If
there is no outer memory needed, this pin is dragged by linking it to Vcc.

13. What is the address range of SFRs?

a) 80h to feh

b) 00h to ffh

c) 80h to ffh

d) 70h to 80h

View Answer

Answer: c

Explanation: In 8051 there certain registers which uses the RAM addresses from80h to ffh. These are
called as Special Function Registers. Some of the SRFrs are I/o ports and control operations as TCON,
SCON, PCON.

14. How many interrupts are there in micro controller?

a) 3

b) 6

c) 4

d) 5

View Answer

Answer: d

Explanation: An interrupt is an external or internal event that disturbs the microcontroller to inform
if that needs its services. There are 5 interrupts :

Timer 0 overflow interrupt

Timer 1 overflow interrupt

External Interrupt 0

External Interrupt 1
Serial port events.

15. Timer 0 is a ________ bit register.

a) 32-bit

b) 8-bit

c) 16-bit

d) 10-bit

View Answer

Answer: c

Explanation: The Timer 0 is a 16-bit register and can be treated as two 8-bit registers and these can
be accessed similarly to any other registers.

1. Number of pins in 8051 microcontroller with ________ package.

a) 40 pin with LLC

b) 60 Pin with QFP

c) 40 pin with DIP

d) 60 pin with QFP

View Answer

Answer: c

Explanation: The 8051 family members have different packages, such as DIP(Dual In Line), QFP(Quad
Flap Package), LLC(Leadless Chip Carrier) they all have 40 pins that are dedicated to different
functions. Especially 8051 have a Dual in Line package.

2. Does an 8051 microcontroller need external oscillator to run?

a) True

b) False

View Answer

Answer: a

Explanation: The 8051 has an on chip oscillator but requires an external oscillator clock to run it.
Most often a quartz crystal oscillator is connected to inputs XTAL1 and XTAL2.

3. We use any other frequency source other than crystal oscillator.


a) True

b) False

View Answer

Answer: a

Explanation: A frequency source other than crustal oscillator is used. It can be a TTL oscillator, it
should be connected to XTAL1 and XTAL2 id left unconnected.

4. Reset work is __________

a) To make program counter zero but values in registers values are made as zero

b) Program counter is not zero but values in registers values are made as

Zero

c) Program counter not zero but values in registers values remain same

d) To make program counter zero but values in registers values remain same

View Answer

Answer: d

Explanation: It is an input pin and active high. When we apply a high pulse it terminates all activities
and it cost all the values in the register to be zero. It will also set program counter to zero.

5. What is the minimum no of cycles required for reset operation?

a) 3 cycle

b) 2 cycles

c) 1 cycles

d) 4 cycles

View Answer

Answer: c

Explanation: When power is turned on, the circuit holds the RST pin high for an amount of time that
depends on the capacitor value and the rate at which it changes. To ensure a valid reset the RST pin
must be held high long enough to allow the oscillator to start up plus two machine cycles.

6. PSEN stands for ________

a) Program Select Enable

b) Peripheral Store Enable


c) Program Store Enable

d) Peripheral Select Enable

View Answer

Answer: c

Explanation: This is an output pin. In an 8031-based system in which an external ROM holds the
program code, this pin is connected to the OE pin of the ROM.

7. Find the machine cycle for AT89C51 if XTAL = 11.0592MHz.

a) 90.42us

b) 361.68us

c) 1.085us

d) 150.145us

View Answer

Answer: b

Explanation: Machine cycle = No.of cycles/frequency

Time = 1/frequency

Time(ns) = 1/11.0592MHz

= 90.42ns

Machine cycles = 12*90.42

= 1.085us.

8. What is the operation for mode 0?

a) 13-bit timer mode, 8-bit timer/counter THx and TLx as 5-bit prescalar

b) 16-bit timer mode, 16-bit timer/counter THx and TLx are cascaded, no prescalar

c) 8-bit auto reload mode, 8-bit auto reload time/counter; THx holds a value which is to be reloaded
into TLx each time it overflows

d) Spilt timer mode

View Answer

Answer: a

Explanation: Mode 0 is exactly same like mode 1 except that it is a 13-bit timer instead of 16-bit. The
13-bit counter can hold values between 0000 to 1FFH in Th-Tl.
9. What is the operation for mode 1?

a) 13-bit timer mode, 8-bit timer/counter THx and TLx as 5-bit prescalar

b) 16-bit timer mode, 16-bit timer/counter THx and TLx are cascaded, no prescalar

c) 8-bit auto reload mode, 8-bit auto reload time/counter; THx holds a value which is to be reloaded
into TLx each time it overflows

d) Spilt timer mode

View Answer

Answer: b

Explanation: It is a 16-bit timer; therefore it allows value from 0000 to FFFFH to br loaded into the
timer’s register TL and TH. After TH and TL are loaded with a 16-bit initial value, the timer must be
started.

10. Which is the operation for mode 2?

a) 13-bit timer mode, 8-bit timer/counter THx and TLx as 5-bit prescalar

b) 16-bit timer mode, 16-bit timer/counter THx and TLx are cascaded, no prescalar

c) 8-bit auto reload mode, 8-bit auto reload time/counter; THx holds a value which is to be reloaded
into TLx each time it overflows

d) Spilt timer mode

View Answer

Answer: c

Explanation: It is an 8 bit timer that allows only values of 00 to FFH to be loaded into the timer’s
register TH. After TH is loaded with 8 bit value, 8051 gives a copy of it to TL.

11. Which is the operation for mode 3?

a) 13-bit timer mode, 8-bit timer/counter THx and TLx as 5-bit prescalar

b) 16-bit timer mode, 16-bit timer/counter THx and TLx are cascaded, no prescalar

c) 8-bit auto reload mode, 8-bit auto reload time/counter; THx holds a value which is to be reloaded
into TLx each time it overflows

d) Spilt timer mode

View Answer

Answer: d

Explanation: Mode 3 is also known as a split timer mode. Timer 0 and 1 may be programmed to be in
mode 0, 1 and 2 independently of similar mode for other time.
12. Function of IE1 in TCON register?

a) External interrupt 1 Edge flag. Not related to timer operations

b) External interrupt 1 Edge flag. Not related to timer operations

c) External interrupt 0 single type control bit

d) External interrupt 1 to be triggered by a falling edge signal

View Answer

Answer: a

Explanation: TCON register has 8 bits. 3rd bit has an IE1 register. This is an external interrupt.

13. 8051 controller contains how many registers?

a) 5

b) 3

c) 1

d) 2

View Answer

Answer: d

Explanation: 8051 microcontroller has 2 types of registers. They are Special Function Registers and
the other is General purpose register. Each of having 128KB of memory. And GPR is a Byte
addressable register and SFR is a Bit addressable register.

14. General purpose memory is called as ________

a) ROM memory

b) RAM memory

c) SRAM memory

d) EPROM memory

View Answer

Answer: b

Explanation: The general purpose memory is called as the RAM memory of the 8051 microcontroller,
which is divided into 3 areas such as banks, bit-addressable area, and scratch-pad area.

15. Which timer register has both timers in it?


a) TMOD

b) TCON

c) Both TMOD and TCON

d) Neither TMOD nor TCON

View Answer

Answer: a

Explanation: In the TMOD register, lower 4 bits are set for timer0 and the upper 4 bits are set aside
for timer1. In each case, the lower 2 bits are used to set the timer mode and upper 2 bits to specify
the operation.

1. What is the processor used by ARM7?

a) 8-bit CISC

b) 8-bit RISC

c) 32-bit CISC

d) 32-bit RISC

View Answer

Answer: d

Explanation: ARM7 is a group 32-bit RISC ARM processor cores licensed by ARM Holdings for
microcontroller use.

2. What is the instruction set used by ARM7?

a) 16-bit instruction set

b) 32-bit instruction set

c) 64-bit instruction set

d) 8-bit instruction set

View Answer

Answer: a

Explanation: ARM introduced the Thumb 16-bit instruction set providing improved code density
compared to previous designs. The most widely used ARM7 designs implement the ARMv4T
architecture, but some implement ARM3 or ARMv5TEJ.

3. How many registers are there in ARM7?

a) 35 register( 28 GPR and 7 SPR)


b) 37 registers(28 GPR and 9 SPR)

c) 37 registers(31 GPR and 6 SPR)

d) 35 register(30 GPR and 5 SPR)

View Answer

Answer: c

Explanation: ARM7TDMI has 37 registers(31 GPR and 6 SPR). All these designs use a Von Neumann
architecture, thus the few versions comprising a cache do not separate data and instruction caches.

4. ARM7 has an in-built debugging device?

a) True

b) False

View Answer

Answer: a

Explanation: Some ARM7 cores are obsolete. It had a JTAG based on-chip debugging; the preceding
ARM6 cores did not support it. The “D” represented a JTAG TAP for debugging.

5. What is the capability of ARM7 f instruction for a second?

a) 110 MIPS

b) 150 MIPS

c) 125 MIPS

d) 130 MIPS

View Answer

Answer: d

Explanation: It is a versatile device for mobile devices and other low power electronics. This
processor architecture is capable of up to 130MIPS on a typical 0.13 um process.

6. We have no use of having silicon customization?

a) True

b) False

View Answer

Answer: b
Explanation: It achieve custom design goals, such as higher clock speed, very low power
consumption, instruction set extension, optimization for size, debug support, etc.

7. Which of the following has the same instruction set as ARM7?

a) ARM6

b) ARMv3

c) ARM71a0

d) ARMv4T

View Answer

Answer: b

Explanation: The original ARM7 was based on the earlier ARM6 design and used the same ARM3
instruction set.

8. What are t, d, m, I stands for in ARM7TDMI?

a) Timer, Debug, Multiplex, ICE

b) Thumb, Debug, Multiplier, ICE

c) Timer, Debug, Modulation, IS

d) Thumb, Debug, Multiplier, ICE

View Answer

Answer: b

Explanation: The ARM7TDMI(ARM7 + 16 bit Thumb + JTAG Debug + fast Multiplier + enhanced ICE)
processor implements the ARM4 instruction set.

9. ARM stands for _________

a) Advanced RISC Machine

b) Advanced RISC Methadology

c) Advanced Reduced Machine

d) Advanced Reduced Methadology

View Answer

Answer: a

Explanation: ARM, originally Acorn RISC Machine, later Advanced RISC Machine, is a family of
reduced instruction set computing (RISC) architectures for computing processors.
10. What are the profiles for ARM architecture?

a) A,R

b) A,M

c) A,R,M

d) R,M

View Answer

Answer: c

Explanation: ARMv7 defines 3 architecture “profiles”:

A-profile, Application profile

R-profile, Real-time profile

M-profile, Microcontroller profile.

11. ARM7DI operates in which mode?

a) Big Endian

b) Little Endian

c) Both big and little Endian

d) Neither big nor little Endian

View Answer

Answer: c

Explanation: Big Endian configuration, when BIGEND signal is HIGH the processor treats bytes in
memory as being in Big Endian format. When it is LOW memory is treated as little Endian.

12. In which of the following ARM processors virtual memory is present?

a) ARM7DI

b) ARM7TDMI-S

c) ARM7TDMI

d) ARM7EJ-S

View Answer

Answer: a

Explanation: ARM7DI is capable of running a virtual memory system. The abort input to the
processor may be used by the memory manager to inform ARM7DI of page faults.
13. How many instructions pipelining is used in ARM7EJ-S?

a) 3-Stage

b) 4-Stage

c) 5-Stage

d)2-stage

View Answer

Answer: c

Explanation: A five-stage pipelining is used, consisting of Fetch, Decode, Execute, Memory, and
Writeback stages. A six-stage pipelining is used in Jazelle state, consisting of Fetch, Jazelle, Execute,
Memory, and Writeback stages.

14. How many bit data bus is used in ARM7EJ-s?

a) 32-bit

b) 16-bit

c) 8-bit

d) Both 16 and 32 bit

View Answer

Answer: a

Explanation: The ARM7EJ-s processor has a Von Neumann architecture. This feature is a single 32-bit
data bus that carries both instructions and data. Only load, store, and swap instructions can access
data from memory. Data can be 8- bit.

15. What is the cache memory for ARM710T?

a) 12Kb

b) 16Kb

c) 32Kb

d) 8Kb

View Answer

Answer: d

Explanation: The ARM710T is a general purpose 32-bit microprocessor with 8Kb cache, enlarged
write buffer and memory management unit combined in a single chip.
1. What are the pipelining stages include?

a) Fetch, Decode, Write

b) Fetch, Decode, Execute

c) Fetch, Execute, Write

d) Fetch, Decode, Execute, Write

View Answer

Answer: a

Explanation: ARM7 core has 3-stage pipeline that increases instruction flow through processor up to
three times. So each instruction is executed in 3 stages:

Fetch – instruction is fetched from memory and placed in pipeline

Decode – instruction is fetched and data-path signals prepared for next cycle

Execute – instruction from prepared data-path reads from registry bank, shifts operand to ALU and
writes generated result to dominant register.

2. What is pipe lining?

a) Non linear

b) Linear

c) Linear and Non linear

d) Sometimes both

View Answer

Answer: b

Explanation: Pipeline is linear, which means that in simple data processing processor executes one
instruction in single clock cycle which while individual instruction takes three clock cycles.

3. What are the no of pins that are in the ARM7 processors?

a) 65 pin with QFP

b) 45 Pin with QFP

c) 45 pin with LLC

d) 65 pin with DIP

View Answer

Answer: d
Explanation: The ARM7 family members have different packages, such as DIP(Dual In Line),
QFP(Quad Flap Package), LLC(Leadless Chip Carrier) they all have 40 pins that are dedicated to
different functions. Especially 8051 has a Quad Flap Package.

4. Using what the processor wake-up from power-down?

a) External Interrupts

b) Internal interrupts

c) Serial Programming

d) Program Counter

View Answer

Answer: a

Explanation: The AVR7 processor wakes up from power down mode via external interrupt or BOD.

5. What is the flash memory for LPC2141?

a) 34kB

b) 32kB

c) 128kB

d) 256kB

View Answer

Answer: b

Explanation: It is the first series of ARM7. This memory is used for both code and data storage.
Programming of the flash memory may be accomplished in several ways. It can also be programmed
in system via serial port.

6. What are the categories in the vectored interrupt controller?

a) Fast interrupt request

b) Non vectored interrupt request

c) Non-vectored IQR

d) Fast interrupt request, Non vectored interrupt request and Non-vectored IQR

View Answer

Answer: d

Explanation: The vectored Interrupt controller accepts all the interrupts request inputs and
categorizes them as Fast Interrupt Request, Vectored Interrupt Request, and Non Vectored IQR as
defined by programmable settings. The programmable assignment scheme means that priorities of
interrupts from the various peripherals can be dynamically assigned and adjusted.

7. Each peripheral has an interrupt line?

a) True

b) False

View Answer

Answer: a

Explanation: Each peripheral device has one interrupt line connected to the Vectored Interrupt
Controller, but may have several internal interrupt flags. Individual interrupt flags may also
represent more than one interrupt source.

8. What is pin connect block?

a) All pins are having a function without reserved

b) Some pins are Reserved

c) Pins have more than one function

d) Multiplexing of some pins

View Answer

Answer: c

Explanation: The pin connect block allows selected pins of the microcontroller to have more than
one function. Configuration registers control the multiplexers to allow connection between the pin
and the on chip peripherals.

9. What is the size of ADC and DAC?

a) 16 bit

b) 10 bit

c) 8 bit

d) 32 bit

View Answer

Answer: b

Explanation: The converters are single 10-bit successive approximation analog to digital converters.
While ADC0 has 6 channels, ADC1 has 8 channels. And DAC output voltage is the vref voltage.
10. How many processors are used in the Instruction pipelining?

a) One

b) Two

c) Three

d) Four

View Answer

Answer: a

Explanation: Pipelining is a technique for implementing instruction level parallelism within a single
processor. Pipelining attempts to keep every part of the processor busy with some instructions, by
dividing incoming instructions into the series of sequential steps.

11. Which signal is used for pipelining on bis cycle in ARM710T?

a) BWAIT

b) BTRAN

c) BLOK

d) BCLK

View Answer

Answer: b

Explanation: The signal BTAN[1:0] is placed by one bus cycle. This pipelining should be taken into
account when these signals are being decoded. The value of BTRAN[1:0] indicates whether the next
bus cycle is a data cycle or an address cycle.

12. _______ pin can be used to extend memory access in whole cycle increments.

a) BTRAN

b) BLOK

c) BWAIT

d) BCLK

View Answer

Answer: c

Explanation: BWAIT pin can be used to extend memory access in whole cycle increments. BWAIT is
driven by the selected slave during the low phase of BCLK.

13. How many DC-DC converters interfaces in ARM7100?


a) 5

b) 3

c) 4

d) 2

View Answer

Answer: d

Explanation: ARM7100 has two programmable duty ratio 96KHz clock output which is intended to be
used as drivers for DC to DC converter in the PSU subsystems.

14. The ARM7TDMI-S uses which pipelining?

a) 2-Stage

b) 3-Stage

c) 4-Stage

d) 5-Stage

View Answer

Answer: b

Explanation: A 3-stage pipelining is used, so instructions are executed in three stages: Fetch, Decode,
Execute.

15. The ARM7TDMI-S processor has __________ types of memory cycle.

a) 5

b) 3

c) 4

d) 2

View Answer

Answer: c

Explanation: The ARM7TDMI-S processor has 4 types of memory cycle: Non sequential cycle,
Sequential cycle, cp processor register transfer cycle, internal cycle.

1. How many types of arduinos do we have?

a) 5

b) 6
c) 8

d) 6

View Answer

Answer: c

Explanation: There are 4 Arduino boards and 4 Arduino shields that fit on top of Arduino compatible
boards to provide additional capability like connecting to the internet, motor controller, LCD screen
controlling etc.,.

2. What is the microcontroller used in Arduino UNO?

a) ATmega328p

b) ATmega2560

c) ATmega32114

d) AT91SAM3x8E

View Answer

Answer: a

Explanation: ATmega328p is a microcontroller which is 32KB of flash ROM and 8-bit microcontroller.

3. What does p refer to in ATmega328p?

a) Production

b) Pico-Power

c) Power-Pico

d) Programmable on chip

View Answer

Answer: b

Explanation: Picopower technology employs advanced features like multiple clock domains, DMA
and event systems to minimize power consumption.

4. Arduino shields are also called as _________

a) Extra peripherals

b) Add on modules

c) Connectivity modules

d) Another Arduinos
View Answer

Answer: b

Explanation: The Arduino boards can connect with add- on modules termed as shields. Multiple, and
possibly stacked shields may be individually addressable via an I2C serial bus.

5. What is the default bootloader of the Arduino UNO?

a) Optiboot bootloader

b) AIR-boot

c) Bare box

d) GAG

View Answer

Answer: a

Explanation: The optiboot bootloader will take 512 bytes, leaving 32256 bytes for application code.
Due to its small size larger up-loadable sketch size is achieved.

6. Does the level shifter converts the voltage levels between RS-232 and transistor-transistor logic.

a) True

b) False

View Answer

Answer: a

Explanation: Level shifters are used in multi-design, different blocks work on different voltage levels.
So when a signal passes from one voltage domain to another voltage this is needed particularly
when a signal passes from low level to high level.

7. Which is the software or a programming language used for controlling of Arduino?

a) Assembly Language

b) C Languages

c) JAVA

d) Any Language

View Answer

Answer: d

Explanation: A program for Arduino can be written in any programming language for a compiler that
produces binary machine code for the target processor.
8. Do Arduino provides IDE Environment?

a) True

b) False

View Answer

Answer: a

Explanation: It includes a code editor with features as texti cutting and pasting, searching and
replacing text, automatic indenting, brace matching, syntax highlighting, and provides simple one-
click mechanism to compile and uplaod programs to an Arduino board.

9. A program written with the IDE for Arduino is called _________

a) IDE source

b) Sketch

c) Cryptography

d) Source code

View Answer

Answer: b

Explanation: Sketches are saved on the development computer as text files with the file extension
.ino. Arduino software (IDE) pre-1.0 saved sketches with the extension file .pde.

10. Arduino IDE consists of 2 functions. What are they?

a) Build() and loop()

b) Setup() and build()

c) Setup() and loop()

d) Loop() and build() and setup()

View Answer

Answer: c

Explanation: Setup() is called once in the program when a sketch starts after power-up. It is used to
initialixe variables, input and output pin modes, and other libraries needed in the sketch.

Loop() is used after setup() been called, function loop() is executed repeatedly in the main program.
It controls the board until the board is powered off or is reset.

11. How many digital pins are there on the UNO board?
a) 14

b) 12

c) 16

d) 20

View Answer

Answer: a

Explanation: It has 14 digital pins input/output pins of which 6 can be used as PWM output, 6 analog
inputs, a USB connection, a power jack, a reset button and more.

12. _________ board allows sewn into clothing.

a) UNO

b) RedBoard

c) LilyPad

d) Mega

View Answer

Answer: c

Explanation: LilyPad was creatively designed with large connecting pads and a flat back to allow
them to be sewn into clothing with conductive thread.

13. How many analog pins are used in Arduino Mega board?

a) 16

b) 14

c) 12

d) 8

View Answer

Answer: a

Explanation: It has lots of digital input/output pins, 14 can be used as PWM output 16 analog inputs,
a USB connection, a power jack, and a reset button.

14. Which board is first to use microcontroller within build USB?

a) LilyPad

b) UNO
c) RedBoard

d) Leonardo

View Answer

Answer: d

Explanation: The Leonard is Arduino’s first development board to use one microcontroller with built-
in USB. This means that it can be cheaper and simple, And also, code libraries are available which
allow the board to emulate a computer keyboard etc.

15. ___________ are pre built circuit boards that fit on top of Android.

a) Sensor

b) Data types

c) Breadboard

d) Sheilds

View Answer

Answer: d

Explanation: Shields are pre- built circuit boards that fit on top of board and provide additional
capabilities like controlling motors, connecting to internet, providing cellular etc.

1. Does Raspberry Pi need external hardware?

a) True

b) False

View Answer

Answer: b

Explanation: The RPi can be used without additional hardware (except perhaps a power supply of
some kind), it won’t be much use as a general computer. As with any normal PC, it is likely you need
some additional hardware.

2. Does RPi have an internal memory?

a) True

b) False

View Answer

Answer: a
Explanation: The RPi has no internal storage or built-in operating system it requires an SD-card that
is set up to boot the RPi.

3. What do we use to connect TV to RPi?

a) Male HDMI

b) Female HDMI

c) Male HDMI and Adapter

d) Female HDMI and Adapter

View Answer

Answer: c

Explanation: HD TV’s and most LCD Monitors can be connected using a full-size male HDMI cable,
and with an inexpensive adapter if DVI is used. HDMI version 1.4 cable is recommended.

4. How power supply is done to RPi?

a) USB connection

b) Internal battery

c) Charger

d) Adapter

View Answer

Answer: a

Explanation: The unit uses a Micro USB connection to power itself (only the power pins are
connected so it will not transfer data over the connection). A standard modern phone charger with a
micro USB connector will do, but needs at least 700 mA at 5 volts.

5. What is the Ethernet/LAN cable used in RPi?

a) Cat5

b) Cat5e

c) Cat6

d) RJ45

View Answer

Answer: d
Explanation: We can use an Ethernet cable or a USB Wifi adapter. The RPi ethernet port is auto-
sensing which means that it may be connected to a router or directly to another computer (without
the need for a crossover cable).

6. What are the parameters that are default values?

a) Port_Name and Bits

b) Speed and Port_Names

c) Speed and Parity

d) Stop bit and Flow Control

View Answer

Answer: b

Explanation: Port_Name: Linux automatically assigns different names for different types of serial
connectors. For Standard Serial Port: ttyS0 … ttySn

USB Serial Port Adapter: ttyUSB0 … ttyUSBn

Speed: 115200.

7. What is the command used for easy using of GNU screen?

a) $useradd -G {dialout} your_name

b) Screen Port_Name115200

c) Minicom -b 115200 -o -D Port_Name

d) Prompt> # help

View Answer

Answer: b

Explanation: This command is used to open and write or modify data on GNU screen and we should
write in the terminal window.

8. Which instruction set architecture is used in Raspberry Pi?

a) X86

b) MSP

c) AVR

d) ARM

View Answer
Answer: d

Explanation: ARM assembler is used in Raspberry Pi. Machine language is built up from discrete
statements or instructions implemented by a particular processor.

9. What is the default user in Debain on Raspberry Pi?

a) Default

b) User

c) Pi

d) Root

View Answer

Answer: c

Explanation: Linux users. User management in Raspberry is done on the command line. The default
user is Pi, and the password is raspberry. You can add users and change each user’s password.

10. What are the distributions are supported by raspberry Pi?

a) Arch Linux

b) Debain

c) Fedora Remix

d) Arch Linux, Debain, and Fedora Remix

View Answer

Answer: d

Explanation: These all are the distributors that have Linux operating system which has default GUI
for Fedora as Xfce, Mate, None-depends on spin.

11. What bit processor is used in Pi 3?

a) 64-bit

b) 32-bit

c) 128-bit

d) Both 64 and 32 bit

View Answer

Answer: a
Explanation: The first is a next generation Quad Core Broadcom BCM2837 64-bit ARMv8 processor,
making the processor speed increase from 900MHz on the Pi 2 to up to 1.2GHz on the Pi 3.

12. What is the speed of operation in Pi 3?

a) 900MHz

b) 1.2GHz

c) 1GHz

d) 500MHz

View Answer

Answer: b

Explanation: The first is a next generation Quad Core Broadcom BCM2837 64-bit ARMv8 processor,
making the processor speed increase from 900MHz on the Pi 2 to up to 1.2GHz on the Pi 3.

13. WiFi is not present in which of the following models?

a) Raspberry Pi3

b) Raspberry Pi Zero WH

c) Raspberry Pi Zero W

d) Raspberry Pi Zero

View Answer

Answer: d

Explanation: All the 3 has an inbuilt Wifi in which all of them works on 802.11 n. For Raspberry Pi
Zero an external ESP2866 should be connected.

14. Does micro SD card present in all modules?

a) True

b) False

View Answer

Answer: a

Explanation: All the products have an inbuilt memory as well as an extended memory.

15. How many USB ports are present in Raspberry Pi 3?

a) 5
b) 2

c) 4

d) 3

View Answer

Answer: c

Explanation: In Raspberry Pi3 there is an upgraded switched power source that goes up to 2.5 Amps
instead of just 2 Amps, allowing pi to power even more powerful devices over USB ports.

1. What is the main programming language code developed by eclipse?

a) C

b) JAVA

c) C++

d) C/C++

View Answer

Answer: b

Explanation: Eclipse is mostly written in Java and its primary use for development Java applications,
but it may also be used to develop applications in other programming languages via plug-ins,
including Ada, C, C++.

2. What does an Eclipse IDE allows?

a) Editing the program

b) Compiling the program

c) Both editing and compiling

d) Editing, building, Debugging, Compiler

View Answer

Answer: d

Explanation: An Integrated Development Environment is a software application that provides


comprehensive facility to computer programmer for software development. An IDE normally
consists of a source code editor, build automation tools and a debugger. Eclipse also has a compiler
while some others do not provide it.

3. What is the scenario the IDE generally required?

a) Language support
b) Visual programming

c) Attitude across different platforms

d) Out system platform

View Answer

Answer: b

Explanation: Visual programming is a usage scenario in which an IDE is generally required. Visual
basics allows user to create new applications by moving programming, building blocks, or code
nodes to create flow chats or structure diagrams that are then compiled and interpreted.

4. What is Eclipse?

a) IDE

b) Software

c) GNU

d) Code base

View Answer

Answer: a

Explanation: An Integrated Development Environment is a software application that provides


comprehensive facilities to computer programmers for software development.

5. Eclipse is used to develop documents with LaTeX.

a) True

b) False

View Answer

Answer: a

Explanation: Eclipse is used to develop documents with LaTeX, (via a TeXlipse plugin) and packages
for the software Mathematica.

6. Development environment include the __________

a) Eclipse VisualAge

b) Classpath

c) Eclipse JDT

d) IcedTea
View Answer

Answer: c

Explanation: Development environment include the Eclipse Java development tools for Java and
Scala, Eclipse CDT for c/c++, and eclipse PDT for PHP, among others.

7. The initial codebase is originated from ________

a) IBM VisualAge

b) Equinox

c) Borland VisualAge

d) Red Hat VisualAge

View Answer

Answer: a

Explanation: The initial codebase originated from IBM VisualAge. The Eclipse software development
kit, which includes the Java development tools, is meant for Java developers.

8. SDK stands for ________

a) Software Design Kit

b) Serial Development Kit

c) Software Development Kit

d) Serial Design Kit

View Answer

Answer: c

Explanation: Eclipse software development kit is free and open source software released under the
terms of the eclipse public license, although it is incompatible with the GNU General Public License.

9. It was one of the first IDE to run under ________ and it runs without problem under IcedTea.

a) GNU General Public License

b) Both GNU Classpath, GPL

c) Neither GNU nor GPL

d) GNU Classpath

View Answer

Answer: d
Explanation: It was one of the first IDE to run under GNU Classpath and it runs without problem
under IcedTea.

10. ACM stands for ________

a) Architecture for Computing Machinery

b) Association for Computing Machinery

c) Association for Cloud Machinery

d) Architecture for Cloud Machinery

View Answer

Answer: b

Explanation: The Association for computing Machinery recognized Eclipse with the 2011 ACM
Software Systems Award.

11. EPL stands for ________

a) Extended Public License

b) Extended Platform License

c) Eclipse Platform License

d) Eclipse Public License

View Answer

Answer: d

Explanation: The Eclipse Public License is the fundamental license under which Eclipse projects are
released. Some projects require dual licensing, for which the Eclipse Distribution License is available.

12. Common Public License is re licensed under ________

a) Eclipse Public License

b) General Public License

c) Eclipse Platform

d) Eclipse plug-in

View Answer

Answer: a

Explanation: Eclipse was originally released under the Common Public License, but was later re-
licensed under the Eclipse Public License. The Free Software Foundation has said licenses are free
software licenses, but are incompatible with the GNU GPL.
13. UML stands for________

a) User Modeling Language

b) User Module Language

c) Unified Modeling Language

d) Unified Module Language

View Answer

Answer: c

Explanation: One of the examples of plug-ins include for Unified Modeling Language, for sequence
and other UML diagram, a plug in for DB Explorer, and many more.

14. The Eclipse SDK includes the Eclipse Java development tools.

a) True

b) False

View Answer

Answer: a

Explanation: The Eclipse SDK includes the Eclipse Java development tools, offering an IDE with a
built-in Java incremental compiler and a full model of the Java source files.

15. Which allows for advanced refactoring technique?

a) JDK

b) SDK

c) UML

d) EPL

View Answer

Answer: b

Explanation: The Eclipse SDK includes the Eclipse Java development tools, offering an IDE with a
built-in Java incremental compiler and a full model of the Java source files. This allows for advanced
refactoring technique and code analysis.

1. MVS stands for ________

a) Microsoft Visual Studio


b) Memory Visual Studio

c) Microsoft Virtual Studio

d) Memory Virtual Studio

View Answer

Answer: a

Explanation: In the mid-1990, a number of powerful commercial development environment were


available; Microsoft Visual Studio was becoming a more general purpose tools platform.

2. IBM landscape contains ________ worlds.

a) 3

b) 2

c) 4

d) 5

View Answer

Answer: b

Explanation: This landscape actually contained two worlds: one centered on tools that enabled
Microsoft’s direction on runtime execution support, the other focused on a more open industry
approach centered on the java platform.

3. IBM Software Group began creating a development tool that eventually known as ________

a) Code Blocks

b) BlueJ

c) Android Studio

d) Eclipse

View Answer

Answer: d

Explanation: IBM Software Group began creating a development tool that eventually known as
Eclipse. We first built a new Java IDE with resources from Object Technology International labs,
along with the broader platform to go with it.

4. Vibrant ecosystem of third parties would be critical for achieving broad adoption of an eclipse.

a) True

b) False
View Answer

Answer: a

Explanation: Vibrant ecosystem of third parties would be critical for achieving broad adoption of an
eclipse. But business partners were initially reluctant to invest in our platforms.

5. The consortium’s operating principles assured that open source community would control
________

a) Code

b) Consortium

c) Both code, consortium

d) Neither code nor consortium

View Answer

Answer: c

Explanation: The consortium’s operating principles assured that open source community would
control the code and the commercial consortium would drive “marketing” and commercial relations.

6. Tools that you develop can plug into the workbench using well defined hooks called ________

a) SDK

b) Extension Point

c) JDK

d) GNU

View Answer

Answer: b

Explanation: The eclipse platform uses the model of a common workbench to integrate the tools
from the end user’s point of view. Tools that you develop can plug into the workbench using well
defined hooks called Extension Point.

