Questions and Answers - PDF

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Summary

This document is a collection of multiple-choice questions about different technical topics like transducers, sensors (detecting gases like LPG, CH4, and CO), modulation techniques, IoT technologies, and more. It covers concepts related to technology and engineering, possibly for an undergraduate course or assessment.

Full Transcript

What is the primary function of a transducer? a. To store energy b. To convert signal from one physical form to another physical form c. To generate eddy current d. To generate heat Which device converts sound to an electrical signal? a. Speaker b. Antenna c. Microphone d. Strain gauge...

What is the primary function of a transducer? a. To store energy b. To convert signal from one physical form to another physical form c. To generate eddy current d. To generate heat Which device converts sound to an electrical signal? a. Speaker b. Antenna c. Microphone d. Strain gauge Which sensor can detect gases like LPG, CH4, and CO? a. DHT22 b. MQ-5 c. HC-SR04 d. PIR What does 'Resolution' indicate in a sensor? a. The correctness of the output b. The smallest change in input that can be detected c. The range of sensing d. The difference between standard and measured values Which modulation technique is used by Zigbee for the 2.4 GHz band? a. BPSK b. QPSK c. OQPSK d. FSK What does 6LoWPAN optimize? a. Load balancing in Legacy High-power networks b. Packet transmission in Low-power and lossy networks (LLN) c. Cryptography in Medium-power networks d. Error detection in Long-range networks Preview Preview Preview Preview Preview Preview Extract text Sider Fusion How long is the Network ID in a Z-Wave network? a. 1 Byte b. 2 Bytes c. 4 Bytes d. 8 Bytes Which range is typical for Class 1 Bluetooth radios? a. 1 meter b. 10 meters c. 30 meters d. 100 meters What does the Constrained RESTful Environments (CoRE) framework include for service discovery? a. Registration Interface (RI) b. Resource Directory (RD) c. REST based protocols such as HTTP and CoAP d. All of the above Which policy controls the duration for which transmitted data is considered to be valid in an IoT network? a. History policy b. Latency budget policy c. Lifespan policy d. Deadline policy How many levels of QoS does MQTT support? a. 2 b. 3 c. 4 d. 5 Which protocol is CoAP based on? a. TCP b. FTP c. UDP d. HTTP Preview Preview Preview Preview Preview Preview Extract text Sider Fusion Preview Preview Preview Preview Preview Preview Extract text Sider Fusion What is considered the main nervous system of any manufacturing industry? a. Human Resources b. Information and Communication Technology (ICT) c. Supply Chain Management (SCM) d. Marketing What is the impact of increasing renewable energy consumption on sustainability? a. Increases sustainability b. Increases waste product c. Unpredictable consumption d. Introduces delay What is the concept of JIDOKA in Lean Production System? a. Producing just what is needed b. Stopping production when there is a problem c. Reducing inventory d. Increasing production speed What is a 'value stream' in Lean Production System? a. A set of tools for production b. All the actions required for a product from order to delivery c. A method of employee training d. A type of waste reduction What does L, D and T stand for under 'People Engagement' in the Lean production System? a. Learn, Do, Teach b. Leverage, Divulge, Teardown c. Lean, Diverse, Timid d. Loan, Deploy, Test Which of the following is a benefit of smart and connected products? a. Increased manual labor b. Improved recall process of product c. Higher production costs d. Decreased automation Preview Preview Preview Preview Preview Preview Extract text Sider Fusion Which resource is associated with the 'Optimization' categorization of Smart and connected products? a. Optimization algorithms b. Manual controls c. Marketing data d. Financial reports Which of the following technologies can provide safety in radio active zones within a smart factory? a. Cybersecurity b. Augmented Reality c. Additive Manufacturing d. Smart Grid What are the characteristics of smart factories? a. Connection, Optimization, Transparent, Proactivity, Agility b. Manual operation, High cost, Slow processing c. Limited connectivity, High energy consumption d. Inefficient resource usage State True or False. The amalgamation of CPS and the evolution of Internet-based technologies led to the development of the Industrial Internet. a. True b. False State True or False. The real-time monitoring of the supply chain reduces inventory and capital requirements. a. True b. False What are Cyber-Physical Systems (CPS)? a. Systems that operate solely on physical components b. Systems that operate only on computational components c. Interacting networks of physical and computational components d. Systems without any computational components Preview Preview Preview Preview Preview Preview Extract text Sider Fusion What is one of the key features of CPS in terms of computation? a. Static computation b. Reactive computation c. Limited computation d. Redundant computation What architecture is used for designing CPS-based manufacturing