You are on page 1of 262

Introduction to Internet of Things

Questions

Presented By: Riya Tapwal


Under the supervision of

Prof. Sudip Misra

Indian Institute of Technology, Kharagpur, India

IIT Kharagpur Introduction to Internet of Things October, 2023 1


Question No: 1

Which of the following areas are identified as IoT enablers?

a.RFID
b.Smart Networks
c. Nanotechnology
d.All of the above

IIT Kharagpur Introduction to Internet of Things Week 12 2


Question No: 1

Which of the following areas are identified as IoT enablers?

a.RFID
b.Smart Networks
c. Nanotechnology
d.All of the above

IIT Kharagpur Introduction to Internet of Things Week 12 3


Question No: 2

Which of the following is a digital sensor?


a. KY-013
b. LX1972
c. DHT11
d. LM35D

IIT Kharagpur Introduction to Internet of Things Week 12 4


Question No: 2

Which of the following is a digital sensor?


a. KY-013
b. LX1972
c. DHT11
d. LM35D

IIT Kharagpur Introduction to Internet of Things Week 12 5


Question No: 3

Which of the following is considered as long range radio used in IoT?

a. Bluetooth
b. RFID
c. LoRa
d. None of them

IIT Kharagpur Introduction to Internet of Things Week 12 6


Question No: 3

Which of the following is considered as long range radio used in IoT?

a. Bluetooth
b. RFID
c. LoRa
d. None of them

IIT Kharagpur Introduction to Internet of Things Week 12 7


Question No: 4

Solenoid valve finds application in _____________________ equipment.

a. Both hydraulic & electrical


b. Both electrical & pneumatic
c. Both electrical & mechanical
d. Both hydraulic & pneumatic

IIT Kharagpur Introduction to Internet of Things Week 12 8


Question No: 4

Solenoid valve finds application in _____________________ equipment.

a. Both hydraulic & electrical


b. Both electrical & pneumatic
c. Both electrical & mechanical
d. Both hydraulic & pneumatic

IIT Kharagpur Introduction to Internet of Things Week 12 9


Question No: 5

Which of the following connects an IoT LAN with a WAN, and to the Internet?

a. IoT node
b. IoT proxy
c. IoT gateway
d. IoT Network

IIT Kharagpur Introduction to Internet of Things Week 12 10


Question No: 5

Which of the following connects an IoT LAN with a WAN, and to the Internet?

a. IoT node
b. IoT proxy
c. IoT gateway
d. IoT Network

IIT Kharagpur Introduction to Internet of Things Week 12 11


Question No: 6

Which of the following is NOT a function of IoT Gateways?

a.Switching
b.Firewall & VPN services
c. Protocol conversion
d.None of the above

IIT Kharagpur Introduction to Internet of Things Week 12 12


Question No: 6

Which of the following is NOT a function of IoT Gateways?

a.Switching
b.Firewall & VPN services
c. Protocol conversion
d.None of the above

IIT Kharagpur Introduction to Internet of Things Week 12 13


Question No: 7

Which of the following is NOT a characteristic of IoT?

a.Intermittent connectivity
b.Ambiguous naming & addressing
c. Scalable architecture
d.Abundance of sleeping nodes

IIT Kharagpur Introduction to Internet of Things Week 12 14


Question No: 7

Which of the following is NOT a characteristic of IoT?

a.Intermittent connectivity
b.Ambiguous naming & addressing
c. Scalable architecture
d.Abundance of sleeping nodes

IIT Kharagpur Introduction to Internet of Things Week 12 15


Question No: 8

Rack & pinion is an example of _____ actuator.

a. Hydrodynamic
b. Electrical
c. Mechanical
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 16


Question No: 8

Rack & pinion is an example of _____ actuator.

a. Hydrodynamic
b. Electrical
c. Mechanical
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 17


Question No: 9

Identify the component shown below.

a. Temperature sensor
b. Tilt sensor
c. Gas sensor
d. Pressure sensor

IIT Kharagpur Introduction to Internet of Things Week 12 18


Question No: 9

Identify the component shown below.

a. Temperature sensor
b. Tilt sensor
c. Gas sensor
d. Pressure sensor

IIT Kharagpur Introduction to Internet of Things Week 12 19


Question No: 10

Fill in the blanks.


V2V communication represents __________ whereas V2R communication represents____________________

a. Vehicle-to-Vehicle, Vehicle-to-Relay
b. Vehicle-to-Vendor, Vehicle-to-Roadside
c. Vehicle-to-Vendor, Vehicle-to-Relay
d. Vehicle-to-Vehicle, Vehicle-to-Roadside

IIT Kharagpur Introduction to Internet of Things Week 12 20


Question No: 10

Fill in the blanks.


V2V communication represents __________ whereas V2R communication represents____________________

a. Vehicle-to-Vehicle, Vehicle-to-Relay
b. Vehicle-to-Vendor, Vehicle-to-Roadside
c. Vehicle-to-Vendor, Vehicle-to-Relay
d. Vehicle-to-Vehicle, Vehicle-to-Roadside

IIT Kharagpur Introduction to Internet of Things Week 12 21


Question No: 11

Which of the following is not an application of IoT?

a. Connected Vehicles
b. Smart Cities
c. Smart parking
d. Relay

IIT Kharagpur Introduction to Internet of Things Week 12 22


Question No: 11

Which of the following is not an application of IoT?

a. Connected Vehicles
b. Smart Cities
c. Smart parking
d. Relay

IIT Kharagpur Introduction to Internet of Things Week 12 23


Question No: 12

SDN stands for

a. Sensor Defined Networking


b. Software Defined Networking
c. Service Defined Networking
d. Selection Defined Networking

IIT Kharagpur Introduction to Internet of Things Week 12 24


Question No: 12

SDN stands for

a. Sensor Defined Networking


b. Software Defined Networking
c. Service Defined Networking
d. Selection Defined Networking

IIT Kharagpur Introduction to Internet of Things Week 12 25


Question No: 13

Which of the following is a component in a typical sensor network?

a. Sink
b. Gateway
c. Router
d. All of these

IIT Kharagpur Introduction to Internet of Things Week 12 26


Question No: 13

Which of the following is a component in a typical sensor network?

a. Sink
b. Gateway
c. Router
d. All of these

IIT Kharagpur Introduction to Internet of Things Week 12 27


Question No: 14

Which of the following represent/s characteristics of big data?

a. Volume
b. Value
c. Velocity
d. All of these

IIT Kharagpur Introduction to Internet of Things Week 12 28


Question No: 14

Which of the following represent/s characteristics of big data?

a. Volume
b. Value
c. Velocity
d. All of these

IIT Kharagpur Introduction to Internet of Things Week 12 29


Question No: 15

What is the standard form of DSRC in wireless communications?

a. Distributed short-range communication


b. Dedicated short-range communications
c. Distributed smart-range communication
d. Dedicated smart-range communication

IIT Kharagpur Introduction to Internet of Things Week 12 30


Question No: 15

What is the standard form of DSRC in wireless communications?

a. Distributed short-range communication


b. Dedicated short-range communications
c. Distributed smart-range communication
d. Dedicated smart-range communication

Dedicated short-range communication (DSRC) is a wireless communication technology designed to allow


automobiles in the intelligent transportation system (ITS) to communicate with other automobiles or infrastructure
technology.

IIT Kharagpur Introduction to Internet of Things Week 12 31


Question No: 16

Which of the following is a feature of Smart Parking?

a. Shortens parking search time for drivers.


b. Reduces traffic congestion.
c. Increases urban mobility.
d. All of these.

IIT Kharagpur Introduction to Internet of Things Week 12 32


Question No: 16

Which of the following is a feature of Smart Parking?

a. Shortens parking search time for drivers.


b. Reduces traffic congestion.
c. Increases urban mobility.
d. All of these.

IIT Kharagpur Introduction to Internet of Things Week 12 33


Question No: 17

You can execute Python programs within a Raspberry Pi

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 34


Question No: 17

You can execute Python programs within a Raspberry Pi

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 35


Question No: 18

Which among the following Internet of Things devices require an operating system?

a. Arduino
b. Raspberry Pi
c. NodeMCU
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 36


Question No: 18

Which among the following Internet of Things devices require an operating system?

a. Arduino
b. Raspberry Pi
c. NodeMCU
d. None of these

Raspberry Pi requires an operating system to work. The official operating system for Raspberry Pi is
Raspbian. However, it also supports other operating systems, such as: Kali Linux, OSMC, Windows 10 IoT Core,
Android Things, RetroPie.
Arduino boards are microcontrollers and do not have an operating system. Raspberry Pi boards are microprocessors
and have their own operating system.
NodeMCU (Node MicroController Unit) is an open-source IoT platform that includes firmware, hardware, and
software development environment.