7. The eclipse platform defines pen architecture.

a) True

b) False

View Answer

Answer: a
Explanation: The eclipse platform defines pen architecture so that each plug-in development team
can focus on their area of expertise.

8. Repository experts build ________ and the usability experts build ________

a) Back end, End user

b) Front end and End user

c) Back user, Front user

d) Back end , Front end

View Answer

Answer: d

Explanation: Repository experts build back ends and the usability experts build end user tools. If the
platform is designed well, significant new features and levels of integration can be added without
impact to other tools.

9. The platform itself is built in layers of plug-ins.

a) True

b) False

View Answer

Answer: a

Explanation: The platform itself is built in layers of plug-ins, each one defining extension points of
lower level plug-ins, and turn defining their own extension points for further customization.

10. The ________ is responsible for defining a structure for plug-ins.

a) Editors

b) Standard Widget Toolkit

c) Runtime

d) JFace UI

View Answer

Answer: c

Explanation: The eclipse runtime defines the plug-ins on which all other plug-ins depends. The
runtime is responsible for defining a structure for plug-ins and the implementation detail behind
them.
11. The workbench UI is ________

a) Plug-in

b) IDE

c) GNU

d) Codebase

View Answer

Answer: a

Explanation: The workbench UI is contributed by one such plug-in. When you start up the
workbench, you are not starting up a single Java program, You are activating a platform runtime.

12. The ________ is a cockpit for navigating all the functionality provided by plug-ins.

a) IDE

b) Workbench

c) GNU

d) Codebase

View Answer

Answer: b

Explanation: The workbench is a cockpit for navigating all the functionality provided by plug-ins. By
using the workbench, we can navigate resources and we can view and edit the content and
properties.

13. The workbench is just a frame.

a) True

b) False

View Answer

Answer: a

Explanation: The workbench is just a frame that can present various visual parts. These parts fall into
two major categories:

Views

Editors.

14. ________ allow the user to edit something in the workbench.


a) View

b) Workbench

c) Codebase

d) Editor

View Answer

Answer: d

Explanation: Editors allow the users to edit something in the workbench. Editors are document-
centrist, much like a file system editor.

15. ________ provide about some objects that the user is working with in the workbench.

a) Editor

b) View

c) Workbench

d) Codebase

View Answer

Answer: b

Explanation: View provide information about some object that the user is working with in the
workbench. Views often change their content as the user selects different objects in the workbench.

1. Which of the following is the professional kit?

a) PK52

b) CA51

c) A51

d) PK51

View Answer

Answer: d

Explanation: Keil development tools for the Controller Architecture supports every level of a
software developer. And PK51 is a professional kit.

2. Which of the following is the Compiler kit?

a) CA51

b) PK51
c) A51

d) A52

View Answer

Answer: b

Explanation: Keil development tools for the Controller Architecture supports every level of a
software developer. And PK51 is a Compiler Kit.

3. Which of the following is the Assembler kit?

a) PK51

b) CA51

c) A51

d) A52

View Answer

Answer: c

Explanation: Keil development tools for the Controller Architecture supports every level of a
software developer. And PK51 is an Assembler Kit.

4. Does PK51 support extended memory derivatives?

a) True

b) False

View Answer

Answer: a

Explanation: The PK51 Professional Kit for the 8051 microcontroller family supports all 8051
derivatives including new devices with extended memory and instruction sets and classic devices
and IP cores from companies like Analog Devices.

5. _______ is a complete line of home IoT devices that includes smart switches.

a) Awair

b) Canary

c) Belkin’s WeMo

d) Cinder

View Answer
Answer: c

Explanation: Belkin’s WeMo is a complete line of home IoT devices that includes smart switches,
cameras, lights, an air purifier and more. It allows the end user to control a lot of different devices
with one smartphone app.

6. Which device is a home security system?

a) Belkin’s WeMo

b) Awair

c) Canary

d) Cinder

View Answer

Answer: c

Explanation: This home security system captures video and audio and sends alerts to your
smartphone. It automatically knows when are home or away and you can also view the live video
feed from phone.

7. _______ also offers a huge lineup of products related to home automation.

a) GE connected appliances

b) Honeywell

c) Eversense

d) Cinder

View Answer

Answer: b

Explanation: Honeywell also offers a huge lineup of products related to home automation and
security. It includes thermostats, GPS asset tracking, locks, lighting, video surveillance and more.

8. _______ is the best for Internet connected thermostat.

a) Honeywell

b) GE connected appliances

c) Eversense

d) Nest

View Answer

Answer: d
Explanation: Nest is the best for Internet connected thermostat, but it also makes smoke and carbon
monoxide detectors and cameras. Its products also integrates with IoT home automation products
d=from a variety of other vendors.

9. _________ is known for its deadbolts and doorknobs.

a) GE connected appliances

b) Eversense

c) Nest

d) Schlage

View Answer

Answer: d

Explanation: Schlage is known for its deadbolts and doorknobs. It is getting ready for IoT era with
two lines of smart home locks. It is a bluetooth enabled smart deadbolt that integrates with iOS
devices.

1. What is the use of Thermostat in Nest Thermostat E?

a) Save energy

b) Show the use of energy

c) Supports in some devices only

d) Won’t work at some conditions

View Answer

Answer: a

Explanation: The thermostat controls half of our energy bills. Independent studies shows that Nest
saved people an average of 10% to 20% on heating and 15% on cooling.

2. What is the main function of Nest Thermostat E?

a) Change the temperature only when we are at home

b) Reduce the energy used

c) Change the temperature from anywhere

d) Powers off when a person is not present

View Answer

Answer: c
Explanation: Its energy saving feature can help in save from day one. And with the nest app we can
change the temperature from anywhere-the beach, the office or the bed.

3. It displays when you are close.

a) True

b) False

View Answer

Answer: a

Explanation: The frosted display blends into the background. It shows only when your close, and
fades into the background when you walk away.

4. Does HomePod allow voice controlling?

a) True

b) False

View Answer

Answer: a

Explanation: HomePod is a smart speaker that focuses on playing music and allows users to control
the device via voice using Siri.

5. Function of huge light bulb?

a) To reduce energy and to control lightning

b) To create lighting scenes based on your favourite photos

c) To reduce energy and to create lighting scenes based on your favourite photos and to control
lightning

d) To controlling lightning and to create lighting scenes based on your favourite photos

View Answer

Answer: c

Explanation: A single bridge will let you control up to 50 bulbs and you will be able to create lighting
scenes based on your favourite photos. Obviously, the lightning is controlling from your smart phone
or tablet. They are said to help use of 80% less energy than our traditional bulbs.

6. What is the drawback of using Lockitron?

a) Wastage of more energy


b) Supports in some devices only

c) Won’t work at some conditions

d) Tough installation

View Answer

Answer: b

Explanation: Lockitron is a device which ensures key less entry inside our home using our home. We
can also monitor to see if the door is locked. And if not it will send a notification when it is unlocked.
The drawback is that it will work only with iphone 4s or iphone 5.

7. Sonos is a system that uses ________ wireless speakers.

a) Wifi

b) Hifi

c) Zigbee

d) Bluetooth

View Answer

Answer: b

Explanation: Sonos is a system of Hifi wireless speakers and audio components that combines all
your music collections, radio or podcasts in a single app.

8. What is the facility Sonos provides?

a) It provides high quality 3D audio

b) Can here only to a restricted area

c) Call connectivity

d) Choose to play what you want in different rooms

View Answer

Answer: d

Explanation: We can choose to play what you want in different rooms by using a dedicated wireless
network. Sonos has got a wide collection of products for music fans, from speakers to sound bars, so
head.

9. Smart Fitness clothing mainly has which device?

a) Battery

b) Bluetooth
c) Sensors

d) Internet

View Answer

Answer: c

Explanation: Each garment has a built in sensor which measures muscle activity using
electromyography. This information is relayed to the “IRON MAN” hub, which we can attach to our
leg or chest.

10. What are Revolv means?

a) In built programming of all devices

b) Movement of device

c) A simple robot

d) Bringing all devices under a single command

View Answer

Answer: d

Explanation: Revolv is a platform that brings more devices together under a single command centre.
We can control the lightning in our room our Apple TV, heating and much more.

1. . Which devices measures gases or liquid?

a) Proximity sensor

b) Pressure sensor

c) Temperature sensor

d) Touch sensor

View Answer

Answer: b

Explanation: The pressure sensor is a device for pressure measurement of gases or liquid. Pressure is
an expression of the force required to stop a fluid from expanding.

2. Which sensor measures the pressure relative to perfect vacuum?

a) Absolute pressure sensor

b) Gauge pressure sensor

c) Vacuum pressure sensor


d) Differential pressure sensor

View Answer

Answer: a

Explanation: Pressure sensor can be classified in terms of pressure ranges they measure,
temperature ranges of operation, and most importantly the type of pressure they measure. Absolute
pressure sensor is a sensor that measures the pressure relative to perfect vacuum.

3. Which sensor measure the pressure relative to atmospheric pressure?

a) Absolute pressure sensor

b) Gauge pressure sensor

c) Vacuum pressure sensor

d) Differential pressure sensor

View Answer

Answer: b

Explanation: This sensor measures the pressure relative to atmospheric pressure. A tire pressure
gauge is an example of gauge pressure measurement; when it indicates zero, then the pressure it is
measuring is the same as the ambient pressure.

4. Barometer is which type of sensor________

a) Pressure sensor

b) Touch sensor

c) Temperature sensor

d) Humidity sensor

View Answer

Answer: a

Explanation: Barometers and pressure gauges are the most popular sensors used for IOT ecosystem.
Barometers are an absolute help in weather forecasting as in accurately measures the ambient air.

5. Touch screen devices use which sensor?

a) Touch sensor

b) Temperature sensor

c) Humidity sensor

d) Pressure sensor
View Answer

Answer: d

Explanation: Pressure sensors are ultimate solution for IOT as they can be used in various areas such
as touch screen devices.

6. What is the stability of pressure sensor?

a) +/-0.75% FS

b) +/-0.5% FS

c) +/- 0.35% FS

d) +/-0.125% FS

View Answer

Answer: c

Explanation: One of the main feature of pressure sensor is its stability which is +/-0.35% FS(Full
Scale).

7. What is the operating voltage of pressure sensor?

a) 3.5v

b) 1.5v

c) 5v

d) 3v

View Answer

Answer: d

Explanation: The pressure sensor has and absolute pressure of 1.2 bar to 10 bar. The typical
operating system is 3v. With a supply voltage of 5v they offer sensitivities of between 15 mV/bar and
80 mV/bar, depending on type.

8. The feature of c39 is its low insertion height.

a) True

b) False

View Answer

Answer: a
Explanation: The c39 is especially suitable for IOT and consumer applications. One feature of c39 is
its low insertion height of just 0.24mm, which makes the low-profile MEMS pressure sensor die ideal
for applications in smartphones and wearables.

9. What is the absolute pressure of c39?

a) 2.0 bar

b) 1.5 bar

c) 1.2 bar

d) 1.35 bar

View Answer

Answer: c

Explanation: The c39 is designed for an absolute pressure of 1.2 bar and, like the c33 series, offers
long-term stability of +/-0.35% FS.

10. Which pressure standard is used for gauge?

a) Dead-weight tester

b) Manometer

c) Pressure switches

d) Stain gauge pressure sensor

View Answer

Answer: b

Explanation: A mercury manometer is a simple pressure standard and may be used for gauge,
differential, and absolute measurements with a suitable reference.

11. Pressure measured relative to perfect vacuum is termed as ______

a) Absolute Pressure Measurement

b) Differential Pressure Measurement

c) Gauge Pressure Measurement

d) Both Absolute and Differential

View Answer

Answer: a
Explanation: Pressure measured relative to perfect vacuum is termed as Absolute Pressure
Measurement. Perfect vacuum is a condition where there is no matter present in the atmosphere
and hence nil air pressure exits in that region.

12. In which pressure measurement, pressure of two distinct positions are compared?

a) Absolute Pressure Measurement

b) Differential Pressure Measurement

c) Gauge Pressure Measurement

d) Both Absolute and Differential

View Answer

Answer: b

Explanation: In differential pressure measurement, pressure of two distinct positions are compared.
For example, pressure difference calculated by measuring it at different floors of a tall building will
give us differential pressure.

13. ______ can be defined as a subtype of differential pressure measurement.

a) Absolute Pressure Measurement

b) Differential Pressure Measurement

c) Gauge Pressure Measurement

d) Both Absolute and Differential

View Answer

Answer: c

Explanation: Gauge Pressure Measurement is defined as subtype of differential pressure


measurement where we compare pressure pressure at any point to the current atmospheric
pressure. Gauge Pressure measurement is used in applications like tire pressure of blood pressure
measurement.

14. The computer devices and smart phones that have _______ with pressure sensor.

a) Automotive Industry

b) Industrial

c) Aviation

d) Touch screen

View Answer
Answer: d

Explanation: The computer devices and smart phones that have touch screen display with pressure
sensor. Whenever slight pressure is applied on touch screen through a finger, the sensor determines
where it has been applied.

15. In which place the pressure sensor is needed for monitoring gases and their partial pressures.

a) Touch screen

b) Automotive Industry

c) Industrial

d) Aviation

View Answer

Answer: c

Explanation: Pressure sensors are used to monitor gases and their partial pressures in industrial
units so that the large chemical reactions take place in precisely controlled environmental
conditions.

1. Which axis accelerometer is mostly used in IOT?

a) 2- axis

b) 3- axis

c) 1- axis

d) Combination of all

View Answer

Answer: b

Explanation: It uses 3-axis accelerometer. It detect orientation, shake, tap, double tap, fall, tilt,
motion, positioning, shock or vibration.

2. Accelerometer is the measurement of ________

a) Velocity/time

b) Energy/time

c) Height/time

d) Angle/time

View Answer

Answer: a
Explanation: Accelerometer is the measurement of the change in velocity or speed divided by time.
For example, a car accelerating from a standstill to 60mph in 60 seconds is determined to have an
acceleration of 10mph per second(60/6).

3. What is the use of accelerometer in laptops?

a) To rotate the screen

b) To protect hard drives from damage

c) To get the angle on monitor

d) To get the linear acceleration

View Answer

Answer: b

Explanation: Accelerometer in laptops protect hard drives from damage. If the laptop were to
suddenly drop while in use, the accelerometer would detect the sudden free fall and immediately
turn off the hard drive to avoid hitting the reading heads into the hard drive platter.

4. Are accelerometer used in cars?

a) True

b) False

View Answer

Answer: a

Explanation: Accelerometers are likewise used in cars as the industry method way of detecting car
crashes and deploying airbags almost instantaneously.

5. How many and what are the parts that are present in the accelerometer sensor?

a) 1, capacitor sensor

b) 3, piezoelectric effect, Analog display, digital display

c) 2, piezoelectric effect and capacitor sensor

d) 2, Capacitor sensor, digital Display

View Answer

Answer: c

Explanation: The accelerometer consists of many different parts and work in many ways, two of
which are piezoelectric effect and the capacitor sensor. The piezoelectric effect is the most common
form of accelerometer and uses microscopic crystal structures that become stressed due to
accelerative forces.
The capacitance accelerometer senses changes in capacitance between micro structures located
next to the device.

6. The BGM160 gyroscope sensor is fitted with ________ interfaces.

a) Only SPI

b) Only I2C

c) SPI and UART

d) SPI and I2C

View Answer

Answer: d

Explanation: The BGM160 is fitted with digital bi-directional SPI and I2C interfaces for optimum
system integration, which require 3.3v operation.

7. Gyroscope is used for_________

a) Anti-theft

b) Capacitive proximity sensing

c) Gaming

d) Angle detection

View Answer

Answer: c

Explanation: Gyroscope is mainly used in 3D mouse, games and athlete training. Gyroscope is also
used in navigation, Remote control, notebooks and ultrabooks.

8. Gyroscope is used to measure_________

a) Linear Acceleration

b) Angular velocity

c) Angular velocity and linear acceleration

d) Linear velocity

View Answer

Answer: b

Explanation: Gyroscope is used to measure angular velocity. Gyroscopes aimed to create smaller and
more sensitive devices.
9. What is the rate noise density of gyroscope?

a) 0.011 dps/√Hz

b) 0.0011 dps/√Hz

c) 1.11 dps/√Hz

d) 11.1 dps/√Hz

View Answer

Answer: a

Explanation: Gyroscopes offer superior stability over time and temperature, with a rate noise density
up to 0.011 dps/√Hz. This guarantees the level of accuracy required by the most of the advanced
motion-based applications.

10. How many sensing structures are there in gyroscope sensor?

a) Two structures

b) Three structures

c) Depending on application

d) Single structure

View Answer

Answer: d

Explanation: The 3-axis gyroscopes have a single sensing structure for motion measurement along all
three orthogonal axis, while other solutions on the market relay on two or three independent
structures.

11. Theory behind working of accelerometer can be understood from ________

a) Rotary

b) Liner

c) Newtonian mechanism

d) Reciprocating

View Answer

Answer: c

Explanation: Theory behind working of accelerometer can be understood from mechanical model of
accelerometer, using Newtonian mechanics. The sensing element essentially is a proof mass.
12. ________ is included in a system to provide desirable damping effect.

a) Speedometer

b) Seismic

c) Damper

d) Dashpot

View Answer

Answer: d

Explanation: A dashpot is also included in a system to provide desirable damping effect. The dashpot
is attached between the mass and the casing.

13. Displacement and acceleration are related by fundamental scaling law.

a) True

b) False

View Answer

Answer: a

Explanation: Displacement and acceleration are related by fundamental scaling law. A higher
resonant frequency implies less displacement or low sensitivity.

14. ________ sensor is used for tracking rotation or twist.

a) Gyroscope

b) Temperature

c) Pressure

d) Proximity

View Answer

Answer: a

Explanation: Accelerometers in mobile phones are used to detect the orientation of the phone. The
gyroscope adds an additional dimension to the information supplied by the accelerometer by
tracking rotation or twist.

15. Ring laser type gyroscope operates based on _________ principle.

a) Damper

b) Sagnac
c) Seismic

d) Dashpot

View Answer

Answer: b

Explanation: Ring laser type gyroscope operates based on sagnac effect. Sagnac involves splitting a
beam of light in two and sending them through different opposite paths and then creating
interference between the two beams.

1. What is ESP8266?

a) WIFI module

b) Sensor

c) Board

d) USB cable

View Answer

View AnswerAnswer: a

Explanation: The ESP8266 WIFI module is used to make an IOT device that plots temperature data
on the web.

2. which sensor is LM35?

a) Pressure sensor

b) Humidity sensor

c) Temperature sensor

d) Touch sensor

View Answer

View AnswerAnswer: c

Explanation: LM35 is a temperature sensor which has 3 legs(Vcc, Vout, GND).

3. How many pins does temperature sensor have?

a) 5 legs

b) 2 legs

c) 4 legs

d) 3 legs
View Answer

View AnswerAnswer: d

Explanation: The temperature sensor LM35 have 3 legs, the first leg is Vcc, you can connect this to
the 3.3V. The middle leg is Vout, where the temperature is read from.

4. Monnit temperature sensor is used for what?

a) Accurate results

b) To measure the temperature at high degree

c) Temperature sensor

d) Pressure sensor

View Answer

View AnswerAnswer: a

Explanation: Monnit wireless temperature sensor use a thermistor to accurately measure


temperature. These sensors are perfect for monitoring ambient temperatures around the sensors
physical location.

5. Which of the following is the Wireless battery-free sensor?

a) LM35

b) RFM3200

c) ESP8266

d) DHT11

View Answer

View AnswerAnswer: b

Explanation: RFM3200 is a wireless battery-free temperature sensor. This flexible sensor is designed
to monitor the environment and material temperature in a wide range of settings.

6. Which sensor is used for monitor electric distribution and switching equipment temperature?

a) LM35

b) ESP8266

c) DHT11

d) RFM3200

View Answer
View AnswerAnswer: d

Explanation: It is a battery-free sensor. This lug mounted sensor is designed to monitor electric
distribution and switching equipment temperatures. Typical applications include building power
distributions, data centers, etc.

7. Electric motor protection has which sensor?

a) Pressure sensor

b) Touch sensor

c) Temperature sensor

d) Humidity sensor

View Answer

View AnswerAnswer: c

Explanation: Electric motor protection has a temperature sensor in it to verify the temperature
which is exceeding its limits or not.

8. What is DS18B20?

a) Pressure sensor

b) Touch sensor

c) Humidity sensor

d) Temperature sensor

View Answer

View AnswerAnswer: d

Explanation: It measures temperature and sends an email if the temperature goes under a
threshold.

9. What is STSC1?

a) Pressure sensor

b) Temperature sensor

c) Touch sensor

d) Humidity sensor

View Answer

View AnswerAnswer: b
Explanation: The STSC1 focuses on the application that requires very precise temperature
measurement. It is suitable for consumer electronics, Internet of Things and smart home
applications, as well as for data loggers and thermostats.

10. Line of sight of wireless sensor tag is ________

a) 750ft

b) 700ft

c) 500ft

d) 550ft

View Answer

View AnswerAnswer: b

Explanation: Line of sight range up to 700 ft, requires Ethernet hub. Temperature logging and
notification with 0.02oC resolution is temperature sensor.

11. A ________ is thermally sensitive resistor that exhibits a large change in resistance.

a) Thermistor

b) Resistance Thermometer

c) Thermo couple

d) Semiconductor based sensor

View Answer

View AnswerAnswer: a

Explanation: A thermistor is a thermally sensitive resistor that exhibits a large, predictable, and
precise change in resistance correlated to variations in temperature.

12. ________ measures temperature by correlating the resistance of the RTD with temperature.

a) Thermistor

b) Resistance Thermometer

c) Thermo couple

d) Semiconductor based sensor

View Answer

View AnswerAnswer: b
Explanation: An RTD, measures temperature by correlating the resistance of the RTD with
temperature. An RTD consists of a film or, for greater accuracy, a wire wrapped around a ceramic or
glass core.

13. ________ consists of two different metals connected at two points.

a) Thermistor

b) Resistance Thermometer

c) Thermocouple

d) Semiconductor based sensor

View Answer

View AnswerAnswer: c

Explanation: Thermocouple consists of two different metals connected at two points. The varying
voltage between these two points reflects proportional changes in temperature.

14. Which type of temperature sensor is placed in Integrated Circuits?

a) Thermistor

b) Resistance Thermometer

c) Thermocouple

d) Semiconductor based sensor

View Answer

View AnswerAnswer: d

Explanation: A semiconductor based temperature sensor is placed on Integrated Circuits. They are
linear but have the lowest accuracy.

15. Which sensor is linear and low accuracy?

a) Thermistor

b) Resistance Thermometer

c) Thermocouple

d) Semiconductor based sensor

View Answer

View AnswerAnswer: d

Explanation: A semiconductor based temperature sensor is placed on Integrated Circuits. They are
linear but have the lowest accuracy.
1. DHT11 is __________ sensor.

a) Proximity sensor

b) Humidity sensor

c) Touch sensor

d) Pressure sensor

View Answer

Answer: b

Explanation: We can read data from any sensor and analyse it graphically from anywhere in the
world. Here, we can read temperature and humidity data from DHT11 sensor and upload it to a
Think speak cloud using Arduino Uno.

2. What is ESP8266?

a) Sensor

b) WIFI module

c) Board

d) USB cable

View Answer

Answer: b

Explanation: ESP8266 is a WIFI module, which is serial. And also it is small, cheap, and easy to use.

3. What is humidity sensor?

a) Hygrometer

b) Gyroscope

c) Sesimoscope

d) Sundial

View Answer

Answer: a

Explanation: A hygrometer is an instrument used for measuring the water vapor in the atmosphere.
Humidity measurement instruments usually rely on measurements of some quantity such as
temperature, pressure, mass or a mechanical or electrical change.
4. Units for Humidity sensor____________

a) Dew/fost point or Relative Humidity

b) Relative Humidity or Parts Per Million

c) Dew/fost point or Parts Per Million

d) Dew/fost point or Parts Per Million or Relative Humidity

View Answer

Answer: d

Explanation: Most commonly units for humidity measurement are Relative Humidity(RH), DEW/Fost
point (D/F PT) and Parts Per Million(PPM). RH is a function of temperature. DEW/Fost point is a
function of the pressure of the as but is independent of temperature and is therefore defined as
absolute humidity measurement of temperature. PPM is also an absolute measurement.

5. Dew point and Fost point are mainly used in which conditions?

a) Water vapor

b) Pressure of gas

c) Dryness of gas

d) Moisture in gas

View Answer

Answer: c

Explanation: Dew point and Fost point are often used when the dryness of the gas is important. Dew
point is also used as an indicator of water vapor in high temperature processes, such as industrial
drying.

6. Units for Absolute Humidity is ________

a) grams/m3

b) % by volume

c) PPMV

d) %

View Answer

Answer: a

Explanation: Absolute Humidity is defined as ratio of mass (vapor) to volume and has units of
grams/m3.
7. Units for Due point is _______

a) gram/m3

b) % by volume

c) PPMV

d) oC

View Answer

Answer: d

Explanation: Dew point is defined as temperature at which the water vapor in a gas condenses to
liquid water and has a units of oC.

8. Humidity sensors are divided into how many types and depending on what?

a) 2 types depending on output

b) 2 types depending on measurement units

c) 3 types depending on measurement units

d) 3 types depending on output

View Answer

Answer: b

Explanation: According to the measurement units, humidity sensors are divided into two types:
Relative Humidity(RH), and Absolute Humidity(moisture) sensors. Most humidity sensors are relative
humidity sensors and use different sensing principles.

9. Electronic type hygrometers are divided into how many types?

a) 5 types

b) 3 types

c) 4 types

d) 2 types

View Answer

Answer: d

Explanation: Electronic type hygrometers or humidity sensors can broadly divided into two
categories: one employs capacitive sensing principle, while other use resistive effects.

10. Relative humidity is a function of ________


a) Ambient temperature

b) Water vapor pressure

c) Ambient temperature and Water vapor pressure

d) Dryness

View Answer

Answer: c

Explanation: Relative humidity is a function of both ambient temperature and water vapor pressure.
Therefore there is a relationship between relative humidity, the amount of moisture present in the
sensor, and sensor capacitance. This relation governs the operation of a capacitive humidity
instrument.

11. Which sensors measure the moisture level using humidity?

a) Capacitive Sensor

b) Resistive Sensor

c) Thermal Conductivity

d) Both resistive and conductive

View Answer

Answer: a

Explanation: These sensors measure moisture levels using a humidity dependent condenser; they
are suitable for RH range and condensation tolerance. These sensors are commonly used in
industrial and commercial environments.

12. ________ sensors measure the electrical change in devices such as conductive polymers.

a) Capacitive Sensor

b) Resistive Sensor

c) Thermal Conductivity

d) Both resistive and conductive

View Answer

Answer: d

Explanation: These sensors can measure the electrical change in devices such as conductive
polymers and treated substrates. They are suitable for use in residential and commercial
environments.
13. ________ sensors are suitable for environments that have high temperatures.

a) Capacitive Sensor

b) Resistive Sensor

c) Thermal Conductivity

d) Both resistive and conductive

View Answer

Answer: c

Explanation: These sensors are suitable for use in environments that have high temperatures. They
measure humidity by calibrating the difference between the thermal conductivity of dry air and that
of moist air.

14. Are capacitive sensors linear?

a) True

b) False

View Answer

Answer: a

Explanation: Capacitive type sensors are linear and hence can measure RH from 0% to 100%, but
require complex circuit and also need regular calibration.

15. Capacitive RH sensors dominate __________ measurements.

a) Atmospheric

b) Process

c) Both atmospheric and process

d) Neither atmospheric nor process

View Answer

Answer: c

Explanation: Capacitive RH sensors dominate atmospheric and process measurements and are the
only types of full range RH measuring devices capable of operating accurately down to 0% RH.

1. Which sensor can detect nearby objects?

a) Proximity sensor

b) Humidity sensor
c) Touch sensor

d) Pressure sensor

View Answer

Answer: a

Explanation: A proximity sensor is a sensor able to detect the presence of nearby objects without
any physical contact. A proximity sensor often emits an electromagnetic field or a beam of
electromagnetic radiation, and looks for a change in the return signal.

2. The monitoring of machines, gears and objects are achieved by which sensor?

a) Humidity sensor

b) Proximity sensor

c) Touch sensor

d) Pressure sensor

View Answer

Answer: b

Explanation: The monitoring of machines, gears and objects are achieved precisely by the
IOT(INTERNET OF THINGS) wireless proximity sensors. They use in industries ranging from robotics
to machine tools, from measuring instruments to assembly lines, from food sector to chemical
industry, etc.

3. Which proximity sensor detects metal objects?

a) Capacitive Proximity Sensor

b) Magnetic Proximity Sensor

c) Ultrasonic Proximity Sensor

d) Inductive Proximity Sensor

View Answer

Answer: d

Explanation: Different proximity sensor targets demand different sensors. The different types of
proximity sensors are: Inductive, Capacitive, Ultrasonic, Photoelectric, Magnetic, etc.

4. Which proximity sensor indicates level?

a) Inductive Proximity Sensor

b) Capacitive Proximity Sensor


c) Magnetic Proximity Sensor

d) Ultrasonic Proximity Sensor

View Answer

Answer: a

Explanation: Capacitive Proximity Sensor indicates level and the fill amount present in containers,
behind covering. They are used to track all objects including non-metallic ones.

5. Which proximity sensors are used in automotive?

a) Inductive Proximity Sensor

b) Capacitive Proximity Sensor

c) Magnetic Proximity Sensor

d) Ultrasonic Proximity Sensor

View Answer

Answer: d

Explanation: They are widely used in automotive such as parking sensors. Ultrasonic Proximity
Sensors are used in automotive.

6. Which proximity sensor detects positioning of an object?

a) Inductive Proximity Sensor

b) Capacitive Proximity Sensor

c) Optical Proximity Sensor

d) Magnetic Proximity Sensor

View Answer

Answer: c

Explanation: They recognize, for non-contact and precisely, the positioning of the object.

7. Are proximity sensors used in retail settings?

a) True

b) False

View Answer

Answer: a
Explanation: A retailer can use a customer’s proximity to a product to send deals and coupons
directly to their smart phone.

8. VCNL4100CT allows the proximity detection up to________

a) 2 meter

b) 1 meters

c) 0.5 meters

d) 1.5 meters

View Answer

Answer: b

Explanation: VCNL4100CT expand the range of applications by introducing a high-power IR emitter


that allows proximity detection up to one meter.

9. Which protocol is used by proximity sensor?

a) I2C

b) SPI

c) UART/USART

d) CAN

View Answer

Answer: a

Explanation: Microcontroller communication is via standard I2C, where the host can set
measurement parameters and request results. If desired, programmable threshold allow the
VCNL4100 to interrupt the host once threshold values are crossed, thereby minimizing device
polling.

10. Does proximity sensor have a temperature sensor in it?

a) True

b) False

View Answer

Answer: a

Explanation: A buit-in temperature sensor is used by the signal processing circuitry to provide stable
outputs across the temperature range -40 oC to +85oC.
11. Which device generates output signal when metal objects are either inside or entering into
sensing area.

a) Capacitive Proximity

b) Magnetic Proximity

c) Inductive proximity

d) Parallel Proximity

View Answer

Answer: a

Explanation: Device which generates output signal electrical signal when metal objects are either
inside or entering into its sensing area from an direction.

12. ________ detects metals but along with it can also detect resins, liquids.

a) Inductive proximity

b) Capacitive Proximity

c) Magnetic Proximity

d) Parallel Proximity

View Answer

Answer: b

Explanation: Capacitive Proximity can also detect metals but along with it can also detect resins,
liquids, powders, etc. This sensor working can vary accordingly covering material, cable longness,
noise sensitivity.

13. _________ sensors have no electrical noise effect and it can work DC.

a) Inductive proximity

b) Capacitive Proximity

c) Magnetic Proximity

d) Parallel Proximity

View Answer

Answer: c

Explanation: Magnetic proximity sensors have no electrical noise effect and it can work on DC, AC,
AC/DC.

14. What is the sensing range for magnetic proximity sensors?


a) 120mm

b) 90mm

c) 150mm

d) 100mm

View Answer

Answer: a

Explanation: Magnetic proximity sensors have no electrical noise effect and it can work on DC, AC,
AC/DC. These types of sensors have highest sensing range upto 120mm.

15. What is the sensing range for capacitive proximity sensors?

a) 150mm

b) 25mm

c) 120mm

d) 100mm

View Answer

Answer: c

Explanation: Capacitive Proximity can also detect metals but along with it can also detect resins,
liquids, powders, etc. This sensor working can vary accordingly covering material, cable longness,
noise sensitivity.Its maximum range of sensing is 25mm.

1. Other name for tactile sensor is______________

a) Pressure sensor

b) Humidity sensor

c) Touch sensor

d) Temperature sensor

View Answer

Answer: c

Explanation: Touch sensors are also called as tactile sensor and are sensitive to touch, force or
pressure. These are one of the simplest and useful sensors.

