Professional Documents
Culture Documents
ADECONAGAR, HOOGHLY –
712121
Question Bank
INTERNET OF THINGS
13. Pre built circuit boards that fit on top of Arduino is called
(a)PCB (b) Shield
(c)Development Board
(d)None of these
14. Library of Arduino IDE is based on the Language
(a)Machine Label
(b)Assembly Label
(c)High Label
(d)Any one among above
15. What does “Things” in IoT refers to?
(a) General device
(b) Information (c)
IoT devices
(d) Object
16. Enabling everyday’s objects to send and receive data through internet is called
(a)Internet of Things
(b) Network Interconnection
(c) Object Determination
(d)None of these
17. Connecting everyday physical objects to the internet can be implemented using .
(a) IOT (Internet of Things)
(b) MQTT (c) COAP (d)
SPI
18. A number of interoperable communication protocols and communication with different devices
and infrastructure is supported by
(a) Artificial Intelligence
(b) Machine Learning
(c) Internet of Things
(d) All of these
19. Which of the following is recognized as first IOT device
(a) Smart Watch
(b) ATM
(c) Radio
(d) Video Game
20. ______refers to establish a proper connection between all the things of IOT.
(a) Connectivity
(b) Analyzing
(c) Sensing
(d) Active Engagement
21. Which of the following(s) is (are) IOT devices
(a) Wearable sensors.
(b) Smart watches
(c) LED lights. (d)
All of the above
22. MQTT stands for
(a) MQ Telemetry Things
(b) MQ Transport Telemetry
(c) MQ Transport Things
(d) MQ Telemetry Transport
23. Which protocol is not lightweight?
(a) MQTT
(b) HTTP
(c) CoAP
(d) None of these
24. HTTP stands for
(a) Hyper Text Transfer Protocol
(b) Hyper Terminal Transfer Protocol
(c) Hyper Text Terminal Protocol
(d) Hyper Terminal Text Protocol
25. CoAP is designed for
(a) Internet applications
(b) Device applications
(c) Wireless applications
(d)Wired applications
26. IOT devices are connected among itself by the protocol
(a) TCP/IP
(b) Network
(c) UDP (d)
HTTP
2. Which action is the best step to protect Internet of Things (IoT) devices from becoming the
entry point for security vulnerabilities into a network while still meeting business
requirements?
(a)Turning IoT devices off when not in use
(b)Removing IoT devices from the network
(c) Using encryption for communications
(d) Applying security updates promptly.