Professional Documents
Culture Documents
Which of the
following is the java
extension file in IoT?
A..exe B..py C..c D. .jar Q2.
Which of the following
class handles Publishing
messages? A.Publish()
B.Server() C. Client()
D.Batch() Q3. What is the
full form of IaaS?
A.Internet as a Software
B.Internet as a Service
C.Infrastructure as a Software
D. Infrastructure as a
Service Q4. What is the
minimum value which
an application shall
exceed to be offloaded?
A.Static value B. Threshold
value
C.Dynamic value D.Critical
value Q5. Which of the
following process has to
support the definition of
application topologies in
various formats? A.Top-
down and bottom-up
B.Management and
Configuration C. Enrichment
of Topology specification
D.Support of different
Migration types Q6.
Software that address
the data protection is
divided into.............. A.1
segment B.2 segments C. 3
segments D.4 segments
Q7.............types of voice
communications are in
IoT environment. A.2 B.
3 C.4 D.5 Q8. IoT devices
can easily lead to
catastrophe
without...............
A.Software B.Devices
C.Cloud D. Management
system Q9. Which of the
following category is
used for business to
consumer process?
A.Group IoT B.Community
IoT C.Personal IoT D.
Industrial IoT
Q10. Which is the future
application of IoT?
A.QoS in communication B.
Role of green IoT system
C.Secure communication
D.Multimedia communication
Q11. Which of the
following option allows
us to monitor the
application? A. Boot
B.Endpoints C.Actuators
D.Hypermedia Q12. Which
of the following is not a
data link layer
technology? A.UART
B.Bluetooth C. HTTP D.WiFi
Q13. Which of the
following layer is called
a port layer in OSI
model? A.Application
B.Presentation C. Session
D.Transport Q14. Which of
the following is not a
networking device?
A.Switch B. Traffic Analyzer
C.Router D.Bridge
Q15...........is the
standard length of MAC
address?
A.8 bits B.16 bits C.32 bits D.
48 bits Q16. What is the
full form of VNC? A.
Virtual Network
Computing B.Various
Network computers C.Virtual
Network Communication
D.None of the above Q17.
Which of the following is
not LPWAN
technologies? A.SigFox
B.NB-IoT C.LoRa D. WiFi
Q18. Which language is
preferred for IoT
analytics ? A.C ++ B.
Python C.HTML D.PHP
Q19. What does CGI
stands for in IOT?
A.Common Gateway Interest
B.Common Gateway Interface
C.Common Gate Interference
D. Computer Generated
Imagery Q20. Which of
the following is
Raspbian? A . O S
B.Assembler C.Language
D.Compiler Q21. What is
the full form of IoT? A.
Internet of Things
B.Internet of Tracking
C.Interaction of Things
D.None of above Q22.
What is the role of
Gateway in smart grid
architecture of IoT?
A.Security B.Store data C.
Collect data D.Manage data
Q23. Which of the
following is not an
advantage of IoT? A.
Security B.Reduced Waste
C.Enhanced Data Collection
D.Improved Customer
Engagement Q24. The IoT
platforms are mainly
divided into..................
A.2 types B.3 types C. 4 types
D.5 types Q25. The core
element is operated
by................. A.IaaS B.PaaS
C.SaaS D. IoT service
Provider
A.system
B.devices
C.network
D.multi homing
B.user
C.pi
D.root
Answer: Option C
No explanation is given for this question Let's Discuss on Board
3.
B.enabled
C.sensitive
D.id
B.fragmentat ion
C.layer 2 forwarding
Answer: Option D
No explanation is given for this question Let's Discuss on Board
5.
B.saas
C.iaas
D.service provider
system
B.
devices
C.
network
D.
multi homing
Answer & Solution Discuss in Board Save for Later
Answer & Solution
Answer: Option D
No explanation is given for this question Let's Discuss on Board
2.