2. How many types of touch sensors are present?

a) 2 types
b) 3 types

c) 4 types

d) 5 types

View Answer

Answer: a

Explanation: There are two types of sensors: capacitive sensor

Resistive sensor.

3. Which sensor is used in mobile phones?

a) Capacitive touch sensor

b) Temperature sensor

c) Humidity sensor

d) Weight sensor

View Answer

Answer: a

Explanation: Capacitive touch sensors are widely used in most of the portable devices like mobile
phones and MP3 players. The reason for this development is durability, robustness, attractive
product design and cost.

4. Capacitive touch sensor has moving parts.

a) True

b) False

View Answer

Answer: b

Explanation: Touch sensor, unlike mechanical devices, do not contain moving parts. Hence, they are
more durable than mechanical input devices.

5. How many types the capacitive touch sensors are classified?

a) 1 type

b) 2 types

c) 3 types

d) 4 types
View Answer

Answer: b

Explanation: There are two types of capacitive touch sensors

1. surface capacitive sensing

2. Projected capacitive sensing

In surface capacitive sensing, an insulator is applied with a conductive coating on one side of its
surface.

In projected capacitive sensing, the whole surface is not changed, but an X-Y grid conductive
material is placed between two insulating materials.

6. Resistive touch sensor is used for longer time than capacitive touch sensor.

a) True

b) False

View Answer

Answer: a

Explanation: Resistive touch sensors are used for a longer time than capacitive solutions as they are
simple control circuits. A resistive touch sensor does not depend on the electrical property of
capacitance.

7. How many types of sensors are there in resistive touch sensor?

a) 2 types

b) 3 types

c) 4 types

d) 5 types

View Answer

Answer: b

Explanation: There are three types of resistive touch sensors: 4-wire, 5-wire, 8-wire.

4-wire resistive touch sensor is most cost effective. 5-wire resistive touch sensors are most durable.
8-wire resistive touch sensor, each edge of the sensor provides a sensing line.

8. Which touchscreen is coated with a transparent material?

a) Capacitive touchscreen

b) SAW
c) Infrared

d) Resistive touchscreen

View Answer

Answer: d

Explanation: The inside surface is coated with a transparent material that makes electrical contact
when pressure is applied. Whilst resistive screens are durable and easy to integrate, they can only
offer 75% clarity.

9. Which touchscreen offers 75% clarity?

a) Resistive touchscreen

b) Capacitive touchscreen

c) SAW

d) Infrared

View Answer

Answer: a

Explanation: The inside surface is coated with a transparent material that makes electrical contact
when pressure is applied. Whilst resistive screens are durable and easy to integrate, they can only
offer 75% clarity.

10. Which touchscreen is used for industrial purpose?

a) Resistive touchscreen

b) Capacitive touchscreen

c) SAW

d) Infrared

View Answer

Answer: b

Explanation: Commonly utilized for industrial purpose, capacitive touch screen consists of a glass
overlay, coated with a conductive material such as Indium Tin Oxide.

11. SAW expanded as?

a) Surface Arrangement Wave

b) Screen Acoustic Wave

c) Screen Arrangement Wave


d) Surface Acoustic Wave

View Answer

Answer: d

Explanation: SAW touch screen technology is based upon two transducers and a reflector placed on
the glass surface. The wave is dispersed across the screen by bouncing off the reflector arrangement
and received by the transducers.

12. Which touchscreen technology does not incorporate an overlay.

a) Resistive touchscreen

b) Infrared

c) Capacitive touchscreen

d) SAW

View Answer

Answer: b

Explanation: Infrared touch screen technology does not incorporate an overlay. Instead, a frame
surrounding the display consists of LEDs on one side and phototransistor detector on the other.

13. Which touch screen technology is popular for its versatility?

a) Resistive touchscreen

b) Capacitive touchscreen

c) SAW

d) Optical Imaging

View Answer

Answer: d

Explanation: This touch screen technology is popular for its versatility and scalability. Optical imaging
relies on infrared lights.

14. Which touchscreen is made up a glass overlay.

a) Resistive touchscreen

b) Capacitive touchscreen

c) APR

d) SAW
View Answer

Answer: c

Explanation: An APR touch screen is made up a glass overlay and four transducers attached to the
back exterior. When the screen is touched, the friction creates acoustic waves.

15. Are APR touch screens touch resistances?

a) True

b) False

View Answer

Answer: a

Explanation: An APR touch screen is made up a glass overlay and four transducers attached to the
back exterior. When the screen is touched, the friction creates acoustic waves. APR touch screens
are water resistance, durable and scalable.

1. Quantization is the method used for conversion?

a) True

b) False

View Answer

Answer: a

Explanation: The conversion involves quantization of the input, is it necessarily introduces a small
amount of error. Furthermore, instead of continuously performing the conversion, an ADC does the
conversion periodically, sampling the input.

2. ENOB stands for_________

a) Effective no of bits

b) Effective no of bytes

c) Efficient no of bits

d) Efficient no of bytes

View Answer

Answer: a

Explanation: The dynamic range of an ADC is often summarized in terms ofits effective no of
bits(ENOB), the number of bits of each measure it returns that are on average not noise. An ideal
ADC has an ENOB equal to its resolution.
3. Perfect resolution is possible when?

a) sampling rate greater than thrice the bandwidth of the signal

b) sampling rate greater than twice the bandwidth of the signal

c) sampling rate less than twice the bandwidth of the signal

d) sampling rate less than thrice the bandwidth of the signal

View Answer

Answer: b

Explanation: If an ADC operates at the sampling rate greater than twice the bandwidth of the signal,
then perfect reconstruction is possible given an ideal ADC and neglecting quantization error.

4. Resolution is expressed in __________

a) Bytes

b) Bits

c) Word

d) Nibble

View Answer

Answer: b

Explanation: The values are usually stored electronically in binary form, so the resolution is usually
expressed in bits.

5. The discrete levels available are_________

a) Sides

b) Edges

c) Levels

d) Bytes

View Answer

Answer: c

Explanation: The number of discrete values available, or levels, is assumed to be power of two.

6. Resolution is expressed in terms of_________

a) Milli volts
b) Ampere

c) Milli ampere

d) Volts

View Answer

Answer: d

Explanation: Resolution can also be defined electrically, and expressed in volts. The minimum
change in voltage required to guarantee a change in the output code level is called least significant
bit.

7. The rate of new values is called the sampling rate or sampling frequency.

a) True

b) False

View Answer

Answer: a

Explanation: The analog signal is continuous I time and it is necessary to convert this to a flow of
digital values. It is therefore required to define the rate at which new digital values are sampled from
the analog signal. The rate of new values is called the sampling rate or sampling frequency of the
converter.

8. How many common ways are there for implementing an ADC?

a) 2 ways

b) 5 ways

c) 8 ways

d) 10 ways

View Answer

Answer: d

Explanation: The most common ways for implementing ADC are direct conversion, successive
approximation, ramp compare, Wilkinson, integrating, delta encoded, pipelined, sigma delta, time
interleaved, intermediate FM stage, other types.

9. Other name for data conversion is ________

a) Flash ADC

b) Wilkinson
c) Sigma delta

d) Ramp compare

View Answer

Answer: a

Explanation: A direct conversion ADC or flash ADC has a bank of comparators sampling the input
signal in parallel, each firing for their decoded voltage range.

10. Which ADC narrows the range?

a) Flash ADC

b) Wilkinson

c) Sigma delta

d) Successive approximation

View Answer

Answer: d

Explanation: A successive approximation ADC uses a comparator to successively narrow a range that
contains the input voltage.

11. Clock jitters is caused by __________

a) Sampling rate

b) Spectrum

c) Phase noise

d) Sampling frequency

View Answer

Answer: c

Explanation: Clock jitter is caused by phase noise. Phase noise is the frequency domain
representation of rapid, short term, random fluctuations in the phase of a waveform, caused by time
domain instabilities.

12. The analog signal is __________ in __________

a) Continuous, frequency

b) Continuous, time

c) Discrete, frequency
d) Discrete, time

View Answer

Answer: b

Explanation: The analog signal is continuous in time and it is necessary to convert this to a flow of
digital values.

13. Sample and hold circuit is a _______ circuit.

a) Analog device

b) Digital device

c) Both analog and digital

d) Neither analog nor digital

View Answer

Answer: a

Explanation: An input circuit called a sample and hold performs task, most cases by using a capacitor
to store the analog voltage at the input, and using an electronic switch or gate to disconnect the
capacitor from the input.

14. Nyquist rate is defined as ___________

a) twice the lowest frequency

b) trice the highest frequency

c) twice the highest frequency

d) trice the lowest frequency

View Answer

Answer: c

Explanation: Nyqist rate, defined as twice the highest frequency of interest, then all frequencies in
the signal can be reconstructed.

15. To avoid aliasing we use a __________ filter.

a) Digital filter

b) Aliasing filter

c) Analog filter

d) Anti-aliasing filter
View Answer

Answer: d

Explanation: To avoid aliasing, the input to an ADC must be low pass filtered to remove frequencies
above half the sampling rate. This filter is called an anti-aliasing filter.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “UART Protocol”.

1. GPS module like SIM900/800 uses which protocol?

a) UART protocol

b) USART protocol

c) SPI protocol

d) I2C protocol

View Answer

Answer: a

Explanation: GSM/GPS modules like SIM900/800 uses UART communication for accepting AT
commands that are used to control them and gather the replies.

2. Finger print sensor uses which interface?

a) USART protocol

b) UART protocol

c) SPI protocol

d) I2C protocol

View Answer

Answer: b

Explanation: Projects that use RFID modules can be built with modules that have a UART interface.
This even applies to some finger print sensors.

3. RS232 is used for long range wired communication.

a) True

b) False

View Answer

Answer: a
Explanation: For long range communications we can convert UART protocol using an external IC to
RS232 or RS485, the latter of which can be used for wired communication @100 kbits/sec up to
1.2km.

4. UART is similar to _________

a) SPI protocol

b) I2C protocol

c) HTTP protocol

d) MQTT protocol

View Answer

Answer: b

Explanation: UART(Universal Asynchronous Receiver/Transmitter) is a small, efficient


communication device, similar to I2C.

5. What does UART contain?

a) Parallel register

b) Shift register

c) Clock

d) Parallel shift register

View Answer

Answer: b

Explanation: UART contains a shift register, which is the fundamental method of conversion between
serial and parallel forms.

6. Communication in UART is ___________

a) Only simple

b) Only duplex

c) Only full duplex

d) Simplex, half duplex, full duplex

View Answer

Answer: d
Explanation: Communication may be simplex(in one direction only no provision for the receiving
device to send data back to the transmission device), full duplex(both devices send and receive data
at the same time), half duplex(devices takes turns transmitting and receiving).

7. Start bit of UART is logic high.

a) True

b) False

View Answer

Answer: b

Explanation: The start bit is logical low. The start bit signals the receiver that a new character is
coming.

8. Which error occurs when the receiver can’t process the character?

a) Overrun error

b) Underrun error

c) Framing error

d) Break condition

View Answer

Answer: a

Explanation: An over run error occur when the receiver cannot process the character that just came
in before the next one arrives. If the CPU or DMA controller does not service the UART quickly
enough and the buffer become full, an over run will occur, and incoming will be lost.

9. What is WD1402A?

a) SPI

b) USART

c) SPIUART

d) I2C

View Answer

Answer: c

Explanation: WD1402A is the first single chip UART on general sale. Introduced about 1971.
Compatible chip included the Fairchild TR1402A and the general instruments AY-5-1013.
10. What is the speed of the 8250 UART?

a) 4800bits/sec

b) 1200bits/sec

c) 12000bit/sec

d) 9600bits/sec

View Answer

Answer: d

Explanation: The 8250 UART has one character buffer for the receiver and the transmitter each,
which meant that communications software performed poorly at speed above 9600bits/sec,
especially it operating under a multitasking system or if handling interrupts from disk controllers.

11. Which error occurs when UART transmitter has completed sending a character and the transmit
buffer is empty?

a) Overrun error

b) Underrun error

c) Framing error

d) Break condition

View Answer

Answer: b

Explanation: An Under run error occurs when UART transmitter has completed sending a character
and the transmit buffer is empty. In asynchronous mode this is treated as an indication that no data
remains to be transmitted.

12. Which error occurs when the designated start and stop bits are not found?

a) Overrun error

b) Underrun error

c) Framing error

d) Break condition

View Answer

Answer: c

Explanation: A framing error occurs when the designated start and stop bits are not found. If the
data line is not in the expected state when the stop bit is expected, a framing error will occur.
13. Which error occurs when the parity of the number of 1 bit disagrees with that specified by the
parity bit?

a) Overrun error

b) Underrun error

c) Framing error

d) Parity error

View Answer

Answer: d

Explanation: A parity error occurs when the parity of the number of 1 bit disagrees with that
specified by the parity bit. Using parity is optional, so this error will only occur if parity checking has
been enabled.

14. A __________ occurs when the receiver input is at the space level.

a) Overrun error

b) Underrun error

c) Framing error

d) Break condition

View Answer

Answer: d

Explanation: A break condition occurs when the receiver input is at the space level for longer than
some duration of time, typically, for more than a character time.

15. The term break derives from ___________ signaling.

a) Current loop

b) Voltage loop

c) Power loop

d) Current and Power loop

View Answer

Answer: a

Explanation: The term break derives from current loop signaling, which was the traditional signaling
used for teletypewriters.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “USART Protocol”.
1. What is the protocol used by USART?

a) RS232

b) RS232C

c) RS485

d) RS422

View Answer

Answer: b

Explanation: RS232C is a long established standard (“c” is the current version) that describes the
physical interface and protocol for relatively low speed serial data communication between
computers and relates devices.

2. USART provides a synchronous mode that is not in UART?

a) True

b) False

View Answer

Answer: a

Explanation: Unlike a UART, USART offers the option of synchronous mode. In the program to
program communication, the synchronous mode requires that each end of an exchange respond in
turn without initiating a new communication.

3. Which of the following needs a clock?

a) Only Asynchronous

b) Only synchronous

c) Both synchronous and Asynchronous

d) Sometimes Synchronous

View Answer

Answer: b

Explanation: Synchronous mode requires both data and clock. Asynchronous mode requires only
data.

4. During receiving operation what does URXD have?

a) Positive edge
b) Negative edge

c) Level edge

d) Either raising or falling edge

View Answer

Answer: a

Explanation: The receive operation is initiated by the receipt of a valid start bit. It consists of a
negative edge at URXD, followed by the taking of majority vote from three samples, where 2 of the
samples must be zero.

5. What is the timing of X?

a) 1/32 to 1/64 times of BRCKL

b) 1/42 to 1/63 times of BRCKL

c) 1/32 to 1/63 times of BRCKL

d) 1/32 to 1/56 times of BRCKL

View Answer

Answer: c

Explanation: The timing of x is 1/32 to 1/63 of BRCLK, but at least BRCLK, depending on the division
on the division rate of the baud rate generation.

6. The secondary implementation uses a fixed second clock divided which is divided by
______________

a) 4

b) 8

c) 32

d) 16

View Answer

Answer: d

Explanation: The standard implementation uses a prescalar from any clock source and a fixed second
clock divider which is usually a divided by 16.

7. The USART module supports ________ multiprocessor communication modes when the
asynchronous mode is used.

a) one
b) two

c) three

d) five

View Answer

Answer: b

Explanation: These formats can be used to transfer information between many microcomputers on
the same serial link. Information is transferred as a block of frames from a particular source to one
or more destinations.

8. How many asynchronous multiprocessor protocols are present?

a) 4

b) 3

c) 2

d) 5

View Answer

Answer: c

Explanation: Both asynchronous multiprocessor protocols, the idel line and the address bit
microprocessor mode allow efficient data transfer between multiple communication systems.

9. Which bit in control register defines the address bit or idle line multiprocessor protocol mode?

a) MM

b) URXWIE

c) URXIE

d) RXWake

View Answer

Answer: a

Explanation: The MM bit in control register defines the address bit or idle line multiprocessor
protocol mode. Both formats use the wake up on transmitting, using the address feature function
(TWWake bit), and on activating the RXWake bit.

10. In idle line multiprocessor mode, a precise idle period can be generated to create efficient
address character identifiers.

a) True
b) False

View Answer

Answer: a

Explanation: In idle line multiprocessor mode, a precise idle period can be generated to create
efficient address character identifiers.

11. In synchronous operation characters must be provided on time if not ______ error occurs.

a) Overrun error

b) Underrun error

c) Framing error

d) Parity error

View Answer

Answer: b

Explanation: USART in synchronous operation characters must be provided on time until a frame is
complete, if the controlling processor does not do so, this is an underrun error, and transmission of
the frame is aborted.

12. HDLC stands for ___________

a) High level Data Link Control

b) High level Data Level Control

c) High level Data Link Coordinator

d) High level Data Link Commutator

View Answer

Answer: a

Explanation: ISO standard high level data link control synchronous link layer protocols, which were
with synchronous voice frequency modems.

13. SDLC stands for ___________

a) Synchronous Data Link Control

b) Synchronous Data Level Control

c) Synchronous Data Level Coordinator

d) Synchronous Data Link Coordinator


View Answer

Answer: a

Explanation: Synchronous Data Link Control synchronous link layer protocols, which were with
synchronous voice frequency modems. These protocols were designed to make the best use of
bandwidth when modems were analog devices.

14. STR stands for___________

a) Synchronous Transmit Rate

b) Synchronous Target Rate

c) Synchronous Target Receive

d) Synchronous Transmit Receive

View Answer

Answer: d

Explanation: Synchronous Transmit Receive, which were with synchronous voice frequency modems.
These protocols were designed to make the best use of bandwidth when modems were analog
devices.

15. BSC stands for ____________

a) Binary Service Communication

b) Bandwidth Synchronous Communication

c) Binary Synchronous Communication

d) Bandwidth Service Communication

View Answer

Answer: c

Explanation: Binary Synchronous Communication, which were with synchronous voice frequency
modems. These protocols were designed to make the best use of bandwidth when modems were
analog devices.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “I2C Protocol”.

1. Two wire interface is also called as _________

a) UART

b) SPI
c) I2C

d) USART

View Answer

Answer: c

Explanation: The i2c protocol also known as the two wire interface is a simple serial communication
protocol that uses just pins of a microcontroller namely SCL and SDA.

2. I2c will address large number of slave devices.

a) True

b) False

View Answer

Answer: a

Explanation: This protocol will address a large number of slave devices that are connected to the
same bus.

3. SDA is having a ____________transition when the clock line SCL is high.

a) high to low

b) low to high

c) low to low

d) high to high

View Answer

Answer: a

Explanation: SDA is having a high to low transition when the clock line SCL is high. Under normal
circumstances this does not happen as you can see in the subsequent clock pulses that the data line
is stable in one state, either high or low when the clock line is high.

4. Inter Integrated Circuit is a _____________

a) Single master, single slave

b) Multi master, single slave

c) Single master, multi slave

d) Multi master, multi slave

View Answer
Answer: d

Explanation: I2C pronounced as I-squared-C, is a multi master, multi salve. It is typically used for
attaching lower-speed peripheral IC’s to processors and micro controllers in short distance, intra
band communication.

5. Typical voltages used are ___________

a) 5v

b) 3.3v

c) 5v or 3.3v

d) 2.5v

View Answer

Answer: c

Explanation: I2C uses only two bidirectional open drain lines, SDA and SCL. Typical voltages used are
5v or 3.3v, although system with other voltages is permitted.

6. What is the speed of I2C bus?

a) 100 kbits/s

b) 10 kbits/s

c) 75 kbits/s

d) 100 kbits/s and 10 kbits/s

View Answer

Answer: d

Explanation: Common I2C bus speeds are the 100 kbits/s standard mode and the 10 kbits/s low
speed mode, but arbitrarily low clock frequencies are also allowed.

7. Master transmits means _________

a) Master node is sending data to a slave

b) Master node is receiving data from slave

c) Slave node is transmitting data to master

d) Slave node is sending data to master

View Answer

Answer: a
Explanation: There may be four potential modes of operation for a given bus device, although most
devices only use a single role and its two modes:

-> Master transmit – Master node is sending data to a slave

-> Maser receive – Master node is receiving data from slave

-> Slave transmit – lave node is transmitting data to master

-> Slave receive – Slave node is sending data to master.

8. Who sends the start bit?

a) Master receive

b) Master transmit

c) Slave transmit

d) Slave receive

View Answer

Answer: b

Explanation: The master is initially in master transmit mode by sending a start bit followed by 7 bit
address of the slave.

9. Which is the I2C messaging example?

a) 24c32 EPROM

b) 24c32 EEPROM

c) 24c33 EEPROM

d) 24c33 EPROM

View Answer

Answer: b

Explanation: The 24c32 EEPROM, which uses two request bytes that are called Address high and
address low. These bytes are used to address bytes within the 32 kbit supported by that EEPROM.

10. Are pull up registers required in I2C?

a) True

b) False

View Answer

Answer: a
Explanation: At physical layer, both SCL and SDA lines are of open drain design, thus pull up resistors
are needed.

11. How many types of addressing structures are there in I2C?

a) 4 types

b) 3 types

c) 2 types

d) 5 types

View Answer

Answer: c

Explanation: There are 2 addressing mode –> 7-bit addressing mode

–> 10-bit addressing mode.

12. All operating modes work under ____________

a) 11 kbit/s

b) 100 kbit/s

c) 15 kbit/s

d) 150 kbit/s

View Answer

Answer: b

Explanation: There are several operating modes for I2C communication. All are compatible in that
the 100 kbit/s standard mode is always used.

13. Which mode is highly compatible and simply tightens?

a) Fast mode

b) High speed mode

c) Ultra fast mode

d) Both fast and high speed mode

View Answer

Answer: a

Explanation: Fast mode is highly compatible and simply tightens several of the timing parameters to
achieve 400 kbit/s speed.
14. What is the speed for fast mode?

a) 100 kbit/s

b) 400 kbit/s

c) 150 kbit/s

d) 200 kbit/s

View Answer

Answer: b

Explanation: Fast mode is highly compatible and simply tightens several of the timing parameters to
achieve 400 kbit/s speed.

15. What is the speed for fast mode?

a) 100 kbit/s

b) 3.4 Mbit/s

c) 150 kbit/s

d) 200 kbit/s

View Answer

Answer: b

Explanation: High speed mode is compatible with normal I2C devices on the same bus, but requires
the master have an active pull-up on the clock line which is enabled during high speed transfers.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “SPI Protocol”.

1. Secure digital card application uses which protocol?

a) UART

b) SPI

c) I2C

d) USART

View Answer

Answer: b

Explanation: The typical applications of SPI protocol are secure digital cards and liquid crystal
displays.
2. SPI device communicates in _________

a) Simplex

b) Half duplex

c) Full duplex

d) Both half and full duplex

View Answer

Answer: c

Explanation: SPI devices communicate in full duplex mode using master-slave architecture with a
simple master.

3. Do SPI have/has a single master?

a) True

b) False

View Answer

Answer: a

Explanation: The master device originates the frame for reading and writing. Multiple slave devices
are supported through selection with individual slave select(SS) line.

4. SPI is described as Asynchronous serial interface.

a) True

b) False

View Answer

Answer: b

Explanation: The SPI is accurately described as a synchronous interface, but it is different from the
synchronous serial interface(SSI) protocol, which is also a employs differential signaling and provides
only a single simplex communication channel.

5. How many logic signals are there in SPI?

a) 5 signals

b) 6 signals

c) 4 signals
d) 7 signals

View Answer

Answer: a

Explanation: The SPI bus specifies five logic signals:

SCLK: Serial clock(output from master)

MOSI: Master Output Input, Master Out Slave In(data output from master)

MISO: Master Input Slave Output, or master In Slave Out( data output from master)

SDIO: Serial Data I/O(bidirectional I/O)

SS: Slave Select(often active low, output from master).

6. SPI uses how many lines?

a) 4 lines

b) 1 line

c) 3 lines

d) 2 lines

View Answer

Answer: d

Explanation: SPI uses separate clock and data lines, along with a select line to choose the device we
wish to talk to.

7. MOSI means __________

a) Line for master to send data to the slave

b) Line for the slave to send data to the master

c) Line for the clock signal

d) Line for the master to select which slave to send data to

View Answer

Answer: a

Explanation: MOSI is the logic signal. The data will be sent to the slave from master.

8. MISO means _________

a) Line for master to send data to the slave


b) Line for the slave to send data to the master

c) Line for the clock signal

d) Line for the master to select which slave to send data to

View Answer

Answer: b

Explanation: MISO is the logic signal. The data will be received by master from the slave.

9. Which of the following is an advantage of SPI?

a) No start and stop bits

b) Use 4 wires

c) Allows for single master

d) Error checking is not present

View Answer

Answer: a

Explanation: As we don’t have start and stop bits, so the data can be streamed continuously without
interruption.

10. Which of the following is the disadvantage in SPI?

a) Full duplex communication

b) Push pull drivers

c) Unidirectional signals

d) More pins

View Answer

Answer: d

Explanation: Requires more pins on IC package than I2C, even in the three wire variant.

11. Which of the following is the type of SPI controller?

a) Queued SPI

b) Microwire

c) Microwire/plus

d) Quad SPI
View Answer

Answer: a

Explanation: A Queued serial peripheral Interface is a type of SPI controller that uses a data queue to
transfer data across the SPI bus.

12. __________ is a predecessor of SPI.

a) Queued SPI

b) Microwire

c) Microwire/plus

d) Quad SPI

View Answer

Answer: b

Explanation: Microwire often spelled uwire, is essential a predecessor od SPI and a trademark of
National Semiconductor. It is subset of SPI: half duplex, and using SPI mode 0.

13. Which has a half duplex communication?

a) Queued SPI

b) Microwire

c) Microwire/plus

d) Quad SPI

View Answer

Answer: b

Explanation: Microwire often spelled uwire, is essential a predecessor od SPI and a trademark of
National Semiconductor. It is subset of SPI: half duplex, and using SPI mode 0.

14. Do SPI have internal flash?

a) True

b) False

View Answer

Answer: a

Explanation: eSPI slaves are allowed to use the eSPI master as a proxy to perform flash operations on
a standard SPI flash memory slave on behalf of the requesting eSPI slave.
15. SMBUS stands for ___________

a) Serial Memory Bus

b) Serial Management Bus

c) System Management Bus

d) System Memory Bus

View Answer

Answer: c

Explanation: All communications that were out of band of the LPC bus like general purpose
input/output and System Management Bus are tunneled through the eSPI bus.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “CoAP Protocol”.

1. CoAP is specialized in ___________

a) Internet applications

b) Device applications

c) Wireless applications

d) Wired applications

View Answer

Answer: a

Explanation: Constrained Application Protocol (CoAP) is a specialized Internet Application Protocol


for constrained devices, as defined in RFC 7228.

2. CoAP is designed for use between devices on the same constrained network.

a) True

b) False

View Answer

Answer: a

Explanation: CoAP is designed for use between devices on the same constrained network (e.g., low-
power, lossy networks), between devices and general nodes on the internet, and between devices
on different constrained networks both joined by an internet.
3. Which layer is CoAP?

a) Control layer

b) Transport layer

c) Service layer

d) Application layer

View Answer

Answer: c

Explanation: In intelligent network and cellular network, service layer is a conceptual layer within a
network service provider architecture. CoAP is a service layer protocol that is intended for use in
resource-constrained internet devices, such as wireless sensor network nodes.

4. CoAP provides which of the following requirements?

a) Multicast support and simplicity

b) Low overhead and multicast support

c) Simplicity and low overhead

d) Multicast support, Low over head, and simplicity

View Answer

Answer: d

Explanation: Multicast, low overhead, and simplicity are extremely important for Internet of Things
(IoT) and Machine-to-Machine (M2M) devices, which tend to be deeply embedded and have much
less memory and power supply than traditional internet devices have.

5. The core of the protocol is specified in _________

a) RFC 7254

b) RFC 7252

c) RFC 7452

d) RFC 7524

View Answer

Answer: b

Explanation: The core of the protocol is specified in RFC 7252, important extensions are in various of
the standardization process.

6. Do CoAP has memory?


a) True

b) False

View Answer

Answer: a

Explanation: The nodes have 8-bit microcontrollers with small amount of ROM and RAM, while
constrained network such as IPv6 over Low-power Wireless Personal Area Network often high
packet error rates and a typical throughput of 10s of kbit/s.

7. CoAP does not provide any security.

a) True

b) False

View Answer

Answer: b

Explanation: The Internet of Things cannot spread as long as it can be exploited by hackers willy-nilly.
CoAP does not just pay lip service to security, it actually provides strong security. CoAP’s default
choice of DTLS parameters is equivalent to 3072-bit RSA keys, yet still runs fine on the smallest
nodes.

8. What is the RAM and ROM size in CoAP?

a) 100 KiB of RAM and 10 KiB of ROM

b) 10 KiB of RAM and 100 KiB of ROM

c) 10 KiB of RAM and 250 KiB of ROM

d) 250 KiB of RAM and 10 KiB of ROM

View Answer

Answer: b

Explanation: The Internet of Things will need billions of nodes, many of which will need to be
inexpensive. CoAP has been designed to work on microcontrollers with as low as 10 KiB of RAM and
100 KiB of ROM (code space).

9. CoAP feels very much like HTTP.

a) True

b) False

View Answer
Answer: a

Explanation: From a developer point of view, CoAP feels very much like HTTP. Obtaining a value from
a sensor is not much different from obtaining a value from a Web API.

10. Which is an open standard?

a) HTTP

b) MQTT

c) XMPP

d) CoAP

View Answer

Answer: d

Explanation: IoT needs standard protocols. Two of the most promising for small devices are MQTT
and CoAP. Both ate standard protocols.

11. Will CoAP connects to the internet.

a) True

b) False

View Answer

Answer: a

Explanation: CoAP is one of the latest application layer protocol developed by IETF for smart devices
to connect to the Internet.

12. HART stands for_________

a) Highway Addressable Remote Transducer

b) High Addressable Remote Transducer

c) High Application Remote Transducer

d) Highway Application Remote Transducer

View Answer

Answer: a

Explanation: IoT PHY/MAC Layers involve all the common wireless communication technology, such
as IEEE 802.11 series, 802.15, HART.
13. LTP stands for _________

a) Lean Transducer Protocol

b) Lean Transport Protocol

c) Layer Transport Protocol

d) Layer Transducer Protocol

View Answer

Answer: b

Explanation: IETF has developed several lightweight protocols e.g., CoAP, Embedded Binary HTTP,
Lean Transport Protocol.

14. CoAP is a specialized _________ protocol.

a) Web Transfer

b) Power

c) Application

d) Resource

View Answer

Answer: a

Explanation: The CoAP is a specialized web transfer protocol for use with constrained nodes and
constrained networks.

15. URI and content type support is which protocol feature?

a) Http

b) UDP

c) CoAP

d) SPI

View Answer

Answer: c

Explanation: CoAP needs to consider optimizing length of datagram and satisfying REST protocol to
support URI. It also needs to provide dependable communication based on UDP protocol.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “MQTT Protocol”.
1. MQTT is mainly used for __________

a) M2M communication

b) Device communication

c) Internet communication

d) Wireless communication

View Answer

Answer: a

Explanation: MQTT is a public messaging protocol designed for lightweight M2M communication. It
was originally developed by IBM and is now an open standard.

2. Which is an open standard?

a) CoAP

b) MQTT

c) XMPP

d) HTTP

View Answer

Answer: b

Explanation: IoT needs standard protocols. Two of the most promising for small devices are MQTT
and CoAP. Both ate standard protocols.

3. MQTT is _________ oriented.

a) Data

b) Message

c) Network

d) Device

View Answer

Answer: b

Explanation: MQTT is message oriented. Every message is a discrete chunk of data, opaque to the
broker

MQTT is message oriented. Every message is a discrete chunk of data, opaque to the broker.

4. Who created MQTT?


a) Robert Cailliau

b) Tim Berners-Lee

c) Andy Stanford-Clark

d) Vint Cerf

View Answer

Answer: c

Explanation: MQTT is created by Andy Stanford-Clark in It was originally developed by IBM and is
now an open standard.

5. Does MQTT support security.

a) True

b) False

View Answer

Answer: a

Explanation: Yes, You can pass a user name and password with an MQTT packet in V3.1 of the
protocol.

6. Standard ports of MQTT are __________

a) I2C

b) SSL

c) USART

d) TCP/IP

View Answer

Answer: d

Explanation: Standard ports of MQTT are TCP/IP. TCP/IP port 1883 is reserved with IANA for use with
MQTT.

7. Full form of MQTT _____

a) Message Queuing Telemetry Transport

b) Message Queuing Telegram Transport

c) Message Queue Telegram Transport

d) Message Queue Telemetry Transport


View Answer

Answer: a

Explanation: MQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol that
provides resource-constrained network clients with a simple way to distribute telemetry
information.

