Professional Documents
Culture Documents
Questions
a.RFID
b.Smart Networks
c. Nanotechnology
d.All of the above
a.RFID
b.Smart Networks
c. Nanotechnology
d.All of the above
a. Bluetooth
b. RFID
c. LoRa
d. None of them
a. Bluetooth
b. RFID
c. LoRa
d. None of them
Which of the following connects an IoT LAN with a WAN, and to the Internet?
a. IoT node
b. IoT proxy
c. IoT gateway
d. IoT Network
Which of the following connects an IoT LAN with a WAN, and to the Internet?
a. IoT node
b. IoT proxy
c. IoT gateway
d. IoT Network
a.Switching
b.Firewall & VPN services
c. Protocol conversion
d.None of the above
a.Switching
b.Firewall & VPN services
c. Protocol conversion
d.None of the above
a.Intermittent connectivity
b.Ambiguous naming & addressing
c. Scalable architecture
d.Abundance of sleeping nodes
a.Intermittent connectivity
b.Ambiguous naming & addressing
c. Scalable architecture
d.Abundance of sleeping nodes
a. Hydrodynamic
b. Electrical
c. Mechanical
d. None of these
a. Hydrodynamic
b. Electrical
c. Mechanical
d. None of these
a. Temperature sensor
b. Tilt sensor
c. Gas sensor
d. Pressure sensor
a. Temperature sensor
b. Tilt sensor
c. Gas sensor
d. Pressure sensor
a. Vehicle-to-Vehicle, Vehicle-to-Relay
b. Vehicle-to-Vendor, Vehicle-to-Roadside
c. Vehicle-to-Vendor, Vehicle-to-Relay
d. Vehicle-to-Vehicle, Vehicle-to-Roadside
a. Vehicle-to-Vehicle, Vehicle-to-Relay
b. Vehicle-to-Vendor, Vehicle-to-Roadside
c. Vehicle-to-Vendor, Vehicle-to-Relay
d. Vehicle-to-Vehicle, Vehicle-to-Roadside
a. Connected Vehicles
b. Smart Cities
c. Smart parking
d. Relay
a. Connected Vehicles
b. Smart Cities
c. Smart parking
d. Relay
a. Sink
b. Gateway
c. Router
d. All of these
a. Sink
b. Gateway
c. Router
d. All of these
a. Volume
b. Value
c. Velocity
d. All of these
a. Volume
b. Value
c. Velocity
d. All of these
a. True
b. False
a. True
b. False
Which among the following Internet of Things devices require an operating system?
a. Arduino
b. Raspberry Pi
c. NodeMCU
d. None of these
Which among the following Internet of Things devices require an operating system?
a. Arduino
b. Raspberry Pi
c. NodeMCU
d. None of these
Raspberry Pi requires an operating system to work. The official operating system for Raspberry Pi is
Raspbian. However, it also supports other operating systems, such as: Kali Linux, OSMC, Windows 10 IoT Core,
Android Things, RetroPie.
Arduino boards are microcontrollers and do not have an operating system. Raspberry Pi boards are microprocessors
and have their own operating system.
NodeMCU (Node MicroController Unit) is an open-source IoT platform that includes firmware, hardware, and
software development environment.
a. Yes
b. No
a. Yes
b. No
No matter how big an SDN network becomes, we can never have more than one SDN controller.
a. True
b. False
No matter how big an SDN network becomes, we can never have more than one SDN controller.
a. True
b. False
Does 6LoWPAN allow interoperability between IEEE802.15.4-based wireless devices and other IP-based devices?
a. Yes
b. No
Does 6LoWPAN allow interoperability between IEEE802.15.4-based wireless devices and other IP-based devices?
a. Yes
b. No
In smart grid communication, the gateway acts as a link between the smart meter and the data aggregator unit.
a. True
b. False
In smart grid communication, the gateway acts as a link between the smart meter and the data aggregator unit.
a. True
b. False
a. 14
b. 54
c. 11
d. 16
a. 14
b. 54
c. 11
d. 16
With Software Defined IoT, it is possible to control the individual physical sensor and actuator nodes as well as rule
placement of the backbone network remotely by suitable orchestration and software.
a. Yes
b. No
With Software Defined IoT, it is possible to control the individual physical sensor and actuator nodes as well as rule
placement of the backbone network remotely by suitable orchestration and software.
a. Yes
b. No
Statement I: Aliasing error occurs if the input variable or added noise changes periodically at a frequency proportional to
the multiple of the sampling rate.