IIT Kharagpur Introduction to Internet of Things Week 12 37


Question No: 19
In general, the target-tracking problem consists of a WSN, whose nodes are strategically or randomly deployed across the
sensor field. Is the statement true?

a. Yes
b. No

IIT Kharagpur Introduction to Internet of Things Week 12 38


Question No: 19
In general, the target-tracking problem consists of a WSN, whose nodes are strategically or randomly deployed across the
sensor field. Is the statement true?

a. Yes
b. No

IIT Kharagpur Introduction to Internet of Things Week 12 39


Question No: 20

Match the following:

a. 1-b, 2-a, 3-d, 4-c


b. 1-b, 2-d, 3-a, 4-c
c. 1-c, 2-a, 3-d, 4-b
d. 1-c, 2-a, 3-b, 4-d

IIT Kharagpur Introduction to Internet of Things Week 12 40


Question No: 20

Match the following:

a. 1-b, 2-a, 3-d, 4-c


b. 1-b, 2-d, 3-a, 4-c
c. 1-c, 2-a, 3-d, 4-b
d. 1-c, 2-a, 3-b, 4-d

IIT Kharagpur Introduction to Internet of Things Week 12 41


Question No: 21

Which of the following is true for the given command?


random(10);

a. Gives random number within the range [0, 10]


b. Gives random number within the range [1, 10]
c. Gives random number within the range [0, 9]
d. Reset the pseudo-random number generator with seed value 10

IIT Kharagpur Introduction to Internet of Things Week 12 42


Question No: 21

Which of the following is true for the given command?


random(10);

a. Gives random number within the range [0, 10]


b. Gives random number within the range [1, 10]
c. Gives random number within the range [0, 9]
d. Reset the pseudo-random number generator with seed value 10

IIT Kharagpur Introduction to Internet of Things Week 12 43


Question No: 22

No matter how big an SDN network becomes, we can never have more than one SDN controller.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 44


Question No: 22

No matter how big an SDN network becomes, we can never have more than one SDN controller.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 45


Question No: 23

Does 6LoWPAN allow interoperability between IEEE802.15.4-based wireless devices and other IP-based devices?

a. Yes
b. No

IIT Kharagpur Introduction to Internet of Things Week 12 46


Question No: 23

Does 6LoWPAN allow interoperability between IEEE802.15.4-based wireless devices and other IP-based devices?

a. Yes
b. No

IIT Kharagpur Introduction to Internet of Things Week 12 47


Question No: 24

In smart grid communication, the gateway acts as a link between the smart meter and the data aggregator unit.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 48


Question No: 24

In smart grid communication, the gateway acts as a link between the smart meter and the data aggregator unit.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 49


Question No: 25

How many digital I/O pins are there in Arduino Uno.

a. 14
b. 54
c. 11
d. 16

IIT Kharagpur Introduction to Internet of Things Week 12 50


Question No: 25

How many digital I/O pins are there in Arduino Uno.

a. 14
b. 54
c. 11
d. 16

IIT Kharagpur Introduction to Internet of Things Week 12 51


Question No: 26

With Software Defined IoT, it is possible to control the individual physical sensor and actuator nodes as well as rule
placement of the backbone network remotely by suitable orchestration and software.

a. Yes
b. No

IIT Kharagpur Introduction to Internet of Things Week 12 52


Question No: 26

With Software Defined IoT, it is possible to control the individual physical sensor and actuator nodes as well as rule
placement of the backbone network remotely by suitable orchestration and software.

a. Yes
b. No

IIT Kharagpur Introduction to Internet of Things Week 12 53


Question No: 27

Statement I: Aliasing error occurs if the input variable or added noise changes periodically at a frequency proportional to
the multiple of the sampling rate.

Statement II: If the signal is monitored digitally, the sampling frequency can cause a dynamic error triggering aliasing
error.

a. Both Statement I and II are false


b. Both Statement I and II are true
c. Statement I is false but Statement II is true
d. Statement I is true but Statement II is false

IIT Kharagpur Introduction to Internet of Things Week 12 54


Question No: 27

Statement I: Aliasing error occurs if the input variable or added noise changes periodically at a frequency proportional to
the multiple of the sampling rate.

Statement II: If the signal is monitored digitally, the sampling frequency can cause a dynamic error triggering aliasing
error.

a. Both Statement I and II are false


b. Both Statement I and II are true
c. Statement I is false but Statement II is true
d. Statement I is true but Statement II is false

IIT Kharagpur Introduction to Internet of Things Week 12 55


Question No: 28

What is/are the vulnerability/vulnerabilities that may exist in the smart grid?

a. Physical threats
b. Availability
c. Dynamic system attacks
d. All of these

IIT Kharagpur Introduction to Internet of Things Week 12 56


Question No: 28

What is/are the vulnerability/vulnerabilities that may exist in the smart grid?

a. Physical threats
b. Availability
c. Dynamic system attacks
d. All of these

IIT Kharagpur Introduction to Internet of Things Week 12 57


Question No: 29

Which component of UMB converts physical devices into virtually abstracted one, as described by Universal Device
Template (UMB).

a. UMB-A
b. UMB-C
c. UDT mapping
d. UMB-B

IIT Kharagpur Introduction to Internet of Things Week 12 58


Question No: 29

Which component of UMB converts physical devices into virtually abstracted one, as described by Universal Device
Template (UMB).

a. UMB-A
b. UMB-C
c. UDT mapping
d. UMB-B

IIT Kharagpur Introduction to Internet of Things Week 12 59


Question No: 30

Suppose there are two organizations, A and B both of which provide cloud services. Any user can access the cloud of A free
of cost whereas only employees of organization B can access the cloud of B. Also organization B has set up its cloud for only
its own needs. With respect to the type of cloud infrastructure provided by A and B, which among the following is true

a. A: Private Cloud, B: Public Cloud


b. A: Public Cloud, B: Private Cloud
c. A: Public Cloud, B: Public Cloud
d. A: Private Cloud, B: Private Cloud

IIT Kharagpur Introduction to Internet of Things Week 12 60


Question No: 30

Suppose there are two organizations, A and B both of which provide cloud services. Any user can access the cloud of A free
of cost whereas only employees of organization B can access the cloud of B. Also organization B has set up its cloud for only
its own needs. With respect to the type of cloud infrastructure provided by A and B, which among the following is true

a. A: Private Cloud, B: Public Cloud


b. A: Public Cloud, B: Private Cloud
c. A: Public Cloud, B: Public Cloud
d. A: Private Cloud, B: Private Cloud

IIT Kharagpur Introduction to Internet of Things Week 12 61


Question No: 31

In Optimal Geographical Density Control (OGDC) algorithm, a node _________ if its coverage area is completely covered.

a. wakes up
b. starts listening
c. sleeps
d. backs off

IIT Kharagpur Introduction to Internet of Things Week 12 62


Question No: 31

In Optimal Geographical Density Control (OGDC) algorithm, a node _________ if its coverage area is completely covered.

a. wakes up
b. starts listening
c. sleeps
d. backs off

IIT Kharagpur Introduction to Internet of Things Week 12 63


Question No: 32

What is the maximum size of hop limit in 6LoWPAN packet format?

a. 8-bit unsigned integer


b. 16-bit unsigned integer
c. 8-bit signed integer
d. 16-bit signed integer

IIT Kharagpur Introduction to Internet of Things Week 12 64


Question No: 32

What is the maximum size of hop limit in 6LoWPAN packet format?

a. 8-bit unsigned integer


b. 16-bit unsigned integer
c. 8-bit signed integer
d. 16-bit signed integer

IIT Kharagpur Introduction to Internet of Things Week 12 65


Question No: 33
State whether true or false.
It is not possible to return multiple values from a function in Python.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 66


Question No: 33
State whether true or false.
It is not possible to return multiple values from a function in Python.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 67


Question No: 34
The physical layer of Sigfox modulates signals using _________ in the uplink direction and _______ in the downlink
direction.

a. DSSS, OFDM
b. DBPSK, GFSK
c. DBPSK, OFDM
d. DSSS, GFSK

IIT Kharagpur Introduction to Internet of Things Week 12 68


Question No: 34
The physical layer of Sigfox modulates signals using _________ in the uplink direction and _______ in the downlink
direction.

a. DSSS, OFDM
b. DBPSK, GFSK
c. DBPSK, OFDM
d. DSSS, GFSK

IIT Kharagpur Introduction to Internet of Things Week 12 69


Question No: 35
Let us consider that multimedia data are coming as an indecipherable mass without structure. It represents which
characteristics of big data?

a. Variability
b. Veracity
c. Volume
d. Velocity

IIT Kharagpur Introduction to Internet of Things Week 12 70


Question No: 35
Let us consider that multimedia data are coming as an indecipherable mass without structure. It represents which
characteristics of big data?