8. What are the key components of a M2M system?

a) Vortex DDS

b) Smart Homes

c) Sensors and Wi-Fi

d) Protocols

View Answer

Answer: c

Explanation: Following are the key components of a M2M system.

Sensors

RFID (Radio Frequency Identification)

Wi-Fi

Autonomic Computing.

9. Request field is present in which message format?

a) Request message

b) Response message

c) Both request and response

d) Neither request nor response

View Answer

Answer: a

Explanation: The request message consists of a request line(e.g., GET /image/logo.png HTTP/1.1,
which requests a resource called /image/logo.png from the server).

10. URI and content type support is which protocol feature?

a) SPI

b) UDP
c) HTTP

d) CoAP

View Answer

Answer: d

Explanation: CoAP needs to consider optimizing length of datagram and satisfying REST protocol to
support URI. It also needs to provide dependable communication based on UDP protocol.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “HTTP Protocol”.

1. Does HTTP protocol take more power.

a) True

b) False

View Answer

Answer: a

Explanation: Uses more battery(percentage battery/hour and percentage battery/message). For


HTTP in sending message it takes 18.43% while for MQTT it takes 16.13%.

2. How many messages will HQTTP will send in 1024?

a) All

b) 256

c) 240

d) 514

View Answer

Answer: c

Explanation: It is less reliable, only 240(3G)/524(WiFi) messages were received out of total of 1024
messages.

3. How many messages will HTTP will send per hour?

a) 1,708

b) 160,278

c) 3,628

d) 263,314
View Answer

Answer: a

Explanation: When we compare HTTP with MQTT, HTTP is lot slower, HTTP will send 1,708
messages/hour whereas MQTT sends 160,278 messages/hour.

4. What does HTTP do?

a) Enables network resources and reduces perception of latency

b) Reduces perception of latency and allows multiple concurrency exchange

c) Allows multiple concurrent exchange and enables network resources

d) Enables network resources and reduces perception of latency and Allows multiple concurrent
exchange

View Answer

Answer: d

Explanation: It enables more efficient use of network resources and a reduced perception of latency
by introducing header field compression and allowing multiple concurrent exchanges on the same
connection.

5. A request from client is basically made of ______

a) Method

b) Task

c) Event

d) Signal

View Answer

Answer: a

Explanation: HTTP is a request/ response protocol where clients request information from a server
and the server responds to these requests accordingly. A request is made up of a method, a
resource, some headers, and some optional content.

6. Response is made up of a ________ status code.

a) two-digit

b) three-digit

c) five-digit

d) six-digit
View Answer

Answer: b

Explanation: HTTP is a request/ response protocol where clients request information from a server
and the server responds to these requests accordingly. A response is made up of a three-digit status
code, some headers and some optional content.

7. HTTP allows which response?

a) Multiplexing

b) Serial

c) Coherent

d) Binary

View Answer

Answer: a

Explanation: HTTP allows multiplexing responses: that is sending responses in parallel. This fixes the
“head-of-line blocking” problem of HTTP where only one request can be outstanding on a TCP/IP
connection at a time.

8. Which protocol provides server push?

a) SPI

b) MQTT

c) CoAP

d) HTTP

View Answer

Answer: d

Explanation: Finally, HTTP/2 introduces the notion of server push. Concretely this means the server
can provide content to clients without having to wait for them to send a request.

9. WOT reduces ________ of HTTP.

a) Overrun

b) Overhead

c) Overload

d) Load

View Answer
Answer: b

Explanation: The WOT as it leads to a more efficient use of connections, which reduces the overhead
of HTTP. It also leads to faster transmission and hence potential saving in terms of battery power
required to communicate.

10. HTTP expands?

a) HyperText Transfer Protocol

b) HyperTerminal Transfer Protocol

c) HyperText Terminal Protocol

d) HyperTerminal Text Protocol

View Answer

Answer: a

Explanation: It is the one of the standard protocol that expands as HyperText Transfer protocol.

11. How many types of message formats are there in HTTP protocol?

a) 4 types

b) 3 types

c) 2 types

d) 5 types

View Answer

Answer: c

Explanation: The client and server communication by sending plain text message. The client sends
requests to the server and server sends the responses. That is

–> Request message

–> Response message.

12. Statue line is present in which message format?

a) Request message

b) Response message

c) Both request and response

d) Neither request nor response

View Answer
Answer: b

Explanation: A status line which includes the status code and reason message (e.g., HTTP/1.1 200
OK, which indicates that the client’s request succeeded).

13. Request field is present in which message format?

a) Request message

b) Response message

c) Both request and response

d) Neither request nor response

View Answer

Answer: a

Explanation: The request message consists of a request line(e.g., GET /image/logo.png HTTP/1.1,
which requests a resource called /image/logo.png from the server).

14. Does HTTP protocol have _________ handshakes.

a) 2 way

b) 1 way

c) 3 way

d) 5 way

View Answer

Answer: c

Explanation: Persistent connections reduce request latency perceptible, because the client does not
need to re-negotiate the TCP 3 way handshake connection after the first request has been sent.

15. Does HTTP has pipelining.

a) True

b) False

View Answer

Answer: a

Explanation: HTTP pipelining further reduces lag time, allowing clients to send multiple request
before waiting for each response.
This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “XMPP Protocol”.

1. XMPP Full form is ________

a) Extensible Messaging and Presence Protocol

b) Extensible Module and presence protocol

c) Extensible Messaging and Presence Protocol

d) Extensible Messaging and Presence Protocol

View Answer

Answer: a

Explanation: XMPP is used in IOT which covers XMPP core, XMPP addressing, XMPP server and XMPP
client communication. XMPP is the short form of Extensible Messaging and Presence Protocol.

2. XMPP is used for streaming which type of elements?

a) XPL

b) XML

c) XHL

d) MPL

View Answer

Answer: b

Explanation: XMPP is an open protocol for streaming XML elements in order to exchange messages
and presence information in close to real time.

3. XMPP creates _________ identity.

a) device

b) email

c) message

d) data

View Answer

Answer: a

Explanation: XMPP creates a device identity also called a Jabber ID. In MQTT, identities are created
and managed separately in broker implementations.
4. XMPP supports __________

a) Structured data

b) Foundation

c) Federation

d) Jabber ID

View Answer

Answer: c

Explanation: XMPP supports federation, meaning devices from different manufactures connected to
different platforms can talk to each other with a standard communication protocol.

5. Which protocol has a quality of service?

a) XMPP

b) HTTP

c) CoAP

d) MQTT

View Answer

Answer: a

Explanation: MQTT has different levels of quality of services. This flexibility is not available in XMPP.

6. The original transport protocol for XMPP.

a) FCP

b) TCP

c) MCP

d) HCP

View Answer

Answer: b

Explanation: The original and native transport protocol for XMPP is Transmission Control Protocol
(TCP), using open ended XML stream over long-lived TCP connections.

7. Which XMPP core describes client server messaging?

a) RFC 6122

b) RFC 4854
c) RFC 6120

d) RFC 3923

View Answer

Answer: c

Explanation: RFC 6120, Extensible Messaging and Presence Protocol (XMPP): core, which describes
client-server messaging using two open-ended XML streams.

8. XMPP uses ________ architecture.

a) Decentralized client-server

b) Centralized client-server

c) Message

d) Public/subscriber

View Answer

Answer: a

Explanation: The XMPP uses a decentralized client-server architecture where clients do not talk
directly to one another, but there is no central server.

9. XMPP implementation uses ________

a) CoAP

b) Gaming

c) Email

d) Polling

View Answer

Answer: d

Explanation: Most XMPP implementations use polling, or checking for updates only on demand. A
protocol called BOSH lets server push messages.

10. XMPP feature such as federation across domains used to implement the Internet of Things.

a) True

b) False

View Answer

Answer: a
Explanation: XMPP features such as federation across domains, public/subscriber, authentication
and its security even for mobile endpoints are being used to implement the Internet of Things.

11. The architecture of the XMPP network is similar to __________

a) Chat box

b) Web browser

c) Gaming

d) Email

View Answer

Answer: d

Explanation: The architecture of the XMPP network is similar to email; anyone can run their own
XMPP server and there is no central master server.

12. Does XMPP have text based communication.

a) True

b) False

View Answer

Answer: b

Explanation: Since XML is text based, normal XMPP has a higher network overhead compared to
purely binary solution. This issue is being addressed by the experimental XEP -0322.

13. In XMPP In band binary data format is __________

a) High

b) Very high

c) Limited

d) Ultra high

View Answer

Answer: c

Explanation: Binary data must be first base64 encoded before it can be transmitted in band.
Therefore, any significant amount of binary data is best transmitted out of band, using in band
message to coordinate.

14. IRC stands for __________


a) Internet Reduce Chat

b) Interconnection Relay Chat

c) Internet Relay Chat

d) Interconnect Reduce Chat

View Answer

Answer: c

Explanation: The XMPP extension for multi user chat can be seen a competitor to Internet Relay
Chat, although IRC is far simpler, has far fewer features, and is far widely used.

15. SIP stands for ___________

a) Session Initiation Protocol

b) Session Internet Protocol

c) Simple Initiation Protocol

d) Session Internet Protocol

View Answer

Answer: a

Explanation: XMPP has often regarded as a competitor to simple, based on Session Initiation
Protocol, as the standard protocol for instant messaging and presence notification.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Network Layer”.

1. Which level is the network layer in the OSI model?

a) Third level

b) Fourth level

c) Second level

d) Fifth layer

View Answer

Answer: a

Explanation: The network layer is the third level of the open system interconnection model and the
layer that provides data routing paths for network communication.

2. Data in network layer is transferred in the form of ____________


a) Layers

b) Packets

c) Bytes

d) Bits

View Answer

Answer: b

Explanation: Data is transferred in the form of packets via logical network paths in an ordered
format controlled by the network layer.

3. The network layer is considered as the _______ of the network layer.

a) backbone

b) packets

c) bytes

d) bits

View Answer

Answer: a

Explanation: The network layer is considered as the backbone of the network layer. It selects and
manages the best logical path for data transfer between nodes.

4. The network layer contains which hardware device?

a) Routers, Bridges

b) Bridges only

c) Bridges and switches

d) Routers, Bridges and Switches

View Answer

Answer: d

Explanation: This layer contains hardware devices such as routers, bridges, firewalls, and switches,
but it actually creates a logical image of the most efficient communication rout and implements it
with a physical medium.

5. Network layer protocol exits in _________

a) Host
b) Switches

c) Packets

d) Bridges

View Answer

Answer: a

Explanation: Network layer protocols exits in every host or router. The router examines the header
fields of all the IP packets that pass through it.

6. What are the common protocols associated with the network layer?

a) Address Resolution Protocol

b) Reverse Address Resolution Protocol

c) Internet protocol

d) Neighbour Discovery Protocol

View Answer

Answer: c

Explanation: Internet protocol and Netware IPX/SPX are the most common protocols associated with
the network layer.

7. The network layer responds to request from which layer?

a) Transport layer

b) Data layer

c) Application layer

d) Session layer

View Answer

Answer: a

Explanation: In OSI model, we are having 7 layers in which the network layer responds to request
from the layer above it called Transport Layer.

8. The network layer issues request to which layer?

a) Transport layer

b) Data layer

c) Application layer
d) Session layer

View Answer

Answer: b

Explanation: In OSI model, we are having 7 layers in which the network layer issues request to the
layer below it called Data Link Layer.

9. IP is connectionless.

a) True

b) False

View Answer

Answer: a

Explanation: IP is connectionless, is that a data packet can travel from a sender to a receiver without
the recipient having to send an acknowledgment connection-oriented protocols exits at other,
higher layers of the OSI model.

10. Does network layer in TCP/IP and OSI Model are same.

a) True

b) False

View Answer

Answer: b

Explanation: The TCP/IP Internet layer is in fact only a subset of functionality of the network layer. It
describes only one type of network architecture, the Internet.

11. What are called routers?

a) The devices that operates at session layer

b) The devices that operates at data layer

c) The devices that operates at application layer

d) The devices that operates at network

View Answer

Answer: d

Explanation: The network interconnection devices that operate at the network layer are usually
called routes, which at this point should hopefully come as no surprise to you.
12. ICMP stands for __________

a) Internet Coordinate Message Protocol

b) Internet Control Message Protocol

c) Interconnect Control Message Protocol

d) Interconnect Coordinate Message Protocol

View Answer

Answer: b

Explanation: The Internet Protocol is the key network layer protocol that implements the TCP/IP
Protocol suites. Since IP is the protocol that provides the mechanism for delivering datagrams,
between devices, it is designed to be relatively basic, and to function with few “bell and whistles”.

13. Packets will be transferred in how many types?

a) 5 types

b) 4 types

c) 2 types

d) 3 types

View Answer

Answer: d

Explanation: Routing deals with determining how packet will routed (transferred) from source to
destination. It can of three types : 1. Static

2. Dynamic

3. Semi Dynamic.

14. DDP stands for _________

a) Datagram Delivery Protocol

b) Device Delivery Protocol

c) Datagram Device Protocol

d) Device Datagram Protocol

View Answer

Answer: a

Explanation: Datagram Delivery Protocol is a member of the AppleTalk networking protocol suite. Its
main responsibility is for socket to socket delivery of datagram over an AppleTalk network.
15. RIP stands for ________

a) Reduced Information Protocol

b) Routing Internet Protocol

c) Routing Information Protocol

d) Reduced Internet Protocol

View Answer

Answer: c

Explanation: The Routing Information Protocol is one of the oldest distance vector routing protocols
which employ the hop count as a routing metric.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Transport Layer”.

1. What are the functions of the transport layer?

a) Multiplexing/ Demultiplexing

b) Connection less Services

c) Connection oriented service

d) Congestion control

View Answer

Answer: a

Explanation: Transport layer functions are:

–> Multiplexing / DE multiplexing : Normally the transport layer will create distinct network
connection for each transport connection required by the session layer.

–> Fragmentation and Re assembly: The data accepted by the transport layer from the session layer
is split up into smaller units if needed and then passed to the network layer.

2. Which services are provided by transport layer?

a) Error control

b) Connection service

c) Connection less service

d) Congestion control

View Answer
Answer: a

Explanation: The transport layer also decides the type of service that should be provided to the
session layer. The message may or may not be received in the order in which it was sent. The
decision regarding the type of service to be provided is taken at the time when the connection is
established.

3. TCP and UDP are called ________

a) Application protocols

b) Session protocols

c) Transport protocols

d) Network protocols

View Answer

Answer: c

Explanation: Above the network layer, we find TCP and UDP, the two transport protocols. TCP is
used for most of our human interactions with the web. UDP is also better suited for real-time data
applications such as voice and video.

4. Security based connection is provided by which layer?

a) Network layer

b) Session layer

c) Application layer

d) Transport layer

View Answer

Answer: d

Explanation: IOT is, of course all about connection to the internet. And even more so, it is about
security. Without security and without encrypted communication, anyone can see what I send and
receive. So encryption and secure communication are key. The solution is to use a connection that
uses the TLS(Transport Layer Security) Protocol.

5. TCP is the standard protocol with std no?

a) 5

b) 4

c) 7

d) 3
View Answer

Answer: c

Explanation: TCP is a standard protocol with STD number 7. TCP is described by RFC 793-
Transmission Control Protocol. Its status is recommended, but in practice, every TCP/IP
implementation that is not used exclusively for routing will include TCP.

6. Using which method in transport layer data integrity can be ensured?

a) Checksum

b) Repetition codes

c) Cyclic redundancy checks

d) Error correcting codes

View Answer

Answer: a

Explanation: Using checksum’s, the data integrity across all the delivery layers can be ensured. These
checksum’s guarantee that the data transmitted is the same as the data received through repeated
attempts made by other layers to have missing data resent.

7. Buffer overrun can be reduced by using what?

a) Traffic control

b) Flow control

c) Byte orientation

d) Data integrity

View Answer

Answer: b

Explanation: Devices at each end of a network connection often have no way of knowing each
other’s capabilities in terms of data throughput and can therefore send data faster than the
receiving devices is able to buffer or process it. In these cases, buffer overruns can cause complete
communication breakdowns.

8. Transport layer can identify the symptoms of overload nodes using _________

a) Flow control

b) Traffic control

c) Byte orientation
d) Data integrity

View Answer

Answer: b

Explanation: Digital communications networks are subject to bandwidth and processing speed
restrictions, which can mean a huge amount of potential for data congestion on the network. This
network congestion can affect almost every part of a network. The transport layer can identify the
symptoms of overload nodes and reduced flow rates.

9. Transport layer receives data in the form of __________

a) Packets

b) Byte streams

c) Bits stream

d) Both packets and Byte stream

View Answer

Answer: b

Explanation: Some applications prefer to receive byte stream instead of packets; the transport layer
allows for the transmission of byte-orientated data stream if required.

10. Transport layer is which layer in OSI model?

a) Fourth layer

b) Third layer

c) Second layer

d) Fifth layer

View Answer

Answer: a

Explanation: The transport layer is the fourth layer from the bottom in the OSI reference model. It is
responsible for message delivery from process.

11. Congestion control can control traffic entry into a telecommunications network, so to avoid
_________

a) Congestive connection

b) Connection collapse

c) Congestive collapse
d) Collapse congestive

View Answer

Answer: c

Explanation: Congestion control can control traffic entry into a telecommunications network, so to
avoid Congestive collapse by attempting to avoid oversubscription of any of the processing or link
capabilities of the intermediate nodes.

12. FCP stands for _________

a) Fiber Channel Protocol

b) Field Channel Protocol

c) Fast Channel Protocol

d) Fiber Carrying Protocol

View Answer

Answer: a

Explanation: Fiber Channel Protocol is the SCSI interface protocol utilizing an underlying Fiber
channel connection.

13. UDP packets are called as _________

a) Segments

b) Checksum

c) Frames

d) Datagrams

View Answer

Answer: d

Explanation: UDP is a very simple protocol, and does not provide virtual circuits, nor reliable
communication, deleting these functions to the application program. UDP packets are called
datagrams, rather than segments.

14. _________ does not provide reliable end to end communication.

a) TCP

b) UDP

c) Both TCP and UDP

d) Neither TCP nor UDP


View Answer

Answer: b

Explanation: TCP, not UDP, provides reliable end to end communication, i.e. error recovery by means
of error detecting code and automatic repeat request protocol.

15. ARQ stands for __________

a) Automatic Repeat Request

b) Automatic Request Repeat

c) Application Repeat Request

d) Application Request Repeat

View Answer

Answer: a

Explanation: TCP, not UDP, provide end to end communication, i.e. error recovery by means of error
detecting code and automatic repeat request protocol. The ARQ protocol also provides flow control,
which may be combined with congestion avoidance.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Application Layer”.

1. AMQP stands for ____________

a) Advanced Message Queuing Protocol

b) Application Message Queuing Protocol

c) Advanced Mailing Queuing Protocol

d) Application Mailing Queuing Protocol

View Answer

Answer: a

Explanation: Advanced Message Queuing Protocol (AMQP) is an open standard application layer
protocol for message oriented middleware. The defining features of AMQP are message oriented,
queuing, routing, reliability and security.

2. The best example for interoperability at the application layer is?

a) Data

b) Net

c) File
d) Web

View Answer

Answer: d

Explanation: The best example of interoperability at the application layer is web. The web made the
internet successful by creating an open, simple and highly interoperabe layer where data can be
exchanged between servers and consumed by applications.

3. Services provided by application layer?

a) Web chat

b) Error control

c) Connection services

d) Congestion control

View Answer

Answer: a

Explanation: There are many services provided by application layer:

1. Simple mail transfer protocol

2. File transfer

3. Web transfer

4. Web chat etc.

4. How many protocols are used in the application layer?

a) 15

b) 10

c) More than 15

d) More than 10

View Answer

Answer: c

Explanation: More than 15 protocols are used in the application layer, including file transfer
protocol, Telnet, Trivial File Transfer Protocol and simple network Management Protocol.

5. What is the main responsibility of application layer?

a) Error handling
b) Web surfing

c) Virtual terminal

d) Network data sharing

View Answer

Answer: a

Explanation: This layer has many responsibilities, including error handling and recovery, data flow
over a network and full network flow. It is also used to develop network based applications.

6. Reoccurring problems can be achieved using __________

a) DNS

b) Telnet

c) BOOTP

d) Patterns

View Answer

Answer: d

Explanation: There are commonly reoccurring problems that occur in the design and implementation
of communication protocol and can be addressed by patterns from several different pattern
languages: Pattern Language for Application Level Communication Protocol etc.

7. Application layer is the ending of the data layer.

a) True

b) False

View Answer

Answer: a

Explanation: The application layer is the ending of data transfer. When you get here, you will find
applications like Microsoft word or programs like java.

8. Application layer interacts directly with the ________

a) front user

b) end user

c) sensors

d) wired link
View Answer

Answer: b

Explanation: In perception layer sensor networks are deployed on various locations. Network layer
contains Wireless or wired link. while application layer interacts directly with the end user.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “IP Address”.

1. What is the format of IP address?

a) 34 bit

b) 64 bit

c) 16 bit

d) 32 bit

View Answer

Answer: d

Explanation: The format of an IP address is a 32-bit numeric address written as four numbers
separated by periods. Each number can be zero to 255. For example, 1.160.10.240 could be an IP
address.

2. Version 6 of IP address has how many bits.

a) 64 bits

b) 128 bits

c) 32 bits

d) 256 bits

View Answer

Answer: b

Explanation: Because of the growth of the Internet and the depletion of available IPV4 address, a
new version of IP(IPV6), using 128 nits for the IP address, was developed in 1995, and standardized
as RFC 2460 in 1998. IPV6 deployment has been ongoing since the mid 2000s.

3. IANA stands for __________

a) Internet Assigned Numbers Authority

b) Internal Assigned Numbers Authority

c) Internet Associative Numbers Authoritative


d) Internal Associative Numbers Authority

View Answer

Answer: a

Explanation: The IP address space is managed globally by the Internet Assigned Numbers
Authority(IANA), and by five Regional Internet Registries(RIR) responsible in their designated
territories for assignment to end users and local Internet registries, such as Internet services
providers.

4. RIR stands for ________

a) Regional Internal Registries

b) Registries Internet Regional

c) Regional Internet Registries

d) Registries Internal Regional

View Answer

Answer: c

Explanation: The IP address space is managed globally by the Internet Assigned Numbers
Authority(IANA), and by five Regional Internet Registries(RIR) responsible in their designated
territories for assignment to end users and local Internet registries, such as Internet services
providers.

5. Geolocation software is used by host.

a) True

b) False

View Answer

Answer: a

Explanation: The header of each IP packet contains the IP address of the sending host, and that of
the destination host. A host may use geolocation software to deduce the geolocation of it
communication peer.

6. How many version /s of IP’s are there?

a) 4 versions

b) 3 versions

c) 2 versions

d) 1 version
View Answer

Answer: c

Explanation: Two versions of the Internet Protocol are in common use in the Internet today. The
original version of the Internet Protocol for use in the Internet is Internet Protocol Version 4, first
installed in 1983.

7. VLSM stands for ________

a) Version Length Subnet Masking

b) Variable Length Subnet Masking

c) Variable Length Surface Masking

d) Version Length Surface Masking

View Answer

Answer: b

Explanation: The class system of the address space was replaced with Classless Inter – Domain
Routing in 1993. CIDR is based on variable length Subnet Masking to allow allocation and routing
based on arbitrary length prefixes.

8. Many desktops and operating systems include which protocol?

a) IPv6 protocol

b) IPv4 protocol

c) Both IPv6 and IPv4 protocol

d) IPv3 protocol

View Answer

Answer: a

Explanation: All modern desktop and enterprise server operating systems include native support for
the IPv6 protocol, but it is not yet widely deployed in other devices, such as residential networking
routers, voice over IP(VoIP) and multimedia equipment, and network peripherals.

9. The design of the Internet protocol suites adhere to the ________ principle.

a) Data corruption

b) Connection oriented

c) End to End principle

d) Reliability
View Answer

Answer: c

Explanation: The design of the Internet protocol suite adheres to the end to end principle, a concept
adapted from the CYCLADES project. Under the end to end principle, the network infrastructure is
considered inherently unreliable at any signal network element or transmission medium and is
dynamic in terms of availability of links and notes.

10. ___________ adjusts the segment size to be smaller than MTU.

a) Internet Protocol 6

b) User Datagram Protocol

c) Internet Protocol 4

d) Transmission Control Protocol

View Answer

Answer: d

Explanation: The Transmission Control Protocol is an example of a protocol that adjusts its segment
size to be smaller than the MTU.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “MAC Address”.

1. Hardware address is known as _________

a) MAC address

b) IP Address

c) Network Interface Card

d) Address Resolution Protocol

View Answer

Answer: a

Explanation: Along with an IP address there is also a hardware address. Typically it is tied to a key
connection device in your computer called the network interface card. Every NIC has a hardware
address that’s known as MAC, for Media Access Control.

2. MAC stands for ________

a) Media Area Control

b) Memory Access Control


c) Memory Area Control

d) Media Access Control

View Answer

Answer: d

Explanation: MAC, for Media Access Control. Where IP addresses are associated with TCP/IP, MAC
address are linked to the hardware of the network adapters.

3. What translates IP address into MAC address?

a) Organizationally Unique Identifier

b) Address Resolution Protocol

c) Network Interface Card

d) Burned In Address

View Answer

Answer: c

Explanation: A MAC address is given to an adapter when it is manufactured. It is hardwired or hard-


coded onto your computer’s NIC and it is unique to it. Something called the ARP (Address Resolution
Protocol) translates an IP address into MAC address.

4. Networking Hardware Address is referred with ________

a) IP address

b) MAC address

c) NIC

d) Organizationally Unique Identifier

View Answer

Answer: b

Explanation: Hardware and software working together, IP address and MAC address working
together. For this reason, the MAC address is sometimes referred to as a networking hardware
address, the burned in address or the physical address.

5. Does MAC address contain characters.

a) True

b) False

View Answer
Answer: a

Explanation: The MAC address itself doesn’t look anything like an IP address. The MAC address is a
string of usually six sets of two digits or characters, separated by colons.

6. MAC addresses are very useful in diagnosing network issues.

a) True

b) False

View Answer

Answer: a

Explanation: MAC addresses are very useful in diagnosing network issues, such as problems with IP
address. They are useful for network diagnosis because they never change, as opposed to a dynamic
IP address, which can change from time to time.

7. On wireless networks ________ filtering is the security measure.

a) OUI

b) IP

c) NIC

d) MAC

View Answer

Answer: d

Explanation: On wireless networks, a process called MAC filtering is a security measure to prevent
unwanted network access by hackers and intruders. In MAC address filtering, the router is
configured to accept traffic only from specific MAC addresses.

8. MAC addresses are used as ________

a) Network addresses

b) IP address

c) Hardware address

d) Burned in address

View Answer

Answer: a
Explanation: MAC address is used as a network address for most IEEE 802 network technologies,
including Ethernet and Wi-Fi. Logically, MAC addresses are used in the media access control protocol
sub layer of the OSI model.

9. IEEE standards for Institute of Electrical and Electronics Engineers.

a) False

b) True

View Answer

Answer: b

Explanation: MAC addresses are formed according to the rules of one of three numbering name
spaces managed by the Institute of Electrical and Electronics Engineers(IEEE).

10. The original IEEE 802 MAC address comes from________

a) MAC address

b) IP address

c) Ethernet address

d) Http

View Answer

Answer: c

Explanation: The original IEEE 802 MAC address comes from the original Xerox Ethernet addressing
scheme. This 48-bit address space contains potential 242 or 281,474,976,710,656 possible MAC
addresses.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “IOT Gateway”.

1. Gateway provides the connection between _________ and _________

a) Cloud and controller

b) Network and Cloud

c) Network and Controller

d) Controller and device

View Answer

Answer: a
Explanation: An Internet of Things (IoT) gateway is a physical device or software program that serves
as the connection point between the cloud and controller, sensors and intelligent devices.

2. Sensors provide _______ data per second.

a) Hundreds of Hundreds of data

b) Hundreds of thousands of data

c) Tens of Hundreds of data

d) Tens of thousands of data

View Answer

Answer: d

Explanation: Sensors generate tens of thousands of data per second. Gateway processes the data at
edge and minimizes the volume of data that needs to be forwarded to cloud.

3. Does IOT gateway provide security for the network.

a) True

b) False

View Answer

Answer: a

Explanation: IOT Gateway is that it provides additional security for the IOT network and the data it
transports.

4. A sensor uses which network?

a) LAN and HAN

b) HAN and PAN

c) LAN and PAN

d) LAN, PAN and HAN

View Answer

Answer: d

Explanation: Sensors usually have very limited capability in terms of networking connection. Your
sensors can likely utilize Bluetooth networking connectivity. The protocols like LAN, HAN and PAN
has a common they can directly connect to large networks like WAN or Internet.

5. Gateway software should be smart enough to handle ___________


a) GPS

b) Message

c) Logging

d) Sensors

View Answer

Answer: c

Explanation: Gateway software should be smart enough to handle system logging. It has to find the
right balance between the number of log entries d=stored on the device and those sent to the data
centre.

6. Number of approaches gateway can be installed?

a) 2 approaches

b) 3 approaches

c) 2 approaches

d) 2 approaches

View Answer

Answer: b

Explanation: There are three main approaches for this issue

1. Factory Bootstrap

2. Server limited Bootstrap

3. Client Initiated Bootstrap.

7. Drawback of Factory Bootstrap?

a) It should not have many gateways

b) It should not have many devices

c) Complex circuit can’t be handled

d) It should have many gateways

View Answer

Answer: a

Explanation: In the factory bootstrap approach, it doesn’t scale well if your solution include a large
number of the gates.
8. Central software management server communicates with the gateway devices in which approach?

a) Factory Bootstrap

b) Server limited Bootstrap

c) Client Initiated Bootstrap

d) Bootstrap

View Answer

Answer: b

Explanation: In server initiated bootstrap, the central software management server communicates
with the gateway device and deploys the proper version of the software to it.

9. Which mode assumes that it is the gateway’s responsibility to connect to the central repository
server?

a) Factory Bootstrap

b) Server limited Bootstrap

c) Client Initiated Bootstrap

d) Bootstrap

View Answer

Answer: c

Explanation: Client initiated bootstrap mode assumes that it is the gateway’s responsibility to
connect to the central repository server and download the proper version of the software. In this
scenario, the gateway is required to have lightweight bootstrap software installed so it can
communicate with the software management server.

10. The feature of IoT Gateway is the ability to download updates over-the-air.

a) True

b) False

View Answer

Answer: a

Explanation: One important extremely feature of IoT Gateway is the ability to download updates
over-the-air.

This set of IOT Problems focuses on “IOT Gateway ( Edge System)”.


1. What is the Edge gateway model used by dell?

a) 5000

b) 4500

c) 4000

d) 3500

View Answer

Answer: a

Explanation: Dell edge gateway model 5000 has an operating system Ubantu snape core with a
memory of 2G, 4G, and 8G.

2. What is the wireless system used by dell?

a) WAN

b) WWAN

c) HAN

d) MAN

View Answer

Answer: b

Explanation: 802.11n Wifi + Bluetooth low energy and WWAN (3G or LTE) and also Mobile
broadband 3G/LTE.

3. Do we have a protection in Dell.

a) True

b) False

View Answer

Answer: a

Explanation: Our hardware features help protect your network edge and sensor from Cyber-attack
including secure boot and BIOS-level control.

4. Where the edge gateway sits in dell?

a) Near the system

b) End of the system

c) End of the devices


d) Near the devices

View Answer

Answer: d

Explanation: Dell’s intelligent gateway sits near the devices and systems in distributed IoT networks.
Meaningful data is sent to the cloud or data centre to enrich the analytic control and smart systems.

5. Windows 10 IoT enterprise OS includes what?

a) Edge gateway

b) PI system

c) RAM

d) Data stream

View Answer

Answer: a

Explanation: Edge gateways come in many shapes and sizes and the edge gateways that include the
windows IoT enterprise operating system are ideally suited to run the PI system.

6. Types of gateway classes?

a) Only one

b) 3 types

c) 2 types

d) 4 types

View Answer

Answer: c

Explanation: We are having 2 types of gateway classes. They are: Small

Large

These classes have different CPU’s Atom and Core respectively.

7. IoT gateway sits at the interaction of egde systems.

a) True

b) False

View Answer

Answer: a
Explanation: IoT gateway also operates as platforms for application code that processes data and
becomes an intelligent part of a device-enabled system. IoT gateway sits at the interaction of edge
systems — devices, controllers and sensors — and the cloud.

8. NEXCOM provides what?

a) OS

b) IoT gateway

c) Devices

d) Transportation

View Answer

Answer: b

Explanation: Today’s “smart” IoT gateway — delivered by companies such as Dell, Wind River/ Intel,
NEXCOM and other — are full fledged computing platforms running modern operating systems.

