IOT MCQ with Answer for Exam and Interview Preperation - Part 1
Unit I : Fundamentals of IoT & Unit II :Sensors Networks
1. _________ allows us to control electronic components
a) RETful API
b) RESTful API
c) HTTP
d) MQTT
Answer: a
Explanation: RETful API that allows us to control electronic components connected to our Intel Galileo Gen 2 board through HTTP requests.
2. MQTT stands for _____________
a) MQ Telemetry Things
b) MQ Transport Telemetry
c) MQ Transport Things
d) MQ Telemetry Transport
Answer: d
Explanation: MQTT was known as MQ Telemetry Transport protocol. MQTT is a lightweight protocol that runs on top of the TCP/IP protocol.
3. MQTT is better than HTTP for sending and receiving data.
a) True
b) False
Answer: a
Explanation: We want to send and receive data in real time through internet and RESTful API is not the most appropriate option to do this. Instead, we will work on MQTT which is lighter than HTTP.
4. MQTT is _________ protocol.
a) Machine to Machine
b) Internet of Things
c) Machine to Machine and Internet of Things
d) Machine Things
Answer: c
Explanation: The MQTT protocol is a machine to machine and Internet of thing connectivity protocol.
5. Which protocol is lightweight?
a) MQTT
b) HTTP
c) CoAP
d) SPI
Answer: a
Explanation: MQTT is a lightweight protocol that runs on top of the TCP/IP protocol and works with publish subscribe mechanism.
6. PubNub publishes and subscribes _________ in order to send and receive messages.
a) Network
b) Account
c) Portal
d) Keys
Answer: d
Explanation: It is necessary to generate our PubNub publishes and subscribes keys in order to send and receive messages in the network.
7. By clicking which key the PubNub will display public, subscribe, and secret keys.
a) Pane
b) Demo Keyset
c) Portal
d) Network
Answer: b
Explanation: Click on Demo keyset pane and PubNub will display public, subscribe, and secret keys. We must copy and paste each of these keys to use them in our code that will publish messages and subscribe to them.
8. The number of elements in the Open IoT Architecture?
a) 6 elements
b) 8 elements
c) 7 elements
d) 3 elements
Answer: c
Explanation: The 7 main elements are : sensor middleware (X-GSN), cloud data storage, scheduler, service delivery and utility manager, request definition, request presentation, configuration and monitoring.
9. Global Sensor Network is built for _________
a) Reducing cost and time for development
b) Reducing cost and increasing time for development
c) Increasing cost and increasing time for development
d) Increasing cost and decreasing time for development
Answer: a
Explanation: GSN is developed on the observation that most of the requirements for the application development sensor network are same. Having each sensor network development using its own custom software not only increases the cost but also takes time for development and deployment.
10. One of the main characteristics of Linked Stream Data is “Live Streaming”.
a) True
b) False
Answer: a
Explanation: Most of the data on the web is from sensing devices. To facilitate the integration of data from sensed devices and other sources, both sensor stream source and data are being enriched with schematic descriptions, creating Linked Stream Data. It shows the live data depending on our application.
11. The huge number of devices connected to the Internet of Things has to communicate automatically, not via humans. What is this called?
a) Skynet
b) Bot 2 Bot
c) Machine 2 Machine
d) Intercloud
Answer: c
Explanation: Devices are connected to other devices like mobiles, laptops, etc, to communicate among themselves which is called machine to machine and that involves wireless communication techniques, serial connection and powerline connection.
12. Internet of Things needs a lot of network connection. What is the proposed “white Space” radio standard called?
a) Bluetooth
b) WiMax
c) Weightless
d) Zigbee
Answer: c
Explanation: White space is nothing but gaps that sit in the frequency band used to broadcast digital TV. The development of so called “Weightless standard” is for the use of TV white space and for IOT/M2M purpose. The main intention is to reduce the cost and power utilization.
13. What is the sensor/protocol used in GSN?
a) HTTP protocol
b) CoAP protocol
c) MQTT protocol
d) XMPP protocol
Answer: b
Explanation: Constrained Application Protocol is a specialized web transfer protocol which enables constrained devices to communicate over internet and it is required for GSN in transferring data stream.