a. Variability
b. Veracity
c. Volume
d. Velocity

IIT Kharagpur Introduction to Internet of Things Week 12 71


Question No: 36
System A has a storage of 10TB (terabytes) while system B has a storage of 10KB (kilobytes). Which among the following
options gives the most correct association of A and B, assuming the standard specifications and difference between cloud and
fog computing.

a. A:Cloud, B: Fog
b. A: Fog, B: Cloud
c. None of these
d. Both of these

IIT Kharagpur Introduction to Internet of Things Week 12 72


Question No: 36
System A has a storage of 10TB (terabytes) while system B has a storage of 10KB (kilobytes). Which among the following
options gives the most correct association of A and B, assuming the standard specifications and difference between cloud and
fog computing.

a. A:Cloud, B: Fog
b. A: Fog, B: Cloud
c. None of these
d. Both of these

IIT Kharagpur Introduction to Internet of Things Week 12 73


Question No: 37
A certain industrial application requires the use of a wireless solution for networking sensors deployed on a factory floor. The
major requirement of the application is to ensure that all of its 5,694,967,200 devices are uniquely addressable without using
any subnets. Which of the following protocols is suitable for this application?

a. WiFi
b. Bluetooth
c. ISA100.11A
d. WirelessHART

IIT Kharagpur Introduction to Internet of Things Week 12 74


Question No: 37
A certain industrial application requires the use of a wireless solution for networking sensors deployed on a factory floor. The
major requirement of the application is to ensure that all of its 5,694,967,200 devices are uniquely addressable without using
any subnets. Which of the following protocols is suitable for this application?

a. WiFi
b. Bluetooth
c. ISA100.11A
d. WirelessHART

IIT Kharagpur Introduction to Internet of Things Week 12 75


Question No: 38
Suppose data is getting collected from different sources. However, the user needs to get a uniform view of the data. Which of
the following needs to be done to satisfy the aforementioned requirement?

a. Cleaning
b. Integration
c. Redundancy mitigation
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 76


Question No: 37
Suppose data is getting collected from different sources. However, the user needs to get a uniform view of the data. Which of
the following needs to be done to satisfy the aforementioned requirement?

a. Cleaning
b. Integration
c. Redundancy mitigation
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 77


Question No: 38
What is the purpose of the following sketch?
void setup() {
Serial.begin(9600);
}
void loop() {
Serial.write(80);
}

a. Send a signal to pin 80 on the Arduino board.


b. Send an octal number of 80 through the Serial pins.
c. Send a byte with value 80 through the Serial pins.
d. Send a hexadecimal number of 80 through the Serial pins

IIT Kharagpur Introduction to Internet of Things Week 12 78


Question No: 38
What is the purpose of the following sketch?
void setup() {
Serial.begin(9600);
}
void loop() {
Serial.write(80);
}

a. Send a signal to pin 80 on the Arduino board.


b. Send an octal number of 80 through the Serial pins.
c. Send a byte with value 80 through the Serial pins.
d. Send a hexadecimal number of 80 through the Serial pins

IIT Kharagpur Introduction to Internet of Things Week 12 79


Question No: 39

Which among the following technologies allows an organization that does not have access to physical IoT devices to still get
IoT based services through virtualized sensors and virtual sensor networks

a: Sensor cloud
b: Software Defined Networking
c: Ad-hoc routing
d: None of these

IIT Kharagpur Introduction to Internet of Things Week 12 80


Question No: 39

Which among the following technologies allows an organization that doesn’t have access to physical IoT devices to still get
IoT based services through virtualized sensors and virtual sensor networks

a: Sensor cloud
b: Software Defined Networking
c: Ad-hoc routing
d: None of these

IIT Kharagpur Introduction to Internet of Things Week 12 81


Question No: 40
A smart home installation requires multiple sensors to be connected to a home-based hub. The requirement for the minimum
connection distance between the devices (if in a mesh configuration) or between the device and the hub (if following a direct
connection) is 60m. Which of the following wireless connectivity solutions is suitable for this installation?

a. Z-wave
b. Zigbee
c. Both Z-wave and Zigbee
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 82


Question No: 40
A smart home installation requires multiple sensors to be connected to a home-based hub. The requirement for the minimum
connection distance between the devices (if in a mesh configuration) or between the device and the hub (if following a direct
connection) is 60m. Which of the following wireless connectivity solutions is suitable for this installation?

a. Z-wave
b. Zigbee
c. Both Z-wave and Zigbee
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 83


Question No: 41
Let us consider that in an electric grid, energy generation is done in a centralized manner. Additionally, energy is getting
distributed only from the power plant to the industry. Finally, it requires manual monitoring and restoration of the grid.
Which of the following represents the aforementioned electric grid –

a. Smart grid
b. Traditional electric grid
c. Isolated grid
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 84


Question No: 41
Let us consider that in an electric grid, energy generation is done in a centralized manner. Additionally, energy is getting
distributed only from the power plant to the industry. Finally, it requires manual monitoring and restoration of the grid.
Which of the following represents the aforementioned electric grid –

a. Smart grid
b. Traditional electric grid
c. Isolated grid
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 85


Question No: 42
Which of the following is true about HAN architecture?

a. Uses XML for description.


b. Follows Software Oriented Architecture.
c. Tied to a dedicated software.
d. All of these

IIT Kharagpur Introduction to Internet of Things Week 12 86


Question No: 42
Which of the following is true about HAN architecture?

a. Uses XML for description.


b. Follows Software Oriented Architecture.
c. Tied to a dedicated software.
d. All of these

IIT Kharagpur Introduction to Internet of Things Week 12 87


Question No: 43
Which among the following libraries in Python do you use to generate and plot graphs

a. numpy
b. time
c. matplotlib
d. random

IIT Kharagpur Introduction to Internet of Things Week 12 88


Question No: 43
Which among the following libraries in Python do you use to generate and plot graphs

a. numpy
b. time
c. matplotlib
d. random

IIT Kharagpur Introduction to Internet of Things Week 12 89


Question No: 44
A Zigbee-based processor generates 1 million symbols per hour. This Zigbee uses a 915MHz band with a data-rate of
250kbps, using BPSK with an allocation of 4 bits per symbol. What is the time taken to transfer 1 million symbols? [Hint:
Use baud rate to calculate the time taken]
a. 32 sec
b. 20 sec
c. 8 sec
d. 16 sec

IIT Kharagpur Introduction to Internet of Things Week 12 90


Question No: 45
A Zigbee-based processor generates 1 million symbols per hour. This Zigbee uses a 915MHz band with a data-rate of
250kbps, using BPSK with an allocation of 4 bits per symbol. What is the time taken to transfer 1 million symbols? [Hint:
Use baud rate to calculate the time taken]
a. 32 sec
b. 20 sec
c. 8 sec
d. 16 sec

250 kb data in 1 sec


Then 1 bit data in 1/250 Kb

1 million symbols means 4 million bits i.e. 4,000,000


Time- 4000000/250000= 16 sec

IIT Kharagpur Introduction to Internet of Things Week 12 91


Question No: 46
In a smart grid, the exchanged sensor readings along with the feedback control signal were
manipulated. Which of the following represents the aforementioned security issue?

a. Data injection attack


b. Covert attack
c. Time synchronization attack
d. Replay attack

IIT Kharagpur Introduction to Internet of Things Week 12 92


Question No: 46
In a smart grid, the exchanged sensor readings along with the feedback control signal were
manipulated. Which of the following represents the aforementioned security issue?

a. Data injection attack


b. Covert attack
c. Time synchronization attack
d. Replay attack

IIT Kharagpur Introduction to Internet of Things Week 12 93


Question No: 47
What is the standard form of DLNA?

a. Digital Living Network Alliance.


b. Domestic Living Network Alliance.
c. Digital Living Network Authority.
d. Distributed Living Network Alliance.

IIT Kharagpur Introduction to Internet of Things Week 12 94


Question No: 47
What is the standard form of DLNA?

a. Digital Living Network Alliance.


b. Domestic Living Network Alliance.
c. Digital Living Network Authority.
d. Distributed Living Network Alliance.

