II4IIT_Assignment-0_Solution PDF
Document Details
Tags
Summary
This document contains the solution to an assignment related to Industry 4.0 and the Internet of Things (IoT), including questions and answers on topics such as computer networks, protocols, and devices.
Full Transcript
Introduction To Industry 4.0 And Industrial Internet Of Things Assignment-0 Number of questions: 10 Total marks: 10 X 1= 10 1. What is the full form of IoT in the context of Computer Networks? a. Integration of Thi...
Introduction To Industry 4.0 And Industrial Internet Of Things Assignment-0 Number of questions: 10 Total marks: 10 X 1= 10 1. What is the full form of IoT in the context of Computer Networks? a. Integration of Things b. Intranet of Things c. Internet of Things d. Information of Things Answer: (c) 2. Which of the following is not an Internet-based company? a. Google b. Amazon c. Honda d. Facebook Answer: (c) 3. How many layers are there in the OSI model? a. 5 b. 7 c. 9 d. There are no layers in the OSI model. Answer: (b) 4. Which of the following protocols is used for email communication? a. HTTP b. SMTP c. FTP d. ICMP Answer: (b) 5. Which of the following applications is not a web browser? a. Brave b. Chrome c. Firefox d. Tally Answer: (d) 6. What does QoS refer to in the context of Computer Networks? a. Quantity of Services b. Quick Online Service c. Quality of Service d. Quantitative Online System Answer: (c) 7. Which of the following transmission modes allows simultaneous bi-directional communication? a. Full Duplex b. Half Duplex c. Simplex d. Multiplex Answer: (a) 8. What does Wi-Fi stand for? a. Wireless Fiber b. Wired Fiber c. Wide Internet Frequency d. Wireless Fidelity Answer: (d) 9. What is bandwidth in the context of Computer Networks? a. The speed at which data can be transmitted over a network b. The number of devices connected to a network c. The physical area covered by a network d. A group of similar computers within a network Answer: (a) 10. What does ‘S’ stand for in HTTPS? a. Small b. Swift c. Safe d. Secure Answer: (d) 1. What is the primary function of a transducer? a. To store energy b. To convert signal from one physical form to another physical form c. To generate eddy current d. To generate heat Answer: (b) Justification: Please refer to Slide 3 of Lecture 1 of Week 1 2. Which device converts sound to an electrical signal? a. Speaker b. Antenna c. Microphone d. Strain gauge Answer: (c) Justification: Please refer to Slide 3 of Lecture 1 of Week 1 3. Which sensor can detect gases like LPG, CH4, and CO? a. DHT22 b. MQ-5 c. HC-SR04 d. PIR Answer: (b) Justification: Please refer to Slide 6 of Lecture 1 of Week 1 4. What does 'Resolution' indicate in a sensor? a. The correctness of the output b. The smallest change in input that can be detected c. The range of sensing d. The difference between standard and measured values Answer: (b) Justification: Please refer to Slide 9 of Lecture 1 of Week 1 5. Which modulation technique is used by Zigbee for the 2.4 GHz band? a. BPSK b. QPSK c. OQPSK d. FSK Answer: (c) Justification: Please refer to Slide 12 of Lecture 2 of Week 1 6. What does 6LoWPAN optimize? a. Load balancing in Legacy High-power networks b. Packet transmission in Low-power and lossy networks (LLN) c. Cryptography in Medium-power networks d. Error detection in Long-range networks Answer: (b) Justification: Please refer to Slide 17 of Lecture 2 of Week 1 7. How long is the Network ID in a Z-Wave network? a. 1 Byte b. 2 Bytes c. 4 Bytes d. 8 Bytes Answer: (c) Justification: Please refer to Slide 4 of Lecture 3 of Week 1 8. Which range is typical for Class 1 Bluetooth radios? a. 1 meter b. 10 meters c. 30 meters d. 100 meters Answer: (d) Justification: Please refer to Slide 13 of Lecture 3 of Week 1 9. What does the Constrained RESTful Environments (CoRE) framework include for service discovery? a. Registration Interface (RI) b. Resource Directory (RD) c. REST based protocols such as HTTP and CoAP d. All of the above Answer: (d) Justification: Please refer to Slide 10 of Lecture 4 of Week 1 10. Which policy controls the