14. Which is the core wrapper of GSN?
a) Serial
b) UDP
c) GPSTest
d) ZeroMQWrapper
Answer: d
Explanation: Wrappers are classified as remote and local wrappers in GSN. Unlike them, the ZeroMQWrapper is a core wrapper which allows for publishing stream elements that are produced by a Virtual Sensor.
15. Open IoT ontology is extending the W3C SSN ontology which supports the description of the physical and processing structure of sensors.
a) True
b) False
Answer: a
Explanation: Sensors are not constrained to physical sensing devices, rather a sensor is anything that can calculate the value of the phenomenon. Thus, either a device or Computational process or a combination of them could play the role of a sensor.
16. Open IoT manages the registration, data acquisition, deployment of sensors and interconnected of objects, through which network?
a) GSN
b) X-GSN
c) LSM
d) HTTP
Answer: b
Explanation: The core fundamental concept in X-GSN is the virtual sensor, which can represent not only physical devices but in general any abstract or concrete entity that observes features of any kind.
17. What happens when service providers change their operating system and communication protocols?
a) Inoperability and complexity arises
b) Only complexity arises
c) Only Inoperability arises
d) Nothing arises
Answer: a
Explanation: Complexity arises when service providers change their operating system and communication protocols, which results in inoperability. Service providers use standard protocols and conventional interfaces to facilitate information among diverse services.
18. In SOA, Service is termed as __________
a) Software service
b) Network service
c) Business service
d) Developer service
Answer: c
Explanation: Services are termed as business services. They are self-contained and logical.
19. Are SOA components loosely coupled.
a) True
b) False
Answer: a
Explanation: They are loosely coupled. That means every service is self-contained and exists alone logically.
20. The SOA architecture is divided into how many layers?
a) 5 layers
b) 2 layers
c) 7 layers
d) no layers ie., only one layer
Answer: b
Explanation: The first which has direct relevance to the business as it carries out business functions. The second layer is the technical layer which talks about managing computer resources like a database, web server etc.
21. Internet of Things (IoT) can be integrated with which of these separate domains:
a. Cloud-based storage and computing.
b. Cyber Physical Systems.
c. Big-data networks.
d. All of these.
22. In the current market scenario, IoT captures the maximum share in which one of these?
a. Industry
b. Security
c. Healthcare
d. Home automation
23.Why is IPv6 preferred over IPv4 for IoT implementations?
a. Larger addressing range
b. More security
c. Both a and b
d. Neither a or b
22. The main function of the IoT Gateway can be summarized as:
a. Forwarding packets between LAN and WAN on the IP layer.
b. Performs application layer functions between IoT nodes and other entities.
c. Enables local, short-range communication between IoT devices.
d. All of these
Ans: a
23. Scalability of IoT means:
a. Expandable/reducible in terms of scale or size.
b. Measurable
c. Increasing/decreasing monetary costs.
d. All of these.
Ans: d
26.Which one of these is the most important factor to be considered in an IoT implementation:
a. Scalability
b. Power efficiency
c. Efficient and scalable addressing schemes
d. All of these
Ans: d
27.Which statement is NOT TRUE:
a. IoT WAN connects various network segments.
b. IoT WAN is geographically wide.
c. IoT WAN is organizationally wide.
d. None of these.
Ans: d
28.Which of these statements regarding sensors is TRUE?
a. Sensors are input devices.
b. Sensors can be analog as well as digital
c. Sensors respond to some external stimuli.
d. All of these.
Ans: d
29.Which of these is NOT a feature of Shape Memory Alloys (SMA)?
a. Low density
b. Low strain recovery
c. Biocompatibility
d. Biodegradability
Ans:b
30.Which of these is a part of the Sensing Layer of the IoT Service Oriented Architecture?
a. Service integration
b. Service repository
c. Business logic
d. Data sensing and actuation protocols.