IIT Kharagpur Introduction to Internet of Things Week 12 95


Question No: 48
Consider that only the following match field based flow rule is installed within an OpenFlow enabled SDN switch and no
other flow rules are present, [Ingress port: 90, Source IP address: 10.15.16.20 ==> Egress port: 100]. It means that if a
packet with source IP address 10.15.16.20 arrives at port 90, then the switch should forward it to port 100.Now a packet with
source IP address 10.56.78.100 arrives at port 40. Which among the following will be the correct action by
the switch

a. Switch drops the packet


b. Switch sends PACKET_IN message to controller
c. Switch forwards the packet to port 100
d. Switch forwards the packet to port 90

IIT Kharagpur Introduction to Internet of Things Week 12 96


Question No: 48
Consider that only the following match field based flow rule is installed within an OpenFlow enabled SDN switch and no
other flow rules are present, [Ingress port: 90, Source IP address: 10.15.16.20 ==> Egress port: 100]. It means that if a
packet with source IP address 10.15.16.20 arrives at port 90, then the switch should forward it to port 100.Now a packet with
source IP address 10.56.78.100 arrives at port 40. Which among the following will be the correct action by
the switch

a. Switch drops the packet


b. Switch sends PACKET_IN message to controller
c. Switch forwards the packet to port 100
d. Switch forwards the packet to port 90

IIT Kharagpur Introduction to Internet of Things Week 12 97


Question No: 49

While designing a communication protocol, the following are the requirements:


• Should be able to send a large number of signals simultaneously.
• Should not depend on sender-receiver synchronization.
Which of the following modulation techniques would be suitable for such a scenario?

a. Direct Sequence Spread Spectrum (DSSS)


b. Quadrature Phase Shift Keying (QPSK)
c. Frequency Hopping Spread Spectrum (FHSS)
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 98


Question No: 49

While designing a communication protocol, the following are the requirements:


• Should be able to send a large number of signals simultaneously.
• Should not depend on sender-receiver synchronization.
Which of the following modulation techniques would be suitable for such a scenario?

a. Direct Sequence Spread Spectrum (DSSS)


b. Quadrature Phase Shift Keying (QPSK)
c. Frequency Hopping Spread Spectrum (FHSS)
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 99


Question No: 50

Suppose an IoT-based Healthcare device is developed which can identify the pulse and oxygen level in the blood, the
electrical and muscular activity of the heart, and the intensity of stress of a patient. Choose the correct option that represents
the correct set of sensors that satisfy the aforementioned requirement.

a. SpO2, ECG, and GSR sensor


b. SpO2, soil moisture sensor, temperature sensor
c. Temperature sensor, gas sensor, ECG
d. NPK sensor, EMG sensor, GSR sensor

IIT Kharagpur Introduction to Internet of Things Week 12 10


Question No: 50

Suppose an IoT-based Healthcare device is developed which can identify the pulse and oxygen level in the blood, the
electrical and muscular activity of the heart, and the intensity of stress of a patient. Choose the correct option that represents
the correct set of sensors that satisfy the aforementioned requirement.

a. SpO2, ECG, and GSR sensor


b. SpO2, soil moisture sensor, temperature sensor
c. Temperature sensor, gas sensor, ECG
d. NPK sensor, EMG sensor, GSR sensor

IIT Kharagpur Introduction to Internet of Things Week 12 10


Question No: 51

A packet is transferred from a source A to a destination B in a network according to the following path [A >X >Y >Z>B],
where X, Y and Z are intermediate routers. The processing time to decide on which route to forward the packet at each router
is 2ms, while the packet transfer time between two routers as well as between routers and the source and destination is 10ms.
Determine the total time that it takes for a packet to go from A to B, considering each router along the way also processes the
packet. [NOTE: Processing takes place ONLY at the intermediate routers]

a. 10ms
b. 46ms
c. 54ms
d. 40ms.

IIT Kharagpur Introduction to Internet of Things Week 12 10


Question No: 51

A packet is transferred from a source A to a destination B in a network according to the following path [A ==> X ==>
Y ==> Z ==> B], where X, Y and Z are intermediate routers. The processing time to decide on which route to forward
the packet at each router is 2ms, while the packet transfer time between two routers as well as between routers and the source
and destination is 10ms. Determine the total time that it takes for a packet to go from A to B, considering each router along
the way also processes the packet. [NOTE: Processing takes place ONLY at the intermediate routers]

a. 10ms
b. 46ms
c. 54ms
d. 40ms.

IIT Kharagpur Introduction to Internet of Things Week 12 10


Question No: 52

An RFID system is used for tracking assets spread over an area of 800x800 sq. mtr? Which of the following antennas is best
suited for this system?

a. HF RFID antenna
b. UHF RFID antenna
c. VHF RFID antenna

IIT Kharagpur Introduction to Internet of Things Week 12 10


Question No: 52

An RFID system is used for tracking assets spread over an area of 800x800 sq. mtr? Which of the following antennas is best
suited for this system?

a. HF RFID antenna
b. UHF RFID antenna
c. VHF RFID antenna

IIT Kharagpur Introduction to Internet of Things Week 12 10


Question No: 53

A programmer is writing a Python code having several functions. S/he needs to use a variable that can be accessed from any
function present in the program. Additionally, the value of that variable may vary. Which of the following variable types
satisfy such criteria.
a. Local variable
b. Constant variable
c. Global variable
d. All of these

IIT Kharagpur Introduction to Internet of Things Week 12 10


Question No: 53

A programmer is writing a Python code having several functions. S/he needs to use a variable that can be accessed from any
function present in the program. Additionally, the value of that variable may vary. Which of the following variable types
satisfy such criteria.
a. Local variable
b. Constant variable
c. Global variable
d. All of these

IIT Kharagpur Introduction to Internet of Things Week 12 10


Question No: 54

As a user of SaaS by a cloud computing service provider, you are constantly worried about having to always keep the
software in the latest updated version manually.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 10


Question No: 54

As a user of SaaS by a cloud computing service provider, you are constantly worried about having to always keep the
software in the latest updated version manually.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 10


Question No: 55

Which one among the following is a striking difference of CPS from M2M?

a. inclusion of a compulsory feedback system in CPS


b. inclusion of a compulsory feedback system in M2M
c. CPS and M2M have no difference
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 11


Question No: 55

Which one among the following is a striking difference of CPS from M2M?

a. inclusion of a compulsory feedback system in CPS


b. inclusion of a compulsory feedback system in M2M
c. CPS and M2M have no difference
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 11


Question No: 56

A programmer needs to execute a python code that requires RAM support of 1GB SDRAM, Quad cortex A53@1.2GHz
CPU, 400 MHz video core IV GPU, and 802.11 wireless communication support. Select the appropriate device where the
code can be executed?
a. Raspberry Pi zero
b. Raspberry Pi 2 model B
c. Raspberry Pi 3 model B
d. Arduino Uno

IIT Kharagpur Introduction to Internet of Things Week 12 11


Question No: 56

A programmer needs to execute a python code that requires RAM support of 1GB SDRAM, Quad cortex A53@1.2GHz
CPU, 400 MHz video core IV GPU, and 802.11 wireless communication support. Select the appropriate device where the
code can be executed?
a. Raspberry Pi zero
b. Raspberry Pi 2 model B
c. Raspberry Pi 3 model B
d. Arduino Uno

IIT Kharagpur Introduction to Internet of Things Week 12 11


Question No: 57

Security and integrity are very important for which of the following cloud service models

a. SaaS
b. PaaS
c. IaaS
d. All of these

IIT Kharagpur Introduction to Internet of Things Week 12 11


Question No: 57

Security and integrity are very important for which of the following cloud service models

a. SaaS
b. PaaS
c. IaaS
d. All of these

IIT Kharagpur Introduction to Internet of Things Week 12 11


Question No: 58

Bluetooth technology uses _____________ modulation scheme and ________________ technique to avoid interferences.

a. Differential Quadrature Phase Shift Keying (DQPSK), Frequency Hopping Spread Spectrum (FHSS)
b. Gaussian Frequency Shift Keying (GFSK), Frequency Hopping Spread Spectrum (FHSS)
c. Differential Quadrature Phase Shift Keying (DQPSK), Direct Sequence Spread Spectrum (DSSS)
d. Gaussian Frequency Shift Keying (GFSK), Direct Sequence Spread Spectrum (DSSS)

IIT Kharagpur Introduction to Internet of Things Week 12 11


Question No: 58

Bluetooth technology uses _____________ modulation scheme and ________________ technique to avoid interferences.

a. Differential Quadrature Phase Shift Keying (DQPSK), Frequency Hopping Spread Spectrum (FHSS)
b. Gaussian Frequency Shift Keying (GFSK), Frequency Hopping Spread Spectrum (FHSS)
c. Differential Quadrature Phase Shift Keying (DQPSK), Direct Sequence Spread Spectrum (DSSS)
d. Gaussian Frequency Shift Keying (GFSK), Direct Sequence Spread Spectrum (DSSS)

IIT Kharagpur Introduction to Internet of Things Week 12 11


Question No: 59

Which of the following best determines the SDN controller-switch architecture?

a. Centralized
b. Decentralized
c. Distributed
d. Does not matter

IIT Kharagpur Introduction to Internet of Things Week 12 11


Question No: 59

Which of the following best determines the SDN controller-switch architecture?

a. Centralized
b. Decentralized
c. Distributed
d. Does not matter

IIT Kharagpur Introduction to Internet of Things Week 12 11


Question No: 60

RFID stands for _________________.

a. Radio Frequent Identifier


b. Radio Frequency Identification
c. Relay Frequency Identifier
d. Relay Frequent Identification

IIT Kharagpur Introduction to Internet of Things Week 12 12


Question No: 60

RFID stands for _________________.

a. Radio Frequent Identifier


b. Radio Frequency Identification
c. Relay Frequency Identifier
d. Relay Frequent Identification

IIT Kharagpur Introduction to Internet of Things Week 12 12


Question No: 61

Identify the component shown below.