systems for Industry 4.0? a. 3C architecture b. 5C architecture c. 7C architecture d. 9C architecture What is a collaboration platform in the context of Industry 4.0? a. A type of business software that combines organizational networking capacities with operations b. A social media platform for employees c. A traditional project management tool d. A financial management system What does Single Source of Truth (SSoT) refer to in collaboration productivity? a. Storing every data element exactly once b. Storing multiple copies of each data element c. Using outdated software for decision making d. Storing the same data across different systems What is required for effective coordination in Industry 4.0 collaboration productivity? a. Isolated decision-making b. Centralized authority c. Stronger coordination between multiple industry agents d. Reducing the exchange of information What is a key feature of Augmented Reality (AR)? a. Completely replacing the physical environment b. Enhancing the present perception of reality c. Only providing auditory feedback d. Operating in isolated systems Preview Preview Preview Preview Preview Preview Extract text Sider Fusion Who proposed the first use of the phrase "Artificial Intelligence"? a. Alan Turing b. John McCarthy c. Marvin Minsky d. Herbert Simon Which of the following statements is true? a. A program without AI uses a large knowledge base and heuristic search method b. A program with AI uses a large database and algorithmic search method c. A program with AI uses a large knowledge base and heuristic search method d. A program without AI uses a large database and heuristic search method According to NIST, what restricts the capacity of using conventional methods to manage Big Data? a. Data quality b. Acquisition speed, data volume, or data characterization c. Data accessibility d. Data format What does the velocity characteristic of Big Data refer to? a. The category of the data b. The speed of generation of data c. The quality of the data d. The volume of the data Which of the following are constraints of mobile CPS? a. Network stability b. Power requirement c. Security d. All of the above What role does Application Security play in Cybersecurity for Industry 4.0? a. Prevents unauthorized physical access b. Ensures the protection of applications from outer threats c. Lock’s the user’s computer files by using an encryption and demands some money to unlock them d. Resolves network architecture issues Preview Preview Preview Preview Preview Preview Extract text Sider Fusion What is Operational Security (OPSEC)? a. A method to increase hardware performance b. An analytical action that categorizes information benefits and regulates control for protection c. A technique to reduce software complexity d. A process to enhance network speed What is Ransomware? a. A type of malware that provides a facility to the attacker to lock user’s computer files by using encryption and demand money to unlock them b. A program that increases computer performance c. A system to enhance network speed d. A method to secure data from unauthorized access What is the primary aim of the Industrial Internet of Things (IIoT)? a. Increase machine life and optimize operational efficiency b. Enhance social media presence c. Decrease manufacturing costs significantly d. Replace human labor completely What is a major challenge in the deployment of IIoT? a. Legacy installations b. Cybersecurity c. Lack of standardization d. All of the above What does IIoT provide in the context of firefighting? a. Increased data redundancy b. Real-time monitoring and early warning of disasters c. Manual rescue operations d. Reduced connectivity among devices What are the three waves of industrial level innovation according to GE? a. The Internet Revolution, The Digital Revolution, The Industrial Internet b. The Industrial Revolution, The Internet Revolution, The Industrial Internet c. The Agricultural Revolution, The Internet Revolution, The Industrial Internet d. The Scientific Revolution, The Industrial Revolution, The Internet Revolution Preview Preview Preview Preview Preview Preview Extract text Sider Fusion What are the three key elements of the Industrial Internet? a. Manual machines, basic analytics, isolated systems b. Advanced analytics, intelligent machines, people at work c. Traditional methods, paper-based records, local systems d. Low-level computing, limited data, manual labor What is a major drawback of Industrial Revolution? a. It had no impact on the environment b. It created a bad working environment and inefficient processes c. It reduced the use of fossil fuels d. It enhanced the quality of life for all workers What is the primary source of IIoT data? a. Actuators b. Controllers c. Sensors d. Network systems Which component is NOT part of the configurations involved in smart sensors? a. Multiparameter Sensing Unit b. Analog Detection Circuit c. Digital Signal Conditioning Unit d. Manual Control Unit What is the role of conventional sensing in industrial control systems? a. To increase the complexity of systems b. To involve feedback automation of a process c. To disconnect systems from feedback loops d. To reduce the reliability of