9. Linux or Windows are sometimes called as _________

a) OS

b) Intelligent Gateways

c) Gateway

d) Devices

View Answer

Answer: c

Explanation: Linux or Windows are sometimes called as “Intelligent gateways”, but the line is
burning and the non-intelligent gateway market is likely to become largely irrelevant in coming
years.

10. In which cases gateway will appear?

a) Industrial Automation

b) Building automation

c) Transportation

d) Industrial & Building Automation

View Answer

Answer: d
Explanation: Dell believes that its gateways will appeal to users in three major use cases: Industrial
automation, building automation, transportation. One of Dell’s early client in eigen innovation, a
supplier of intelligent industrial vision systems.

This set of IOT Questions and Answers for Experienced people focuses on “IOT Gateway( Wind
Intelligent Device)”.

1. Wind River Intelligent Device offers what?

a) Gateway security

b) Application enablement

c) Device Connectivity

d) All of the mentioned

View Answer

Answer: d

Explanation: Wind River Intelligent Device Platform XT offers:

Gateway security: Secures communication channel, the data and the end device

Application Enablement: Provides JAVA OSGi application environment is provided

Device connectivity: Connection between devices using MQTT protocol

Remote device management: Supports well established management protocol such as TR-069.

2. Pre integrated and smart connectivity enables what?

a) Long term security

b) Products life span increases

c) Saves time and cost

d) Secure remote management

View Answer

Answer: c

Explanation: Connectivity, manageability, and security are core IoT building blocks, essential for
reducing device manufactures, time-to-market, complexity, and risk. Wind River Intelligent Devices
has Connectivity benefit which enables rich network option s to save development time and costs.

3. Does manageability provide what?

a) Saves time and cost


b) Product life span increases

c) Long term security

d) Secure remote management

View Answer

Answer: a

Explanation: Connectivity, manageability, and security are core IoT building blocks, essential for
reducing device manufactures, time-to-market, complexity, and risk. Wind River Intelligent Devices
has manageability benefit which reduces development time while increases the product‘s life span
and uptime.

4. What will Security provide?

a) Saves time and cost

b) Product life span increases

c) Long term security

d) Secure remote management

View Answer

Answer: c

Explanation: Connectivity, manageability, and security are core IoT building blocks, essential for
reducing device manufactures, time-to-market, complexity, and risk. Wind River Intelligent Devices
has security benefit which are designed for IoT software development to protect critical data
throughout the device lifecycle.

5. Wind River software.

a) True

b) False

View Answer

Answer: a

Explanation: Wind River, a wholly owned subsidiary of Intel corporation, is a world leader in
delivering software for intelligent connected systems.

6. Wind River is introduced by ____________

a) IBM

b) Intel
c) Tech Mahindra

d) Syntel

View Answer

Answer: b

Explanation: Wind River is introduced by Intel.

7. Wind River provides what?

a) Safe and Secure

b) Secure remote management

c) Save time and cost

d) Product life time increases

View Answer

Answer: a

Explanation: Wind River the technology and expertise that enables the innovation and deployment
of safe, secure, and reliable intelligent systems.

8. Which transportation brings new control?

a) Route Navigation

b) Industrial automation

c) Smart Energy

d) Building Automation

View Answer

Answer: d

Explanation: Building Automation bring new control, visibility, and efficiencies for reducing power
consumption, ensuring safety, and providing services to new and existing buildings.

9. Which transportation brings intelligence to their operations?

a) Building Automation

b) Industrial Automation

c) Smart Energy

d) Route Navigation

View Answer
Answer: b

Explanation: Wind River helps industrial manufactures bring intelligence to their operations. Gain
insights from your machine data with smart devices management.

10. Which transportation build more intelligent energy infracture?

a) Building Automation

b) Industrial Automation

c) Smart Energy

d) Route Navigation

View Answer

Answer: c

Explanation: Smart energy builds more intelligent energy infrastructure by combining traditional and
emerging power sources for the delivering of cleaner, safer, and more economical energy. Perform
power management tasks with finer precision and faster response time.

This set of IOT Interview Questions and Answers for Experienced people focuses on “Understanding
the Relationship between IoT and Big Data”.

1. What Bigdata collects?

a) Human generated data

b) Sensor data

c) Machine generated data

d) Device data

View Answer

Answer: a

Explanation: Bigdata analyses large amounts of mostly human generated data to support longer
duration.

2. What IoT collects?

a) Human generated data

b) Sensor data

c) Machine generated data

d) Device data
View Answer

Answer: c

Explanation: IoT is aggregating and compressing massive amounts of low latency/ low duration/high
volume machine generated data coming from a wide variety of sensor to support real time use cases
such as operational.

3. Which requires data stream management?

a) Bigdata

b) IoT

c) Bigdata & IoT

d) Device data

View Answer

Answer: b

Explanation: In order for one to claim that they can deliver IoT analytic solutions requires big data,
but IoT analytics must also include: Stream data management and Edge analytics.

4. Which requires Edge analytics?

a) Bigdata

b) IoT

c) Bigdata & IoT

d) Device data

View Answer

Answer: b

Explanation: In order for one to claim that they can deliver IoT analytic solutions requires big data,
but IoT analytics must also include : Stream data management and Edge analytics.

5. The IoT operates at ___________ scale.

a) Machine

b) Human

c) Device

d) Sensor

View Answer
Answer: a

Explanation: The IoT operates at machine scale, by dealing with machine to machine generated data.
This machine generated data creates discrete observations at very high signal rates.

6. One way to see observations addressing IoT analytics is?

a) 4-Tier Analytics

b) 2-Tier Analytics

c) 1-Tier Analytics

d) 3-Tier Analytics

View Answer

Answer: d

Explanation: One way that we see observation addressing the IoT analytics needs is via a 3-Tier
Analytics.

7. Which tier Performs individual wind turbine real time performance?

a) 3-Tier Analytics

b) 2-Tier Analytics

c) 1-Tier Analytics

d) 4-Tier Analytics

View Answer

Answer: c

Explanation: Tier-1 performs individual wind turbine real time performance analytics and
optimization.

8. Which tier performs predicts maintenance?

a) 3-Tier Analytics

b) 2-Tier Analytics

c) 1-Tier Analytics

d) 4-Tier Analytics

View Answer

Answer: b
Explanation: Tier 2 optimizes performance and predicts maintenance needs across the wind turbines
in the same wind farm.

9. Which tier is data lake enabled core analytics platform?

a) 4-Tier Analytics

b) 2-Tier Analytics

c) 1-Tier Analytics

d) 3-Tier Analytics

View Answer

Answer: d

Explanation: Tier-3 is the data lake enabled core analytics platform. The tier 3 core analytics platform
includes analytics engines, data sets and data management services that enable access to the data.

10. For supporting real time edge analytics, we need to provide detailed data.

a) True

b) False

View Answer

Answer: a

Explanation: To support real time edge analytics, we need to provide detailed data that can flag
observations of concern, but then doesn’t overwhelm the ability to get meaningful data back to the
core for more broad based strategic analysis.

This set of IOT test focuses on “Understanding the Intel IoT Analytics Structure”.

1. We need to invest in storage and prepossessing capacity to perform _________

a) C analytics

b) Bigdata analytics

c) Python analytics

d) IoT analytics

View Answer

Answer: d
Explanation: When would need to invest in the storage and processing capacity to perform IoT
analytics with such a huge amount of data. Whenever we have a similar requirement, we can take
advantage of a cloud based solution.

2. IoT analytics was proposed by _________

a) Syntel

b) IBM

c) Accenture

d) Intel

View Answer

Answer: d

Explanation: Intel IoT analytics is one of them and it works very well with the Intel Galileo Gen 2
board and python.

3. How can we publish data in Intel IoT?

a) By paying amount

b) By creating an account

c) By signing an account

d) By deleting an account

View Answer

Answer: b

Explanation: Intel IoT Analytics requires us to sign up, create an account with a valid e mail and a
password, and click on the activation link of a confirmation e mail before we can publish the sensor
data using their free services.

4. Which page provides the number of last observations in the specific period?

a) Dashboard

b) GitHub

c) IoT analytics

d) Sensors

View Answer

Answers: a
Explanation: Each time we publish data from a registered device to Intel IoT Analytics, we create an
observation for the devices. Thus, the My Dashboard page provides the number of last observations
in a specific period.

5. The page displays the sum of the last hour observations for all the registered devices.

a) True

b) False

View Answer

Answer: a

Explanation: By default, the page displays the sum of the last hour observations for all the registered
devices. We should keep the website opened in our web browser.

6. Each device has a globally unique identifier known as _________

a) id

b) deviceId

c) accountid

d) device

View Answer

Answer: c

Explanation: As a user, we can work with many accounts. Each account can contain many devices,
has a name and a identifier known as accountId. Each device has a globally unique identifier known
as deviceId.

7. With one account in Intel IoT Analytics, how many devices can be connected?

a) 3,000 devices

b) 5,000 devices

c) Infinite

d) 7,000 devices

View Answer

Answer: c

Explanation: We don’t have a limit to be connected to this number of devices for an account. We can
connect any number of devices.
8. _________ setting that can be modified on a device.

a) Actuator

b) Time Series

c) API

d) UI

View Answer

Answer: a

Explanation: Actuator is a setting that can be modified on a device. For example, rotate the angle of
a servo’s shaft or turn on an LED.

9. A series of values captured from the sensor is _________

a) Actuator

b) Time series

c) API

d) UI

View Answer

Answer: b

Explanation: A series of values captured from a sensor, that is, a collection of observations.

10. A time series with ambient temperature observations expressed in _________

a) Degrees Fahrenheit

b) Degrees Celsius

c) Percentage

d) Fahrenheit

View Answer

Answer: a

Explanation: We need a device to use the following components that will retrieve the values from
the digital temperature and humidity sensor connected to board:

A Time series with ambient temperature observations expressed in a degrees Fahrenheit.

11. A time series with ambient humidity observations expressed in ___________

a) Degree Fahrenheit
b) Degree Celsius

c) Percentage

d) Fahrenheit

View Answer

Answer: c

Explanation: We need a device to use the following components that will retrieve the values from
the digital temperature and humidity sensor connected to board:

A time series with ambient humidity observations expressed in a percentage.

This set of IOT Quiz focuses on “Setting up Devices in Intel IoT Analytics”.

1. What is the image that we have been using to boot Intel Galileo Gen 2 board?

a) Local agent

b) IoTkit

c) Device Id

d) SSH Terminal

View Answer

Answer: a

Explanation: The image that we have been using to boot Intel Galileo Gen 2 board includes a local
agent for Intel IoT Analytics preinstalled.

2. The agent running as a _________ on a device.

a) SSH Terminal

b) Yocto Linux

c) Daemon

d) Local agent

View Answer

Answer: c

Explanation: Unless we have made specific changes to the Yocto Linux meta distribution to disable
specific component, we will have the agent running as a daemon on the device.

3. _________ command line utility allows us to perform specific interactions with Intel IoT Analytics.
a) Iotkit-admin

b) SSH Terminal

c) Local agent

d) Daemon

View Answer

Answer: a

Explanation: The agent includes the iotkit-admin command line utility allows us to perform specific
interactions with Intel IoT Analytics.

4. We will not use command line utility to perform _________

a) proper communication with Intel IoT analytics

b) Obtain device id

c) Activate device

d) Send observations

View Answer

Answer: d

Explanation: The agent includes the iotkit-admin command line utility allows us to perform specific
interactions with Intel IoT Analytics. We will use command line utility to perform the following tasks:

–> Test the proper communication with Intel IoT Analytics

–> Obtain the device Id

–> Activate a device

–> Register three time series components for the device

–> Send test observations.

5. To check whether the command line utility can establish proper communication the command is
_________

a) iotkit-admin test

b) iotkit – admin test

c) admin-iotkit test

d) admin – iotkit test

View Answer

Answer: a
Explanation: First, we will check whether the iotkit-admin command line utility can establish proper
communication with Intel IoT Analytics. We just need to run the following command in the SSH
terminal:

Iotkit-admin test.

6. Build: 0.14.5 defines what?

a) Ip Address

b) Medium

c) Address

d) Version

View Answer

Answer: d

Explanation: If the connection is successful, we will see lines similar to the following ones. The last
line provides the information about the version.

7. Command line to obtain the device Id?

a) iotkit-admin device-id

b) iotkit-admin deviceid

c) Iotkit – admin device-id

d) Iotkit – admin device – id

View Answer

Answer: a

Explanation: The following command in the SSH terminal to obtain the device ID, also known as
deviceId:

Iotkit-admin device-id.

8. Default, device Id is equal to _________

a) IP Address

b) MAC Address

c) ISP

d) UI

View Answer
Answer: b

Explanation: The Iotkit-admin device-id command line will generate an output line such as the
following one with the device ID. By default, the device ID is equal to the MAC address of the
network interface card

2016-04.05T02:23:170Z – info: Device ID: 98-4F-EE-01-75-72.

9. Command to change the device Id?

a) iotkit-admin set-device-id new-device-id

b) iotkit – admin set – device – id new – device – id

c) iotkit-admin setdevice-id newdevice-id

d) iotkit-admin set-device-id new-device-id

View Answer

Answer: d

Explanation: The following command to change the device ID to a different one:iotkit-admin set-
device-id new-device-id. We just need to replace new-device-id with new device id you want to set
up for your devices. However, bear in mind the new device ID must be a globally unique identifier.

10. Do new device ID should be a globally unique identifier.

a) False

b) True

View Answer

Answer: b

Explanation: The following command to change the device ID to a different one:iotkit-admin set-
device-id new-device-id. We just need to replace new-device-id with new device id you want to set
up for your devices. However, bear in mind the new device ID must be a globally unique identifier.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Collecting Sensor Data”.

1. The temperature and humidity sensor values are printed in _________

a) OLED matrix

b) PIP

c) PYPI

d) SDK
View Answer

Answer: a

Explanation: When we read temperature and humidity values from the sensor, we printed the values
in an OLED matrix and rotated a servo’s shaft to display the measured temperature expressed in
degrees Fahrenheit with the shaft.

2. _________ installer we have to installer to make sure that the request package is installed.

a) PYPI

b) PIP

c) Python

d) SDK

View Answer

Answer: b

Explanation: The PIP installer was available to install additional python 2.7.3 package in the Yocto
Linux that we are running on the board.

3. PIP stands for _________

a) Package Management System

b) Python Package Index

c) PIP installs packages

d) Python Management System

View Answer

Answer: c

Explanation: PIP is recursive acronyms that stand for either pip installs packages or pip installs
python.

4. PIP is _________ acronym.

a) Excursive

b) Recursive

c) Intrusive

d) Package

View Answer
Answer: b

Explanation: PIP is a recursive acronym that stands for either pip installs packages or pip installs
python.

5. We will use pip installer to make sure that the _________ Package is installed.

a) Requests

b) SDK

c) IoT Accelerator

d) Maven

View Answer

Answer: a

Explanation: Now, we will use pip installer to make sure that the requests package is installed. This
package is very popular HTTP library for python.

6. Requests package is very popular _________ Library.

a) MQTP

b) SMTP

c) CoAP

d) HTTP

View Answer

Answer: d

Explanation: we will use pip installer to make sure that the requests package is installed. This
package is very popular HTTP library for python that allows us to easily build and send HTTP requests
with an extremely easy to understand syntax.

7. Requests package is very popular HTTP library for _________

a) C

b) Embedded c

c) Python

d) Java

View Answer

Answer: c
Explanation: we will use pip installer to make sure that the requests package is installed. This
package is very popular HTTP library for python that allows us to easily build and send HTTP requests
with an extremely easy to understand syntax.

8. What is the command to install packets?

a) pip install requests

b) pip_install_requests

c) pip-install-requests

d) Pip – install – requests

View Answer

Answer: a

Explanation: We need to run the following command in the SSH terminal to install the package.

9. _________ is created to represent the interface to Intel IoT Analytics.

a) Intel_IoT_Analytics

b) IntelIoTAnalytics

c) Intel_Iot_Analytics

d) IntelIotAnalytics

View Answer

Answer: d

Explanation: We will create an Intel Iot Analytics class to represent the interface to Intel IoT Analytics
and make it easy for us to publish observations for the three components.

10. The class declares the ___________ method that receives the temperature.

a) public-observation

b) Public_observation

c) Public – observation

d) Public- Observation

View Answer

Answer: b

Explanation: The class declares the public_observation method that receives the temperature
expressed in degrees Fahrenheit, the temperature expressed in degrees Celsius and the humidity
level percentage.
This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Analysing Sensor Data”.

1. Kansas-temp will display _________ Components.

a) 3 components

b) Can’t say

c) 4 components

d) Infinite

View Answer

Answer: b

Explanation: Check the Kansas-temp… checkbox and the site will display the registered components
for the selected device. Registered components may be temperature, humidity etc.

2. What temperature of checkbox will display?

a) Temperature in Fahrenheit

b) Temperature in Celsius

c) Percentage

d) Temperature in Fahrenheit for the past hour

View Answer

Answer: d

Explanation: The temperature checkbox and the site will display a chat with the ambient
temperature measured in degrees Fahrenheit for the past hour.

3. Chat uses _________ to generate graph.

a) Lines

b) Rows and Columns

c) Only rows

d) Only columns

View Answer

Answer: a

Explanation: By default, the chart uses a line and generates a graph with the time series values
registered in the past hour.
4. Refresh rate for the graph is set to _________

a) 20 seconds

b) 5 seconds

c) 30 seconds

d) Every second

View Answer

Answer: c

Explanation: By default, the refresh rate for the graph is set to 30 seconds, and therefore, the chart
will be updated every 30 seconds.

5. What is the maximum refresh rate that can be set?

a) 100 seconds

b) 120 seconds

c) 40 seconds

d) 60 seconds

View Answer

Answer: d

Explanation: We can change the refresh rate to as low as 5 seconds or as high as 60 seconds.

6. My chat page allows searching criteria such as _________

a) Device Name

b) Associated tags

c) Properties

d) Charts

View Answer

Answer: c

Explanation: Charts site will display the My Charts page that will allow you to search for devices
using many search criteria, such as the device name, the associated tags, and its properties.

7. Raw rate button will display what?

a) Raw data
b) Data from all components

c) All types of data

d) Device names

View Answer

Answer: a

Explanation: The raw data site will display a list with raw data that has been sent to build the time
series, that is, all the observations received for the selected component.

8. Can we use MATLAB for analysing IOT sensor data.

a) True

b) False

View Answer

Answer: a

Explanation: We can use MATLAB to analyse IOT sensor data. As IoT solutions emerge, the amount
of available sensor data is growing, but developing insight into that data can be difficult.

9. ___________ is used to organize and manipulate time-stamped data.

a) Network

b) Machine Learning

c) Cluster

d) Timetable

View Answer

Answer: d

Explanation: Timetable is used to organize and manipulate time-stamped data. Timetable is


designed to help you combine data-sets with different time-stamps in a meaningful way.

10. Machine learning algorithm uses computational methods to learn.

a) False

b) True

View Answer

Answer: b
Explanation: Machine learning algorithm uses computational methods to learn information directly
from data without assuming a predetermined equation as a model.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “USB Bootloader”.

1. Boot loader consists of __________ number of components.

a) 4 components

b) 2 components

c) 3 components

d) 5 components

View Answer

Answer: c

Explanation: The boot loader consists of the following components:

–> Target MCU

–> Master programmer

–> Data source.

2. All silicon labs SiMxxxxx MCUs with Flash memory are self-programmable.

a) True

b) False

View Answer

Answer: a

Explanation: All silicon labs SiMxxxxx MCUs with Flash memory are self-programmable, ie., code
running on the MCUs can erase and write other parts of the code memory.

3. If the device is programmed with a bootloader, the application image is loaded in _________
interface.

a) UART

b) USB

c) SPI

d) I2C

View Answer
Answer: b

Explanation: An uninitialized device requires the bootloader to be flashed over the debug interface.
Once the device is programmed with a bootloader, the application image is loaded in USB interface.

4. Application/s that provide to test the bootloader functionality.

a) Blinky_Fast and B.inky-Medium

b) Only Blinky_slow

c) Only Blinky_Fast

d) Blinky_Fast and Blinky_Slow

View Answer

Answer: d

Explanation: There are two example applications provided to test out the bootloader functionality:

–> Blinky_Fast

–> Blinky_Slow.

5. _________ command should be performed to very that the firmware image is Blinky_fast.

a) Query

b) Reset

c) Upload

d) Download

View Answer

Answer: a

Explanation: Query command is performed and we have to verify that the sAppName of the loaded
firmware image is Blinky_Fast.

6. Which switch should be pressed to perform all commands?

a) Up switch

b) Push

c) Down switch

d) Reset switch

View Answer

Answer: d
Explanation: Force the device into bootloader mode by holding down sw2 and pressing and releasing
reset switch to perform a query, upload, or download command on the device.

7. DFU stands for Device Firmware Update.

a) True

b) False

View Answer

Answer: a

Explanation: The file manager and DFU state machine are imported unmodified from the framework
software.

8. When is DEVICE_Init called?

a) Upload

b) Reset

c) Download

d) Query

View Answer

Answer: b

Explanation: The DEVICE_Init routine is called after each device reset and is responsible for
initializing the device and checking for the appropriate trigger sources.

9. DEVICE_Init performs what?

a) Disabling watchdog timer and disabling APB clock

b) Enabling APB clock and enabling watchdog timer

c) Disabling watchdog timer and enabling APB clock

d) Disabling APB clock and enabling watchdog timer

View Answer

Answer: c

Explanation: The DEVICE_Init routine performs the following functions:

–> Disables the watchdog timer and enables the APB clock

–> Determines the amount of Flash and RAM in the device

–> Check all internal and external automatic trigger sources.


10. DEVICE_Restore routine restores all the device registers modified by DEVICE_Init to their reset
values.

a) True

b) False

View Answer

Answer: a

Explanation: DEVICE_Restore routine restores all the device registers modified by DEVICE_Init to
their reset values. This includes starting the watchdog timer and restoring the APB clock gates back
to their reset value.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Bootstrapping”.

1. Bootstrap is used for __________

a) Web applications

b) IoT

c) Bigdata

d) Data

View Answer

Answer: a

Explanation: Bootstrap is a free and open source front end web framework for designing websites
and web applications.

2. It contains __________ design based templates for topography.

a) SMTP

b) HTML

c) MQTP

d) CoAP

View Answer

Answer: b

Explanation: It contains HTML and CSS based design templates for typography, forms, buttons,
navigation and other interface components, as well as optional JavaScript extensions.
3. Bootstrap is a front end development only.

a) True

b) False

View Answer

Answer: a

Explanation: Unlike many web frameworks, it concerns with front-end development only.

4. __________ stars and __________forks are there in bootstrap.

a) 111,600 and 51,500

b) 51,500 and 111,600

c) 125,124 and 36,154

d) 36,154 and 125,124

View Answer

Answer: a

Explanation: Bootstrap is the second most starred project on GitHub, with more than 111,600 stars
and 51,500 forks.

5. Bootstrap was originally named as __________

a) Twitter Bootstrap

b) Twinkle Bootstrap

c) Twitter Blueprint

d) Twinkle Blueprint

View Answer

Answer: c

Explanation: Bootstrap, originally named as Twitter Blueprint, was developed by Mark Otto, and
Jacob Thornton at Twitter as a framework to encourage consistency across internal tools.

6. Which bootstrap has twelve column responsive grid layout system?

a) Bootstrap 4

b) Bootstrap 3

c) Bootstrap 2

d) Bootstrap
View Answer

Answer: c

Explanation: Bootstrap 2 was released, which added a twelve column responsive grid layout system,
inbuilt support for Glyphicons, several new components, as well as changes to many of the existing
components.

7. Which bootstrap uses flat design?

a) Bootstrap 2

b) Bootstrap 3

c) Bootstrap 4

d) Bootstrap

View Answer

Answer: b

Explanation: Bootstrap 3 was released, which resigned components to use flat design, and a mobile
first approach.

8. Bootstrap 4 has how many versions?

a) 4 versions

b) 3 versions

c) Only one version

d) 2 versions

View Answer

Answer: d

Explanation: The first alpha version of bootstrap 4 was released on august 19, 2015. The first beta
version was released on august 10 2017.

9. Do bootstrap 3 supports Google chrome.

a) True

b) False

View Answer

Answer: a

Explanation: Bootstrap 3 supports the latest version of the Google Chrome, Firefox, Internet Explorer
Opera, and Safari. In additional support back to IE8 and the latest Firefox Extended Support Release.
10. Does bootstrap 4 supports Sass and flexbox.

a) True

b) False

View Answer

Answer: a

Explanation: The version 4.0 alpha release added Sass and flexbox support.

11. __________ is used instead of less for stylesheets.

a) Hackathon

b) Grid layout

c) Flexbox

d) Sass

View Answer

Answer: d

Explanation: Sass s used instead of less for the stylesheets. Each Bootstrap component consists of an
HTML structure, CSS declaration, and in some cases accompanying JavaScript code.

12. Sass stands for __________

a) Syntactically awesome Spreadsheets

b) Syntactically awesome Stylesheets

c) Scripting awesome Stylesheets

d) Scripting awesome Spreadsheets

View Answer

Answer: b

Explanation: Sass(Syntactically awesome Stylesheets) is a style sheet language initially designed by


Hampton Catlin and developed by Natalie Weizenbaum.

13. Grid system and responsive design come standard with __________ pixel wide grid layout.

a) 1270

b) 1500

c) 1170
d) 1350

View Answer

Answer: c

Explanation: Grid system and responsive design come standard with 1170 pixel wide grid layout.
Alternatively, the developer can use a variable width layout.

14. ___________ provides a set of stylesheets that provide basic style definition for HTML
components.

a) Bootstrap

b) Javascript

c) Sass

d) Flexbox

View Answer

Answer: a

Explanation: Bootstrap provides a set of stylesheets that provide basic style definition for HTML
components. These provide a uniform, modern appearance for formatting text, tables and form
elements.

15. Bootstrap uses what?

a) Pixels

b) Root ems

c) Less

d) Pager component

View Answer

Answer: b

Explanation: Bootstrap 4 is almost rewritten from Bootstrap 3. Changes include:

Switched from Less to Sass

Switched from pixel to root ems.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “FOG Computing”.

1. Fog computing is also known as fogging.


a) False

b) True

View Answer

Answer: b

Explanation: Fog computing or fog networking is also known as fogging, is an architecture that uses
one or more collaborative end-user clients or near-user devices to carry out a substantial amount of
storage, communication, control.

2. Fog computing can be perceived in ___________ and ____________

a) Big data and Cloud systems

b) Big data and IoT

c) Cloud systems and IoT

d) Big data, Cloud systems and IoT

View Answer

Answer: a

Explanation: Fog computing can be perceived both in large cloud systems and big data structures,
making reference to the growing difficulties in accessing information objectively.

3. Fog computing has ____________ and ____________ plane.

a) Control and data

b) Control and Barcode

c) Barcode and Data

d) Data and cloud

View Answer

Answer: a

Explanation: Fog networking consists of a control plane and Data plane. For example, on the data
plane, fog computing enables computing services to reside at the edge of the network as opposed to
servers in a data center.

4. Which of the following computing emphasizes proximity to end user?

a) Mist computing

b) Cloud computing

c) Edge computing
d) Fog computing

View Answer

Answer: d

Explanation: Compared to cloud computing, fog computing emphasizes proximity to end user and
client objectives, dense geographical distribution and local resource pooling.

5. QoS stands for ____________

a) Quality of storage

b) Quality of service

c) Quality of security

d) Quality of swarms

View Answer

Answer: c

Explanation: Quality of service is the description or measurement of the overall performance of a


service, such as telephony or computer network or a cloud computing service, particularly the
performance seen by the users of the network.

6. Does fog support IoT concepts.

a) True

b) False

View Answer

Answer: a

Explanation: Fog networking supports the Internet of Things concept, in which most of the devices
used by humans on a daily basis will be connected to each other.

7. ____________ is prototyping and testing a scalable. Secure Distribution Tolerant Mesh Network
to protect strategic military assets.

a) SPANAR

b) SPAWAR

c) APWANR

d) SPANAR

View Answer

Answer: b
Explanation: SPAWAR, is prototyping and testing a scalable. Secure Distribution Tolerant Mesh
Network to protect strategic military assets, both stationary and mobile.

8. AIDC stands for ____________

a) Automated Identification Data Carriers

b) Automobile Identification Data Carriers

c) Automated Identification Data Computing

d) Automated Identification Device Carriers

View Answer

Answer: a

Explanation: ISO/IEC 20248 provides whereby the data of objects identified by edge computing using
Automated Identification Data Carriers a Barcode and/or RFID tag, can be read, interpreted, verified
and made available into the fog and on the edge even the AIDC tag has moved on.

9. ____________ practice of using a network of remote servers hosted on the Internet of store.

a) Mist Computing

b) Fog computing

c) Cloud computing

d) Mobile cloud computing

View Answer

Answer: c

Explanation: Cloud computing is the practice of using a network of remote servers hosted on the
Internet of store, manage, and process data, rather than a local server or a personal computer.

10. Which computing can be heavy weight and dense form of computing power?

a) Mobile Cloud computing

b) Fog computing

c) Mist computing

d) Cloud computing

View Answer

Answer: d
Explanation: Cloud computing is the practice of using a network of remote servers hosted on the
Internet of store, manage, and process data, rather than a local server or a personal computer.
Cloud computing can be heavyweight and dense form of computing power.

11. ____________ Computing is the extension of cloud computing.

a) Mobile cloud computing

b) Mist computing

c) Fog computing

d) Cloud computing

View Answer

Answer: c

Explanation: Fog computing refers to extending cloud computing to the edge of an enterprise’s
network. Fog computing facilitates the operation of computer, storage, and networking services
between end devices and computing data centers.

12. ____________ computing is medium weighted.

a) Mobile cloud computing

b) Cloud computing

c) Mist computing

d) Fog computing

View Answer

Answer: d

Explanation: Fog computing is a medium weight and intermediate level of computing power.

13. ____________ are rudimentary form of computing.

a) Mist computing

b) Fog computing

c) Mobile cloud computing

d) Cloud computing

View Answer

Answer: a

Explanation: Mist computing is a rudimentary form of computing power that resides directly within
the network fabric at the extreme edge of the network fabric.
14. _____________ is a lightweight computing.

a) Cloud computing

b) Mobile cloud computing

c) Mist computing

d) Fog computing

View Answer

Answer: c

Explanation: Mist computing is a lightweight and rudimentary form of computing power that resides
directly within the network fabric at the extreme edge of the network fabric.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Application of Fog
Computing”.

1. Fog computing is utilized to _________ all debris into a single platform.

a) Integrate

b) Store

c) Task

d) Flexible

View Answer

Answer: a

Explanation: Some tasks require large amount of computation and storage, eg., real time video
analytics, are infeasible due to the limited capacity of hardware. To solve these problems, fog
computing is utilized to integrate all debris into a single platform.

2. OpenFog Consortium defines and extends the application of _______ computing.

a) Mist computing

b) Edge computing

c) Cloud computing

d) Mobile Cloud computing

View Answer

Answer: b
Explanation: OpenFog Consortium defines and extends the application of fog computing.

3. Cloud computing must work _______ with fog computing to provide a seamless end to end
customer experiences.

a) Seamlessly

b) Scalable

c) Control

d) Multiple services

View Answer

Answer: a

Explanation: Cloud computing must work seamlessly with fog computing to provide a seamless end
to end customer experiences, said Antunes.

4. Fog computing works well in cloud based _______ panel

a) Cloud

b) Data

c) Control

d) Fog

View Answer

Answer: c

Explanation: Fog computing works well in a cloud based control plane to provide control and
broader insight across a large numbers of nodes.

5. Challenges can be addressed within a single IoT network by _______

a) Fog node

b) Cloud node

c) Data

d) Control

View Answer

Answer: a

Explanation: Large cities face challenges from traffic congestion, public safety, high energy use.
These challenges can be addressed within a single IoT network by installing a network of fog node.
6. Lack of broadband _______ and connectivity is a major issue in establishing smart cities.

a) Storage

b) Bandwidth

c) Address

d) Services

View Answer

Answer: b

Explanation: A lack of broadband bandwidth and connectivity is a major issue in establishing smart
cities. While most of the modern cities have one or more cellular networks providing adequate
coverages.

7. Fog computing addresses security, data encryption.

a) True

b) False

View Answer

Answer: a

Explanation: Fog computing addresses security, data encryption and distributed analytics
requirements.

8. Building automation demonstrates the need for _______

a) Edge intelligence

b) Sensors

c) Control function

d) Local operations

View Answer

Answer: a

Explanation: Building automation demonstrates the need for edge intelligence and localized
processing.

9. A commercial building may contain mainly _______ component.

a) Memory
b) Fog node

c) Cloud nodes

d) Sensors

View Answer

Answer: d

Explanation: A commercial building may contain thousands of sensors to measure various building
operating parameters: temperature, keypad readers and parking space occupancy.