A.
default
B.
user
C.
pi
D.
root
Answer & Solution Discuss in Board Save for Later
Answer & Solution
Answer: Option C
No explanation is given for this question Let's Discuss on Board
3.
A.
id and enabled
B.
enabled
C.
sensitive
D.
id
Answer & Solution Discuss in Board Save for Later
Answer & Solution
Answer: Option D
No explanation is given for this question Let's Discuss on Board
4.
A.
header compressio n
B.
fragmentat ion
C.
layer 2 forwarding
D.
paas
B.
saas
C.
iaas
D.
service provider
Answer & Solution Discuss in Board Save for Later
Answer & Solution
Answer: Option D
Answer:- D
2. IoT stands for:
1.
A. Internet of Tech
B. Incorporation of Things
C. Internet of Things
D. Incorporation of Technology
Answer:- C
3. Which of the following can not be considered an IoT device?
1.
A. Smartwatch
B. Andriod Phone
C. Laptop
D. Tubelight
Answer:- D
4. Which is not an IoT platform?
1.
A. Xiaomi Cloud
B. GoogleCloud
C. Myntra
Answer:- C
Explanation: AWS, Google Cloud, and Xiaomi Cloud deliver cloud computing IoT services. But
Myntra is an e-commerce website that supplies goods.
A. Smartwatch
B. Andriod Phone
C. Laptop
D. Tubelight
Answer:- D
6. IoT is based on ______ technology.
1.
A. Hardware
B. Software
C. None
D. Both of these
Answer:- D
7. What is the standard form of RFID?
1.
Answer:- A
8. What is considered the standard length for a MAC Address?
1.
A. 8 bits
B. 32 bits
C. 48 bits
D. None of these
Answer:- C
9. What “bit” represents the address bit in the control register?
1.
A. MML
B. ML
C. MX
D. MM
Answer:- C
10. What is mandatory for an IP Packet to contain?
1.
A. Destination IP Address
B. Source IP Address
C. Both of these
D. None of these
Answer:- C
Explanation: Each IP Packet must contain source and destination IP addresses.
11. At which level does the router operate in the OSI reference model?
1.
A. Data Link
B. Network
C. Physical
D. None of these
Answer:- B
12. What is an IoT network?
1.
Answer:- B
Explanation: IoT is a massive network of devices that are connected with each other. These devices
collect and transmit data to each other.
D. None of these
Answer:- A
14. Full-Form of VNC:
1.
Answer:- D
15. What is the java extension file used in IoT?
1.
A. .jar
B. .obj
C. .cpp
D. .exe
Answer:-A
16. Which one out of these is not a Data Link Layer Technology?
1.
A. Bluetooth
B. Wifi
C. HTTP
D. Mobile Hotspot
Answer:- C
17. What is the standard form of LLN?
1.
Answer:- B
18. What type of interface is used by fingerprint sensors to collect data?
1.
A. IPI interface
B. UART interface
C. I2P interface
D. None
Answer:- B
19. How many wires does the SPI protocol use?
1.
A. 3
B. 4
C. 2
D. More than 4
Answer:- B
20. Which of the following things is mandatory for the IoT gateway to provide?
1.
C. Software Security
D. Protocol abstraction
Answer:- D
Explanation: An IoT gateway must provide a few things like Protocol abstraction, Computing, I/O
performance, and Integration communication capability to enhance the security of the user.
21. In which of the following way, data is associated with an IoT device:
1.
A. Internet
B. Network connection
C. Cables
D. Cloud
Answer:- D
22. Full form of HART:
1.
Answer:- B
23. Full form of LPWAN:
1.
Answer:- A
24. What do API systems enable?
1.
D. All of these
Answer:- B
Explanation: API systems enable the portability of Systems Service.
A. to enhance security
D. All of these
Answer:- C
26. In IoT, does the _____ layer help in end-to-end communication?
1.
A. security
B. transport
C. data communication
D. logical
Answer:- B
Explanation: The transport layer is used to provide end-to-end communication in IoT.