•Temperature sensor
•Humidity sensor
•Both temperature and humidity sensor
•None of these

IIT Kharagpur Introduction to Internet of Things Week 12 12


Question No: 61

Identify the component shown below.

•Temperature sensor
•Humidity sensor
•Both temperature and humidity sensor
•None of these

IIT Kharagpur Introduction to Internet of Things Week 12 12


Question No: 62

Which function in Arduino is analogous to the main() function in C/C++?

a. setup()
b. loop()
c. __init__()
d. main()

IIT Kharagpur Introduction to Internet of Things Week 12 12


Question No: 62

Which function in Arduino is analogous to the main() function in C/C++?

a. setup()
b. loop()
c. __init__()
d. main()

IIT Kharagpur Introduction to Internet of Things Week 12 12


Question No: 63
HC-SR04 is a ______________ sensor.

a. Ultrasonic distance
b. Humdity
c. Temperature
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 12


Question No: 63
HC-SR04 is a ______________ sensor.

a. Ultrasonic distance
b. Humdity
c. Temperature
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 12


Question No: 64

Which of the following offers heterogeneous computing nodes distributed over a wide area to perform large tasks?

a. Cluster computing
b. Cloud computing
c. Grid computing
d. Utility computing

IIT Kharagpur Introduction to Internet of Things Week 12 12


Question No: 64

Which of the following offers heterogeneous computing nodes distributed over a wide area to perform large tasks?

a. Cluster computing
b. Cloud computing
c. Grid computing
d. Utility computing

IIT Kharagpur Introduction to Internet of Things Week 12 12


Question No: 65

Typically, what are the types of users/end devices that may be possible in cloud computing?

a. Thick and thin


b. Thick, thin, and mobile
c. Thick and mobile
d. Thin and mobile

IIT Kharagpur Introduction to Internet of Things Week 12 13


Question No: 65

Typically, what are the types of users/end devices that may be possible in cloud computing?

a. Thick and thin


b. Thick, thin, and mobile
c. Thick and mobile
d. Thin and mobile

IIT Kharagpur Introduction to Internet of Things Week 12 13


Question No: 66
True or False?
LoRa is a short range radio.
a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 13


Question No: 66
True or False?
LoRa is a short range radio.
a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 13


Question No: 67

What nature of decisions are enabled on integrating SDN with IoT?


a. Centralized
b. Coordinated
c. Distributed
d. Decentralized

IIT Kharagpur Introduction to Internet of Things Week 12 13


Question No: 67

What nature of decisions are enabled on integrating SDN with IoT?


a. Centralized
b. Coordinated
c. Distributed
d. Decentralized

IIT Kharagpur Introduction to Internet of Things Week 12 13


Question No: 68

Raspberry Pi 3 has ________ GB internal storage.

a. three
b. zero
c. four
d. one

IIT Kharagpur Introduction to Internet of Things Week 12 13


Question No: 68

Raspberry Pi 3 has ________ GB internal storage.

a. three
b. zero
c. four
d. one

IIT Kharagpur Introduction to Internet of Things Week 12 13


Question No: 69

What is the full form of TCAM in SDN switches?


a. Temporary content-addressable memory
b. Transmission content-addressable memory
c. Transfer content-addressable memory
d. Ternary content-addressable memory

IIT Kharagpur Introduction to Internet of Things Week 12 13


Question No: 69

What is the full form of TCAM in SDN switches?


a. Temporary content-addressable memory
b. Transmission content-addressable memory
c. Transfer content-addressable memory
d. Ternary content-addressable memory

IIT Kharagpur Introduction to Internet of Things Week 12 13


Question No: 70

Which of the following is the root in a Zigbee network?

a. Zigbee coordinator
b. Zigbee router
c. Zigbee end device
d. Any of the above

IIT Kharagpur Introduction to Internet of Things Week 12 14


Question No: 70

Which of the following is the root in a Zigbee network?

a. Zigbee coordinator
b. Zigbee router
c. Zigbee end device
d. Any of the above

IIT Kharagpur Introduction to Internet of Things Week 12 14


Question No: 71

Fill in the blank: Coverage algorithms are centralized _______ decentralized _________ localized.

a. and, and
b. and, or
c. or, and
d. or, or

IIT Kharagpur Introduction to Internet of Things Week 12 14


Question No: 71

Fill in the blank: Coverage algorithms are centralized _______ decentralized _________ localized.

a. and, and
b. and, or
c. or, and
d. or, or

IIT Kharagpur Introduction to Internet of Things Week 12 14


Question No: 72

Which of the following features in cloud computing refers to rapid and automatic resource allocation?

a. Resource pooling
b. Measured service
c. On-demand service
d. Rapid Elasticity

IIT Kharagpur Introduction to Internet of Things Week 12 14


Question No: 72

Which of the following features in cloud computing refers to rapid and automatic resource allocation?

a. Resource pooling
b. Measured service
c. On-demand service
d. Rapid Elasticity

IIT Kharagpur Introduction to Internet of Things Week 12 14


Question No: 73

What is the command (Linux) for generating a public/private authentication key pair?

a. keygen
b. ssh-key
c. ssh-genkey
d. ssh-keygen

IIT Kharagpur Introduction to Internet of Things Week 12 14


Question No: 73

What is the command (Linux) for generating a public/private authentication key pair?

a. keygen
b. ssh-key
c. ssh-genkey
d. ssh-keygen

IIT Kharagpur Introduction to Internet of Things Week 12 14


Question No: 74

True or False?

Changes in network prefixes does not affect the remote anchor point to which the IoT gateways are attached.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 14


Question No: 74

True or False?

Changes in network prefixes does not affect the remote anchor point to which the IoT gateways are attached.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 14


Question No: 75

How many axes data does a typical accelerometer in a smartphone provide?

a. 1
b. 2
c. 3
d. 4

IIT Kharagpur Introduction to Internet of Things Week 12 15


Question No: 75

How many axes data does a typical accelerometer in a smartphone provide?

a. 1
b. 2
c. 3
d. 4

IIT Kharagpur Introduction to Internet of Things Week 12 15


Question No: 76

What is the process of combining data from several sources to produce new data called?

a. Data collection
b. Data fusion
c. Information fusion
d. Data synthesis

IIT Kharagpur Introduction to Internet of Things Week 12 15


Question No: 76

What is the process of combining data from several sources to produce new data called?

a. Data collection
b. Data fusion
c. Information fusion
d. Data synthesis

IIT Kharagpur Introduction to Internet of Things Week 12 15


Question No: 77
Fill in the blank:

IIoT is based on ______________ approach.

a. Wrap and re-use


b. Rip and replace
c. Wrap and replace
d. Rap and re-use

IIT Kharagpur Introduction to Internet of Things Week 12 15


Question No: 77
Fill in the blank:

IIoT is based on ______________ approach.

a. Wrap and re-use


b. Rip and replace
c. Wrap and replace
d. Rap and re-use

IIT Kharagpur Introduction to Internet of Things Week 12 15


Question No: 78
True or False?

Zigbee variants such as Zigbee, Zigbee Pro, and others are not compatible with each other.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 15


Question No: 78
True or False?