duration for which transmitted data is considered to be valid in an IoT network? a. History policy b. Latency budget policy c. Lifespan policy d. Deadline policy Answer: (c) Justification: Please refer to Slide 15 of Lecture 4 of Week 1 11. How many levels of QoS does MQTT support? a. 2 b. 3 c. 4 d. 5 Answer: (b) Justification: Please refer to Slide 7 of Lecture 5 of Week 1 12. Which protocol is CoAP based on? a. TCP b. FTP c. UDP d. HTTP Answer: (c) Justification: Please refer to Slide 10 of Lecture 5 of Week 1 13. For what kind of applications is AMQP optimized for? a. Entertainment b. Financial c. Vehicular d. Educational Answer: (b) Justification: Please refer to Slide 17 of Lecture 5 of Week 1 14. Which layer in IoT architecture is responsible for predictive analytics and data management? a. Sensing layer b. Networking layer c. Service layer d. Interface layer Answer: (c) Justification: Please refer to Page 5 of the book Introduction to Industrial Internet of Things and Industry 4.0 by S Misra, C Roy, A Mukherjee 15. State True or False. A sensor’s accuracy does not depend upon it’s resolution. a. True b. False Answer: (a) Justification: Please refer to Page 103 of the book Introduction to Internet of Things S Misra, A Mukherjee, A Roy 1. Which of the following is NOT a characteristic of the Fourth Industrial Revolution? a. Extensive use of ubiquitous and mobile internet b. Use of artificial intelligence and machine learning c. Invention of the steam engine d. Development of Cyber Physical Systems (CPS) Answer: (c) Justification: Please refer to Slide 5 of Lecture 1 of Week 2 2. What is a significant characteristic of new materials in the context of the Fourth Industrial Revolution? a. High cost and scarcity b. Lighter, stronger, recyclable, and adaptive c. Easily available but very expensive d. Non-recyclable and heavy Answer: (b) Justification: Please refer to Slide 19 of Lecture 1 of Week 2 3. Which of the following equipment can manifest physical objects based on digital specifications? a. 3D Printer b. Digital Microscope c. DSLR Camera d. Magnetic Separator Answer: (a) Justification: Please refer to Slide 17 of Lecture 1 of Week 2 4. Which of the following is not a characteristic of a sustainable industry? a. Energy efficiency b. Reliance on government subsidy c. Conservation of resource d. Low-waste production Answer: (b) Justification: Please refer to Slide 2 of Lecture 2 of Week 2 5. What is considered the main nervous system of any manufacturing industry? a. Human Resources b. Information and Communication Technology (ICT) c. Supply Chain Management (SCM) d. Marketing Answer: (b) Justification: Please refer to Slide 7 of Lecture 2 of Week 2 6. What is the impact of increasing renewable energy consumption on sustainability? a. Increases sustainability b. Increases waste product c. Unpredictable consumption d. Introduces delay Answer: (a) Justification: Please refer to Slide 8 of Lecture 2 of Week 2 7. What is the concept of JIDOKA in Lean Production System? a. Producing just what is needed b. Stopping production when there is a problem c. Reducing inventory d. Increasing production speed Answer: (b) Justification: Please refer to Slides 4 of Lecture 3 of Week 2 8. What is a 'value stream' in Lean Production System? a. A set of tools for production b. All the actions required for a product from order to delivery c. A method of employee training d. A type of waste reduction Answer: (b) Justification: Please refer to Slides 7 of Lecture 3 of Week 2 9. What does L, D and T stand for under ‘People Engagement’ in the Lean production System? a. Learn, Do, Teach b. Leverage, Divulge, Teardown c. Lean, Diverse, Timid d. Loan, Deploy, Test Answer: (a) Justification: Please refer to Slide 15 of Lecture 3 of Week 2 10. Which of the following is a benefit of smart and connected products? a. Increased manual labor b. Improved recall process of product c. Higher production costs d. Decreased automation Answer: (b) Justification: Please refer to Slide 3 of Lecture 4 of Week 2 11. Which resource is associated with the 'Optimization' categorization