D. None
Answer:- C
28. Many-Valued Logic is formed because of:
1.
A. binary logic
B. Hexa logic
C. fuzzy logic
D. All of these
Answer:- C
29. The collection of ____ that connects several devices is called the bus.
1.
A. network
B. lines
C. cables
D. None of these
Answer:- B
Explanation: A collection of lines that connects several devices is called bus.
A. WPA
B. HTTP
C. MLA
D. None of these
Answer:- A
31. The main purpose of the web of things(WoT) in IoT is:
1.
A. to increase the cost
B. to improve security
D. All of these
Answer:- C
Explanation: Web of things(WoT) is used to improve the usability and interoperability of IoT.
A. limited
B. unlimited
C. not available
D. All of these
Answer:- A
Explanation: The storage in IoT is very limited.
A. 424 Kbps
B. 1106 Kbps
C. 216 Kbps
D. All of these
Answer:- D
Explanation: The NFC can transfer data at any speed of either 212, 1106, or 424 Kbps.
Answer:- D
35. Which of the following uses Java Language?
1.
A. GSN
B. MMQT
C. GAN
D. None of these
Answer:- A
Explanation: GSN(Global Sensor Network) uses Java as it is more portable than other languages
like C++, Python, etc.
D. obtain IP Address
Answer:- D
37. The standard form of CGI is:
1.
D. None
Answer:- D
Explanation: CGI stands for Common Gateway Interface.
A. Bluetooth
B. VPN
C. Wifi
D. Hotspot
Answer:- B
Explanation: Those wireless networks having a short-range like Bluetooth and Wifi are called short-
range wireless networks. These are suitable for working in the local environment.
A. micro converter
B. microcontroller
C. microsensor
D. None
Answer:- B
Explanation: A Microcontroller is a component that executes a program in an IoT system. It consists
of a command unit, storage memory, timers, etc., that are used to handle the execution of a
program.
A. LORA
B. SIGFOX
C. NB-IoT
D. Bluetooth
Answer:- D
41. With two-factor Authentication, which attack can be users vulnerable to?
1.
B. Man-in-the-middle attack
C. Cross Attack
D. Radiant Attack
Answer:- B
Explanation: Users may be vulnerable to a man-in-the-middle attack even after two-factor
authentication.
42. Which one out of these is in a format which is not readable by the user?
1.
A. Encryption
B. Passwords
C. .text
D. None of these
Answer:- A
Explanation: Encryption is converting data into a specific form that is unreadable to any other user.
2.
B.8 elements
C.7 elements
D.3 elements
Answer: Option C
Solution:
The Open IoT Architecture is typically composed of 7 elements that
collectively form the framework for building IoT solutions. These
elements are:
1. Devices: Physical objects or sensors that gather data from the
environment.
4.
B.5 types
C.4 types
D.2 types
Answer: Option C
Solution:
IoT platforms are categorized into four main types based on their
functionalities and capabilities. These types are:
1. Connectivity Management Platforms: These platforms primarily focus
on managing the connectivity between IoT devices and the network.
They handle tasks such as device onboarding, provisioning, and
ensuring seamless communication.
3.
B.security
C.bandwidth
D.power consumption
Answer: Option D
Solution:
In the context of Internet of Things (IoT), the use of a cellular network can be
costly, particularly when dealing with a large number of IoT devices. One of the
significant contributing factors to this expense is the power consumption of the
devices. Cellular communication requires energy for transmitting and receiving
data, which can drain the limited power resources of IoT devices, especially
those with small batteries or located in remote areas.
B.5 types
C.4 types
D.2 types
Answer: Option C
Solution:
IoT platforms are categorized into four main types based on their
functionalities and capabilities. These types are:
1. Connectivity Management Platforms: These platforms primarily focus on
managing the connectivity between IoT devices and the network. They handle
tasks such as device onboarding, provisioning, and ensuring seamless
communication.