Zigbee variants such as Zigbee, Zigbee Pro, and others are not compatible with each other.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 15


Question No: 79

What function is useful for generating the same set of random numbers every time a program is run?

a. randomgen()
b. randomint()
c. randomseed()
d. constrandom()

IIT Kharagpur Introduction to Internet of Things Week 12 15


Question No: 79

What function is useful for generating the same set of random numbers every time a program is run?

a. randomgen()
b. randomint()
c. randomseed()
d. constrandom()

IIT Kharagpur Introduction to Internet of Things Week 12 15


Question No: 80

What is a cyber-physical system equipped with sustainable models of energy production, distribution, and usage?

a. Information and communication technology


b. Grid
c. Smart grid
d. Traditional grid

IIT Kharagpur Introduction to Internet of Things Week 12 16


Question No: 80

What is a cyber-physical system equipped with sustainable models of energy production, distribution, and usage?

a. Information and communication technology


b. Grid
c. Smart grid
d. Traditional grid

IIT Kharagpur Introduction to Internet of Things Week 12 16


Question No: 81

What type of networks, in terms of range, are piconets used to refer?

a. Long range
b. Medium range
c. Short range
d. Very short range

IIT Kharagpur Introduction to Internet of Things Week 12 16


Question No: 81

What type of networks, in terms of range, are piconets used to refer?

a. Long range
b. Medium range
c. Short range
d. Very short range

IIT Kharagpur Introduction to Internet of Things Week 12 16


Question No: 82

Which of the following may be referred to as a transducer?

a. Sensor
b. Actuator
c. Neither sensor nor actuator
d. Both sensor and actuator

IIT Kharagpur Introduction to Internet of Things Week 12 16


Question No: 82

Which of the following may be referred to as a transducer?

a. Sensor
b. Actuator
c. Neither sensor nor actuator
d. Both sensor and actuator

IIT Kharagpur Introduction to Internet of Things Week 12 16


Question No: 83

Which of the following properties in smart grids covers load forecasting?

a. Power system efficiency


b. Distributed generation
c. Power quality
d. Consumer participation

IIT Kharagpur Introduction to Internet of Things Week 12 16


Question No: 83

Which of the following properties in smart grids covers load forecasting?

a. Power system efficiency


b. Distributed generation
c. Power quality
d. Consumer participation

IIT Kharagpur Introduction to Internet of Things Week 12 16


Question No: 84

Web of Things (WoT) enables access and control over IoT resources and applications using which of the following
mainstream web technologies?
a. Ruby n' Rails
b. Ajax
c. WoTPro
d. Both Ruby n' Rails and Ajax
e. All of these

IIT Kharagpur Introduction to Internet of Things Week 12 16


Question No: 84

Web of Things (WoT) enables access and control over IoT resources and applications using which of the following
mainstream web technologies?
a. Ruby n' Rails
b. Ajax
c. WoTPro
d. Both Ruby n' Rails and Ajax
e. All of these

IIT Kharagpur Introduction to Internet of Things Week 12 16


Question No: 85

In tunneling, the nodes communicate to a remote anchor point instead of channeling their packets through the router.
Which among the following is NOT a tunneling solution?

a. Proxy Mobile IPv6 (PMIPv6)


b. Client-based Mobile IPv6 (MIPv6)
c. Network Mobility (NEMO)
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 17


Question No: 85

In tunneling, the nodes communicate to a remote anchor point instead of channeling their packets through the router.
Which among the following is NOT a tunneling solution?

a. Proxy Mobile IPv6 (PMIPv6)


b. Client-based Mobile IPv6 (MIPv6)
c. Network Mobility (NEMO)
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 17


Question No: 86

A signal with power 2 mW is distorted by noise with power 0.002 mW and interference of 0.001 mW. What is the
signal to interference plus noise ratio (SINR) in dB?
a. 28.23
b. 2.823
c. 38.23
d. 3.823

IIT Kharagpur Introduction to Internet of Things Week 12 17


Question No: 86

A signal with power 2 mW is distorted by noise with power 0.002 mW and interference of 0.001 mW. What is the
signal to interference plus noise ratio (SINR) in dB?
a. 28.23
b. 2.823
c. 38.23
d. 3.823

IIT Kharagpur Introduction to Internet of Things Week 12 17


Question No: 87

How can flooding be detected in an SDN operating under OpenFlow?

a. Flows in the user device


b. Flow rules at the end devices
c. Port statistics at the switches
d. Flow rules at the switches

IIT Kharagpur Introduction to Internet of Things Week 12 17


Question No: 87

How can flooding be detected in an SDN operating under OpenFlow?

a. Flows in the user device


b. Flow rules at the end devices
c. Port statistics at the switches
d. Flow rules at the switches

IIT Kharagpur Introduction to Internet of Things Week 12 17


Question No: 88

A fog-cloud architecture deploys or utilizes both fog and cloud platforms. 25% of the task requests use both platforms
and 40% of the students use the cloud platform. What percent of those which used the cloud also used fog?

a. 62.5%
b. 65.5%
c. 71.5%
d. 60.5%

IIT Kharagpur Introduction to Internet of Things Week 12 17


Question No: 88

A fog-cloud architecture deploys or utilizes both fog and cloud platforms. 25% of the task requests use both platforms
and 40% of the students use the cloud platform. What percent of those which used the cloud also used fog?

a. 62.5% To find the percentage of students who used both the cloud
b. 65.5% and fog platforms, you can use conditional probability. The
c. 71.5% formula for conditional probability is:
d. 60.5% P(A|B) = P(A ∩ B) / P(B)
In this case:
A represents the event of using fog,
B represents the event of using the cloud.
Given:
P(A ∩ B), the probability of using both platforms, is 25% (0.25).
P(B), the probability of using the cloud, is 40% (0.40).
Now, plug these values into the formula:
P(A|B) = 0.25 / 0.40
P(A|B) = 0.625
To express this as a percentage, multiply by 100:
P(A|B) = 62.5%
So, 62.5% of the students who used the cloud platform also
used the fog platform.

IIT Kharagpur Introduction to Internet of Things Week 12 17


Question No: 89

Which of the following is primarily a time-series database management system (DBMS)?

a. SQLite
b. InfluxDB
c. MongoDB
d. RethinkDB

IIT Kharagpur Introduction to Internet of Things Week 12 17


Question No: 89

Which of the following is primarily a time-series database management system (DBMS)?

a. SQLite
b. InfluxDB
c. MongoDB
d. RethinkDB

IIT Kharagpur Introduction to Internet of Things Week 12 17


Question No: 90

Which of the following typically supports data of larger size?

a. Structured data structure


b. Unstructured data structure
c. Neither a nor b
d. None of the above

IIT Kharagpur Introduction to Internet of Things Week 12 18


Question No: 90

Which of the following typically supports data of larger size?

a. Structured data structure


b. Unstructured data structure
c. Neither a nor b
d. None of the above

IIT Kharagpur Introduction to Internet of Things Week 12 18


Question No: 91

In Collaborative conceptualization theory of Semantic interoperability, a collaborative sign (cosign) is represented as:
cosign = (A, B, C, D)
In the above representation, what is “D”?

•Cosign internal identifier


•Natural language
•Interpretant
•Cosign dictionary

IIT Kharagpur Introduction to Internet of Things Week 12 18


Question No: 91

In Collaborative conceptualization theory of Semantic interoperability, a collaborative sign (cosign) is represented as:
cosign = (A, B, C, D)
In the above representation, what is “D”?

•Cosign internal identifier


•Natural language
•Interpretant
•Cosign dictionary

IIT Kharagpur Introduction to Internet of Things Week 12 18


Question No: 92

True or False?
Fog computing paradigm is designed to compliment the services of the cloud and will eventually replace the cloud.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 18


Question No: 92

True or False?
Fog computing paradigm is designed to compliment the services of the cloud and will eventually replace the cloud.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 18


Question No: 93

Which among the following is a wearable Arduino board?


a. Arduino Uno
b. Arduino Mega
c. RedBoard Arduino
d. LilyPad Arduino

IIT Kharagpur Introduction to Internet of Things Week 12 18


Question No: 93

Which among the following is a wearable Arduino board?


a. Arduino Uno
b. Arduino Mega
c. RedBoard Arduino
d. LilyPad Arduino

IIT Kharagpur Introduction to Internet of Things Week 12 18


Question No: 94

What protocol does the Odin agent and master use to communicate with each other?

a. TCP
b. UDP
c. TCP/IP
d. ODIN protocol

IIT Kharagpur Introduction to Internet of Things Week 12 18


Question No: 94

What protocol does the Odin agent and master use to communicate with each other?

a. TCP
b. UDP
c. TCP/IP
d. ODIN protocol

IIT Kharagpur Introduction to Internet of Things Week 12 18


Question No: 95

A cloud server receives requests from three users A, B and C, which makes up 25%, 35% and 40% of the total traffic. From
past experience, 5%, 4% and 2% of the traffic produced by these users are malicious. If a request was found to be malicious,
what is the probability that the request was made by user A?

a. 44/69
b. 25/69
c. 13/24
d. 11/24

IIT Kharagpur Introduction to Internet of Things Week 12 19


Question No: 95

A cloud server receives requests from three users A, B and C, which makes up 25%, 35% and 40% of the total traffic. From
past experience, 5%, 4% and 2% of the traffic produced by these users are malicious. If a request was found to be malicious,
what is the probability that the request was made by user A?

a. 44/69 To determine the probability that a malicious request came from user A, we can use Bayes' Theorem,
which is a way to calculate conditional probabilities. In this context:
b. 25/69
•P(A | B) represents the probability that a request is from user A given that it is malicious.
c. 13/24 •P(B | A) is the probability that a request is malicious, given that it's from user A.
d. 11/24 •P(A) is the probability that a request is from user A.
•P(B) is the overall probability that a request is malicious.
Given probabilities:
•P(A) = 0.25 (25% of requests are from user A).
•P(B | A) = 0.05 (5% of user A's requests are malicious).
•P(B | B) = 0.35 (35% of all requests are from user B).
•P(B | C) = 0.4 (40% of all requests are from user C).
Now, apply Bayes' Theorem:
P(A | B) = (P(B | A) * P(A)) / (P(B | A) * P(A) + P(B | B) * P(B) + P(B | C) * P(C))
P(A | B) = (0.05 * 0.25) / (0.05 * 0.25 + 0.04 * 0.35 + 0.02 * 0.4)
P(A | B) = 0.0125 / (0.0125 + 0.014 + 0.008)
P(A | B) ≈ 0.0125 / 0.0345
P(A | B) ≈ 0.362
So, the probability that a malicious request came from user A is approximately 36.2%.