Statement II: If the signal is monitored digitally, the sampling frequency can cause a dynamic error triggering aliasing
error.
Statement I: Aliasing error occurs if the input variable or added noise changes periodically at a frequency proportional to
the multiple of the sampling rate.
Statement II: If the signal is monitored digitally, the sampling frequency can cause a dynamic error triggering aliasing
error.
What is/are the vulnerability/vulnerabilities that may exist in the smart grid?
a. Physical threats
b. Availability
c. Dynamic system attacks
d. All of these
What is/are the vulnerability/vulnerabilities that may exist in the smart grid?
a. Physical threats
b. Availability
c. Dynamic system attacks
d. All of these
Which component of UMB converts physical devices into virtually abstracted one, as described by Universal Device
Template (UMB).
a. UMB-A
b. UMB-C
c. UDT mapping
d. UMB-B
Which component of UMB converts physical devices into virtually abstracted one, as described by Universal Device
Template (UMB).
a. UMB-A
b. UMB-C
c. UDT mapping
d. UMB-B
Suppose there are two organizations, A and B both of which provide cloud services. Any user can access the cloud of A free
of cost whereas only employees of organization B can access the cloud of B. Also organization B has set up its cloud for only
its own needs. With respect to the type of cloud infrastructure provided by A and B, which among the following is true
Suppose there are two organizations, A and B both of which provide cloud services. Any user can access the cloud of A free
of cost whereas only employees of organization B can access the cloud of B. Also organization B has set up its cloud for only
its own needs. With respect to the type of cloud infrastructure provided by A and B, which among the following is true
In Optimal Geographical Density Control (OGDC) algorithm, a node _________ if its coverage area is completely covered.
a. wakes up
b. starts listening
c. sleeps
d. backs off
In Optimal Geographical Density Control (OGDC) algorithm, a node _________ if its coverage area is completely covered.
a. wakes up
b. starts listening
c. sleeps
d. backs off
a. True
b. False
a. True
b. False
a. DSSS, OFDM
b. DBPSK, GFSK
c. DBPSK, OFDM
d. DSSS, GFSK
a. DSSS, OFDM
b. DBPSK, GFSK
c. DBPSK, OFDM
d. DSSS, GFSK
a. Variability
b. Veracity
c. Volume
d. Velocity
a. Variability
b. Veracity
c. Volume
d. Velocity
a. A:Cloud, B: Fog
b. A: Fog, B: Cloud
c. None of these
d. Both of these
a. A:Cloud, B: Fog
b. A: Fog, B: Cloud
c. None of these
d. Both of these
a. WiFi
b. Bluetooth
c. ISA100.11A
d. WirelessHART
a. WiFi
b. Bluetooth
c. ISA100.11A
d. WirelessHART
a. Cleaning
b. Integration
c. Redundancy mitigation
d. None of these
a. Cleaning
b. Integration
c. Redundancy mitigation
d. None of these
Which among the following technologies allows an organization that does not have access to physical IoT devices to still get
IoT based services through virtualized sensors and virtual sensor networks
a: Sensor cloud
b: Software Defined Networking
c: Ad-hoc routing
d: None of these
Which among the following technologies allows an organization that doesn’t have access to physical IoT devices to still get
IoT based services through virtualized sensors and virtual sensor networks
a: Sensor cloud
b: Software Defined Networking
c: Ad-hoc routing
d: None of these
a. Z-wave
b. Zigbee
c. Both Z-wave and Zigbee
d. None of these
a. Z-wave
b. Zigbee
c. Both Z-wave and Zigbee
d. None of these
a. Smart grid
b. Traditional electric grid
c. Isolated grid
d. None of these
a. Smart grid
b. Traditional electric grid
c. Isolated grid
d. None of these
a. numpy
b. time
c. matplotlib
d. random
a. numpy
b. time
c. matplotlib
d. random
Suppose an IoT-based Healthcare device is developed which can identify the pulse and oxygen level in the blood, the
electrical and muscular activity of the heart, and the intensity of stress of a patient. Choose the correct option that represents
the correct set of sensors that satisfy the aforementioned requirement.