B.connectivity
C.dynamic nature
D.enormous scale
Answer: Option B
Solution:
The concept of the Internet of Things (IoT) is based on connectivity, which
empowers IoT by bringing together everyday objects into a networked
environment. Through connectivity, these objects are able to communicate,
share data, and interact with each other over the internet. This
interconnectedness allows for the collection of data from various sources,
enabling better understanding, control, and automation of processes.
Hence, the correct answer is Option B: connectivity. It's the element that enables
the networking of everyday objects to create the IoT ecosystem.
6.
B.heterogeneity
C.security
D.connectivity
Answer: Option C
Solution:
IoT devices are inherently susceptible to various security threats due to their
interconnected and often resource-constrained nature. The interconnectedness of
these devices exposes them to potential vulnerabilities that malicious actors can
exploit to gain unauthorized access, manipulate data, or disrupt operations. As
IoT devices collect and transmit sensitive data, inadequate security measures
can result in data breaches and privacy violations.
Option A: Sensors are components of IoT devices that gather data from the
environment. While they can be exploited in some attack scenarios, they are not
the main reason for IoT device vulnerability.
Option B: Heterogeneity refers to the diversity of devices and technologies in
IoT ecosystems. While it can complicate security measures, it is not the primary
cause of vulnerability.
Option D: Connectivity is a fundamental aspect of IoT but is not inherently a
threat. However, the way devices are connected can introduce vulnerabilities if
not properly secured.
Therefore, the correct answer is Option C: security. IoT devices are naturally
vulnerable to security threats due to their interconnected and resource-limited
nature.
7.
IoT is a paradigm that involves ubiquitous presence
in the environment
A.TRUE
B.FALSE
Answer: Option A
Solution:
The statement is true. IoT (Internet of Things) is indeed a paradigm that
involves the ubiquitous presence of interconnected devices in the environment.
In IoT, various objects, sensors, devices, and even everyday items are equipped
with sensors, software, and connectivity, allowing them to collect and exchange
data over the internet. This interconnectedness creates an environment where
devices and objects can communicate, share information, and collaborate to
provide enhanced functionality and services.
B..c
C..exe
D..py
Answer & Solution Discuss in Board Save for Later
Answer: Option A
Solution:
The Java extension file commonly used in the context of IoT (Internet of
Things) is .jar. A .jar file, which stands for Java Archive, is a compressed file
format that contains Java class files, resources, and metadata. It is used to
package and distribute Java applications and libraries. In IoT, Java is a popular
programming language for developing applications that run on various IoT
devices and platforms.
Options B (.c), C (.exe), and D (.py) represent file extensions for programming
languages other than Java. .c is for C programming language, .exe is for
executable files in Windows, and .py is for Python programming language.
B.manage data
C.collect data
D.security
Options A (store data), C (collect data), and D (security) are relevant aspects of
IoT and smart grid architecture, but Option B (manage data) specifically
highlights the Cloud's crucial role in handling and processing the data collected
from smart grid devices.
Hence, the correct answer is Option B: manage data. The Cloud manages and
processes data to derive meaningful insights and enhance the efficiency of the
smart grid architecture in IoT.
10.
B.speaker
C.thermostat
D.transmitter
Answer: Option C
Solution:
When we hear about IoT (Internet of Things), we often associate it with
devices that are part of our daily lives and surroundings. The thermostat is a
prime example of an IoT device. IoT encompasses the interconnection of
various objects, devices, and sensors to the internet, enabling them to gather and
exchange data, and in the case of a thermostat, control and regulate
environmental conditions.
Option A: While microphones can be part of IoT devices, they are not the most
common or typical representation of IoT in our minds.
Option B: Similar to microphones, speakers can also be connected to IoT
systems, but they do not symbolize IoT as prominently as other devices.
Option D: Transmitters are used for communication, but they are not as
strongly associated with the concept of IoT as a thermostat.