Ans: d
31.MQTT stands for:
a. Message Queue Telemetry Transport
b. Multiple Queue Telemetry Transport
c. Multiple Query Transport Technique
d. Multiple Query Transport Technique
Ans: a
32.AMQP is designed for connecting:
a. Constrained networks
b. LANs and WANs
c. Systems and Business processes
d. None of these
Ans: c
33.Which modulation scheme is followed by IEEE 802.15.4 standard?
a. BPSK
b. QPSK
c. DSSS
d. All of these
Ans: d
34. Which CoAP message transfers response from the server within the acknowledgment message?
a. Separate
b. Confirmable
c. Non-confirmable
d. Piggyback
Ans: d
35.Collision prevention in 802.15.4 standard is provided by means of:
a. CSMA-CA
b. CSMA-CD
c. ALOHA
d. None of these
Ans: a
36.Which of these is a routing protocol for low power lossy networks over IPv6?
a. RPL
b. OSPF
c. Both a and b
d. None of these
Ans: a
37. The basic unit of AMQP data is:
a. A frame
b. A packet
c. A byte
d. A bit
Ans: a
38. RPL supports:
a. Message confidentiality
b. Loop detection in the routes
c. Data path validation
d. All of these
Ans: d
39. Which statement is TRUE with respect to the IEEE 802.15.4 standard?
a. It is a low data-rate standard.
b. Used for architecting wireless PANs
c. Uses only two layers – PHY and MAC
d. All of these
Ans: d
40. LOADng routing uses:
a. AODV
b. DSDVc. RIPv2
d. OSPF
Ans: a
41. The number of channels incorporated in physical layer of the HART standard are:
a. 10
b. 15
c. 20
d. 64
Ans: b
42.Channel hopping is performed at which HART layer?
a. Physical
b. Data link
c. Network
d. Application
Ans: b
43. This process of bypassing radio dead-spots in Z wave is done using a message called
a. Healing
b. Beacon
c. Probe
d. None of these
Ans: a
44. The difference between the wired and wireless versions of HART are at the:
a. Network layer
b. Physical layer
c. Data link layer
d. All of these
Ans: d
45.WASN stands for:
a. Wireless and Sensor networks
b. Wired and Sensor networks
c. Wireless Ad-hoc Sensor Networks
d. None of these
Ans: c
46. Class-2 Bluetooth devices have a range of:
a. 1m
b. 10m
c. 100m
d. 1000m
Ans: b
47.SOS in sensor web stands for
a. Sensor of a System
b. System of Sensors
c. Sensor Observation Service
d. None of these
Ans: C
48. Which topology is supported by Z wave:
a. Star
b. Mesh
c. Tree
d. All of these
Ans: d
49.QoS guarantees in WSNs include:
a. Offering guarantees in terms of bandwidth, delay, jitter
b. Offering guarantees in terms of packet loss probability.
c. Offering guarantees in terms of Limited bandwidth, unpredictable changes in RF channel characteristics.
d. All of these
Ans: d
50. The WSN nodes are prone to:
a. Malicious attacks
b. Eavesdropping
c. Interference
d. All of these
Ans: d
51. With respect to WSN coverage problems, the OGDC algorithm is an acronym for:
a. Optimal Geographic Density Control
b. Optimal Geographic Distance Control
c. Optimal Geographic Distance Coverage
d. Optimal geographic Density Coverage
Ans: a
52. A crossing with respect to WSN coverage is _ if it is in the interior region of at least one node’s coverage disk.
a. Partially covered
b. Covered
c. Not covered
d. Isolated
Ans: b
53. A PIR Sensor stands for:
a. Proximity Infra-Red
b. Passive Infra-Red
c. Picture Infra-Red
d. None of these
Ans: b
54. WMSNs stand for:
a. Wired Multimedia Sensor Networks
b. Wireless Multimedia Sensor Networks
c. Wireless Mobile Sensor Networks
d. Wireless Machine Sensor Network
Ans: b
55. UAV-VANETS link-up may be used for:
a. visual guidance
b. Data-muling
c. Coverage enhancement
d. All of these
Ans: d
56. M2M stands for:
a. MAC to MAC communication
b. Machine to MAC communication
c. Machine to machine communication
d. MAC to machine communication
Ans: c
57. In WSN area coverage problem, which is TRUE?
a. Energy-efficient random coverage
b. Connected random coverage
c. A network is connected if any active node can communicate with any other active nodes
d. All of these
Ans: d
58. In a M2M ecosystem, Internet service providers:
a. Provide their infrastructures for M2M device communications.