Suppose an IoT-based Healthcare device is developed which can identify the pulse and oxygen level in the blood, the
electrical and muscular activity of the heart, and the intensity of stress of a patient. Choose the correct option that represents
the correct set of sensors that satisfy the aforementioned requirement.
A packet is transferred from a source A to a destination B in a network according to the following path [A >X >Y >Z>B],
where X, Y and Z are intermediate routers. The processing time to decide on which route to forward the packet at each router
is 2ms, while the packet transfer time between two routers as well as between routers and the source and destination is 10ms.
Determine the total time that it takes for a packet to go from A to B, considering each router along the way also processes the
packet. [NOTE: Processing takes place ONLY at the intermediate routers]
a. 10ms
b. 46ms
c. 54ms
d. 40ms.
A packet is transferred from a source A to a destination B in a network according to the following path [A ==> X ==>
Y ==> Z ==> B], where X, Y and Z are intermediate routers. The processing time to decide on which route to forward
the packet at each router is 2ms, while the packet transfer time between two routers as well as between routers and the source
and destination is 10ms. Determine the total time that it takes for a packet to go from A to B, considering each router along
the way also processes the packet. [NOTE: Processing takes place ONLY at the intermediate routers]
a. 10ms
b. 46ms
c. 54ms
d. 40ms.
An RFID system is used for tracking assets spread over an area of 800x800 sq. mtr? Which of the following antennas is best
suited for this system?
a. HF RFID antenna
b. UHF RFID antenna
c. VHF RFID antenna
An RFID system is used for tracking assets spread over an area of 800x800 sq. mtr? Which of the following antennas is best
suited for this system?
a. HF RFID antenna
b. UHF RFID antenna
c. VHF RFID antenna
A programmer is writing a Python code having several functions. S/he needs to use a variable that can be accessed from any
function present in the program. Additionally, the value of that variable may vary. Which of the following variable types
satisfy such criteria.
a. Local variable
b. Constant variable
c. Global variable
d. All of these
A programmer is writing a Python code having several functions. S/he needs to use a variable that can be accessed from any
function present in the program. Additionally, the value of that variable may vary. Which of the following variable types
satisfy such criteria.
a. Local variable
b. Constant variable
c. Global variable
d. All of these
As a user of SaaS by a cloud computing service provider, you are constantly worried about having to always keep the
software in the latest updated version manually.
a. True
b. False
As a user of SaaS by a cloud computing service provider, you are constantly worried about having to always keep the
software in the latest updated version manually.
a. True
b. False
Which one among the following is a striking difference of CPS from M2M?
Which one among the following is a striking difference of CPS from M2M?
A programmer needs to execute a python code that requires RAM support of 1GB SDRAM, Quad cortex A53@1.2GHz
CPU, 400 MHz video core IV GPU, and 802.11 wireless communication support. Select the appropriate device where the
code can be executed?
a. Raspberry Pi zero
b. Raspberry Pi 2 model B
c. Raspberry Pi 3 model B
d. Arduino Uno
A programmer needs to execute a python code that requires RAM support of 1GB SDRAM, Quad cortex A53@1.2GHz
CPU, 400 MHz video core IV GPU, and 802.11 wireless communication support. Select the appropriate device where the
code can be executed?
a. Raspberry Pi zero
b. Raspberry Pi 2 model B
c. Raspberry Pi 3 model B
d. Arduino Uno
Security and integrity are very important for which of the following cloud service models
a. SaaS
b. PaaS
c. IaaS
d. All of these
Security and integrity are very important for which of the following cloud service models
a. SaaS
b. PaaS
c. IaaS
d. All of these
Bluetooth technology uses _____________ modulation scheme and ________________ technique to avoid interferences.
a. Differential Quadrature Phase Shift Keying (DQPSK), Frequency Hopping Spread Spectrum (FHSS)
b. Gaussian Frequency Shift Keying (GFSK), Frequency Hopping Spread Spectrum (FHSS)
c. Differential Quadrature Phase Shift Keying (DQPSK), Direct Sequence Spread Spectrum (DSSS)
d. Gaussian Frequency Shift Keying (GFSK), Direct Sequence Spread Spectrum (DSSS)
Bluetooth technology uses _____________ modulation scheme and ________________ technique to avoid interferences.