systems Which sector is predicted to have the highest growth in Industry 4.0 as per PwC’s Global Industry 4.0 Survey of 2016? a. Electronics b. Manufacturing c. Defense d. Automotive Preview Preview Preview Preview Preview Preview Extract text Sider Fusion What is the focus of the 'Control Layer' in the 5C Architecture for Cyber Physical Systems? a. Data collection b. Sensor-based monitoring c. Supervised control: Self-configure, Self-optimize, Self-adjust d. Human-readable interpretation and data visualization In the existing GSM cellular phones, a smart card is used to provide security to e-commerce applications, using encryption and digital signatures. What is it called? a. Wireless Identity Module (WIM) b. Trusted Platform Module (TPM) c. USB Token d. None of the above Which of the following is an inclusion in the Industry 4.0 application as per ICP DAS? a. Manual data entry b. Supply chain automation c. Isolated machine operation d. Traditional logistics Which technology does Caterpillar integrate with IoT for enhanced machine interaction? a. Virtual Reality (VR) b. Augmented Reality (AR) c. Blockchain d. Manual controls What is the objective of the Cisco & Fanuc smart factory initiative? a. Maximize downtime in industrial facilities b. Minimize downtime in industrial facilities c. Increase manual operations d. Decrease system efficiency Which of the following is NOT one of the building blocks of a business model? a. Value Proposition b. Market Segment c. Employee Satisfaction d. Revenue Generation and Margins Preview Preview Preview Preview Preview Preview Extract text Sider Fusion Which of the following is NOT a type of customer segment? a. Mass market b. Niche market c. Segmented market d. Unsegmented market What is a characteristic of the Subscription Model in IoT business models? a. One-time charge b. Recurring revenue through regular subscription fees c. High upfront cost d. Limited customer interaction Which of the following is NOT a type of IIoT business model? a. Cloud-based Business Model b. Service-Oriented Business Model c. Process-Oriented Business Model d. Product-Based Business Model What is an SLA in the context of business transactions? a. Service-level agreement b. Socio legal amendment c. Stop Loss Activation d. Symmetrical Link Aggregation What does Infrastructure-as-a-Service (IaaS) provide? a. Only software online in the cloud b. Required hardware and software online in the cloud c. Only data storage services d. Manual computing resources Which business model aims at process optimization within a company and across company borders? a. Cloud-Based Business Model b. Service-Oriented Business Model c. Process-Oriented Business Model d. Product-Based Business Model Preview Preview Preview Preview Preview Preview Extract text Sider Fusion What type of KPI is input-oriented and hard to measure? a. Leading KPI b. Lagging KPI c. Output KPI d. Static KPI Which of the following is a major focus and activity of Industrial Internet Consortium (IIC) members? a. Market analysis b. Testbeds c. Customer surveys d. Manual data entry What does the Usage Viewpoint in IIRA relate to? a. System requirements and key objectives b. High-level specifications and fundamental capabilities c. Key capabilities identified in the business viewpoint and activities coordinating different units of work d. Interfaces, protocols, and system characteristics Which viewpoint relates to the technical representation of an IIoT system, including interfaces and protocols? a. Business Viewpoint b. Usage Viewpoint c. Functional Viewpoint d. Implementation Viewpoint What are the elements of an activity in the Usage Viewpoint of IIRA? a. Role, Task, Workflow, Implementation Map b. Trigger, Workflow, Constraints, Effects c. Physical Systems, Control, Sense, Actuation d. Vision, Values, Key Objectives, Fundamental Capabilities Which of the following is one of the benefits of sensor usage in industry? a. Increasing downtime due to routine maintenance b. Reduced manual intervention for sensing in hazardous areas c. Manual data entry d. Limited operational efficiency Preview Preview Preview Preview Preview Preview Extract text Sider Fusion Ultrasonic sensors can be used for ______________. Fill in the blank. a. Object detection b. Distance measurement c. Dynamic body detection d. All of the above Which sensor can be used for distance measurement, pattern matching, color checking, structured lighting, and motion capture? a. Acceleration sensor b. PIR Sensor c. Ultrasonic sensor d. Image sensor What is another name for MOS gas sensors? a. Electro-Resistive Gas sensors b. Chemi-Resistive Gas sensors c. Photo-Resistive Gas sensors d. Thermo-Resistive Gas sensors What happens to the resistance of a gas sensor when it detects Volatile Organic Compounds (VOCs)? a. The resistance remains constant b. The resistance changes from its baseline resistance c. The resistance increases only d. The resistance decreases only What is the 'Optimum Temperature' in the context of MOS gas sensors? a. The temperature at which the sensor does not respond b. The temperature at which the sensor gives the best response c. The lowest temperature at which the sensor operates d. The highest temperature