of Smart and connected products? a. Optimization algorithms b. Manual controls c. Marketing data d. Financial reports Answer: (a) Justification: Please refer to Slide 9 of Lecture 4 of Week 2 12. What is a smart factory according to the Deloitte University Press? a. A system that reduces manual labor b. A flexible system that can self-optimize performance c. A traditional factory with enhanced communication d. A fully automated production facility Answer: (b) Justification: Please refer to Slide 2 of Lecture 5 of Week 2 13. What are the characteristics of smart factories? a. Connection, Optimization, Transparent, Proactivity, Agility b. Manual operation, High cost, Slow processing c. Limited connectivity, High energy consumption d. Inefficient resource usage Answer: (a) Justification: Please refer to Slide 11 of Lecture 5 of Week 2 14. State True or False. The amalgamation of CPS and the evolution of Internet-based technologies led to the development of the Industrial Internet. a. True b. False c. Cannot be determined d. None of the above Answer: (a) Justification: Please refer to Page 36 of the book Introduction to Industrial Internet of Things and Industry 4.0 by S Misra, C Roy, A Mukherjee by CRC Press 15. State True or False. The real-time monitoring of the supply chain reduces inventory and capital requirements. a. True b. False c. Cannot be determined d. None of the above Answer: (a) Justification: Please refer to Page 40 of the book Introduction to Industrial Internet of Things and Industry 4.0 by S Misra, C Roy, A Mukherjee by CRC Press 1. What are Cyber-Physical Systems (CPS)? a. Systems that operate solely on physical components b. Systems that operate only on computational components c. Interacting networks of physical and computational components d. Systems without any computational components Answer: (c) Justification: Please refer to Slides 2 of Lecture 1 of Week 3 2. What is one of the key features of CPS in terms of computation? a. Static computation b. Reactive computation c. Limited computation d. Redundant computation Answer: (b) Justification: Please refer to Slide 6 of Lecture 1 of Week 3 3. What architecture is used for designing CPS-based manufacturing systems for Industry 4.0? a. 3C architecture b. 5C architecture c. 7C architecture d. 9C architecture Answer: (b) Justification: Please refer to Slide 12 of Lecture 1 of Week 3 4. What is a collaboration platform in the context of Industry 4.0? a. A type of business software that combines organizational networking capacities with operations b. A social media platform for employees c. A traditional project management tool d. A financial management system Answer: (a) Justification: Please refer to Slide 2 of Lecture 2 of Week 3 5. What does Single Source of Truth (SSoT) refer to in collaboration productivity? a. Storing every data element exactly once b. Storing multiple copies of each data element c. Using outdated software for decision making d. Storing data in various formats across different systems Answer: (a) Justification: Please refer to Slide 6 of Lecture 2 of Week 3 6. What is required for effective coordination in Industry 4.0 collaboration productivity? a. Isolated decision-making b. Centralized authority c. Stronger coordination between multiple industry agents d. Reducing the exchange of information Answer: (c) Justification: Please refer to Slide 8 of Lecture 2 of Week 3 7. What is a key feature of Augmented Reality (AR)? a. Completely replacing the physical environment b. Enhancing the present perception of reality c. Only providing auditory feedback d. Operating in isolated systems Answer: (b) Justification: Please refer to Slides 4 of Lecture 3 of Week 3 8. What is a characteristic of Projection-based Augmented Reality? a. Uses GPS for location-based services b. Projects light onto real-world surfaces c. Requires physical markers d. Only provides visual feedback Answer: (b) Justification: Please refer to Slides 11 of Lecture 3 of Week 3 9. What does a fully immersive VR simulation provide? a. Limited interaction with the virtual environment b. A wide field