a. Differential Quadrature Phase Shift Keying (DQPSK), Frequency Hopping Spread Spectrum (FHSS)
b. Gaussian Frequency Shift Keying (GFSK), Frequency Hopping Spread Spectrum (FHSS)
c. Differential Quadrature Phase Shift Keying (DQPSK), Direct Sequence Spread Spectrum (DSSS)
d. Gaussian Frequency Shift Keying (GFSK), Direct Sequence Spread Spectrum (DSSS)
a. Centralized
b. Decentralized
c. Distributed
d. Does not matter
a. Centralized
b. Decentralized
c. Distributed
d. Does not matter
•Temperature sensor
•Humidity sensor
•Both temperature and humidity sensor
•None of these
•Temperature sensor
•Humidity sensor
•Both temperature and humidity sensor
•None of these
a. setup()
b. loop()
c. __init__()
d. main()
a. setup()
b. loop()
c. __init__()
d. main()
a. Ultrasonic distance
b. Humdity
c. Temperature
d. None of these
a. Ultrasonic distance
b. Humdity
c. Temperature
d. None of these
Which of the following offers heterogeneous computing nodes distributed over a wide area to perform large tasks?
a. Cluster computing
b. Cloud computing
c. Grid computing
d. Utility computing
Which of the following offers heterogeneous computing nodes distributed over a wide area to perform large tasks?
a. Cluster computing
b. Cloud computing
c. Grid computing
d. Utility computing
Typically, what are the types of users/end devices that may be possible in cloud computing?
Typically, what are the types of users/end devices that may be possible in cloud computing?
a. three
b. zero
c. four
d. one
a. three
b. zero
c. four
d. one
a. Zigbee coordinator
b. Zigbee router
c. Zigbee end device
d. Any of the above
a. Zigbee coordinator
b. Zigbee router
c. Zigbee end device
d. Any of the above
Fill in the blank: Coverage algorithms are centralized _______ decentralized _________ localized.
a. and, and
b. and, or
c. or, and
d. or, or
Fill in the blank: Coverage algorithms are centralized _______ decentralized _________ localized.
a. and, and
b. and, or
c. or, and
d. or, or
Which of the following features in cloud computing refers to rapid and automatic resource allocation?
a. Resource pooling
b. Measured service
c. On-demand service
d. Rapid Elasticity
Which of the following features in cloud computing refers to rapid and automatic resource allocation?
a. Resource pooling
b. Measured service
c. On-demand service
d. Rapid Elasticity
What is the command (Linux) for generating a public/private authentication key pair?
a. keygen
b. ssh-key
c. ssh-genkey
d. ssh-keygen
What is the command (Linux) for generating a public/private authentication key pair?
a. keygen
b. ssh-key
c. ssh-genkey
d. ssh-keygen
True or False?
Changes in network prefixes does not affect the remote anchor point to which the IoT gateways are attached.
a. True
b. False
True or False?
Changes in network prefixes does not affect the remote anchor point to which the IoT gateways are attached.
a. True
b. False
a. 1
b. 2
c. 3
d. 4
a. 1
b. 2
c. 3
d. 4
What is the process of combining data from several sources to produce new data called?
a. Data collection
b. Data fusion
c. Information fusion
d. Data synthesis
What is the process of combining data from several sources to produce new data called?
a. Data collection
b. Data fusion
c. Information fusion
d. Data synthesis
Zigbee variants such as Zigbee, Zigbee Pro, and others are not compatible with each other.
a. True
b. False
Zigbee variants such as Zigbee, Zigbee Pro, and others are not compatible with each other.
a. True
b. False
What function is useful for generating the same set of random numbers every time a program is run?
a. randomgen()
b. randomint()
c. randomseed()
d. constrandom()
What function is useful for generating the same set of random numbers every time a program is run?
a. randomgen()
b. randomint()
c. randomseed()
d. constrandom()
What is a cyber-physical system equipped with sustainable models of energy production, distribution, and usage?
What is a cyber-physical system equipped with sustainable models of energy production, distribution, and usage?
a. Long range
b. Medium range
c. Short range
d. Very short range
a. Long range
b. Medium range
c. Short range
d. Very short range
a. Sensor
b. Actuator
c. Neither sensor nor actuator
d. Both sensor and actuator
a. Sensor
b. Actuator
c. Neither sensor nor actuator
d. Both sensor and actuator
Web of Things (WoT) enables access and control over IoT resources and applications using which of the following
mainstream web technologies?
a. Ruby n' Rails
b. Ajax
c. WoTPro
d. Both Ruby n' Rails and Ajax
e. All of these
Web of Things (WoT) enables access and control over IoT resources and applications using which of the following
mainstream web technologies?
a. Ruby n' Rails
b. Ajax
c. WoTPro
d. Both Ruby n' Rails and Ajax
e. All of these
In tunneling, the nodes communicate to a remote anchor point instead of channeling their packets through the router.