b. are responsible for devices providing raw data.
c. is an individual or company what utilizes M2M applications.
d. None of these
Ans: a
59. With respect to stationary sensor networks, which of these points apply?
a. Easy deployment
b. Node can be placed in an optimized distance
c. Easy topology maintenance
d. All of these
Ans: d
60. High-end M2M nodes have:
a. Mobility
b. QoS guarantees
c. Low density deployment
d. All of these
Ans: d
61. A hardware code, before uploading to an embedded processor board first needs to be:
a. Verified and compiled
b. Executed
c. Both a and b
d. None of these
Ans: a
62. Why interoperability is required?
a. Heterogeneous wireless communication protocols
b. Different programming languages
c. Different control models
d. All of the above
Ans: d
63. What is the function for reading humidity from DHT sensor from Arduino?
a. dht.readHumidity()
b. dht.readTemperature()
c. dht.begin()
d. d. dht(pin,DHT22)
Ans: a
64. Device interoperability problem is between
a. Two devices
b. A device and an user
c. Both (a) and (b)
d. None of the above
Ans: a
65. Which is the following is not an Actuator?
a. Servo motor
b. Stepper motor
c. DHT
d. Relay
Ans: c
66. Which of the following is not a sensor?
a. Barometer
b. Light Dependent Resistor (LDR)
c. DHT
d. Relay
Ans: d
67. What is the servo library command to move the shaft of Servo motor back and forth across 180 degree?
a. Knob()
b. Sweep()
c. write()
d. detach()
Ans: b
68. The code written in Arduino IDE is referred to as:
a. Script
b. Block
c. Sketch
d. Arduino Script
Ans: c
69. Which of the following library functions can be used to generate a random number in Arduino?
a. randomize()
b. ran()
c. rand()
d. random()
Ans: d
70. Which pin of Arduino should be connected with the pin 3 of the DHT sensor?
a. Pint 5V
b. Pin 3.3V
c. Pin GND
d. None of the these
Ans: d
71. By default, the GPIO pins in Raspberry Pi are configured as?
a. Input except pins 14 and 15
b. Output except pins 14 and 15c. Bcm
d. GPIO
Ans: a
72. Which of the following datatype is correct for the object below?
D = [‘python’, 3.43, ‘p’, 100]
a. Array
b. Dictionary
c. Tuple
d. List
Ans: b
73.What does the method readline() return:
a. One line
b. One byte
c. One character
d. Bool
Ans: a
74. What is the maximum peripheral current draw allowed in Raspberry pi 3?
a. 1200mA
b. 700mA
c. 500mA
d. 100mA
Ans: a
75. Data collected by Raspberry Pi from the sensor can be
a. Processed in Raspberry Pi
b. Sent to other devices connected to the network
c. Used to control/activate other devices in the network
d. All of the above
Ans: d
76. Relay is a kind of:
a. Sensor
b. Actuator
c. Hub
d. Router
Ans: b
77. What are the mode/modes used for addressing the pins in Raspberry Pi?
a. GPIO
b. BCM
c. GPIO and BCM
d. GPIO, BCM and CAN
Ans: c
78. Which of the following variants of Raspberry Pi has an inbuilt wi-fi?
a. Raspberry Pi 2
b. Raspberry Pi 3
c. Raspberry Pi A+
d. Raspberry Pi Zero
Ans: b
79. Internet of Things refers to:
a. Interconnection of devices in a network
b. Exchange of data between devices in a network
c. An ecosystem of devices, accessible through internet
d. All of the above
Ans: d
80. IoT devices must have:
a. A USB port
b. A unique identification
c. Wired connectivity
d. All of the above
Ans: b
81. Server is a:
a. Computer
b. Any device/program which serves or responds to the request from client
c. A data center
d. Cloud
Ans: b
82. The split() function in Python programming language breaks the string on the basis of:
a. Blank Space
b. Comma
c. Any specified delimiter
d. Hyphen
Ans: c
83. Bind() function in Python socket programming is used to:
a. Specify the port for service on the specified host
b. Read data from the socket
c. Send data to the socket
d. Initiate the connection
Ans: a
84. Application program interface (API) used between data and control planes in SDN is known as:
a. Northbound API
b. Eastbound API
c. Southbound API
d. Westbound API
Ans:c
85. When does a switch send PAKCET-IN message to a controller in SDN:
a. Flow-rule associated with a received flow does not exist
b. All the time
c. After deleting a flow-rule
d. None of the above
Ans: a
86. In SDN, does the control overhead increase compared to the traditional network:
a. Depends on application and network topology
b. Yes, always
c. Not at all
d. Depends on Open Flow protocol
Ans: a
87. One of the advantages of SDN-based sensor network is:
a. Real-time programmability
b. No need to replace any node
c. Both a & b
d. None of the above
Ans: a
88. Application program interface (API) used between application and control planes is known as:
a. Northbound API
b. Eastbound API
c. Southbound API
d. Westbound API
Ans: a
89. An SDN Controller can be placed based on:
a. Hierarchical manner
b. Star-topology
c. Mesh topology
d. All of the above
Ans: d
90. Typically, __ protocol is used in low-rate wireless PANs:
a. IEEE 802.15.4
b. IEEE 802.11
c. IEC 6250
d. None of the above
Ans: a
91.Using SDN, the following can be managed:
a. Network partition
b. Network matching
c. Load balancing
d. All of the above
Ans: d
92. From the below given options, which is not a characteristic of cloud computing?
a. Low management effort
b. Low level generalization of computation
c. On-demand network access
d. Configurable computing resources
Ans: b
93. Pre-configure facility for allocation of virtualized resources comes under
a. Availability and reliability
b. Scalability and elasticity
c. Manageability and interoperability
d. Measured Services
Ans: c
94. Service Management mainly focusses on
a. Importance to desired outcomes of customers
b. Importance to desired outcomes of organizations
c. Both (a) and (b)