of view with head-mounted displays and motion detecting devices c. Only visual feedback without interaction d. Manual control over the virtual environment Answer: (b) Justification: Please refer to Slide 22 of Lecture 3 of Week 3 10. What type of AR uses visual markers for outcomes? a. Marker-based Augmented Reality b. Markerless Augmented Reality c. Projection Based Augmented Reality d. Superimposition Based Augmented Reality Answer: (a) Justification: Please refer to Slide 10 of Lecture 3 of Week 3 11. Who proposed the first use of the phrase "Artificial Intelligence"? a. Alan Turing b. John McCarthy c. Marvin Minsky d. Herbert Simon Answer: (b) Justification: Please refer to Slide 4 of Lecture 4 of Week 3 12. Which of the following statements is true? a. A program without AI uses a large knowledge base and heuristic search method b. A program with AI uses a large database and algorithmic search method c. A program with AI uses a large knowledge base and heuristic search method d. A program without AI uses a large database and heuristic search method Answer: (c) Justification: Please refer to Slide 5 of Lecture 4 of Week 3 13. According to NIST, what restricts the capacity of using conventional methods to manage Big Data? a. Data quality b. Acquisition speed, data volume, or data characterization c. Data accessibility d. Data format Answer: (b) Justification: Please refer to Slide 3 of Lecture 5 of Week 3 14. What does the velocity characteristic of Big Data refer to? a. The category of the data b. The speed of generation of data c. The quality of the data d. The volume of the data Answer: (b) Justification: Please refer to Slide 8 of Lecture 5 of Week 3 15. Which of the following are constraints of mobile CPS? a. Network stability b. Power requirement c. Security d. All of the above Answer: (d) Justification: Please refer to Page 44 of the book Introduction to Industrial Internet of Things and Industry 4.0 by S Misra, C Roy, A Mukherjee by CRC Press 1. What role does Application Security play in Cybersecurity for Industry 4.0? a. Prevents unauthorized physical access b. Ensures the protection of applications from outer threats c. Lock’s the user’s computer files by using an encryption and demands some money to unlock them d. Resolves network architecture issues Answer: (b) Justification: Please refer to Slide 6 of Lecture 1 of Week 4 2. What is Operational Security (OPSEC)? a. A method to increase hardware performance b. An analytical action that categorizes information benefits and regulates control for protection c. A technique to reduce software complexity d. A process to enhance network speed Answer: (b) Justification: Please refer to Slide 9 of Lecture 1 of Week 4 3. What is Ransomware? a. A type of malware that provides a facility to the attacker to lock user’s computer files by using encryption and demand money to unlock them b. A program that increases computer performance c. A system to enhance network speed d. A method to secure data from unauthorized access Answer: (a) Justification: Please refer to Slide 11 of Lecture 1 of Week 4 4. What is the primary aim of the Industrial Internet of Things (IIoT)? a. Increase machine life and optimize operational efficiency b. Enhance social media presence c. Decrease manufacturing costs significantly d. Replace human labor completely Answer: (a) Justification: Please refer to Slide 2 of Lecture 2 of Week 4 5. What is a major challenge in the deployment of IIoT? a. Legacy installations b. Cybersecurity c. Lack of standardization d. All of the above Answer: (d) Justification: Please refer to Slide 8 of Lecture 2 of Week 4 6. What does IIoT provide in the context of firefighting? a. Increased data redundancy b. Real-time monitoring and early warning of disasters c. Manual rescue operations d. Reduced connectivity among devices Answer: (b) Justification: Please refer to Slide 23 of Lecture 2 of Week 4 7. What are the three waves of industrial level innovation according to GE? a. The Internet Revolution, The Digital Revolution, The Industrial Internet b. The Industrial Revolution, The Internet