Which among the following is NOT a tunneling solution?
In tunneling, the nodes communicate to a remote anchor point instead of channeling their packets through the router.
Which among the following is NOT a tunneling solution?
A signal with power 2 mW is distorted by noise with power 0.002 mW and interference of 0.001 mW. What is the
signal to interference plus noise ratio (SINR) in dB?
a. 28.23
b. 2.823
c. 38.23
d. 3.823
A signal with power 2 mW is distorted by noise with power 0.002 mW and interference of 0.001 mW. What is the
signal to interference plus noise ratio (SINR) in dB?
a. 28.23
b. 2.823
c. 38.23
d. 3.823
A fog-cloud architecture deploys or utilizes both fog and cloud platforms. 25% of the task requests use both platforms
and 40% of the students use the cloud platform. What percent of those which used the cloud also used fog?
a. 62.5%
b. 65.5%
c. 71.5%
d. 60.5%
A fog-cloud architecture deploys or utilizes both fog and cloud platforms. 25% of the task requests use both platforms
and 40% of the students use the cloud platform. What percent of those which used the cloud also used fog?
a. 62.5% To find the percentage of students who used both the cloud
b. 65.5% and fog platforms, you can use conditional probability. The
c. 71.5% formula for conditional probability is:
d. 60.5% P(A|B) = P(A ∩ B) / P(B)
In this case:
A represents the event of using fog,
B represents the event of using the cloud.
Given:
P(A ∩ B), the probability of using both platforms, is 25% (0.25).
P(B), the probability of using the cloud, is 40% (0.40).
Now, plug these values into the formula:
P(A|B) = 0.25 / 0.40
P(A|B) = 0.625
To express this as a percentage, multiply by 100:
P(A|B) = 62.5%
So, 62.5% of the students who used the cloud platform also
used the fog platform.
a. SQLite
b. InfluxDB
c. MongoDB
d. RethinkDB
a. SQLite
b. InfluxDB
c. MongoDB
d. RethinkDB
In Collaborative conceptualization theory of Semantic interoperability, a collaborative sign (cosign) is represented as:
cosign = (A, B, C, D)
In the above representation, what is “D”?
In Collaborative conceptualization theory of Semantic interoperability, a collaborative sign (cosign) is represented as:
cosign = (A, B, C, D)
In the above representation, what is “D”?
True or False?
Fog computing paradigm is designed to compliment the services of the cloud and will eventually replace the cloud.
a. True
b. False
True or False?
Fog computing paradigm is designed to compliment the services of the cloud and will eventually replace the cloud.
a. True
b. False
What protocol does the Odin agent and master use to communicate with each other?
a. TCP
b. UDP
c. TCP/IP
d. ODIN protocol
What protocol does the Odin agent and master use to communicate with each other?
a. TCP
b. UDP
c. TCP/IP
d. ODIN protocol
A cloud server receives requests from three users A, B and C, which makes up 25%, 35% and 40% of the total traffic. From
past experience, 5%, 4% and 2% of the traffic produced by these users are malicious. If a request was found to be malicious,
what is the probability that the request was made by user A?
a. 44/69
b. 25/69
c. 13/24
d. 11/24
A cloud server receives requests from three users A, B and C, which makes up 25%, 35% and 40% of the total traffic. From
past experience, 5%, 4% and 2% of the traffic produced by these users are malicious. If a request was found to be malicious,
what is the probability that the request was made by user A?
a. 44/69 To determine the probability that a malicious request came from user A, we can use Bayes' Theorem,
which is a way to calculate conditional probabilities. In this context:
b. 25/69
•P(A | B) represents the probability that a request is from user A given that it is malicious.
c. 13/24 •P(B | A) is the probability that a request is malicious, given that it's from user A.
d. 11/24 •P(A) is the probability that a request is from user A.
•P(B) is the overall probability that a request is malicious.
Given probabilities:
•P(A) = 0.25 (25% of requests are from user A).