10. Who will do actions if it is needed?

a) Fog node

b) Fog computing

c) Devices

d) Controller

View Answer

Answer: b

Explanation: Data from sensors must be analyzed to see if actions are needed, such as triggering a
fire alarm if smoke is sensed. Fog computing allows for autonomous local operations for optimized
control function.

11. Fog node is ___________

a) Floor

b) Wing

c) Individual room

d) Floor and Wing

View Answer

Answer: d

Explanation: Each floor, wing or even individual room could contain its own fog node that is
responsible for performing emergency monitoring and response functions.

12. Fog computing works with cloud computing.

a) False

b) True
View Answer

Answer: b

Explanation: Fog computing works with cloud computing, so the long term history of building
operational telemetry and control actions can be aggregated and uploaded to the cloud.

13. What is OpenFog?

a) Software

b) Device

c) Derived from fog computing

d) Architecture

View Answer

Answer: d

Explanation: The OpenFog architecture specifies a secure end to end computer environment
between the cloud and the fog nodes that connect to IoT devices.

14. IoT devices use _______ for security.

a) Cloud

b) Software

c) Immutable

d) Fognode

View Answer

Answer: c

Explanation: These devices use a hardware-based immutable root of trust, which can be attested by
software agents running throughout the infrastructure.

15. Fog computing allows for latency sensitive distributed surveillance that maintains privacy.

a) True

b) False

View Answer

Answer: a

Explanation: Fog computing allows for latency sensitive distributed surveillance that maintains
privacy because privacy concerns must be addressed when using a camera as a sensor.
This set of IOT MCQs focuses on “Publishing Data to the Cloud with Dweepy”.

1. Dweet.io is used for __________

a) Sharing data

b) Storage

c) Publishing data

d) Alerting devices

View Answer

Answer: c

Explanation: dweet.io is used to publish the data retrieved from the sensors and make it available to
different computers and devices all over the world.

2. What utility of dweet.io allows publishing data?

a) Data sharing

b) Publishing data

c) Storage

d) Alerting devices

View Answer

Answer: a

Explanation: The dweet.io data sharing utility allows us to easily publish data or messages and alerts
from IoT devices and then use other devices to subscribe to this data.

3. dweet.io is similar as __________

a) GIUD

b) Insta

c) Web api

d) Twitter

View Answer

Answer: d

Explanation: dweet.io data sharing utility defines itself as something similar to twitter for social
machines.
4. dweet.io provides __________ to send data from IoT devices.

a) JSON

b) HTTP

c) Web API

d) POST HTTP

View Answer

Answer: c

Explanation: The dweet.io data sharing utility provides we api that we can send data from our IoT
device, known as thing in dweet.io documentation.

5. GUID full form is ___________

a) Global Unique Identifier

b) Global User Identifier

c) Gradual User Identifier

d) Gradual Unique Identifier

View Answer

Answer: a

Explanation: We have to choose a unique name for our thing. It is convenient to combine a string
with a GUID(Global Unique Identifier).

6. The processing of publishing data is called as __________

a) Yocto

b) Thing

c) Dweepy

d) Dweeting

View Answer

Answer: d

Explanation: Once we have chosen a unique for one thing, we can start publishing data, a process
known as Dweeting.

7. Dweepy is a simple python client for dweet.io.


a) False

b) True

View Answer

Answer: b

Explanation: Dweepy is a simple python client for dweet.io that allows us to easily publish data to
dweet.io with python.

8. Dictionary here define what?

a) Key-value pairs

b) JASON

c) dweet.io

d) Yocto

View Answer

Answer: a

Explanation: The dictionary defines the key value pairs that we want to send as JASON data to
dweet.io for our thing. The keys may be the values what we want to know like, temperature,
humidity etc.

9. The visual view displays what?

a) Pie graph

b) Bar graph

c) Line graph

d) Histograms

View Answer

Answer: c

Explanation: The visual view displays line graph of whatever we want the information that is getting
from the sensors. Examples are temperature and humidity values.

10. ________ Command is used to retrieve the latest dweet made for our thing.

a) HTTP

b) HTTPie

c) cURL
d) RESTful API

View Answer

Answer: b

Explanation: HTTPie command in any computer or device to retrive the latest dweet made for our
thing.

This set of IOT MCQs focuses on “Publishing Data to the Cloud with Dweepy”.

1. Dweet.io is used for __________

a) Sharing data

b) Storage

c) Publishing data

d) Alerting devices

View Answer

Answer: c

Explanation: dweet.io is used to publish the data retrieved from the sensors and make it available to
different computers and devices all over the world.

2. What utility of dweet.io allows publishing data?

a) Data sharing

b) Publishing data

c) Storage

d) Alerting devices

View Answer

Answer: a

Explanation: The dweet.io data sharing utility allows us to easily publish data or messages and alerts
from IoT devices and then use other devices to subscribe to this data.

3. dweet.io is similar as __________

a) GIUD

b) Insta

c) Web api
d) Twitter

View Answer

Answer: d

Explanation: dweet.io data sharing utility defines itself as something similar to twitter for social
machines.

4. dweet.io provides __________ to send data from IoT devices.

a) JSON

b) HTTP

c) Web API

d) POST HTTP

View Answer

Answer: c

Explanation: The dweet.io data sharing utility provides we api that we can send data from our IoT
device, known as thing in dweet.io documentation.

5. GUID full form is ___________

a) Global Unique Identifier

b) Global User Identifier

c) Gradual User Identifier

d) Gradual Unique Identifier

View Answer

Answer: a

Explanation: We have to choose a unique name for our thing. It is convenient to combine a string
with a GUID(Global Unique Identifier).

6. The processing of publishing data is called as __________

a) Yocto

b) Thing

c) Dweepy

d) Dweeting

View Answer
Answer: d

Explanation: Once we have chosen a unique for one thing, we can start publishing data, a process
known as Dweeting.

7. Dweepy is a simple python client for dweet.io.

a) False

b) True

View Answer

Answer: b

Explanation: Dweepy is a simple python client for dweet.io that allows us to easily publish data to
dweet.io with python.

8. Dictionary here define what?

a) Key-value pairs

b) JASON

c) dweet.io

d) Yocto

View Answer

Answer: a

Explanation: The dictionary defines the key value pairs that we want to send as JASON data to
dweet.io for our thing. The keys may be the values what we want to know like, temperature,
humidity etc.

9. The visual view displays what?

a) Pie graph

b) Bar graph

c) Line graph

d) Histograms

View Answer

Answer: c

Explanation: The visual view displays line graph of whatever we want the information that is getting
from the sensors. Examples are temperature and humidity values.
10. ________ Command is used to retrieve the latest dweet made for our thing.

a) HTTP

b) HTTPie

c) cURL

d) RESTful API

View Answer

Answer: b

Explanation: HTTPie command in any computer or device to retrive the latest dweet made for our
thing.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Building a Web- based
Dashboard”.

1. _________ is used to visualize data collected with the sensor.

a) freeboard.io

b) Dweet.io

c) Dweeting

d) Yocto

View Answer

Answer: a

Explanation: freeboard.io visualize the data collected with the sensor and published to dweet.io in
many gauges and make the dashboard available to different computers and devices all over the
world.

2. Freeboard.io allows us to build ________

a) Application

b) Dashboard

c) Device

d) Output

View Answer

Answer: b

Explanation: Freeboard.io allows us to build a dashboard by selecting data source and dragging and
dropping customizable widgets.
3. freeboard.io itself defines as ________

a) Data based service

b) Fog based service

c) Cloud based service

d) Signals based service

View Answer

Answer: c

Explanation: Freeboard.io defines itself as a cloud based service that allows us to visualize the
internet of things.

4. Gauge will display the latest value that is running in the board.

a) True

b) False

View Answer

Answer: a

Explanation: The gauge will display the latest value that the code running in the board dweeted for
the ambient temperature in degree Fahrenheit.

5. Which application feature is a world of warcraft gadget?

a) Leftronic

b) Ducksboard

c) Klipfolio

d) Dashzen

View Answer

Answer: d

Explanation: Dashzen contains many gadgets. One unique feature of Dashzen is that world of
Warcraft Gadget.

6. Which application supports Google Spreadsheets?

a) Dashzen

b) Ducksboard
c) Klipfolio

d) Leftronic

View Answer

Answer: b

Explanation: Ducksboard can tap many sites APIs to display data, but it also offers its own API, which
lets you send your own data into your dashboard. Ducksboard supports Google spreadsheets as a
data source.

7. Which application allows a number of unique background images?

a) Dashzen

b) Ducksboard

c) Klipfolio

d) Leftronic

View Answer

Answer: b

Explanation: Ducksboard offers a number of unique background images including the default, which
looks like wood flooring.

8. Which application allows us to build data source against many types of data?

a) Dashzen

b) Ducksboard

c) Klipfolio

d) Leftronic

View Answer

Answer: c

Explanation: Unlike other products, Klipfolio doesn’t just link up to existing APIs. It also allows us to
build data source against many types of data, including Excel, CSV.

9. ________ uses a clean interface to provide data.

a) Dashzen

b) Ducksboard

c) Klipfolio
d) Dash

View Answer

Answer: d

Explanation: Dash uses a clean interface to provide data from various social and new sites, as well as
websites monitoring tools and fitness tracking sites.

10. Dash supports static images.

a) True

b) False

View Answer

Answer: a

Explanation: The dash supports static images and text as well as a clock widget and weather widget.

This set of IOT Multiple Choice Questions & Answers focuses on “Sending and Receiving Data in Real
Time Through Internet”.

1. _________ allows us to control electronic components

a) RETful API

b) RESTful API

c) HTTP

d) MQTT

View Answer

Answer: a

Explanation: RETful API that allows us to control electronic components connected to our Intel
Galileo Gen 2 board through HTTP requests.

2. MQTT stands for _____________

a) MQ Telemetry Things

b) MQ Transport Telemetry

c) MQ Transport Things

d) MQ Telemetry Transport

View Answer
Answer: d

Explanation: MQTT was known as MQ Telemetry Transport protocol. MQTT is a lightweight protocol
that runs on top of the TCP/IP protocol.

3. MQTT is better than HTTP for sending and receiving data.

a) True

b) False

View Answer

Answer: a

Explanation: We want to send and receive data in real time through internet and RESTful API is not
the most appropriate option to do this. Instead, we will work on MQTT which is lighter than HTTP.

4. MQTT is _________ protocol.

a) Machine to Machine

b) Internet of Things

c) Machine to Machine and Internet of Things

d) Machine Things

View Answer

Answer: c

Explanation: The MQTT protocol is a machine to machine and Internet of thing connectivity protocol.

5. Which protocol is lightweight?

a) MQTT

b) HTTP

c) CoAP

d) SPI

View Answer

Answer: a

Explanation: MQTT is a lightweight protocol that runs on top of the TCP/IP protocol and works with
publish subscribe mechanism.

6. PubNub publishes and subscribes _________ in order to send and receive messages.
a) Network

b) Account

c) Portal

d) Keys

View Answer

Answer: d

Explanation: It is necessary to generate our PubNub publishes and subscribes keys in order to send
and receive messages in the network.

7. By clicking which key the PubNub will display public, subscribe, and secret keys.

a) Pane

b) Demo Keyset

c) Portal

d) Network

View Answer

Answer: b

Explanation: Click on Demo keyset pane and PubNub will display public, subscribe, and secret keys.
We must copy and paste each of these keys to use them in our code that will publish messages and
subscribe to them.

8. The messageChannel class declares the _________ class attribute that defines the key string.

a) command_key

b) command-key

c) commandkey

d) Key_command

View Answer

Answer: a

Explanation: The messageChannel class declares the command_key class attribute that defines the
key string that defines what the code will understand as the command.

9. _________ method saves the received arguments in three attributes.

a) __Init
b) Init__

c) __Init__

d) _init_

View Answer

Answer: c

Explanation: __Init__ method saves the received arguments in three attributes with the same
names.

10. _________ and _________ saves the publish and subscribe keys that we have generated with
the PubNub Admin portal.

a) public_key and subscribe_key

b) Public-key and subscribe-key

c) publickey and subscribekey

d) Key_public and key_subscribe

View Answer

Answer: a

Explanation: Then, the constructor declares two local variables: public_key and subscribe_key. These
local variables save the public and subscribe keys that we had generated with the PubNub Admin
portal.

11. _________ specifies the function that will be called when there is a new message received from
the channel.

a) Reconnect

b) Error

c) Connect

d) Callback

View Answer

Answer: d

Explanation: The call to this message specifies many methods declared in the MessageChannel class

Callback: specifies the function that will be called when there is a new message received from the
channel.

12. _________ specifies the function that will be called on an error event.
a) Callback

b) Error

c) Connect

d) Reconnect

View Answer

Answer: b

Explanation: The call to this message specifies many methods declared in the MessageChannel class

Error: specifies the function that will be called on an error event.

13. _________ Specifies the function that will be called when a successful connection with the
PubNub cloud.

a) Callback

b) Error

c) Connect

d) Reconnect

View Answer

Answer: c

Explanation: The call to this message specifies many methods declared in the MessageChannel class

Connect: specifies the function that will be called when a successful connection with the PubNub
cloud.

14. _________ specifies the function that will be called when a successful re-connection is
completed.

a) Callback

b) Error

c) Connect

d) Reconnect

View Answer

Answer: d

Explanation: The call to this message specifies many methods declared in the MessageChannel class

Reconnect: specifies the function that will be called when a successful re-connection is completed
with the PubNub cloud.
15. ___________ specifies the function that will be called when the client disconnects.

a) Callback

b) Error

c) Connect

d) Disconnect

View Answer

Answer: d

Explanation: The call to this message specifies many methods declared in the MessageChannel class

Disconnect: specifies the function that will be called when the client disconnects from the PubNub
cloud.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Publishing Messages with
Commands”.

1. What is the java extension file in IoT?

a) .jar

b) .c

c) .exe

d) .py

View Answer

Answer: a

Explanation: Java IDE to run the example in any computer or build .jar file with all the dependencies
included and launch it any computer or devices that you want to use as the MQTT client with a
command similar to the following line.

2. Do we run our program in the same computer where we have written?

a) True

b) False

c) May or may not

d) Cannot be determined

View Answer
Answer: c

Explanation: In case you don’t run the example in the same computer in which you are running the
MQTT server, remember to change the value for the mqttServerHost string in the main method of
the Main class.

3. Publish command message is sent from _________

a) Only publisher to broker

b) Only broker to publisher

c) Publisher to broker and broker to publisher

d) Server to client

View Answer

Answer: c

Explanation: The public command message is sent from a publisher to a broker or from a broker to a
subscriber, to publish information on a specified topic or topics.

4. The message is sent to the input queue of a message flow that contains a _________

a) Subscriber

b) Server

c) Publication node

d) Client

View Answer

Answer: d

Explanation: Message is sent to the input queue of a message flow that contains a publishing node.
Authority to put a message into the queue and to publish on the specified topic.

5. Does user has authority for all topics.

a) True

b) False

View Answer

Answer: b

Explanation: If the user has no authority on topic a warning response will come which indicates
which are not published, if not those topics are published.
6. ROSTOPIC uses _________ at the command line for representing the content of the message.

a) YAML_syntax

b) rostopic bw

c) rostopic delay

d) rostopic echo

View Answer

Answer: a

Explanation: ROSTOPIC uses YAML_syntax at the command line for representing the content of the
message. For information on how to use this YAML syntax for commands like rostopic pub.

7. Which command displays the band width?

a) rostopic hz

b) rostopic delay

c) rostopic echo

d) rostopic bw

View Answer

Answer: d

Explanation: Rostopic bw displays the bandwidth. The bandwidth reported is the received
bandwidth. If there are network connectivity issues or rostopic cannot keep up with the publisher.

8. rostopic delay will provide delay for ___________

a) Topics which has header

b) Topics which has tail

c) Topics which has tail and head

d) To all topics

View Answer

Answer: a

Explanation: Rostopic delay display the delay for topic which has header. Rostopic is implemented in
python.

9. Which command displays messages published to a topic?

a) rostopic bw
b) rostopic delay

c) rostopic echo

d) rostopic hz

View Answer

Answer: c

Explanation: Rostopic echo displays messages published to a topic. Rostopic is implemented in


python.

10. Which command finds out the topic?

a) rostopic bw

b) rostopic delay

c) rostopic echo

d) rostopic find

View Answer

Answer: d

Explanation: Rostopic find, finds topics by type. Rostopic is implemented in python. ROSTOPIC uses
YAML_syntax at the command line

This set of IOT Questions and Answers for Entrance exams focuses on “Publishing Messages to the
Cloud”.

1. Publishing messages is handled through ________ Class.

a) Client()

b) Server()

c) Publish()

d) Batch()

View Answer

Answer: a

Explanation: Publishing message is handled through the client class(aliased as google-cloud-pubsub-


publisherclient).

2. client() class provides ________ to create topics.


a) Software

b) Classes

c) Methods

d) Batch

View Answer

Answer: c

Explanation: client() class provides the method to create topics. publish() method publishes
messages to pub/sub. Publishing message is handled through the client class.

3. ________ method publishes messages to pub/sub.

a) Client()

b) Publish()

c) Server()

d) Batch()

View Answer

Answer: b

Explanation: While client() provides method to create topics, publish() method publishes messages
to pub/sub.

4. How many arguments are accepted by publish()?

a) 5 arguments

b) 3 arguments

c) 1 argument

d) 2 arguments

View Answer

Answer: d

Explanation: This method accepts two positional arguments: the topic to publish to, and the body of
the message.

5. Does publish() method accepts arbitrary arguments.

a) True

b) False
View Answer

Answer: a

Explanation: Publish() method also accepts arbitrary keyword arguments, which are passed along as
attributes of the message.

6. The topic in the publish method is in which form?

a) Binomial form

b) Canonical form

c) Nominal form

d) Message form

View Answer

Answer: b

Explanation: The topic is passed along as a string; all topics have the canonical form of
projects/{project_name}/topic/{topic_name}.

7. The message in pub/sub is an opaque blob of ________

a) Bits

b) Bytes

c) Word

d) Nibble

View Answer

Answer: b

Explanation: The message in pub/sub is an opaque blob of bytes, and as such, you must send a bytes
object in python 3.

8. ________ error will show if we try to send text string instead of bytes.

a) TypeError

b) Error

c) Linker error

d) Compiler error

View Answer

Answer: a
Explanation: If we send a text string the method will raise TypeError. TypeError will show if we try to
send text string instead of bytes.

9. What do we call string in python 2?

a) Str

b) Unicode

c) Strs

d) Unicades

View Answer

Answer: b

Explanation: In python 2 the text string is called as str, and in python 2 it is called as unicode.

10. When you publish a message ________ is automatically created?

a) Client

b) Server

c) Batch

d) Server

View Answer

Answer: c

Explanation: Whenever we publish a message, a batch is automatically created. This way, if you
publish a large volume of messages, it reduces the number of requests made to the server.

11. When the batch is created, it begins a countdown that publishes the batch once sufficient time
has elapsed.

a) True

b) False

View Answer

Answer: a

Explanation: When the batch is created, it begins a countdown that publishes the batch once
sufficient time has elapsed.

12. What is the time elapsed after a batch is created?


a) 0.5 seconds

b) 0.05 seconds

c) 1.5 seconds

d) 1 second

View Answer

Answer: b

Explanation: When the batch is created, it begins a countdown that publishes the batch once
sufficient time has elapsed by default it is 0.05 seconds.

13. Every call to publish() will return a class that conforms to the __________ interface.

a) Batch

b) Client

c) Server

d) Future

View Answer

Answer: d

Explanation: Every call to publish() will return a class that conforms to the future interface. You can
use this to ensure that the publish.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Cloud – Powerful Smart
Mobile Devices”.

1. IaaS stands for __________

a) Infrastructure as a Service

b) Infrastructure as a Software

c) Internet as a Service

d) Internet as a Software

View Answer

Answer: a

Explanation: Cloud Computing delivers infrastructure, platform, and software that are provided as
services on the usage based payment to end users. These services are Infrastructure as a Service
(IaaS).
2. Mobile cloud computing at its simplest refers to an __________

a) Intervention

b) Internet

c) Infrastructure

d) Intervention & Internet

View Answer

Answer: c

Explanation: Mobile cloud computing at its simplest refers to an infrastructure where both data
storage and the data processing happen outside of the mobile devices.

3. Mobile Cloud applications move the __________ Power and __________ away from mobile
phone and into cloud.

a) Computing and internet

b) Data storage and computing

c) Computing and data storage

d) Internet and computing

View Answer

Answer: c

Explanation: Mobile cloud applications move the computing power and data storage away from
mobile phones and into the cloud, bringing applications and mobile computing to not just smart
phone users but a much broader range of mobile subscribers.

4. SaaS stands for __________

a) Service as a Smartphone

b) Service as a software

c) Smartphone as a service

d) Software as a Service

View Answer

Answer: d

Explanation: Cloud computing delivers infrastructure, platform, and software that are provided as
services on the usage based payment to end users. These services are Software as a Service (SaaS).
5. __________ reduces the development and running cost of mobile applications on smartphone
devices.

a) Infrastructure

b) Productive business

c) Software

d) Services

View Answer

Answer: b

Explanation: It is a productive business choice that transfers data from smartphone devices to
powerful and centralized computer platform located in the cloud. Thus reducing the development
and running cost of mobile applications on smartphone devices.

6. PaaS stands as __________

a) Platform as a Software

b) Photo as a service

c) Platform as a Service

d) Photo as a Software

View Answer

Answer: c

Explanation: Cloud Computing delivers infrastructure, platform, and software that are provided as
services on the usage based payment to end users. These services are Platform as a Service (PaaS).

7. The architecture of MCC is such that various mobile devices are connected to their respective
mobile networks via __________

a) Software

b) Satellite

c) Access point

d) Base Station

View Answer

Answer: d

Explanation: The architecture of MCC is such that various mobile devices are connected to their
respective mobile networks via base station.
8. MCC stands for Mobile Cloud Computation.

a) True

b) False

View Answer

Answer: a

Explanation: The advancement in cloud computing is leading to an excessive growth of mobile


devices that can become powerful means for information access and mobile applications.
Introducing a latent technology called Mobile Cloud Computing.

9. __________ is the minimum value which an application shall exceed to be offloaded.

a) Static value

b) Critical value

c) Threshold value

d) Dynamic value

View Answer

Answer: c

Explanation: Threshold value is the minimum value which an application shall exceed to be
offloaded. The threshold value can be measured in terms of processing time, energy consumption
and memory usage.

10. Offloading decision depends upon __________ to be offloaded.

a) Size of application

b) Threshold value

c) Critical value

d) Dynamic value

View Answer

Answer: a

Explanation: Offloading decision depends upon the size of application to be offloaded. It saves
energy for a code compilation, if size of the code is large.

11. The part of the code which involves complex computations and requires more time to execute is
referred to as __________

a) Static session
b) Threshold session

c) Dynamic session

d) Critical session

View Answer

Answer: d

Explanation: The part of the code which involves complex computations and requires more time to
execute is referred to as critical session. The module of the application if falls under the critical
section then it is offloaded.

12. In __________ offloading application is partitioned during development.

a) Static offloading

b) Dynamic offloading

c) Threshold offloading

d) Critical offloading

View Answer

Answer: a

Explanation: In static offloading application is partitioned during development. In static


environment, parameters such as data size and execution time which acts as a deciding factor for
offloading are known beforehand.

13. __________ network environment means changing connection status.

a) Static offloading

b) Dynamic offloading

c) Threshold offloading

d) Critical offloading

View Answer

Answer: b

Explanation: Dynamic network environment means changing connection status and bandwidth that
affect the process of offloading.

14. __________ is defined as delay between the offloading and final result.

a) Latency rate

b) Network Bandwidth
c) Heterogeneity

d) Migration Cost

View Answer

Answer: a

Explanation: Latency rate is defined as delay between the offloading of an application on the cloud
and final results to be retracted back to the smartphone.

15. _____________ Depends upon the amount of the code being offloaded.

a) Latency rate

b) Network Bandwidth

c) Heterogeneity

d) Migration Cost

View Answer

Answer: b

Explanation: Bandwidth Utilization depends on the amount of the code being offloaded. If large
amount of data is to be offloaded to the cloud then it ultimately increases the latency rate which in
turn affects the efficiency.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Cloud – Runtime Adaption
Engine”.

1. QoE stands for _________

a) Quality of Energy

b) Quality of Experience

c) Quality of Envelop

d) Quality of Encryption

View Answer

Answer: b

Explanation: If the light weight query engine returns a poor result, then the user may have to issue
my query redundantly to the cloud based query processing engine with the hope of getting a better
result. This may hurt the overall Quality of Experience.

2. The RAE learns the _________ algorithm to learn the most cost effective policy.
a) Logistic Regression

b) Device/cloud algorithm

c) QoE algorithm

d) Anatomous algorithm

View Answer

Answer: a

Explanation: The RAE learns the logistic regression algorithm to learn the most cost effective policy
for distributing the task among devices and cloud, given the resource state.

3. _________ is the weighted sum of resource state, network, and cpu.

a) Logistic Regression

b) Cloud

c) Device

d) Cost function

View Answer

Answer: d

Explanation: The cost function is the weighted sum of resource state, network, and CPU usage.

4. The policy obtained by running logistic regression is enforced by _________ module.

a) Device/cloud section

b) Only device

c) Only Cloud

d) Cost function

View Answer

Answer: a

Explanation: The policy obtained by running logistic regression is enforced by Device/cloud section
module, based on the expected cost value for a given task.

5. The mechanism of the RAE is _________ which can be deployed on each device and cloud.

a) QoE

b) Logistic regression

c) Anatomous agent
d) Device/cloud

View Answer

Answer: c

Explanation: The mechanism of the RAE is anatomous agent, which can be deployed on each device
and cloud.

6. OAD stands for ___________

a) Optimal Application Distribution

b) Orientational Application Distribution

c) Orientation Application Development

d) Optimal Application Development

View Answer

Answer: a

Explanation: The exponential growth of cloud service offering in the last year has increased the
number of alternative for engineering and re-engineering applications to be partially or completely
run in a cloud environment.

7. _________ enables the application developer to enhance the application design.

a) Cloud Blueprint

b) TOSCA standard

c) Both Cloud blueprint and TOSCA standard

d) Utility function

View Answer

Answer: c

Explanation: TOSCA standard and Cloud Blueprint enable the application developer to enhance the
application design by providing the means to model which cloud offering is used to host which parts
of the application stack.

8. _________ process must support the analysis and evaluation of the application topology.

a) Support of different Migration types

b) Enrichment of Topology specification

c) Management and Configuration

d) Top-down and bottom-up


View Answer

Answer: d

Explanation: Top-down and bottom-up application evaluation process must support the analysis and
evaluation of the application topology alternatives both based on previous knowledge and empirical
analysis, and during the application productive phase.

9. _________ process has to support the definition of application topologies in various formats.

a) Top-down and bottom-up

b) Enrichment of Topology specification

c) Management and Configuration

d) Support of different Migration types

View Answer

Answer: b

Explanation: Enrichment of Topology specification process has to support the definition of


application topologies in various formats such as TOSCA or Blueprints and must consider non-
functional aspects specified as extension of the previous formats.

10. Any tool providing _________ process must provide management and configuration for cloud
services.

a) Top-down and bottom-up

b) Enrichment of Topology specification

c) Management and Configuration

d) Support of different Migration types

View Answer

Answer: c

Explanation: Any tool providing Management and Configuration process must provide management
and configuration for cloud services from different providers covering all cloud service and delivery
models.

11. In order to re- distribute an application _________ process has to support all cloud native and
non cloud native applications.

a) Top-down and bottom-up

b) Enrichment of Topology specification

c) Management and Configuration


d) Support of different Migration types

View Answer

Answer: d

Explanation: In order to re- distribute an application support of different migration types process has
to support all cloud native and non cloud native application types identified.

12. _________ process must support the characterization of different adaptation actions.

a) Characterization of adaptation strategies

b) Independence of Architectural Paradigm

c) Support and reaction to application resources

d) Support of hardware

View Answer

Answer: a

Explanation: Characterization of adaptation strategies process must support the characterization of


different adaptation actions that can be used during run time for a given application.

13. In _________ the application to be re directional is based on 3-layered architecture.

a) Characterization of adaptation strategies

b) Independence of Architectural Paradigm

c) Support and reaction to application resources

d) Support of hardware

View Answer

Answer: b

Explanation: In Independence of Architectural Paradigm the application to be re directional is based


on 3-layered architecture, must be supported.

14. As the workload of an application is subjected to fluctuation over time _________ process must
support the identification.

a) Characterization of adaptation strategies

b) Independence of Architectural Paradigm

c) Support and reaction to application resources

d) Support of hardware
View Answer

Answer: c

Explanation: s the workload of an application is subjected to fluctuation over time support and
reaction to application resources demand evolution process must support the identification.

15. _________ process must consider such characteristics for optimizing the overall application
performance.

a) Characterization of adaptation strategies

b) Independence of Architectural Paradigm

c) Support and reaction to application resources

d) Support of hardware

View Answer

Answer: d

Explanation: Support of hardware, software, application characteristics process must consider such
characteristics for optimizing the overall application performance.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Cloud – Privacy Protection
Solution”.

1. Privacy protection solution was proposed with KP-ABE and CP-ABE.

a) True

b) False

View Answer

Answer: a

Explanation: The hybrid privacy protection solution was proposed with KP-ABE and CP-ABE. This way
chosen different way to encrypt the privacy information based on user attributions according to
cloud service business type.

2. _________ consumers investing in general data protection needs in multiple dimensions.

a) Normal

b) Business

c) Office

d) Third Party
View Answer

Answer: b

Explanation: Business consumers investing in general data protection needs in multiple dimensions.
First, the type of device they need to support determines one continuum to potential solutions from
desktop through to mobile phones. Second, the location of the data determines another axis for
consideration, either on the device or stored in the cloud.

3. Software that address the data protection is divided into _________ Segments.

a) 1 segment

b) 2 segments

c) 4 segments

d) 3 segments

View Answer

Answer: d

Explanation: Because of the two factors, it’s possible to divide software that addresses data
protection into three segments:

Cloud privacy protection

Endpoint protection

Mobile device management.

4. _________ segment contributing to protection of data on device.

a) Endpoint Protection

b) Cloud Privacy Protection

c) Mobile Device Management

d) Cloud

View Answer

Answer: a

Explanation: The oldest segment contributing to protection of data on device is End Point Protection.
EPP also indicates protection for device integrity, including protection against malware, etc.,

5. _________ segment indicates protection for device integrity.

a) Endpoint Protection

b) Cloud Privacy Protection


c) Mobile Device Management

d) Cloud

View Answer

Answer: a

Explanation: The oldest segment contributing to protection of data on device is End Point Protection.
EPP also indicates protection for device integrity, including protection against malware, etc.,

6. EPP approach favours _________ data into the device.

a) UnLocking

b) Locking

c) Blocking

d) Unblocking

View Answer

Answer: b

Explanation: For data protection, End Point Protection approach favour locking data into the device
through full disk encryption port control, auditing and restriction of data prior to release from the
device and other similar mechanisms.

7. End Point Protection primarily focused around deployment on _________

a) Laptops

b) Desktops

c) Both laptops and desktops

d) Phones

View Answer

Answer: c

Explanation: End Point Protection primarily focused around deployment on desktops and laptops
although some endpoint protection exists for mobile devices. In these cases, EPP overlaps with
MDD.

8. _________ is concerned with management of mobile.

a) Endpoint Protection

b) Cloud Privacy Protection

c) Mobile Device Management


d) Cloud

View Answer

Answer: c

Explanation: Mobile Device Management is primarily concerned with management of mobile


devices. Solution often consists of configuration, network, and services management on mobile
devices.

9. Is mobile device management similar to that of end point protection with respect to locking?

a) True

b) False

View Answer

Answer: a

Explanation: For data protection, mobile device management, in similar fashion to end point
protection favors locking data on the devices so that it cant be compromised.

10. How MDM will achieve locking mechanism?

a) Wrapping

b) Controlling

c) Both wrapping and controlling

d) Encryption

View Answer

Answer: c

Explanation: Mobile device management achieves this by wrapping and controlling access by all
applications on the device.

11. MDM is focused on _________

a) Laptops

b) Tablets

c) Both phones and tablets

d) Phones

View Answer

Answer: c
Explanation: MDM id focused on mobile devices, including mobile phones and tablets. As the line
between less distinct, mobile device management will overlap capabilities with end point protection.

12. _________ complicates _________ and _________

a) MDM, EPP and CPP

b) EPP, CPP and MDM

c) MDM, CPP and EPP

d) CPP, EPP and MDM

View Answer

Answer: d

Explanation: The new cloud privacy protection segment complicates end point protection and
mobile device management. It embraces the inevitable movement of data off device across all the
devices of an enterprise.