d. none of the above
Ans: a
95. Broad network access in cloud deals with
a. Dynamic allocation for scale out
b. Recorded resource usage
c. Availability of cloud resources over the network
d. All of the above
Ans: c
96. Billing information is calculated using
a. Accounting Records only
b. Billing rules and Accounting records
c. Billing rules, Accounting records and Resource prices
d. None of the above
Ans: c
97. Integrity in data security is :
a. Detecting unauthorized data modification
b. Sending secure data to cloud
c. Preserving the privacy of data
d. None of the above
Ans: a
98. Cloud Analyst provides
a. Support for large scale cloud applications
b. GUI based control
c. Flexible and repeatable environment
d. All of these
Ans: d
99. GreenCloud Simulator is designed based on
a. NS-3
b. NS-2
c. CloudSim
d. DCSim
Ans: b
100. Which of the following is not a cloud simulator?
a. CloudSim
b. NS-3
c. DCSim
d. GroudSim
Ans: b
101. What is the purpose of floating IP in Openstack?
a. To connect the instance with the external network
b. To interconnect among instances
c. To connect among instances inside a same network
d. None of them
Ans: a
102. We normally take snapshot in Openstack, _.
a. After the installation of an instance
b. Before the installation of an instance
c. It is an inbuilt image in Openstack
d. It should be downloaded from the internet
Ans: a
103. Sensor-Cloud deals with
a. Sensor-for-Service
b. Sensor-as-a-Service
c. Sensor-in-Cloud
d. None of these
Ans: b
104. Which of the following statement is true in sensor-cloud
a. End user procures sensors and lend these to sensor-cloud service provider
b. Sensor-cloud is based only on dumping the sensor data to the cloud
c. Single sensor nodes is shared dedicatedly with only one end user
d. None of these
Ans: d
105. What are the three main issues faced by cloud while handling IoT data?
a. speed, volume, bandwidth
b. speed, quality of service, volume
c. volume, latency, bandwidth
d. none of the above
Ans: c
106. Why data volume is a problem in IoT-based cloud computing?
a. because data are encrypted and hard to analyze
b. because data coming from IoT devices are always in raw format and difficult to store
c. because the density of IoT devices is increasing each day and in turn the volume of generated data is
growing very fast
d. because IoT device density is decreasing each day and in turn the volume of generated data are decreasing very fast
Ans: c
107. If the time-sensitive data are sent to cloud for analysis, the latency will be __
a. Increased
b. Decreased
c. neither increase nor decrease
d. first increase, then decreased
Ans: a
108. What is a good approach to reduce latency?
a. Analyzing data close to the data source
b. Analyzing data in cloud
c. Increasing number of nodes
d. Decreasing number of nodes
Ans: a
109. What are less time-sensitive data?
a. Data which can be analyzed after seconds or minutes
b. Data which should be analyzed within fraction of a second
c. Data which can be wait for hours, days, weeks
d. Data which can be wait for months
Ans: a
110. How fog provide better privacy to industries and companies?
a. By providing the facility to store confidential data in their local servers
b. By providing more secure communication system
c. By providing a secured VPN network
d. All of the above
Ans: a
111.Which of these can be considered as the skeleton for smart cities?
a. Buildings
b. Transportation
c. Banks
d. Sensors
Ans: a
112. Which of these can be considered as the sensory organs for smart cities?
a. Buildings
b. Transportation
c. Banks
d. Sensors
Ans: d
113. Smart Agriculture incorporates:
a. Alert generation in case of above-threshold pollutants in the air or water.
b. Scheduling harvesting and arranging proper transfer of harvests to
warehouses or markets.
c. Both the above
d. None of these
Ans: b
114. Heterogeneity for IoT in smart cities stands for:
a. Integration of varying hardware platforms and specifications.
b. Integration of different radio specifications.
c. Integration of various software platforms.
d. All of these
Ans: d
115. Which of these can be categorized as AI based mathematical model for data fusion?
a. CNN
b. Recursive methods
c. Bayesian analysis
d. Belief networks
Ans: a
116. Which of these connects cable-based networks with wireless networks for increased sharing of media, control and access and can share network media resources?
a. UPnP
b. DLNA
c. LAN
d. WiFi
Ans: b
117. Which of these is NOT a feature of VANETs?
a. High Dynamic Topology
b. High transmission and computation capability
c. Stable connectivity
d. Predictable mobility pattern
Ans: c
118. X-10 protocol is characterized by:
a. Low-speed and low data rate.
b. Low speed and high data rate
c. High speed and low data rate
d. High speed and high data rate
Ans: a
119. The V2X paradigm is not restricted to a single source information provider.
a. True
b. False
c. Sometimes True, mostly False
d. Sometimes False, mostly True
Ans: a
120. TCP/IP fails in V2X because:
a. TCP/IP is designed mainly for handling information exchange between a single pair of entities.
b. Information exchanges in TCP/IP are dependent on the location of data.
c. TCP/IP can only identify the addresses of endpoints, which alone is not useful for content distribution.
d. All of these
Ans: d
121. Net metering depends on –
a. Energy consumed by the consumers and energy generated by the consumers
b. Energy consumed by the consumers and energy supplied back to the grid
c. Only energy consumed by the consumer
d. None of the above
Ans: b
122. Smart grid enables –
a. Distributed energy management
b. Centralized energy management
c. Either of these
d. None of these
Ans: a
123. In smart grid, gateways communicate using –
a. IEEE 802.15.4
b. IEEE 802.15.6
c. 6LowPAN
d. IEEE 802.11
Ans: d
124. Full form of SANETs –
a. Sensors and Actions Networks
b. Sensors and Actuator Networks
c. Smart and Active Networks
d. None of these
Ans: b
125. In IIoT environment, networks can
a. Communicate with each other, external environment and people.
b. Communicate with each other, but not with external environment and people.
c. Does not communicate with each other, but communicates with external
environment.
d. Communicate with each other, but not with people.