•P(B | A) = 0.05 (5% of user A's requests are malicious).
•P(B | B) = 0.35 (35% of all requests are from user B).
•P(B | C) = 0.4 (40% of all requests are from user C).
Now, apply Bayes' Theorem:
P(A | B) = (P(B | A) * P(A)) / (P(B | A) * P(A) + P(B | B) * P(B) + P(B | C) * P(C))
P(A | B) = (0.05 * 0.25) / (0.05 * 0.25 + 0.04 * 0.35 + 0.02 * 0.4)
P(A | B) = 0.0125 / (0.0125 + 0.014 + 0.008)
P(A | B) ≈ 0.0125 / 0.0345
P(A | B) ≈ 0.362
So, the probability that a malicious request came from user A is approximately 36.2%.
True or False?
The DHT22 sensor may be used by both raspberry pi and NodeMCU devices.
a. True
b. False
True or False?
The DHT22 sensor may be used by both raspberry pi and NodeMCU devices.
a. True
b. False
IEEE 802.15.4 identifies reduced function devices (RFD) and full-function devices (FFD) as two different types of network
nodes. FFDs can talk to other FFDs or to RFDs. However, an RFD can only talk to an FFD. Such hierarchy leads to which
of the following network topologies?
a. Star
b. Mesh
c. Both star and mesh
d. None of these
IEEE 802.15.4 identifies reduced function devices (RFD) and full-function devices (FFD) as two different types of network
nodes. FFDs can talk to other FFDs or to RFDs. However, an RFD can only talk to an FFD. Such hierarchy leads to which
of the following network topologies?
a. Star
b. Mesh
c. Both star and mesh
d. None of these
•Integer
•Float
•Either integer or float
•Range
•Integer
•Float
•Either integer or float
•Range
In the remote IoT data logging experiment with raspberry pi, can the same experiment be implemented without
the resistor?
a. Yes
b. No
In the remote IoT data logging experiment with raspberry pi, can the same experiment be implemented without
the resistor?
a. Yes
b. No
“X” acts as a Trust Center & repository for security keys. What is “X”?
“X” acts as a Trust Center & repository for security keys. What is “X”?
What port number is typically used by the Secure Shell protocol (SSH)?
a. 8080
b. 443
c. 22
d. 445
What port number is typically used by the Secure Shell protocol (SSH)?
a. 8080
b. 443
c. 22
d. 445
Which of the following mechanisms are used by the IPv6 protocol suite for address autoconfiguration on an attached link?
Which of the following mechanisms are used by the IPv6 protocol suite for address autoconfiguration on an attached link?
Which of the following is responsible for blocking ports and programs that may affect your computer?
a. Firewall
b. Proxy
c. HTTP
d. Intrusion detection system
Which of the following is responsible for blocking ports and programs that may affect your computer?
a. Firewall
b. Proxy
c. HTTP
d. Intrusion detection system
In 6LoWPAN packet format, Hop Limit is decremented by 1 by each node that forwards the packet. The packet is discarded
if Hop Limit is decremented to zero. What is the format of Hop Limit?
In 6LoWPAN packet format, Hop Limit is decremented by 1 by each node that forwards the packet. The packet is discarded
if Hop Limit is decremented to zero. What is the format of Hop Limit?
How many port numbers are there in networking (including both useable and reserved)?
a. 215-1
b. 216-1
c. 217-1
d. 218-1
How many port numbers are there in networking (including both useable and reserved)?
a. 215-1
b. 216-1
c. 217-1
d. 218-1
RPL (Routing Protocol for Low-Power and Lossy Networks) is a protocol based on distance vector and operates on
__________.
a. IEEE 802.11
b. IEEE 802.13
c. IEEE 802.15
d. IEEE 802.17
RPL (Routing Protocol for Low-Power and Lossy Networks) is a protocol based on distance vector and operates on
__________.
a. IEEE 802.11
b. IEEE 802.13
c. IEEE 802.15
d. IEEE 802.17
True or False?
In contrast to the constraints in TCAM memory in SDN, WSNs have the ability to accommodate as many control messages as
required.
a. True
b. False
True or False?