the sensor can withstand What are the typical requirements for industrial communication? a. High duty-cycle, high latency, high jitter b. Real-time, very low duty-cycle, very low latency, very low jitter c. Manual data processing, high latency, low duty-cycle d. High duty-cycle, low latency, high jitter Preview Preview Preview Preview Preview Preview Extract text Sider Fusion What is the range of data transmission rate for EtherCat? a. 10 Mbps b. 100 Mbps c. 1 Gbps d. 200 Mbps Which topology is the EtherNet/IP standard based on? a. Universal Serial Bus topology b. Active star topology c. Passive bus topology d. Hybrid ring topology Which Profibus variant handles communication between PCs and Programmable Logic Controllers? a. Profibus DP b. Profibus PA c. Profibus FMS d. Profibus MBP Which Profibus variant is suitable for hazardous environments? a. Profibus DP b. Profibus PA c. Profibus FMS d. Profibus MBP Which network topology does the Interbus use? a. Active Ring Topology b. Bus Topology c. Mesh Topology d. Star Topology What is the latency supported by Tactile Internet? a. < 1 ms round trip latency b. 10-20 ms round trip latency c. 50-100 ms round trip latency d. 200-500 ms round trip latency Preview Preview Preview Preview Preview Preview Extract text Sider Fusion Which frequency band does the 5G NR use for high-band communication? a. 24 GHz d. 10-20 GHz What are the three components of the Modbus architecture? a. Modbus Node, Modbus Junction, Modbus Branch b. Modbus Client, Modbus Router, Modbus Server c. Modbus Publisher, Modbus Broker, Modbus Subscribers d. Modbus Master, Modbus Gateway, Modbus Slaves __________ stands for L in LPWAN. Fill in the blanks a. Low b. Less c. Light d. Level In which of the following radio bands does the SIGFOX radio link operate? a. Licensed ISM radio bands b. Unlicensed ISM radio bands c. Licensed GPS radio bands d. Unlicensed GPS radio bands The wireless throughput achieved by SIGFOX is up to __________ bits per second. Fill in the blanks. a. 10 b. 100 c. 1000 d. 10000 Which IEEE standard is the physical and MAC layer of Zigbee based on? a. IEEE 802.11 b. IEEE 802.15.20 c. IEEE 802.15.4 d. IEEE 802.3 Preview Preview Preview Preview Preview Preview Extract text Sider Fusion “Zigbee’s communication ranges typically vary between 10-100 meters depending on the device variant.” State true or false. a. True b. False Which of the following is a product by Digi? a. XBEE b. Jbee c. Xigbee d. Jigbee What is the full form of CPS that seamlessly monitors and controls the physical processes by integrating computational and physical components? a. Cyber Physical Systems b. Cyber Practical Systems c. Computer Physical Systems d. Cyber Physical Store Which of the following is/are true about rule-based engines in the context of Complex Event Processing? a. Extract causal and temporal patterns using predefined rules b. Handles multiple data streams and correlates them to provide meaningful output c. Can process data in near real-time d. All of the above Which of the following is false about middleware in the context of IIoT processing? a. It is the software layer between the infrastructure layer and the application layer b. It provides services according to device functionality c. It does not support heterogeneity, security d. Many middleware solutions are based on service-oriented architecture The SWAMP project developed IoT-based methods and approaches for smart water management in the precision irrigation domain. Which of the following services can be rendered by Smart Water Management Platform? a. Entirely replicable services b. Fully customizable services c. Application-specific services d. All of the above Preview Preview Preview Preview Preview Preview Extract text Sider Fusion “The objectives of Vineyard Health Monitoring is to increase the yield and quality of grapes with optimal water use.” State true or false. a. True b. False SmartSantander is an IoT-based smart city deployment platform for large-scale applications. What does AAA stand for in its architecture layer? a. Authentication, Authorization, and Accounting b. Automation, Application, and Accounting c. Automation, Authorization, and Accounting d. Authentication, Application, and Accounting “Open Loop Control is never used to control decisions independent of process variables in Industrial Control Systems.” State true or false. a. True b. False ______________ is a type of Industrial Control Systems. Fill in the blanks. a. Programmable Local Controllers b. Distributed Command Systems c. Supervisory Control and Data Acquisition d. Distinct Control Systems Which of the following is not a component of Supervisory Control and Data Acquisition? a. Remote Telemetry Units b. Remote Telephonic Units c. SCADA master units d. Human-Machine Interface Which of the following statements is TRUE about unsupervised methods? a. They require labeled data to function. b. They find structure in the input data on their own. c. They are always more accurate than supervised methods. d. They are not at all useful for clustering tasks. Preview Preview Preview Preview Preview Preview Extract text Sider Fusion “Deployment of IIoT analytics typically consists of three steps - i) train