Revolution, The Industrial Internet c. The Agricultural Revolution, The Internet Revolution, The Industrial Internet d. The Scientific Revolution, The Industrial Revolution, The Internet Revolution Answer: (b) Justification: Please refer to Slides 3 of Lecture 3 of Week 4 8. What are the three key elements of the Industrial Internet? a. Manual machines, basic analytics, isolated systems b. Advanced analytics, intelligent machines, people at work c. Traditional methods, paper-based records, local systems d. Low-level computing, limited data, manual labor Answer: (b) Justification: Please refer to Slide 10 of Lecture 3 of Week 4 9. What is a major drawback of Industrial Revolution? a. It had no impact on the environment b. It created a bad working environment and inefficient processes c. It reduced the use of fossil fuels d. It enhanced the quality of life for all workers Answer: (b) Justification: Please refer to Slide 7 of Lecture 3 of Week 4 10. What is the primary source of IIoT data? a. Actuators b. Controllers c. Sensors d. Network systems Answer: (c) Justification: Please refer to Slide 2 of Lecture 4 of Week 4 11. Which component is NOT part of the configurations involved in smart sensors? a. Multiparameter Sensing Unit b. Analog Detection Circuit c. Digital Signal Conditioning Unit d. Manual Control Unit Answer: (d) Justification: Please refer to Slide 8 of Lecture 4 of Week 4 12. What is the role of conventional sensing in industrial control systems? a. To increase the complexity of systems b. To involve feedback automation of a process c. To disconnect systems from feedback loops d. To reduce the reliability of systems Answer: (b) Justification: Please refer to Slide 5 of Lecture 4 of Week 4 13. Which sector is predicted to have the highest growth in Industry 4.0 as per PwC’s Global Industry 4.0 Survey of 2016 ? a. Electronics b. Manufacturing c. Defense d. Automotive Answer: (a) Justification: Please refer to Slide 3 of Lecture 5 of Week 4 14. What is the focus of the 'Control Layer' in the 5C Architecture for Cyber Physical Systems? a. Data collection b. Sensor-based monitoring c. Supervised control: Self-configure, Self-optimize, Self-adjust d. Human-readable interpretation and data visualization Answer: (c) Justification: Please refer to Slide 9 of Lecture 5 of Week 4 15. In the existing GSM cellular phones, a smart card is used to provide security to e-commerce applications, using encryption and digital signatures. What is it called? a. Wireless Identity Module (WIM) b. Trusted Platform Module (TPM) c. USB Token d. None of the above Answer: (a) Justification: Please refer to Page 87 of the book Introduction to Industrial Internet of Things and Industry 4.0 by S Misra, C Roy, A Mukherjee by CRC Press 1. Which of the following is an inclusion in the Industry 4.0 application as per ICP DAS? a. Manual data entry b. Supply chain automation c. Isolated machine operation d. Traditional logistics Answer: (b) Justification: Please refer to Slide 3 of Lecture 1 of Week 5 2. Which technology does Caterpillar integrate with IoT for enhanced machine interaction? a. Virtual Reality (VR) b. Augmented Reality (AR) c. Blockchain d. Manual controls Answer: (b) Justification: Please refer to Slide 4 of Lecture 1 of Week 5 3. What is the objective of the Cisco & Fanuc smart factory initiative? a. Maximize downtime in industrial facilities b. Minimize downtime in industrial facilities c. Increase manual operations d. Decrease system efficiency Answer: (b) Justification: Please refer to Slide 7 of Lecture 1 of Week 5 4. Which of the following is NOT one of the building blocks of a business model? a. Value Proposition b. Market Segment c. Employee Satisfaction d. Revenue Generation and Margins Answer: (c) Justification: Please refer to Slide 3 of Lecture 2 of Week 5 5. Which of the following is NOT a type of customer segment? a. Mass market b. Niche market c. Segmented market d. Unsegmented market Answer: (d) Justification: Please refer to Slide 5 of Lecture 2 of Week 5 6. What is a characteristic of the Subscription Model in IoT business