13. _________ enables the use of cloud sync and storage.

a) Inevitable movement of data

b) Encryption

c) Wrapping

d) Controlling

View Answer

Answer: a

Explanation: The inevitable movement of data off device across all the devices of an enterprise. This
enables the use of cloud sync and storage by desktops and laptops beyond the device boundary
where EPP provides protection.

14. It enables _________ use of mobile devices without requiring the lockdown of data.

a) own-device

b) controlling

c) sharing of data

d) bring-your-own-device

View Answer

Answer: d
Explanation: It enables bring-your-own-device use of mobile devices without requiring the lockdown
of data through MDM.

15. CPP embraces sharing of data between ____________

a) Devices

b) Users

c) Both devices and users

d) Cloud and Devices

View Answer

Answer: c

Explanation: Cloud privacy protection embraces sharing of data between devices and users. This
sharing means that data must transmit through intermediaries and be protected while doing so.

1. _____________ reduces the adoption and learning curve for the end user.

a) Intuitive

b) IoT

c) Commands

d) Devices

View Answer

Answer: a

Explanation: Intuitive reduces the adoption and learning curve for the end user while, at the same
time, create q unique bond between the product and its owner.

2. Most common application for voice control application are ___________

a) Home security

b) Family health monitoring

c) Home security and health monitoring

d) Business

View Answer

Answer: c

Explanation: The most common application for voice control technology will be home security,
personal and family health monitoring, and family monitoring(whether remote or local).
3. _________ either built into smoke alarm and thermostat or in the form of small plug – in.

a) Microphones

b) Loudspeaker

c) Microphone and loudspeaker

d) Mic

View Answer

Answer: a

Explanation: Environmental microphones either built into smoke alarms and thermostat or in the
form of small plug in modules such as an electric air freshener.

4. Voice recognition software and virtual assistant programs offer for ________ and _________

a) Communication

b) Communication and Entertainment

c) Entertainment

d) Communication and Software

View Answer

Answer: b

Explanation: Many big companies offer voice recognition software and virtual assistant programs for
their communication and entertainment products that talk to users and respond to a list of
commands.

5. Voice control doesn’t provide the level of __________

a) Amplitude control

b) Sound control

c) Voice control

d) Frequency control

View Answer

Answer: d

Explanation: Voice control doesn’t provide the level of voice control monitoring that analysts see as
the wave of the near future.
6. The advanced security and smart system first monitor and then interacts with human.

a) True

b) False

View Answer

Answer: a

Explanation: The advanced security and smart system first monitor and then interacts with human
users to fulfil their daily needs – turning on lights, adjusting thermostat, reporting intruders and
identifying residents or employees based on certain biological signs.

7. How many types of voice communications are there in IoT environment?

a) 2 types

b) 4 types

c) 3 types

d) 5 types

View Answer

Answer: c

Explanation: There are 3 key types of voice communication in IoT environment:

1. Bi-directional voice communication

2. Mono-directional voice communication

3. Voice recognition.

8. _________ is particularly appealing when the human’s hands or eye are otherwise occupied.

a) Voice recognition

b) Sound recognition

c) Amplitude recognition

d) Frequency recognition

View Answer

Answer: a

Explanation: Voice recognition is particularly appealing when the human’s hands or eye are
otherwise occupied. For example, it may not only convenient but also a legal requirement to use
verbal commands.
9. Voice telephony is an efficient means of __________ with machines that can listen.

a) Mono-directional voice communication

b) Bi-directional voice communication

c) Voice recognition

d) Both bi directional and mono directional

View Answer

Answer: b

Explanation: Voice telephony is an efficient means of Bi-directional voice communication with


machine that can listen, and respond without the need for complex commands.

10. ________ could potentially challenge the need of touch screen on many devices.

a) Voice recognition

b) Voice telephony

c) Voice Integration

d) Intuitive

View Answer

Answer: c

Explanation: Voice Integration could potentially challenge the need for a touch screen on many
devices, as it reduces the cost for devices that will be dormant for majority of the time.

11. ________ Will reduces the cost of the devices.

a) Intuitive

b) Voice telephony

c) Voice recognition

d) Voice Integration

View Answer

Answer: d

Explanation: Voice Integration could potentially challenge the need for a touch screen on many
devices, as it reduces the cost for devices that will be dormant for majority of the time.

12. How the voice is transferred to our phone?

a) Internet
b) Bluetooth

c) Sharing applications

d) Zigbee

View Answer

Answer: a

Explanation: In car, consumer electronics and entertainment devices are all using Bluetooth to
transfer our words to our phone or a gateway, which connects to the cloud.

13. Is there any limit for connecting devices though voice.

a) False

b) True

View Answer

Answer: b

Explanation: There are a virtually limitless number of applications for voice-controlled, IoT-
connected devices.

14. Microphones usually have ___________

a) Amplitude filter

b) Noise filter

c) Round filter

d) Frequency filter

View Answer

Answer: c

Explanation: Microphones usually have a fuzzy covering or a round filter known in the industry as
pop filter. They are designed to block out distortion from breath and wind.

15. _________ are well integrated antennas for long range communication.

a) BC241

b) BC154

c) BC144

d) BC118

View Answer
Answer: d

Explanation: To enable the connectivity, BC118, BC127, BC188 modules work with Bluetooth or WiFi
devices, this has long range communication.

This set of IOT online test focuses on “Communication with IOT Devices with Thoughts”.

1. API’s are the inter connector.

a) True

b) False

View Answer

Answer: a

Explanation: API’s are inter connectors which provide the interface between the global network and
the things.

2. Without ___________ IoT devices can easily lead to catastrophe.

a) Software

b) Management system

c) Cloud

d) Devices

View Answer

Answer: b

Explanation: API’s are the fundamental enabler of the Internet of Things but without management
system, IoT devices can easily lead to catastrophe.

3. Management is set of _________

a) Technologies

b) Processes

c) Devices

d) Technologies and Processes

View Answer

Answer: d
Explanation: Management is a set of technologies and processes fpr creating, managing, securing,
analyzing and scaling the API’s from IoT connected devices.

4. Does the API allow the devices to talk.

a) True

b) False

View Answer

Answer: a

Explanation: The API’s allow devices to talk to each other in a consistent and structured way that
makes it really easy to get them to communicate.

5. API management system creates __________ identity.

a) Secure

b) Friendly

c) Robust

d) Secure and friendly

View Answer

Answer: d

Explanation: API management system creates a secure user friendly identity. It ensures secure
connection to devices across mobile and IoT environment.

6. Web applications support ___________ API.

a) RESTful

b) RESful

c) Class

d) Lua

View Answer

Answer: a

Explanation: Most web applications support RESTful API which relay in HTTP method. The open
source swagger framework helps to design and maintain API’s.

7. _________ helps in design and maintain of API.


a) Lua

b) Open source swagger

c) HTTP

d) Lua and HTTP

View Answer

Answer: b

Explanation: Most web applications support RESTful API which relay in HTTP method. The open
source swagger framework helps to design and maintain API’s.

8. WiFi uses how much frequency?

a) 2.2GHz

b) 3GHz

c) 3.5GHz

d) 2.4GHz

View Answer

Answer: d

Explanation: WiFi is a local wireless technology that uses 2.4GHz ultra high frequency or 5 GHz super
high frequency radio waves.

9. Bluetooth will transmit the data over the frequency band _________

a) 2.4 to 2.7 GHz

b) 2.4 to 3 GHz

c) 2.4 to 2.485 GHz

d) 2.4 to 2.6 GHz

View Answer

Answer: c

Explanation: Bluetooth technology allows for personal data networks. It transmits data over the
frequency band between 2.4 and 2.485 GHz.

10. Bluetooth operates at short distances.

a) True

b) False
View Answer

Answer: a

Explanation: Bluetooth operates over short distances than WiFi and requires less power to operate.
We can pair devices like phone, smart watches, headsets, speakers, etc.,.

11. Bluetooth will drain battery life.

a) True

b) False

View Answer

Answer: a

Explanation: Even with limited range, early Bluetooth implementations were a big drain on battery
life.

12. Which bluetooth version enables low energy?

a) Bluetooth 3.0

b) Bluetooth 4.0

c) Bluetooth 2.0

d) Bluetooth 1.0

View Answer

Answer: c

Explanation: With the development of bluetooth 4.0 became the ability to implement low energy
features that conserve power more effectively.

13. __________ is the brainchild of ARM.

a) Zigbee

b) WiFi

c) Bluetooth

d) Thread

View Answer

Answer: d

Explanation: The brainchild of an alliance between Nest, Samsung, ARM and a few other companies
is Thread. Thread aims to anticipate the needs of the Internet pf Things.
14. Thread would be able to support __________ devices.

a) 256 Devices

b) 300 Devices

c) 125 Devices

d) 250 Devices

View Answer

Answer: d

Explanation: Based on the current specification, thread would be able to support a network of up to
250 devices. Every house could be its own network, meaning your home could have up to 250
integrated devices interacting with you on a daily basis.

15. Thread would allow _________ networks.

a) Mesh

b) Node

c) Mesh and node

d) Either mesh or node

View Answer

Answer: a

Explanation: Thread would allow for mesh networks. All those devices would be capable of relaying
data. Thread hopes to avoid the Zigbee problem.

1. BAN stands for ________

a) Body Area Network

b) Brain Area Network

c) Body Android Network

d) Brain Android Network

View Answer

Answer: a

Explanation: With the rise of wearable, such as Android Wear or he Apple Watch your smart phone
increasingly plays and additional role. This new role can be considered as the brain of your Body area
network.
2. BAN gives _________

a) Communication

b) Storage

c) Network connectivity

d) Communication and storage

View Answer

Answer: d

Explanation: With the rise of wearable, such as Android Wear or he Apple Watch your smart phone
increasingly plays and additional role. This new role can be considered as the brain of your Body area
network, given the storage and communication capabilities of the smart phone.

3. NFC stands for ________

a) Near Fast Communication

b) Near Field Communication

c) Near Field Customer

d) Near Field Connection

View Answer

Answer: b

Explanation: Near Field Communication smart phones can function not only as sensors but also as
actuators, that is, trigger actions or control other things, including TV’s or cars.

4. Phones act as actuators too.

a) True

b) False

View Answer

Answer: a

Explanation: Smart phones can function not only as sensors but also as actuators, that is, trigger
actions or control other things, including TV’s or cars.

5. AI refers to ____________

a) Electronic environment

b) Devices
c) Applications

d) Electronic environment and devices

View Answer

Answer: d

Explanation: AI refers to “electronic environment and devices that are sensitive and responsive to
people’s presence and activities”.

6. AI is considered as embedded.

a) True

b) False

View Answer

Answer: a

Explanation: AI is considered as “embedded” because the devices used are seamlessly embedded
within people’s environment.

7. AI is also named as __________

a) Context aware

b) Personalized

c) Adaptive

d) Context aware, personalized, and adaptive

View Answer

Answer: d

Explanation: AI is considered as “context aware” because these devices are used to know people’s
situation and context conditions, “personalized” because they can be customized to the needs of
users, “adaptive” because it changes depending on the user’s needs.

8. Smart phones can be used in IoT setup with _________ application categories.

a) 2 Applications

b) 3 Applications

c) 4 Applications

d) 5 Applications

View Answer
Answer: c

Explanation: Smartphones can be used in IoT setup along with four application categories:

–> Personal IoT

–> Group IoT

–> Community IoT

–> Industrial IoT.

9. Which category finds an increase in applications targeting health and fitness?

a) Personal IoT

b) Group IoT

c) Community IoT

d) Industrial IoT

View Answer

Answer: a

Explanation: Personal IoT where we find an increasing number of applications targeting health and
fitness, and helping to solve everyday problems.

10. Which category is used in the context of connected cars?

a) Personal IoT

b) Group IoT

c) Community IoT

d) Industrial IoT

View Answer

Answer: b

Explanation: Group IoT where smartphones can be used in the context of connected cars to check
the system status, or in smart homes.

11. Which category could be used by citizens to contribute to a smart city?

a) Personal IoT

b) Group IoT

c) Community IoT

d) Industrial IoT
View Answer

Answer: c

Explanation: Community IoT where could sourcing applications could be used by citizens to
contribute to a smart city.

12. Which category is used for business to consumer process?

a) Personal IoT

b) Group IoT

c) Community IoT

d) Industrial IoT

View Answer

Answer: d

Explanation: Industrial IoT where smartphones are used for business to consumer purposes such as
sending customized services and vouchers in real time.

13. Future application of IoT through phones includes viewing data and controlling sensors
anywhere.

a) True

b) False

View Answer

Answer: a

Explanation: Future application of IoT through phones includes viewing data and controlling sensors
anywhere.

14. Authors proposed 4 layer model named __________

a) K-Businesscare

b) K-Healthcare

c) Health-care

d) Business-care

View Answer

Answer: b

Explanation: Authors proposed a four layer model named “k-Healthcare” which is considered a
comprehensive platform for accessing patient’s health data using the smartphones and applications.
15. __________ layer is the communication layer that connects the IoT devices with WAN.

a) Internet layer

b) Application layer

c) Sensor layer

d) Network layer

View Answer

Answer: d

Explanation: The network layer is the communication layer that connects the IoT devices with WAN
using different protocols such as 802.16 for 3G.

This set of IOT Question Bank focuses on “Scheduling Process and IOT Services Lifecycle”.

1. __________ performs two functions toward the delivery of the services.

a) Global Scheduler

b) Local Scheduler

c) Device Scheduler

d) IoT Scheduler

View Answer

Answer: a

Explanation: The global Scheduler component is the main and first entry point for service request
submitted to the cloud platform. It performs two functions toward the delivery of the services,
selection of the sensor and reservation for the needed resources.

2. ___________ manages the metadata of the IoT services.

a) Power

b) Controller

c) Scheduler

d) Package

View Answer

Answer: c
Explanation: Scheduler manages the metadata of the IoT services, signature of the service, sensors
used to deliver, and execution parameters.

3. Global scheduler keeps the track of and control the life cycle of IoT services.

a) True

b) False

View Answer

Answer: a

Explanation: Global scheduler keeps the track of and control the life cycle of IoT services. In
particular, the lifecycle management services are supported by the scheduler.

4. ___________ service discovers the virtual sensors ability.

a) Register

b) Resource Discovery

c) Unregister

d) Suspend

View Answer

Answer: b

Explanation: Resource recover service discovers the virtual sensors ability. It therefore provides the
resources that match the requirements of the given request for the IoT service.

5. ___________ Service is responsible for establishing the requested service with in the cloud
database.

a) Suspend

b) Resource Discovery

c) Unregister

d) Register

View Answer

Answer: d

Explanation: Register service is responsible for establishing the requested service with in the cloud
database. To this end, it initially identifies and logs all the sensors which are pertinent and or needed
for delivering the requested IoT service.
6. For which service the resources allocated for the services are released?

a) Register

b) Resource Discovery

c) Unregister

d) Suspend

View Answer

Answer: c

Explanation: In the scope of the unregister functionality for a given IoT service, the resources
allocated for the services are released.

7. _________ service is deactivated and therefore its operation is ceased.

a) Register

b) Resource Discovery

c) Unregister

d) Suspend

View Answer

Answer: d

Explanation: As part of suspend functionality, the service is deactivated and therefore its operation
is ceased. However, as part of the suspension the platform does not release the resources
associated with the services.

8. _________ service enables the previously suspended services.

a) Enable from suspension

b) Enable

c) Update

d) Registered service status

View Answer

Answer: a

Explanation: Enable from suspension service enables the previously suspended services. The data
structures holding the service’s meta data in the cloud are appropriately updated.

9. ________ service allows the enablement of an unregistered service.


a) Enable from suspension

b) Enable

c) Update

d) Registered service status

View Answer

Answer: b

Explanation: Enable service allows the enablement of an unregistered service. In practice this
functionality registers the service once again in the platform, through identifying and storing the
required sensors.

10. Which service permits the changes to the IoT services?

a) Enable from suspension

b) Enable

c) Update

d) Registered service status

View Answer

Answer: c

Explanation: Update service permits changes to the IoT services. In particular, it allows for the
updating of the service’s lifecycle metadata according to the requested changes.

11. Which service provides the lifecycle status of a given IoT service?

a) Enable from suspension

b) Enable

c) Update

d) Registered service status

View Answer

Answer: d

Explanation: Registered service status service provides the lifecycle status of a given IoT service.
Detailed information about IoT service is provided.

12. _________ service checks periodically all the enables services.

a) Service updated resources


b) Get service

c) Get available services

d) Update

View Answer

Answer: a

Explanation: Service update resources checks periodically all the enabled services, and identifies
those using mobile sensors.

13. _________ service retrieves the description of the registered service.

a) Service updated resources

b) Get service

c) Get available services

d) Update

View Answer

Answer: b

Explanation: Get service retrieves the description of the registered service, that is, the SPARQL
description in the case of the OpenIoT open source implementation.

14. Which service returns a list of registered services that are associated with a particular user?

a) Service updated resources

b) Get service

c) Get available services

d) Update

View Answer

Answer: c

Explanation: Get available services return a list of registered services that are associated with a
particular user. The various IoT services are registered and established by users of the platform.

15. Which service enables the user to periodically invoke an already defined IoT service?

a) Service updated resources

b) Get service

c) Get available services


d) Poll for the report

View Answer

Answer: d

Explanation: Poll for the report service enables the user to periodically invoke an already defined IoT
service within specified time intervals.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Resource Management”.

1. What is the popular method of organizing wireless network topologies?

a) Software

b) Synchronization

c) Network

d) Cluster

View Answer

Answer: d

Explanation: Clustering is a popular method of organising wireless network topologies, in which a


few nodes, the cluster heads are elected as representing to route the traffic originated in the entire
network.

2. _________ will enable the humans to access, control and manage the operation.

a) IoT

b) Bigdata

c) Network

d) Communication

View Answer

Answer: a

Explanation: IoT enables the humans to access, control and manage the operations and data of the
objects working under different information systems of their surroundings.

3. In _________ the embedded devices and objects working under IoT are resource constrained.

a) Health

b) Industry
c) Home

d) Information system

View Answer

Answer: d

Explanation: In the information system the embedded devices and objects working under IoT
implementation are resource constrained.

4. What type of networks is interacting under IoT?

a) Heterogeneous only

b) Homogeneous Only

c) Both hetero and homogeneous

d) Neither hetero nor Homo

View Answer

Answer: a

Explanation: Due to the huge number of heterogeneous network elements interacting and working
under IoT based information systems, there is an enormous need for resource management for the
smooth running of IoT operations.

5. Managing of resources can be done by implementing ________

a) Protocols

b) Algorithms

c) Networks

d) Protocols and algorithms

View Answer

Answer: d

Explanation: Managing of resources by implementing protocols, algorithms or techniques is required


to enhance the scalability, reliability and stability in the operations of IoT across different domains of
technology.

6. This section is to solicit the efforts and ongoing research work in the domain of _______

a) Information Management

b) Resource Management

c) Industrial Management
d) Network Management

View Answer

Answer: b

Explanation: The motivation of this section is to solicit the efforts and ongoing research work in the
domain of resource management in IoT.

7. Resource management will elaborate the key aspects of _________

a) Industrial management

b) Energy management

c) Network management

d) Information management

View Answer

Answer: c

Explanation: Resource management will elaborate the key aspects of energy management,
communication protocols and future applications of IoT for information systems.

8. Resource management includes ___________

a) IoT Devices

b) IoT Cloud

c) IoT Networks

d) IoT Web

View Answer

Answer: b

Explanation: Resource management includes IoT Cloud, IoT based industrial and home environment
and integration of IoT concept in upcoming technologies of Cyber Physical System, Ambient living
and Fog Computing.

9. What is the role of communication protocol in IoT?

a) Smart cities

b) Cyber physical system

c) Mac layer issue

d) Managing energy
View Answer

Answer: c

Explanation: Role of communication protocol in IoT :

–> Multimedia communication

–> QoS in communication protocol

–> Mac layer issues

–> Secure communication in D2D.

10. Which of the following is the future application of IoT?

a) Role of green IoT system

b) QoS in communication

c) Secure communication

d) Multimedia communication

View Answer

Answer: a

Explanation: Future applications of IoT:

–> IoT based information system for Ambient living

–> Cyber Physical System in IoT

–> Role of Green IoT system

–> Fog computing.

11. The object of IoT will be empowered by ___________

a) Network

b) Cloud

c) Devices

d) Connectivity

View Answer

Answer: c

Explanation: The objects of the Internet of Things will be empowered by embedded devices whose
constrained resources will need to be managed efficiently.
12. The embedded devices will form _______ network.

a) ATM

b) Ethernet

c) FDDI

d) Ad-hoc

View Answer

Answer: d

Explanation: It is envisioned that these devices will be able to form ad-hoc network, and that the
connection from these networks to the Internet of Things infrastructure will not always be possible.

13. _______ are used to overcome the challenges of managing the resources of the IoT.

a) Clustering

b) Software agents

c) Synchronization techniques

d) Cluster, Software agent, and Synchronization techniques

View Answer

Answer: d

Explanation: The use of Cluster, Software agent, and Synchronization techniques in order to
overcome the challenges of managing the resources of the Internet of Things objects.

14. Which will reduce the energy expenditure?

a) Clustering

b) Software agents

c) Synchronization techniques

d) Cluster, Software agent, and Synchronization techniques

View Answer

Answer: a

Explanation: Clustering will be beneficial to reduce the energy expenditure and improve the
scalability and robustness of the object networks.

15. Synchronization techniques will be necessary to address the various challenges of harmonising.

a) False
b) True

View Answer

Answer: b

Explanation: Synchronization techniques will be necessary to address the various challenges of


harmonising plenty of copies of object data with potentially partially disconnected Internet of Things
architecture components.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Handling Actuator
Request”.

1. ____________ enables production-ready feature to the spring boot application.

a) Actuators

b) Endpoint

c) Boot

d) Hyper media

View Answer

Answer: a

Explanation: Actuators enable production ready features to a spring boot application without having
to actually implement these things yourself.

2. __________ should be added to start the existing actuators in boot.

a) spring-boot-actuator

b) sprint-actuator-boot

c) boot-spring-actuator

d) actuator-spring-boot

View Answer

Answer: a

Explanation: To start using the existing actuators in boot we will just need to add the spring-boot-
actuator dependency.

3. __________ allows us to monitor the application.

a) Actuators

b) Endpoints
c) Boot

d) Hypermedia

View Answer

Answers: b

Explanation: Endpoints allow you to monitor the application and, in some cases, interact with it as
well. The boot comes with many built-in endpoints and, like pretty much anything in spring.

4. Which endpoints are sensitive?

a) /health

b) /info

c) /metric

d) /trace

View Answer

Answer: c

Explanation: Most endpoints are sensitive ie., meaning they are not fully public. While a handful is
not: /health and /metric.

5. Which endpoint shows application health information?

a) /health

b) /info

c) /metric

d) /trace

View Answer

Answer: a

Explanation: /health shows application health information (a simple ‘status’ when accessed over an
unauthenticated connection or full message details when authenticated). It is not sensitive by
default.

6. __________ endpoint displays arbitrary application information.

a) /health

b) /info

c) /metric
d) /trace

View Answer

Answer: b

Explanation: Endpoints allow you to monitor the application and, in some cases, interact with it as
well. /info endpoint displays arbitrary application information. Not sensitive by default.

7. Which endpoint shows metric information for the current application?

a) /health

b) /info

c) /metric

d) /trace

View Answer

Answer: c

Explanation: Endpoints allow you to monitor the application and, in some cases, interact with it as
well. /metric shows metric information for the current application. It is also sensitive by default.

8. Which endpoint displays trace information?

a) /health

b) /info

c) /metric

d) /trace

View Answer

Answer: d

Explanation: Endpoints allow you to monitor the application and, in some cases, interact with it as
well. /trace displace trace information by default the; last few HTTP requests.

9. How many customizing properties are available?

a) 2 Properties

b) 3 Properties

c) 4 Properties

d) 5 Properties

View Answer
Answer: b

Explanation: Each endpoint can be customized with properties using the following format:
endpoint.[endpoint name].[property to customize]. Three properties are:

1. Id

2. Enabled

3. Sensitive.

10. Using which customized endpoint will be accessed over HTTP?

a) Id and enabled

b) Enabled

c) Sensitive

d) Id

View Answer

Answer: d

Explanation: Each endpoint can be customized with properties using the following format:
endpoint.[endpoint name].[property to customize].

Id – by which this endpoint will be accessed over HTTP.

11. Enabled customization endpoint will be enabled only during __________

a) True cases only

b) False cases only

c) Either True or false cases

d) True and false cases

View Answer

Answer: a

Explanation: Each endpoint can be customized with properties using the following format:
endpoint.[endpoint name].[property to customize].

Enabled – if true then it can be accessed otherwise not.

12. Enabled customization endpoint will be sensitive only during ________

a) True and false cases

b) False cases only


c) Either True or false cases

d) True cases only

View Answer

Answer: d

Explanation: Each endpoint can be customized with properties using the following format:
endpoint.[endpoint name].[property to customize].

Sensitive – if true then need the authorization to show crucial information over HTTP.

13. Health information is collected from all the beans implementing Health Indicator interface.

a) True

b) False

View Answer

Answer: a

Explanation: Health information is collected from all the beans implementing Health Indicator
interface configured in your application context.

14. Which endpoint is gathered and publishes information about OS?

a) /health

b) /info

c) /metric

d) /trace

View Answer

Answer: c

Explanation: The metric endpoint is one of the most important endpoint as I gathers and publishes
information about OS, JVM and Application level metric.

15. Command to create new endpoint?

a) Endpoint_T

b) Endpoint<T>

c) Endpoint-T

d) Endpoint-t

View Answer
Answer: b

Explanation: Besides using the existing endpoint provided by spring boot we can create a new
endpoint. We need to have endpoint implementation implement the endpoint<T>.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Handling Sensor Request”.

1. HelloWeb is an example of ____________ server.

a) HTTP

b) MQTP

c) SMTP

d) CoAP

View Answer

Answer: a

Explanation: HelloWeb is an example of an HTTP server, but it does not use any sensors or actuators.

2. ________ will show how to handle GET request to a sensor resources.

a) Monitor

b) VoltageMonitor

c) Voltage

d) Voltage-Monitor

View Answer

Answer: c

Explanation: VoltageMonitor, shows how to handle GET request to a sensor resource, more specially
one that represent some voltage.

3. Can we use any web browser as client.

a) True

b) False

View Answer

Answer: a

Explanation: You can use any web browser as a client to inspect the current voltage. After all, a web
browser is basically an engine for initiating GET request.
4. An HTTP server manages ____________

a) Websites

b) Devices

c) Resources

d) Sensors

View Answer

Answer: c

Explanation: An HTTP server manages resources. In this example, a resource is provided that has the
meaning, “actual voltage value, as measured by a sensor attached to the board”.

5. A resource that contains an actual value is called as ________

a) Potential variable

b) Measured variable

c) Resource variable

d) Physical variable

View Answer

Answer: b

Explanation: A resource that contains an actual value is called a measured variable. A measured
variable changes its value over time, depending on a physical process.

6. When the user turns the potentiometer’s knob, the value is changed.

a) True

b) False

View Answer

Answer: a

Explanation: When the user physically turns the potentiometer’s knob, the measured variable
changes its value accordingly. This means that subsequent GET request to the same resource may
yield different responses.

7. A resource with measured variable will reflect ________

a) Potential phenomenon
b) Resource phenomenon

c) Measured phenomenon

d) Physical phenomenon

View Answer

Answer: d

Explanation: A resource with measured variable will reflect a physical phenomenon as it currently is.
The resource is updated with new sensor values from time to time.

8. What should an URL contain?

a) ASCII values

b) Digits

c) Characters

d) ASCII values, digits, and characters

View Answer

Answer: d

Explanation: You can use any URL as long you use ASCII letters, digits, and Characters. For example,
the URL /root/sensor/analog/I would look like:

http://192.168.5.100/root/sensor/analog/1.

9. For reading the current voltage ________ library class is used.

a) Digital sensor

b) Analog sensor

c) Actuator

d) Potential sensor

View Answer

Answer: a

Explanation: For reading the current voltage, library class Analog Sensor that wraps an analog input
port in an object that provides the method HandleGet.

10. Variable voltage Sensor is an instance of Analog Sensor.

a) True

b) False
View Answer

Answer: a

Explanation: For reading the current voltage, library class Analog Sensor that wraps an analog input
port in an object that provides the method HandleGet.

Variable voltage Sensor is an instance of Analog Sensor, initialized with pinA1.

11. Which property makes it possible for the analog sensor object to convert the integer input?

a) MinValue

b) MaxValue

c) Either MinValue or MaxValue

d) Both MinValue and MaxValue

View Answer

Answer: d

Explanation: Properties MinValue and MaxValue make it possible for the analog sensor object to
convert the integer input of the analog input port to a value in the given range.

12. What is the range of analog input port?

a) 0 to 3

b) 0 to 3.3

c) 0 to 4

d) 0 to 4.5

View Answer

Answer: b

Explanation: Properties MinValue and MaxValue make it possible for the analog sensor object to
convert the integer input of the analog input port to a value in the given range, in this case it is
between 0.0 to 3.3.

13. ________ is used to provide an object of type MeasuredVariable.

a) HandleRequest

b) RequetHandle

c) Handle_Request

d) Handle-Request
View Answer

Answer: a

Explanation: In the WebServer initialization, We use the request handler HandleRequest provided by
an object of type MeasuredVariable. A MeasuredVariable object has a property FromSensor.

14. When a client makes a GET request for /voltage/actual, the request is passed to ________

a) MeasuredVariable

b) HandleRequest

c) Measured Variable’s HandleRequest

d) HandleRequest’s MeasuredVariable

View Answer

Answer: c

Explanation: When a client makes a GET request for /voltage/actual, the request is passed to
Measured Variable’s HandleRequest method. When this happens, the MeasuredVariable object first
calls FromSensor.

15. Delegate properties must be compatible with the delegate types they represent.

a) True

b) False

View Answer

Answer: a

Explanation: FromSensor is a property to which you can assign a method I.e., a C#delegate property.
Delegate properties must be compatible with the delegate types they represent.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Multithreading”.

1. _______ makes it possible for two or more activities to execute in parallel on a single processor.

a) Multithreading

b) Threading

c) SingleThreading

d) Both Multithreading and SingleThreading

View Answer
Answer: a

Explanation: MultiThreading makes it possible for two or more activities to execute in parallel on a
single processor.

2. In ______ an object of type Thread in the namespace System.Threading represents and controls
one thread.

a) . PY

b) .SAP

c) .NET

d) .EXE

View Answer

Answer: c

Explanation: In .NET, an object of type Thread in the namespace System.Threading represents and
controls one thread. Its constructor takes a parameterless method as a parameter.

3. The method will be executed once the thread’s ______ method is called.

a) EventBegin

b) EventStart

c) Begin

d) Start

View Answer

Answer: d

Explanation: In .NET, an object of type Thread in the namespace System.Threading represents and
controls one thread. Its constructor takes a parameter less method as a parameter. The method will
be executed once the threads Start method is called.

4. Command to make thread sleep?

a) Thread.Sleep

b) Thread_Sleep

c) ThreadSleep

d) Thread_sleep

View Answer

Answer: a
Explanation: A particular thread of the application can be blocked forever by calling
Thread.Sleep(Timeout.Infinite).

5. An instance of class Buffer provides a threadsafe way of communication between ________

a) Actors

b) Objects

c) Locking

d) Buffer

View Answer

Answer: b

Explanation: An instance of class Buffer provides a threadsafe way of communication between


actors. A buffer instance basically acts as a variable whose current value can be read and written.

6. _______ method puts zero into the buffer.

a) HandlePut(object o)

b) HandletGet(object o)

c) HandletGet()

d) HandletPut()

View Answer

Answer: a

Explanation: void HandlePut(object o) method puts 0 into buffer. The new value in the buffer
replaces the old one.

7. HandlePut(object o) performs what?

a) Fixing values

b) Locking

c) Changing values

d) Unlocking

View Answer

Answer: d

Explanation: void HandlePut(object o) method puts 0 into buffer. The new value in the buffer
replaces the old one. The method performs the necessary locking to enable safe use of the buffer
from multi threads.
8. In HandlePut(object o), o represents?

a) Null

b) Zero

c) Empty

d) Origin

View Answer

Answer: a

Explanation: void HandlePut(object o) method puts 0 into buffer. The new value in the buffer
replaces the old one. The method performs the necessary locking to enable safe use of the buffer
from multi threads. Object o may be NULL.

9. What is HandleGet() method function?

a) Current buffer state, with changing

b) Current buffer state, without changing

c) Previous buffer state, with changing

d) Previous buffer state, without changing

View Answer

Answer: b

Explanation: This method gets the current buffer state, without changing it. The method performs
the necessary locking to enable safe of the buffer from multiple threads.