a (predictive) analytics model, ii) test and validate the model on previously unseen data, and iii) deploy the model to make predictions on real (streaming) data.” State True or False. a. True b. False __________ requires fine-tuning a trained model. This approach requires less amount of data. Therefore, the time required for processing and computation may be reduced from hours to minutes and from weeks to days. Fill in the blanks. a. Transfer Learning b. Decision Tree c. Regression d. Naïve Bayes Which of the following is false about Reinforcement Learning? a. There is an external supervisor to guide the agent. b. There is a reward function which acts as feedback to the agent. c. It builds a knowledge graph from the constant feedback of the corresponding actions. d. None of the above Which of the following machine learning techniques is used to identify similar groups of data, coined as clustering? a. Supervised b. Unsupervised c. Classification d. Regression In __________, one data point may belong to more than one cluster. Fill in the blanks. a. K-Means b. Fuzzy c-Means c. Naïve Bayes d. Decision Tree “Machine learning is a subset of deep learning which can learn automatically by finding the features of the object on its own.” State True or False. a. True b. False Preview Preview Preview Preview Preview Preview Extract text Sider Fusion When does a deep learning model typically provide better accuracy? a. When the amount of data is very limited b. When the amount of data is huge c. When data is unavailable d. All of the above Which of the following services can NOT be provided by utilizing cloud computing? a. Software-as-a-Service b. Platform-as-a-Service c. Pivot-as-a-Service d. Infrastructure-as-a-Service MindSphere is the cloud-based, open IoT operating system. Which of the following features are supported by the MindSphere? a. Security supports b. Procurement and distribution c. Automated exploitation of performance and intelligence d. All of the above Which of the following is rendered by a Consumer IoT cloud platform? a. A large number of data points b. Modest security c. Return on investment (ROI) sensitive d. Quality of Service Which of the following is not a C3 IoT Platform tool? a. Ex Machina b. Data Explorer c. Data Science Notebook d. Type Developer Preview Preview Preview Preview Preview Preview Extract text Sider Fusion “Cashify is an Industrial IoT platform that facilitates real-time monitoring and low-cost solutions.” State true or false. a. True b. False Which of the following statements is false about fog computing? a. An added layer between the edge and the cloud layer b. A complete replacement of Cloud c. Distributed at one level, centralized on the other d. Intelligent in providing services like filtering, aggregation, and translation Why is fog computing important for IIoT applications? a. To decrease the cloud storage capacity b. To provision immediate action and quick response to time-sensitive data c. To eliminate local data processing d. To eliminate the need for provisioning data security Which of the following IIoT solutions can be rendered using Fog? a. Virtualization b. Automation c. Communication d. All of the above Which of the following is not a fog platform provider? a. FogHorn b. DHT11 c. Crosser d. Sonm Preview Preview Preview Preview Preview Preview Extract text Sider Fusion “Reserve words in R programming language have special meanings and can be used as variable names and function names.” State True or False. a. True b. False Which of the following methods is the correct format for declaring a variable in the R programming language? a. A=10 b. A->10 c. #A->10 d. A:=10 ______________ syntax is used by Julia programming language to print in the console. Fill in the blanks. a. println() b. print() c. p() d. printx() ______________ is the data type available in the R programming language. Fill in the blanks. a. TRUE b. else c. Integer d. break Which of the following syntax is used to load the package in R programming language? a. library() b. load() c. package() d. import() Which of the following statements is false about the Julia programming language? a. Open source b. Distributed computation and parallelism possible c. Does not efficiently support Unicode d. Call c functions directly Preview Preview Preview Preview Preview Extract text Sider Fusion "Hadoop is an open-source implementation for Google File System and MapReduce." State True or False. a. True b. False Which of the following is not a property of Data Center Networks? a. Rigid b. Secure c. Reliable d. Scalable Which of the following represent(s) data center network topologies? a. Three-tier DCN b. BCube c. Dcell d. All of the above "In Software Defined Networking (SDN), forwarding devices forward an incoming traffic based on the control logic defined by the SDN controller." State True or False. a. True b. False Preview Extract text Sider Fusion A ______________ consists of single or multiple public, community, or public fog nodes, which are logically combined to provide services to multiple organizations. Fill in the blank. a. Private fog node b. Community fog node c. Public fog node d. Hybrid fog node

Use Quizgecko on...
Browser
Browser