IIT Kharagpur Introduction to Internet of Things Week 12 19


Question No: 96

True or False?
The DHT22 sensor may be used by both raspberry pi and NodeMCU devices.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 19


Question No: 96

True or False?
The DHT22 sensor may be used by both raspberry pi and NodeMCU devices.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 19


Question No: 97

IEEE 802.15.4 identifies reduced function devices (RFD) and full-function devices (FFD) as two different types of network
nodes. FFDs can talk to other FFDs or to RFDs. However, an RFD can only talk to an FFD. Such hierarchy leads to which
of the following network topologies?

a. Star
b. Mesh
c. Both star and mesh
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 19


Question No: 97

IEEE 802.15.4 identifies reduced function devices (RFD) and full-function devices (FFD) as two different types of network
nodes. FFDs can talk to other FFDs or to RFDs. However, an RFD can only talk to an FFD. Such hierarchy leads to which
of the following network topologies?

a. Star
b. Mesh
c. Both star and mesh
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 19


Question No: 98

In Python, the following is the syntax of the sleep function:


time.sleep(secs)
The argument <secs> should be __________.

•Integer
•Float
•Either integer or float
•Range

IIT Kharagpur Introduction to Internet of Things Week 12 19


Question No: 98

In Python, the following is the syntax of the sleep function:


time.sleep(secs)
The argument <secs> should be __________.

•Integer
•Float
•Either integer or float
•Range

IIT Kharagpur Introduction to Internet of Things Week 12 19


Question No: 99

In the remote IoT data logging experiment with raspberry pi, can the same experiment be implemented without
the resistor?

a. Yes
b. No

IIT Kharagpur Introduction to Internet of Things Week 12 19


Question No: 99

In the remote IoT data logging experiment with raspberry pi, can the same experiment be implemented without
the resistor?

a. Yes
b. No

IIT Kharagpur Introduction to Internet of Things Week 12 19


Question No: 100

“X” acts as a Trust Center & repository for security keys. What is “X”?

a. Zigbee End Device


b. ZigBee Coordinator
c. Zigbee Router
d. Zigbee Repo

IIT Kharagpur Introduction to Internet of Things Week 12 20


Question No: 100

“X” acts as a Trust Center & repository for security keys. What is “X”?

a. Zigbee End Device


b. ZigBee Coordinator
c. Zigbee Router
d. Zigbee Repo

IIT Kharagpur Introduction to Internet of Things Week 12 20


Question No: 101

What port number is typically used by the Secure Shell protocol (SSH)?

a. 8080
b. 443
c. 22
d. 445

IIT Kharagpur Introduction to Internet of Things Week 12 20


Question No: 101

What port number is typically used by the Secure Shell protocol (SSH)?

a. 8080
b. 443
c. 22
d. 445

IIT Kharagpur Introduction to Internet of Things Week 12 20


Question No: 102

Which of the following mechanisms are used by the IPv6 protocol suite for address autoconfiguration on an attached link?

a. Stateless Address Autoconfiguration (SLAAC)


b. Identifier Key Exchange version 2 (IKEv2)
c. Both SLAAC and IKEv2
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 20


Question No: 102

Which of the following mechanisms are used by the IPv6 protocol suite for address autoconfiguration on an attached link?

a. Stateless Address Autoconfiguration (SLAAC)


b. Identifier Key Exchange version 2 (IKEv2)
c. Both SLAAC and IKEv2
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 20


Question No: 103
Smart Route Request replaces intermediate route reply while retaining the loop-freedom nature and security mechanism of
LOADng Routing Protocol. In case of Smart Route Request, if an intermediate LOADng router has already a routing entry to
the destination, it will retransmit the Route Requests to the destination by ____________, instead of _______________.
a. unicast, broadcast
b. broadcast, unicast
c. multicast, unicast
d. unicast, multicast

IIT Kharagpur Introduction to Internet of Things Week 12 20


Question No: 103
Smart Route Request replaces intermediate route reply while retaining the loop-freedom nature and security mechanism of
LOADng Routing Protocol. In case of Smart Route Request, if an intermediate LOADng router has already a routing entry to
the destination, it will retransmit the Route Requests to the destination by ____________, instead of _______________.
a. unicast, broadcast
b. broadcast, unicast
c. multicast, unicast
d. unicast, multicast

IIT Kharagpur Introduction to Internet of Things Week 12 20


Question No: 104

Which of the following is responsible for blocking ports and programs that may affect your computer?

a. Firewall
b. Proxy
c. HTTP
d. Intrusion detection system

IIT Kharagpur Introduction to Internet of Things Week 12 20


Question No: 104

Which of the following is responsible for blocking ports and programs that may affect your computer?

a. Firewall
b. Proxy
c. HTTP
d. Intrusion detection system

IIT Kharagpur Introduction to Internet of Things Week 12 20


Question No: 105

In 6LoWPAN packet format, Hop Limit is decremented by 1 by each node that forwards the packet. The packet is discarded
if Hop Limit is decremented to zero. What is the format of Hop Limit?

a. 8-bit signed integer


b. 6-bit signed integer
c. 8-bit unsigned integer
d. 6-bit unsigned integer

IIT Kharagpur Introduction to Internet of Things Week 12 21


Question No: 105

In 6LoWPAN packet format, Hop Limit is decremented by 1 by each node that forwards the packet. The packet is discarded
if Hop Limit is decremented to zero. What is the format of Hop Limit?

a. 8-bit signed integer


b. 6-bit signed integer
c. 8-bit unsigned integer
d. 6-bit unsigned integer

IIT Kharagpur Introduction to Internet of Things Week 12 21


Question No: 106

How many port numbers are there in networking (including both useable and reserved)?

a. 215-1
b. 216-1
c. 217-1
d. 218-1

IIT Kharagpur Introduction to Internet of Things Week 12 21


Question No: 106

How many port numbers are there in networking (including both useable and reserved)?

a. 215-1
b. 216-1
c. 217-1
d. 218-1

IIT Kharagpur Introduction to Internet of Things Week 12 21


Question No: 107

RPL (Routing Protocol for Low-Power and Lossy Networks) is a protocol based on distance vector and operates on
__________.

a. IEEE 802.11
b. IEEE 802.13
c. IEEE 802.15
d. IEEE 802.17

IIT Kharagpur Introduction to Internet of Things Week 12 21


Question No: 107

RPL (Routing Protocol for Low-Power and Lossy Networks) is a protocol based on distance vector and operates on
__________.

a. IEEE 802.11
b. IEEE 802.13
c. IEEE 802.15
d. IEEE 802.17

IIT Kharagpur Introduction to Internet of Things Week 12 21


Question No: 108

True or False?
In contrast to the constraints in TCAM memory in SDN, WSNs have the ability to accommodate as many control messages as
required.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 21


Question No: 108

True or False?
In contrast to the constraints in TCAM memory in SDN, WSNs have the ability to accommodate as many control messages as
required.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 217


Question No: 109

Which of the following is the extension for your python file in Raspberry Pi?
a. .py
b. .pi
c. .rpi
d. .rpy

IIT Kharagpur Introduction to Internet of Things Week 12 218


Question No: 109

Which of the following is the extension for your python file in Raspberry Pi?
a. .py
b. .pi
c. .rpi
d. .rpy

IIT Kharagpur Introduction to Internet of Things Week 12 219


Question No: 110

In the absence of a flow rule, what packet does the SDN switch send to the controller?

a. PACKET-IN
b. PACKET-OUT
c. PACKET-REQ
d. PACKET-TTL

IIT Kharagpur Introduction to Internet of Things Week 12 220


Question No: 110

In the absence of a flow rule, what packet does the SDN switch send to the controller?