10. What is the result for HandleGet()?

a) Null

b) Zero

c) Empty

d) Origin

View Answer

Answer: a

Explanation: This method gets the current buffer state, without changing it. The method performs
the necessary locking to enable safe of the buffer from multiple threads. The result may be null.
11. Multithreading is a mechanism for splitting up a program into several parallel activities called
_________

a) Methods

b) Objects

c) Classes

d) Threads

View Answer

Answer: c

Explanation: Multithreading is a mechanism for splitting up a program into several parallel activities
called threads. Multithreading makes it possible for two or more activities to execute in parallel on a
single processor.

12. Each thread is a single stream of execution.

a) False

b) True

View Answer

Answer: a

Explanation: Multithreading is a mechanism for splitting up a program into several parallel activities
called threads. Each thread is a single stream of execution, yet they all share the same resources.

13. Multithreading on a single processor is possible with the help of _________

a) Threader

b) Scheduler

c) Method

d) Divider

View Answer

Answer: b

Explanation: Multithreading on a single processor is possible with the help of scheduler, which
briefly stops the currently execution thread of an application after each time slice.

14. Scheduler switch threads in ________

a) Multilevel queue scheduling

b) Priority Scheduling
c) Round robin fashion

d) Multilevel feedback queue scheduling

View Answer

Answer: c

Explanation: It switches among threads in a round robin fashion so that every thread gets its fair
share of processing time.

15. What is the switching speed?

a) 60 times per second

b) 50 times per second

c) 55 times per second

d) 66 times per second

View Answer

Answer: b

Explanation: Switching among threads occurs so frequently -50 times per second that all threads
appear to run in parallel.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Designing for Emerging
Technology”.

1. IIoT stands for __________

a) Industrial Internet of Things

b) Internet Internet of Things

c) Intelligence Internet of Things

d) Internal Internet of Things

View Answer

Answer: a

Explanation: Industrial IoT is the subset of IoT that associates itself with connected manufacturing
operations to design and craft products and services.

2. IIoT is sophisticated.

a) True
b) False

View Answer

Answer: a

Explanation: Using IIoT, the previous labor intensive, time consuming technique can be substituted
with vibrant, sophisticated, and automated mechanisms.

3. What does design provide?

a) Technology

b) Ecosystem

c) Technology and ecosystem

d) Digital revolution

View Answer

Answer: c

Explanation: Design not only provides the framework for how technology works and how it’s used
but also places it in a broader context that includes the total ecosystem with which it interacts and
the possibility of unintended consequences.

4. Which possibility ensures load balancing and peak levelling of energy consumption?

a) Transportation and logistics

b) Energy and utilities

c) Automotive

d) Connected supply chain

View Answer

Answer: b

Explanation: Energy and utilities: A network of smart grids, smart meters and devices continuously
communicate with each other to ensure load balancing and peak levelling of energy consumption,
down to the device level.

5. Which possibility automatically communicates with other vehicles?

a) Transportation and logistics

b) Energy and utilities

c) Automotive

d) Connected supply chain


View Answer

Answer: c

Explanation: Automotive: Within the automotive space, the connected car concept is a game
changer. New models continuously generate data when in operation.

6. Which possibility connects the production line to suppliers?

a) Transportation and logistics

b) Energy and utilities

c) Automotive

d) Connected supply chain

View Answer

Answer: d

Explanation: Connected supply chain: By connecting the production line to suppliers, all stakeholders
can understand interdependencies, the flow of material and process cycle times.

7. Which possibility provides inter connectivity between shop floor and top floor?

a) Transportation and logistics

b) Energy and utilities

c) Plant control flow operation

d) Connected supply chain

View Answer

Answer: c

Explanation: Plant control flow operation: The IoT data network provides inter connectivity between
shop floor and top floor, which enables the automation of specific process and reduces the human
intervention required to address issues.

8. Which possibility is the highest contributor to cost overhead for manufacturing facilities?

a) Transportation and logistics

b) Energy and utilities

c) Plant control flow operation

d) Energy management and resource optimization

View Answer
Answer: d

Explanation: Energy management and resource optimization: Energy is among the highest
contributor to cost overhead for manufacturing facilities.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Taking Control of Gesture
Interactions”.

1. __________ Uses voice to control the devices.

a) Google Home

b) Apple HomePod

c) Both Google Home and Apple HomePod

d) Google Sheets

View Answer

Answer: c

Explanation: Google Home, or Apple HomePod, takes in the user’s voice to control the devices. Like,
with the help of voice all the parts of our home can be done.

2. Do we have problems using screen in smartphones.

a) True

b) False

View Answer

Answer: a

Explanation: This can be the user’s smartphone screen, but some devices, like smartwatches, have
screens of their own. The problem in the latter case is that these screens can be tiny and hard to use
effectively. Neither voice control nor smartphone control offer adequate solutions to this problem.

3. What should be the frequency of the soil for hand gesturing functions?

a) 50 GHz

b) 60 GHz

c) 35 GHz

d) 40 GHz

View Answer

Answer: b
Explanation: Soil uses high frequency 60GHz radar to sense fine hand gestures that can be mapped
to certain functions.

4. What is the gesture that can be produced by tapping index finger to the tip of your thumb?

a) Pressing a virtual button

b) Twisting a virtual dial

c) Pressing a virtual button and Twisting a virtual dial

d) Neither Twisting a virtual dial nor Pressing a virtual button

View Answer

Answer: a

Explanation: Example of soil intuitive virtual tools, by tapping your index finger to the tip of your
thumb, you can simulate pressing a virtual button.

5. What is the gesture that can be produced by rubbing your index finger against your thumb?

a) Pressing a virtual button

b) Twisting a virtual dial

c) Pressing a virtual button and Twisting a virtual dial

d) Neither Twisting a virtual dial nor Pressing a virtual button

View Answer

Answer: b

Explanation: Example of soil intuitive virtual tools, you can rub your index finger against your thumb
to simulate twisting a virtual dial.

6. Using gestures to interact with augmented applications _________

a) Providing movement

b) Modifying a virtual menu

c) Changing the direction

d) Navigating a virtual menu

View Answer

Answer: d

Explanation: Using it to control smartwatches, one could readily imagine using gestures to interact
with augmented or virtual reality applications, such as navigating a virtual menu.
7. Soli has ______

a) Small form factor

b) High power

c) High form factor

d) Medium power

View Answer

Answer: a

Explanation: Soil has small form factor, and low power, soil is practically custom made for IoT
devices. With the help of soli gesture functions can be performed.

8. Does smart phone use soli.

a) True

b) False

View Answer

Answer: a

Explanation: Smart home devices may also be a natural fit for soli- perhaps you could turn a light on
or off by flicking your fingers at it.

9. RFID stands for ________

a) Radio Frequency Industry

b) Random Frequency Identification

c) Radio Flow Industry

d) Radio Frequency Identification

View Answer

Answer: d

Explanation: In the early years of IoT, RFID (Radio Frequency Identification) and sensor technologies
were the focus. The concept has grown enormously during the last decade.

10. IoT describes where Internet provides _________

a) Network

b) Things
c) Architecture

d) Objects

View Answer

Answer: b

Explanation: IoT describes a system where Internet enabled “things” in the physical world equipped
with sensors, actuators and capable of interacting with the environment are connected to the
internet for monitoring and control of the physical “things”.

11. Is our technology out of sync.

a) True

b) False

View Answer

Answer: a

Explanation: Today’s technology can sometimes feel like it’s out of sync with our senses as we peer
at small screens, flick and pinch fingers across smooth surfaces, and read tweets “written” by
programmer created bots.

12. Do we have H2M communication.

a) True

b) False

View Answer

Answer: a

Explanation: As people and companies prepare to adapt to the internet of things, with its ever
winding focus on machine to machine communication, it’s a good time to ask where people will fit
in. H2M-Human to Machine communication conversation can be done with gestures.

13. Is gesture technology important.

a) False

b) True

View Answer

Answer: b

Explanation: Gesture technology is important because when it is implemented correctly, it becomes


something we barely think about. It can make basic interactions with everyday objects simple and
intuitive.
14. _________ Is experimenting to turn human body in to sort of antenna.

a) Sony

b) Samsung

c) Ericcson

d) Lenovo

View Answer

Answer: c

Explanation: Ericcson is experimenting with a product it calls the connected paper to turn the human
body into a sort of antenna.

15. Which company is trying to develop hand gestures into virtual controls?

a) Mahindra

b) Microsoft

c) Qualcomm

d) Google

View Answer

Answer: d

Explanation: Google’s project soli, which turns hand gestures into virtual controls – without the need
for a virtual reality headset. Instead of a tiny sensor that fits onto a chip tracks at high speed and
accuracy not just big arm waving gestures but also sub mm hand movement, using .radar

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Designing Material
Behavior”.

1. Each object represents _________ in virtual network.

a) Thing

b) Device

c) Node

d) Small object

View Answer

Answer: c
Explanation: Each object represents a node in a virtual network, continuously transmission a large
volume of data itself and its surroundings – we call these digital footprints a code halo.

2. Continuous transmission of data is called as ____________

a) Ac-halloc

b) Code halo

c) Halo code

d) Halloc-ac

View Answer

Answer: b

Explanation: Each object represents a node in a virtual network, continuously transmission a large
volume of data itself and its surroundings – we call these digital footprints a code halo.

3. BoT stands for ___________

a) Base of Things

b) Built of Things

c) Benefits of Things

d) Business of Things

View Answer

Answer: a

Explanation: According to Gartner, “the installed base of things will grow to 26 billion units in 2020, a
near 30 fold increase from 0.9 billion units in 2009.”

4. An informed manufacturing organization contains __________ elements.

a) 4 elements

b) 3 elements

c) 5 elements

d) 6 elements

View Answer

Answer: a

Explanation: An informed manufacturing organization contains four elements:

Informed products
Processes

People and

Infrastructure.

5. The manufacturing elements provide _________ manufacturing processes.

a) Automated

b) Intelligent

c) Streamlined

d) Automated, Intelligent, and Streamlined

View Answer

Answer: d

Explanation: An informed manufacturing organization contains four elements: Informed products,


Processes, People and Infrastructure. These essential elements of manufacturing are converging like
never before, creating a more automated, intelligent, and streamlined manufacturing process.

6. Informed _________ will enable machines to take autonomous action.

a) Product

b) People

c) Processes

d) Infrastructure

View Answer

Answer: a

Explanation: Advanced sensors, controls, and software applications work together to obtain and
share real time information as finished goods make their way down the production line. Informed
product will enable machines to take autonomous action.

7. Informed __________ will provide intelligent design, operation as well as safety.

a) Product

b) People

c) Processes

d) Infrastructure

View Answer
Answer: b

Explanation: Informed people will people will provide intelligent design, operations and
maintenance, as well as higher quality service and safety.

8. Informed _______ lead to flexible and adaptable supply chain.

a) Product

b) People

c) Processes

d) Infrastructure

View Answer

Answer: c

Explanation: By emphasizing bi directional information sharing across the global manufacturing


value chain from supplier to customer-Informed process lead to flexible and adaptable supply chain.

9. Informed _________ will better manage complexities and enable more efficient manufacturing of
goods.

a) Product

b) People

c) Processes

d) Infrastructure

View Answer

Answer: d

Explanation: Using smart infrastructure components that interface with mobile devices, products
and people, informed infrastructure will better manage complexities and enable more efficient
manufacturing of goods.

10. Which possibility is based on combination of materials and information flow?

a) Automotive

b) Energy and utilities

c) Transportation and logistics

d) Connected supply chain

View Answer

Answer: c
Explanation: Transportation and Logistics: Logistics and distribution networks are based on a
combination of materials and information flow between various supply chain participants.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Collaborative Robotics”.

1. Collaborative robots are easily integrated into existing production environment. With __________
articulation points.

a) 4

b) 5

c) 6

d) 3

View Answer

Answer: c

Explanation: Our three different Collaborative robots are easily integrated into existing production
environment. 6 articulation points and a wide scope of flexibility.

2. The collaborative robot arms are designed to mimic the range of motion of a ________

a) Network

b) Machine arm

c) Device

d) Human arm

View Answer

Answer: d

Explanation: The collaborative robot arms are designed to mimic the range of motion of a human
arm.

3. In co – robot co represents?

a) Coordinative

b) Collaborative

c) Computer

d) Control

View Answer
Answer: b

Explanation: A cobot or co-robot is a robot intended to physically interact with humans in a shared
workspace.

4. A cobots as an apparatus and method for interaction between ________ and ________

a) person and computer

b) Device and computer

c) Device and human

d) Human and

View Answer

Answer: a

Explanation: A cobots as an apparatus and method for direct physical interaction between a person
and a general purpose manipulator controlled by a computer.

5. The cobots assured human safety by having no internal source of ________

a) General motors

b) Safe equipment

c) Industrial material

d) Motive power

View Answer

Answer: d

Explanation: The first cobots assured human safety by having no internal source of motive power. It
is a natural agent, used to impact motion to machinery such as engine.

6. Motive power was provided by the human worker.

a) True

b) False

View Answer

Answer: a

Explanation: The first cobots assured human safety by having no internal source of motive power.
Motive power was provided by the human worker.
7. Cobots function was to allow computer control of motion by ________

a) Motors

b) Human worker

c) Payload

d) Power

View Answer

Answer: c

Explanation: Cobots function was to allow computer control of motion, by redirecting or steering a
payload, in a cooperative way with human worker. Later cobots provided limited amounts of motive
power as well.

8. IAD stands for ________

a) Intelligent Assist Device

b) Industrial Assist Device

c) International Assist Device

d) Informative Assist Device

View Answer

Answer: a

Explanation: The general motors team used the term Intelligent Assist Device as an alternative to
cobot, especially in the context of industrial material handling and automotive assembly operations.

9. Cobots is also called as _______

a) ICD

b) IBD

c) IMD

d) IAD

View Answer

Answer: d

Explanation: The general motors team used the term Intelligent Assist Device as an alternative to
cobot, especially in the context of industrial material handling and automotive assembly operations.

10. BAXTER is which type of robot?


a) Humanoid robot

b) Industrial robot

c) Hospital robot

d) Workspace robot

View Answer

Answer: b

Explanation: Universal robots released its first cobot, in 2008. Rethink Robotics released an industrial
cobot, Baxter, in 2012.

11. ________ is the simplest method of collaborative robots and is used in applications when human
interaction with robot is less.

a) Self monitored stop

b) Speed and separation monitoring

c) Power and force limiting

d) Hand guiding

View Answer

Answer: a

Explanation: Self monitored stop is the simplest method of collaborative robots and is used in
applications when human interaction with robot is less.

12. Which type of collaborative robot installation also traditional industrial robots?

a) Self monitored stop

b) Speed and separation monitoring

c) Power and force limiting

d) Hand guiding

View Answer

Answer: b

Explanation: This type of collaborative robot installation also uses traditional industrial robots, but it
is more suited for environments where employees will be frequently interacting with the robot.

13. _________ robots are the most collaborative of the types.

a) Self monitored stop


b) Speed and separation monitoring

c) Power and force limiting

d) Hand guiding

View Answer

Answer: c

Explanation: Power and force limiting robots are the most collaborative of the types mentioned and
they are the only ones that can truly work alongside humans without any additional safety devices
and process interruption.

14. __________ robot allows a programmer to teach robot paths and positions.

a) Self monitored stop

b) Speed and separation monitoring

c) Power and force limiting

d) Hand guiding

View Answer

Answer: d

Explanation: Hand Guiding is a collaborative feature that some robots have. It allows a programmer
to teach robot paths and positions simply by moving the robot their hand to the desired positions.

15. All collaborative robot applications should follow ISO 10218.

a) True

b) False

View Answer

Answer: a

Explanation: All collaborative robot applications should follow ISO 10218. However, not all processes
are applicable to collaborative robots, which is why a risk assessment needs to be done.

This set of IOT Questions and Answers for Aptitude test focuses on “Neuroscience and Cosmology”.

1. ________ are the general feature of our brain’s perception.

a) Strobes

b) Constant
c) Research

d) Interact

View Answer

Answer: a

Explanation: Evidence gathered from the finding of a landmark Australian Italian collaboration
suggests that oscillations or strobes are a general feature of our brains perception.

2. Perception and attention are intrinsically rhythmic in nature.

a) True

b) False

View Answer

Answer: a

Explanation: According to the study conducted by researchers from the university of Sydney and
Italian universities, Perception and attention are intrinsically rhythmic in nature.

3. ________ oscillates as one ear peaks in perception before the other takes a turn.

a) Oscillations

b) Auditory decision making

c) Auditory perception

d) Auditory perception and oscillations

View Answer

Answer: c

Explanation: Auditory perception oscillates as one ear peaks in perception before the other ear takes
a turn. This is essential for accurately locating events in the environment.

4. ________ oscillates.

a) Auditory perception

b) Auditory decision making

c) Oscillations

d) Auditory perception and oscillations

View Answer

Answer: b
Explanation: Current Biology, the researches emphasized three key findings from their study:

Auditory decision making also oscillates.

5. ________ occur in all perception, not just vision.

a) Auditory perception

b) Auditory decision making

c) Oscillations

d) Auditory perception and oscillations

View Answer

Answer: c

Explanation: Current Biology, the researches emphasized three key findings from their study:

Oscillations occur in all perceptions, not just vision.

6. Human eye perception is cyclical.

a) True

b) False

View Answer

Answer: a

Explanation: While it has been known for years that human eye perception is cyclical, this is the first
time that our auditory perception has been proven to be the same.

7. The researches demonstrated that the sensitivity of detecting weak sound is ________

a) Constant

b) Not constant

c) Fluctuating

d) Sinusoidal

View Answer

Answer: b

Explanation: The researches demonstrated that the sensitivity of detecting weak sound is not
constant. Instead, its strobing, or it fluctuates rhythmically over time.

8. The auditory cycles happen at the rate of around ________


a) 7 per second

b) 5 per second

c) 6 per second

d) 8 per second

View Answer

Answer: c

Explanation: The auditory cycles happen at the rate of around six per second. While we might deem
this a fact, it’s quite slow as far as neuroscience is concerned.

9. Is auditory cycles slow than neuroscience.

a) True

b) False

View Answer

Answer: a

Explanation: The auditory cycles happen at the rate of around six per second. While we might deem
this a fact, it’s quite slow as far as neuroscience is concerned.

10. Brain oscillations happen at the rate of around ________

a) 150 times per second

b) 100 times per second

c) 125 times per second

d) 250 times per second

View Answer

Answer: b

Explanation: The auditory cycles happen at the rate of around six per second. While we might deem
this a fact, it’s quite slow as far as neuroscience is concerned. The human brain oscillations might
happen up to 100 times per second.

11. Human decision making is at the rate of ________

a) One-third of a second

b) One-fourth of a second

c) One-tenth of a second
d) One-sixth of a second

View Answer

Answer: d

Explanation: Human makes a decision at the rate of about One-sixth of a second, which is in line with
these auditory oscillations.

12. A variation of oscillation is said to be found between ________

a) Two eyes

b) Only one ear

c) Only one eye

d) Two ears

View Answer

Answer: d

Explanation: A variation of oscillation is said to be found between the two ears, with one ear
showing peak sensitivity after the other.

13. ________ to attention could help bind together relevant information at regular time points.

a) Strobing Approach

b) Oscillation

c) Both strobing and oscillations

d) Neither strobing nor oscillations

View Answer

Answer: a

Explanation: Strobing Approach to attention could help bind together relevant information at regular
time points and allow new groupings of information to reassemble at other moments.

14. ICT stands for ____________

a) Internet Communication Technology

b) Industrial Communication Technology

c) Information Communication Technology

d) Information Connect Technology

View Answer
Answer: c

Explanation: It discusses scope of Big Data Analysis, Information Communication Technology and
Ambient Intelligence.

15. AI stands for ____________

a) Artificial Intelligence

b) Ambient Intelligence

c) Application Intelligence

d) Ambient Internet

View Answer

Answer: b

Explanation: It discusses scope of Big Data Analysis, Information Communication Technology and
Ambient Intelligence.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Toy Designs”.

1. ________ device, perhaps in the form of doll or toy.

a) Anthropomorphic

b) Devil toy

c) Chunky

d) Teddy

View Answer

Answer: a

Explanation: Anthropomorphic device, perhaps in the form of doll or toy, may be configured to
control one or more media devices.

2. The anthropomorphic device may aim its gaze at the source of ________

a) Interpreter

b) Media device

c) Social cue

d) Transmitter

View Answer
Answer: c

Explanation: Upon reception or a detection of a social cue, such as movement or spoken word or
phase, the anthropomorphic device may aim its gaze at the source of the social cue.

3. The anthropomorphic device may transmit the media device command to ________

a) Social cue

b) Media device

c) Interpreter

d) Transmitter

View Answer

Answer: b

Explanation: In response to receiving a voice command, the anthropomorphic device may interpret
the voice command and map it to a media device command. Then, the device may transmit the
media command to a media device.

4. The toy includes ________

a) Microphone

b) Camera

c) Speaker

d) Microphone, camera, and speaker

View Answer

Answer: d

Explanation: The toys, which include microphones, cameras, speakers and motors, have some
people pointing at teddy, the super computer toy.

5. The privacy concerns are ________ when devices have the capacity to record conversations and
log activity.

a) Clear

b) Not clear

c) Fluctuating

d) Constant

View Answer

Answer: a
Explanation: The privacy concerns are clear when devices have the capacity to record conversations
and log activity.

6. When we hear about IoT, we think of our ________

a) Microphone

b) Speaker

c) Thermostat

d) Transmitter

View Answer

Answer: c

Explanation: Usually when you hear about the Internet of Things, you think about it in terms of your
thermostat.

7. Sensible objects first game is called Fabulous Beast.

a) True

b) False

View Answer

Answer: a

Explanation: Sensible objects first game is called Fabulous Beast. A multi-player balancing game that
fleetwood describes as a cross between Jenga and collectible card pokemon.

8. Hello Barbie does what?

a) Moves its hands

b) Raises its Eyebrow

c) Moves its legs

d) Moves its head

View Answer

Answer: b

Explanation: Barbie went through hard times as Mattel released Hello Barbie, a cloud connected doll
that raised eyebrows amongst parents who were uncomfortable with Barbie listening to children.

9. Does the HelloBarbie connected to cloud?


a) True

b) False

View Answer

Answer: a

Explanation: Barbie went through hard times as Mattel released Hello Barbie, a cloud connected doll
that raised eyebrows amongst parents who were uncomfortable with Barbie listening to children.

10. Using ________ toy will keep interaction between toy and child.

a) Device

b) Motor

c) Driver

d) Engine

View Answer

Answer: d

Explanation: Using a dialogue engine to utilize some of the most advanced language processing
algorithms available driving the personalization of our platform, and keeping the interaction going
between toy and child.

11. With set of sensors and app children can do ________

a) Feed

b) Bathe

c) Hatch

d) Feed, bathe and hatch

View Answer

Answer: d

Explanation: Peppered with his own set of sensors and app children can virtual feed, bathe, and
hatch the toy, providing yet another variant of how physical toys and connectivity can merge.

12. ________ introduces children to the concept of computer programming.

a) Lightbot

b) Brain Development

c) Healthy and activity


d) Privacy

View Answer

Answer: a

Explanation: Lightbot introduces children to the concept of computer programming through fun
interactive puzzles.

13. Using what the time can and should be used for encouraging education and imagination.

a) Lightbot

b) Brain Development

c) Healthy and activity

d) Privacy

View Answer

Answer: b

Explanation: The connected toy should not abuse this already concerning trend, but capitalize on the
value it produces. With this children’s should improve education and imagination.

14. By using which of the following the floor of the child plays area turn into an interactive game?

a) Lightbot

b) Brain Development

c) Healthy and activity

d) Privacy

View Answer

Answer: c

Explanation: Lumo’s Interactive Projector turns the floor of your child play area into an interactive
game that encourages running, jumping and all sorts of physical activities, which makes the child
healthy and active.

15. ________ the connected toy will warrant significant effort from manufactures.

a) Lightbot

b) Brain Development

c) Healthy and activity

d) Privacy and safety


View Answer

Answer: d

Explanation: Safety and privacy surrounding the connected toy will warrant significant effort from
manufacturers and parents alike.

This set of IOT online quiz focuses on “IoT Characteristics and Reliability Issues”.

1. Which characteristics involve the facility the thing to respond in an intelligent way to a particular
situation?

a) Intelligence

b) Connectivity

c) Dynamic Nature

d) Enormous Scale

View Answer

Answer: a

Explanation: IoT comes with the combination of algorithms and computation, software and
hardware that makes it smart. Ambient Intelligence in IoT enhances its capabilities which facilitate
the things to respond in an intelligent way to a particular situation.

2. ________ empowers IoT by bringing together everyday objects.

a) Intelligence

b) Connectivity

c) Dynamic Nature

d) Enormous Scale

View Answer

Answer: b

Explanation: Connectivity empowers IoT by bringing together everyday objects. Connectivity of


these objects is pivotal because simple object level interactions contribute towards collective
intelligence in IoT network.

3. The collection of data is achieved with ________ changes.

a) Intelligence

b) Connectivity
c) Dynamic Nature

d) Enormous Scale

View Answer

Answer: c

Explanation: The primary activity of Internet of Things is to collect data from its environment, this os
achieved with the dynamic changes that take place around the devices.

4. The number of devices that need to be managed and that communicate with each other will be
much larger.

a) Intelligence

b) Connectivity

c) Dynamic Nature

d) Enormous Scale

View Answer

Answer: d

Explanation: The number of devices that need to be managed and that communicate with each
other will be much larger than the devices connected to the current internet.

5. ________ Provide the means to create capability that reflects true awareness of the physical
world and people.

a) Sensors

b) Heterogeneity

c) Security

d) Connectivity

View Answer

Answer: a

Explanation: Sensing technologies provide the means to create capability that reflects true
awareness of the physical world and people in it. The sensing information is simply the analogue
input from the physical world.

6. ________ in IoT as one of the key characteristics, devices have different hardware platforms and
networks.

a) Sensors
b) Heterogeneity

c) Security

d) Connectivity

View Answer

Answer: b

Explanation: Heterogeneity in IoT as one of the key characteristics, devices have different hardware
platforms and networks. And can interact with other devices or services platforms through different
networks.

7. IoT devices are naturally vulnerable to ________ threats.

a) Sensors

b) Heterogeneity

c) Security

d) Connectivity

View Answer

Answer: c

Explanation: IoT devices are naturally vulnerable to security threats. There is a high level of
transparency and privacy issues with IoT.

8. Which challenge comes under IoT devices, reliable bidirectional signaling.

a) Signaling

b) Security

c) Presence detection

d) Power consumption

View Answer

Answer: a

Explanation: With connected IoT devices, reliable bidirectional signaling is essential for collecting
and routing data between devices.

9. Which challenge comes under securing the information?

a) Signaling

b) Security
c) Presence detection

d) Power consumption

View Answer

Answer: b

Explanation: Security is a huge umbrella, but it’s paramount in Internet of Things connectivity.

10. ________ gives an exact, up to the second state of all devices on a network.

a) Signaling

b) Security

c) Presence detection

d) Power consumption

View Answer

Answer: c

Explanation: Its important to immediately know when an IoT device drops off the network and goes
offline and when comes online back. Presence detection of IoT devices gives an exact, up to the
second state of all devices on a network.

11. Which challenge comes when we use many devices on the same network?

a) Signaling

b) Security

c) Presence detection

d) Power consumption

View Answer

Answer: d

Explanation: You need minimal battery drain and low power consumption. You can’t afford to use up
100% of an IoT devices small and expensive embedded CPU power.

12. ________ a cellular network is expensive, especially with many IoT devices.

a) Signaling

b) Security

c) Bandwidth

d) Power consumption
View Answer

Answer: c

Explanation: In addition to power and CPU, bandwidth consumption is another challenge for IoT
connectivity. Bandwidth on a cellular is expensive, especially with many IoT devices.

13. Which of the following issues are considered in IoT?

a) Security Issue

b) Reliablity Issue

c) Standard Issue

d) All issues

View Answer

Answer: d

Explanation: We should be very careful while building IoT as it has the following issues:

Security Issue

Reliablity Issue

Standard Issue.

14. SBC stands for?

a) Standard Building Center

b) Smart Business Center

c) Standard Business Center

d) Smart Building Center

View Answer

Answer: b

Explanation: One of the key subsystems from point of view of security of the complex IoT system is a
smart business center system.

15. IoT is a paradigm that involves ubiquitous presence in the environment.

a) True

b) False

View Answer

Answer: a
Explanation: IoT is a paradigm that involves ubiquitous presence in the environment of different
things that are using wireless and wire networks.

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Addressing Reliability”.

1. There are efficiency gains from ________ all sorts of equipment.

a) Implementation

b) Analogous

c) Evolution

d) Digitization

View Answer

Answer: d

Explanation: There are efficiency gains from digitization of all sorts of equipment and measures that
used to be analog and disconnected.

2. Business values can be Daunting Proposition to figure out how to best harness all this data.

a) True

b) False

View Answer

Answer: a

Explanation: Across every industry, organization is looking at ways they can derive business value
from IoT. While some benefits will be relative clear cut, it can be a Daunting Proposition to figure out
how to best harness all this data.

3. The availability of ________ is the cloud services provider who will host video and data for end
users.

a) Devices

b) Memory

c) Security system

d) Objects

View Answer

Answer: c
Explanation: The availability of cloud based security is the cloud services provider who will host
video and data for end users, as providers are solely responsible for ensuring the availability and
reliability of this data.

4. SLA stands for ____________

a) Service Level Agreement

b) Security Level Agreement

c) System Local Area

d) Service Local Area

View Answer

Answer: a

Explanation: Not all cloud service providers service level agreement offer that level of guarantee.

5. A provider which produces 99 percent uptime ________

a) Security issues

b) Network Issues

c) Programming issue

d) Memory issue

View Answer

Answer: b

Explanation: Among the exceptions that release a provider from providing 99 percent uptime are
network issues not within their direct control, client negligence, “acts of god,” scheduling
maintenance and more.

6. With physical security, the stakes are incredibly ________

a) Very high

b) Low

c) Very low

d) High

View Answer

Answer: d

Explanation: With physical security, the stakes are incredibly high, so even if you are working with a
limited budget, cloud services are not an area where you should shop for a bargain.
7. Issue with connecting to data stored have anything to do with data centers.

a) True

b) False

View Answer

Answer: a

Explanation: The reality is that any issues with connecting to data stored in the cloud rarely have
anything to do with the service provider’s data center.

8. The most likely culprit is ________

a) Things

b) Network

c) Device

d) Internet connectivity

View Answer

Answer: d

Explanation: The most likely culprit is internet connectivity, leaving end users unable to access their
hosted data or even perform management functions.

9. ________ are designed to protect data and servers.

a) Physical walls

b) Logical firewalls

c) Both Physical and logical

d) Neither physical nor logical

View Answer

Answer: c

Explanation: Physical and logical firewalls measure are designed to protect data and the servers
where it is stored from theft. Sabotage and damage caused by natural disasters.

10. Communication between ________ and ________ is encrypted for security.

a) Cloud and device

b) End user and data center


c) Network and device

d) Cloud and Network

View Answer

Answer: b

Explanation: Communication between end user sites and data centre is encrypted according to
industry standards to further improve system security.

11. Undertaking the intervention over an extended period of time would enhance the change of
gaining access.

a) True

b) False

View Answer

Answer: a

Explanation: Undertaking the intervention over an extended period of time would enhance the
change of gaining access to revelation about the thinking of biology teachers.

12. ________ phase starts with the construction of spanning tree for ordinary routing information.

a) Initialization

b) Message Relaying

c) Selective recovery

d) Lost message detection

View Answer

Answer: a

Explanation: Initialization phase starts with the construction of spanning tree for ordinary routing
information. A level corresponds to the hop distance of the node from the sink and data will be
transmitted.

13. In which phase packets are forwarded hop by hop to get closer to the sink?

a) Initialization

b) Message Relaying

c) Selective recovery

d) Lost message detection

View Answer
Answer: b

Explanation: Packets are forwarded hop by hop to get closer to the sink. Intermediate nodes keep
the packetId in their buffer during Tcol corresponding to the maximum delay allowed to transmit.

14. ________ is achieved using over hearing mechanism.

a) Initialization

b) Message Relaying

c) Selective recovery

d) Lost message detection

View Answer

Answer: d

Explanation: The lost message detection is achieved by over hearing mechanism. Upon sensing the
channel, if node A does not hear node B transmitting the packet packetId to its next hop, it becomes
aware that the packet has been lost and that are transmission is required.

15. What is the last step in algorithm for reliable data transfer?

a) Initialization

b) Message Relaying

c) Selective recovery

d) Lost message detection

View Answer

Answer: c

Explanation: Once a packet is detected, the AJIA mechanism relies on its routing metric to choose
the best next hop for the packet re transmission.

You might also like