In contrast to the constraints in TCAM memory in SDN, WSNs have the ability to accommodate as many control messages as
required.
a. True
b. False
Which of the following is the extension for your python file in Raspberry Pi?
a. .py
b. .pi
c. .rpi
d. .rpy
Which of the following is the extension for your python file in Raspberry Pi?
a. .py
b. .pi
c. .rpi
d. .rpy
In the absence of a flow rule, what packet does the SDN switch send to the controller?
a. PACKET-IN
b. PACKET-OUT
c. PACKET-REQ
d. PACKET-TTL
In the absence of a flow rule, what packet does the SDN switch send to the controller?
a. PACKET-IN
b. PACKET-OUT
c. PACKET-REQ
d. PACKET-TTL
Which of the following is a property that allows cloud access independent of device and location?
a. Scalability
b. Multitenancy
c. Agility
d. Ubiquitous
Which of the following is a property that allows cloud access independent of device and location?
a. Scalability
b. Multitenancy
c. Agility
d. Ubiquitous
True or False?
Zigbee communication is based on IEEE 802.15.3 standard.
a. True
b. False
True or False?
Zigbee communication is based on IEEE 802.15.3 standard.
a. True
b. False
a. Theft
b. Leakage
c. Deletion
d. All of these
a. Theft
b. Leakage
c. Deletion
d. All of these
a. Controller
b. Gateway
c. Orchestration
d. Service logic
a. Controller
b. Gateway
c. Orchestration
d. Service logic
In the IoT connectivity layers, which of the following services are service providers responsible for?
a. Services
b. Local connectivity
c. Global connectivity
d. None of the above
In the IoT connectivity layers, which of the following services are service providers responsible for?
a. Services
b. Local connectivity
c. Global connectivity
d. None of the above
What are variables that are declared and has its scope within a function in python called?
a. Global variable
b. Local variable
c. Hierarchical variable
d. Dangling variable
What are variables that are declared and has its scope within a function in python called?
a. Global variable
b. Local variable
c. Hierarchical variable
d. Dangling variable
In the SDN-WISE protocol stack, which layer contains the flow rules?
a. Forwarding layer
b. Routing layer
c. Topology manager
d. Emulated node
In the SDN-WISE protocol stack, which layer contains the flow rules?
a. Forwarding layer
b. Routing layer
c. Topology manager
d. Emulated node
a. raspicapture
b. raspicam
c. raspisnap
d. raspistill
a. raspicapture
b. raspicam
c. raspisnap
d. raspistill
a. Qualitative
b. Quantitative
c. Both qualitative and quantitative
d. Neither qualitative nor quantitative
a. Qualitative
b. Quantitative
c. Both qualitative and quantitative
d. Neither qualitative nor quantitative
How many channels does the wireless HART employ in the 2.4 GHz band to increase reliability?
a. 7
b. 14
c. 15
d. 21
How many channels does the wireless HART employ in the 2.4 GHz band to increase reliability?
a. 7
b. 14
c. 15
d. 21
In typical wireless multimedia sensor network deployments, what is the relation between the number of camera (C) and
scalar sensors (S)?
a. S<C
b. S>C
c. S=C
d. None of the above
In typical wireless multimedia sensor network deployments, what is the relation between the number of camera (C) and
scalar sensors (S)?
a. S<C
b. S>C
c. S=C
d. None of the above
Which IoT technology in smart cities is responsible to concisely integrate the functionalities and communication capabilities
of all involved devices?
Which IoT technology in smart cities is responsible to concisely integrate the functionalities and communication capabilities
of all involved devices?
True or False?
a. True
b. False
True or False?
a. True
b. False
What external hardware module is necessary for loading the programs into an Arduino board?
a. ESP8266
b. ESP32
c. ESP12e
d. None of these
What external hardware module is necessary for loading the programs into an Arduino board?
a. ESP8266
b. ESP32
c. ESP12e
d. None of these
a. Centralized
b. Decentralized
c. Distributed
d. Does not matter
a. Centralized
b. Decentralized
c. Distributed
d. Does not matter
a. Transient
b. Permanent
c. Historical analysis
d. All of the above
a. Transient
b. Permanent
c. Historical analysis
d. All of the above
In data center networking, when should the flows be classified for adequately forwarding them on the network?
In data center networking, when should the flows be classified for adequately forwarding them on the network?
XMPP is suitable for cloud computing deployments and does not support M2M or P2P communications.
a. True
b. False
XMPP is suitable for cloud computing deployments and does not support M2M or P2P communications.
a. True
b. False