a. PACKET-IN
b. PACKET-OUT
c. PACKET-REQ
d. PACKET-TTL

IIT Kharagpur Introduction to Internet of Things Week 12 221


Question No: 111

6LoWPAN is an acronym of ______________________.

a. 6 Low-Power Wireless Personal Area Networks


b. IPv6 over Long Wireless Personal Area Networks
c. 6 Long Wireless Personal Area Networks
d. IPv6 over Low-Power Wireless Personal Area Networks

IIT Kharagpur Introduction to Internet of Things Week 12 222


Question No: 111

6LoWPAN is an acronym of ______________________.

a. 6 Low-Power Wireless Personal Area Networks


b. IPv6 over Long Wireless Personal Area Networks
c. 6 Long Wireless Personal Area Networks
d. IPv6 over Low-Power Wireless Personal Area Networks

IIT Kharagpur Introduction to Internet of Things Week 12 223


Question No: 112

Which of the following is a property that allows cloud access independent of device and location?
a. Scalability
b. Multitenancy
c. Agility
d. Ubiquitous

IIT Kharagpur Introduction to Internet of Things Week 12 224


Question No: 112

Which of the following is a property that allows cloud access independent of device and location?
a. Scalability
b. Multitenancy
c. Agility
d. Ubiquitous

IIT Kharagpur Introduction to Internet of Things Week 12 225


Question No: 113

Which one of the following is true for cloud computing services?


a. High cost and high maintainance
b. Low cost and high maintainance
c. Low cost and low maintainance
d. High cost and low maintainance

IIT Kharagpur Introduction to Internet of Things Week 12 226


Question No: 113

Which one of the following is true for cloud computing services?


a. High cost and high maintainance
b. Low cost and high maintainance
c. Low cost and low maintainance
d. High cost and low maintainance

IIT Kharagpur Introduction to Internet of Things Week 12 227


Question No: 114

True or False?
Zigbee communication is based on IEEE 802.15.3 standard.
a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 228


Question No: 114

True or False?
Zigbee communication is based on IEEE 802.15.3 standard.
a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 229


Question No: 115

Typically, cloud security service policies cover which of the following?

a. Theft
b. Leakage
c. Deletion
d. All of these

IIT Kharagpur Introduction to Internet of Things Week 12 230


Question No: 115

Typically, cloud security service policies cover which of the following?

a. Theft
b. Leakage
c. Deletion
d. All of these

IIT Kharagpur Introduction to Internet of Things Week 12 231


Question No: 116

Which of the following is not a component of policies in SDN?

a. Controller
b. Gateway
c. Orchestration
d. Service logic

IIT Kharagpur Introduction to Internet of Things Week 12 232


Question No: 116

Which of the following is not a component of policies in SDN?

a. Controller
b. Gateway
c. Orchestration
d. Service logic

IIT Kharagpur Introduction to Internet of Things Week 12 233


Question No: 117

In the IoT connectivity layers, which of the following services are service providers responsible for?

a. Services
b. Local connectivity
c. Global connectivity
d. None of the above

IIT Kharagpur Introduction to Internet of Things Week 12 234


Question No: 117

In the IoT connectivity layers, which of the following services are service providers responsible for?

a. Services
b. Local connectivity
c. Global connectivity
d. None of the above

IIT Kharagpur Introduction to Internet of Things Week 12 235


Question No: 118

What are variables that are declared and has its scope within a function in python called?

a. Global variable
b. Local variable
c. Hierarchical variable
d. Dangling variable

IIT Kharagpur Introduction to Internet of Things Week 12 236


Question No: 118

What are variables that are declared and has its scope within a function in python called?

a. Global variable
b. Local variable
c. Hierarchical variable
d. Dangling variable

IIT Kharagpur Introduction to Internet of Things Week 12 237


Question No: 119

In the SDN-WISE protocol stack, which layer contains the flow rules?

a. Forwarding layer
b. Routing layer
c. Topology manager
d. Emulated node

IIT Kharagpur Introduction to Internet of Things Week 12 238


Question No: 119

In the SDN-WISE protocol stack, which layer contains the flow rules?

a. Forwarding layer
b. Routing layer
c. Topology manager
d. Emulated node

IIT Kharagpur Introduction to Internet of Things Week 12 239


Question No: 120

In raspberry pi, what is the command for capturing an image?

a. raspicapture
b. raspicam
c. raspisnap
d. raspistill

IIT Kharagpur Introduction to Internet of Things Week 12 240


Question No: 120

In raspberry pi, what is the command for capturing an image?

a. raspicapture
b. raspicam
c. raspisnap
d. raspistill

IIT Kharagpur Introduction to Internet of Things Week 12 241


Question No: 121

Which method of data analysis involves observing the data?

a. Qualitative
b. Quantitative
c. Both qualitative and quantitative
d. Neither qualitative nor quantitative

IIT Kharagpur Introduction to Internet of Things Week 12 242


Question No: 121

Which method of data analysis involves observing the data?

a. Qualitative
b. Quantitative
c. Both qualitative and quantitative
d. Neither qualitative nor quantitative

IIT Kharagpur Introduction to Internet of Things Week 12 243


Question No: 122

How many channels does the wireless HART employ in the 2.4 GHz band to increase reliability?

a. 7
b. 14
c. 15
d. 21

IIT Kharagpur Introduction to Internet of Things Week 12 244


Question No: 122

How many channels does the wireless HART employ in the 2.4 GHz band to increase reliability?

a. 7
b. 14
c. 15
d. 21

IIT Kharagpur Introduction to Internet of Things Week 12 245


Question No: 123

In typical wireless multimedia sensor network deployments, what is the relation between the number of camera (C) and
scalar sensors (S)?

a. S<C
b. S>C
c. S=C
d. None of the above

IIT Kharagpur Introduction to Internet of Things Week 12 246


Question No: 123

In typical wireless multimedia sensor network deployments, what is the relation between the number of camera (C) and
scalar sensors (S)?

a. S<C
b. S>C
c. S=C
d. None of the above

IIT Kharagpur Introduction to Internet of Things Week 12 247


Question No: 124

Which IoT technology in smart cities is responsible to concisely integrate the functionalities and communication capabilities
of all involved devices?

a. Radio Frequency Identification


b. Wireless Sensor Network
c. Addressing
d. Middleware

IIT Kharagpur Introduction to Internet of Things Week 12 248


Question No: 124

Which IoT technology in smart cities is responsible to concisely integrate the functionalities and communication capabilities
of all involved devices?

a. Radio Frequency Identification


b. Wireless Sensor Network
c. Addressing
d. Middleware

IIT Kharagpur Introduction to Internet of Things Week 12 249


Question No: 125

True or False?

Smart grids help the customers in reducing their power/electricity costs.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 250


Question No: 125

True or False?

Smart grids help the customers in reducing their power/electricity costs.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 251


Question No: 126

What external hardware module is necessary for loading the programs into an Arduino board?

a. ESP8266
b. ESP32
c. ESP12e
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 252


Question No: 126

What external hardware module is necessary for loading the programs into an Arduino board?

a. ESP8266
b. ESP32
c. ESP12e
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 253


Question No: 127

Typically, what is the nature of a V2X architecture?

a. Centralized
b. Decentralized
c. Distributed
d. Does not matter

IIT Kharagpur Introduction to Internet of Things Week 12 254


Question No: 127

Typically, what is the nature of a V2X architecture?

a. Centralized
b. Decentralized
c. Distributed
d. Does not matter

IIT Kharagpur Introduction to Internet of Things Week 12 255


Question No: 128

Typically, what type of storage is generally offered by fog nodes?

a. Transient
b. Permanent
c. Historical analysis
d. All of the above

IIT Kharagpur Introduction to Internet of Things Week 12 256


Question No: 128

Typically, what type of storage is generally offered by fog nodes?

a. Transient
b. Permanent
c. Historical analysis
d. All of the above

IIT Kharagpur Introduction to Internet of Things Week 12 257


Question No: 129

In data center networking, when should the flows be classified for adequately forwarding them on the network?

a. Before inserting the flow rules


b. On inserting the flow rules
c. After inserting the flow rules
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 258


Question No: 129

In data center networking, when should the flows be classified for adequately forwarding them on the network?

a. Before inserting the flow rules


b. On inserting the flow rules
c. After inserting the flow rules
d. None of these

IIT Kharagpur Introduction to Internet of Things Week 12 259


Question No: 130

XMPP is suitable for cloud computing deployments and does not support M2M or P2P communications.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 260


Question No: 130

XMPP is suitable for cloud computing deployments and does not support M2M or P2P communications.

a. True
b. False

IIT Kharagpur Introduction to Internet of Things Week 12 261


Thank You

IIT Kharagpur Annual Review Presentation Week 12 26

You might also like