Ans: a
126. IIoT is mainly focused on
a. Convenience of individuals
b. Efficiency, safety and security of operation and individuals.
c. Efficiency of the system.
d. Data security.
Ans: b
127. What is the key technology to enable V2V and V2R communication?
a. Short Range Communication
b. Dedicated Short Range Communication
c. Long Range Communication
d. Medium Range Communication
Ans: b
128. What do you mean by service management in IIoT?
a. Implementation and management of the quality of services
b. Collection of services
c. Features extracted from data received
d. Services which do not meet the demand of end-users.
Ans: a
129. Traditional RDBMS unable to process –
a. Structured data
b. Unstructured data
c. Both structured and unstructured data
d. None of these
Ans: b
130.Structured data is managed in database using –
a. .NET Framework
b. Structured Query Language
c. Normal Language Processing
d. All of these
Ans: b
131.Mathematical model, which represents the relationship between variables, is termed as –
a. Mathematical model
b. Statistical model
c. Variability model
d. None of the above
Ans: b
132. ANOVA has –
a. Two types
b. Three Types
c. Four Types
d. Any finite value
Ans: b
133. Which of the following option supports a long-range communication
a. ZigBee
b. GPRS
c. Bluetooth
d. All of the above
Ans: b
134. The primary challenges of an embedded operating system for WSN are
a. Small memory footprint
b. Low power and computing capability
c. Lack hardware parallelism
d. All of these
Ans: d
135. What is the network topology of Ambusens WBAN devices
a. Bus topology
b. Star Topology
c. Mesh Topology
d. None of the above
Ans: b
136. Which communication protocol is used between sensor devices in Ambusens WBAN system
a. 3G
b. WLAN/Wi-fi
c. IEEE 802.15.4
d. IEEE 802.15.1
Ans: d
137. Which privacy-aware scheme is used in Ambusens cloud framework
a. Hashing and reverse hashing of patient physiological data
b. Patient identity masking by hashing-based mechanism
c. Hashing and reverse hashing of physiological sensor ID
d. All of the above
Ans: b
138. Activity monitoring:
a. Provides better quality of life
b. Provides information accurately in a reliable manner
c. Provides continuous monitoring support.
d. All of these
Ans: d
139. Which of these sensors can be most appropriately used for activity monitoring in wearables?
a. Accelerometer
b. Cameras
c. LIDARs
d. LED
Ans: a
140. Statistical methods of activity recognition can work on:
a. Videos
b. Images
c. Scalar sensor data
d. All of these
Ans: c
141. Which indicates the communication between internetworking devices and applications. a. Internet b. Communication Devices c. Internet of things d. None of the above
Which indicates the computations at device level before the computed data is communicated through internet
a. Computing
b. Edge Computing
c. Communication
d. Internetworking
Ans: b
142. The levels of IoT are called as
a. Nodes
b. Tires
c. Items
d. Blocks
Ans: b
143. Which are the devices that sense the physical environments
a. Control units
b. Sensors
c. Firmware
d. PDU’s
Ans: b
144. Which IoT block contains the MCU or Customer chip
a. Control units
b. Sensors
c. Firmware
d. PDU’s
Ans: a
145. REST stands for
a. Raspbian state transfer
b. Raspberry state transfer
c. Representational state transfer
d. Raswik state transfer
Ans: c
146. Which is an operating system for IOT
a. Contiki
b. RIOT
c. Spark
d. Allyoyn
Ans: a
147. Which is an open data platform with open API
a. Thingspeak
b. Nimbits
c. IoT toolkit
d. Site Where
Ans: a
148. Which provides complete platform for managing IoT Devices
a. Thingspeak
b. Nimbits
c. IoT toolkit
d. Site Where
Ans:
Next Page :- 1 2