models? a. One-time charge b. Recurring revenue through regular subscription fees c. High upfront cost d. Limited customer interaction Answer: (b) Justification: Please refer to Slide 13 of Lecture 2 of Week 5 7. Which of the following is NOT a type of IIoT business model? a. Cloud-based Business Model b. Service-Oriented Business Model c. Process-Oriented Business Model d. Product-Based Business Model Answer: (d) Justification: Please refer to Slide 4 of Lecture 3 of Week 5 8. What is an SLA in the context of business transactions? a. Service-level agreement b. Socio legal amendment c. Stop Loss Activation d. Symmetrical Link Aggregation Answer: (c) Justification: Please refer to Page 109 of the book Introduction to Industrial Internet of Things and Industry 4.0 by S Misra, C Roy, A Mukherjee by CRC Press 9. What does Infrastructure-as-a-Service (IaaS) provide? a. Only software online in the cloud b. Required hardware and software online in the cloud c. Only data storage services d. Manual computing resources Answer: (b) Justification: Please refer to Slide 6 of Lecture 3 of Week 5 10. Which business model aims at process optimization within a company and across company borders? a. Cloud-Based Business Model b. Service-Oriented Business Model c. Process-Oriented Business Model d. Product-Based Business Model Answer: (c) Justification: Please refer to Slide 19 of Lecture 3 of Week 5 11. What type of KPI is input-oriented and hard to measure? a. Leading KPI b. Lagging KPI c. Output KPI d. Static KPI Answer: (a) Justification: Please refer to Slide 5 of Lecture 4 of Week 5 12. Which of the following is a major focus and activity of Industrial Internet Consortium (IIC) members? a. Market analysis b. Testbeds c. Customer surveys d. Manual data entry Answer: (b) Justification: Please refer to Slide 7 of Lecture 4 of Week 5 13. What does the Usage Viewpoint in IIRA relate to? a. System requirements and key objectives b. High-level specifications and fundamental capabilities c. Key capabilities identified in the business viewpoint and activities coordinating different units of work d. Interfaces, protocols, and system characteristics Answer: (c) Justification: Please refer to Slide 10 of Lecture 5 of Week 5 14. What are the elements of an activity in the Usage Viewpoint of IIRA? a. Role, Task, Workflow, Implementation Map b. Trigger, Workflow, Constraints, Effects c. Physical Systems, Control, Sense, Actuation d. Vision, Values, Key Objectives, Fundamental Capabilities Answer: (b) Justification: Please refer to Slide 13 of Lecture 5 of Week 5 15. Which viewpoint relates to the technical representation of an IIoT system, including interfaces and protocols? a. Business Viewpoint b. Usage Viewpoint c. Functional Viewpoint d. Implementation Viewpoint Answer: (d) Justification: Please refer to Slide 23 of Lecture 5 of Week 5 1. Which of the following is one of the benefits of sensor usage in industry? a. Increasing downtime due to routine maintenance b. Reduced manual intervention for sensing in hazardous areas c. Manual data entry d. Limited operational efficiency Answer: (b) Justification: Please refer to Slide 6 of Lecture 1 of Week 6 2. Ultrasonic sensors can be used for _______________. Fill in the blank. a. Object detection b. Distance measurement c. Dynamic body detection d. All of the above Answer: (d) Justification: Please refer to Slide 25 of Lecture 1 of Week 6 3. Which sensor can be used for distance measurement, pattern matching, color checking, structured lighting, and motion capture? a. Acceleration sensor b. PIR Sensor c. Ultrasonic sensor d. Image sensor Answer: (d) Justification: Please refer to Slide 25 of Lecture 1 of Week 6 4. What is another name for MOS gas sensors? a. Electro-Resistive Gas sensors b. Chemi-Resistive Gas sensors c. Photo-Resistive Gas sensors d. Thermo-Resistive Gas sensors Answer: (b) Justification: Please refer to Slide 4 of Lecture 2 of Week 6 5. What is the 'Optimum Temperature' in the context of MOS gas sensors? a. The temperature at which the sensor does not respond b. The temperature at which the sensor gives the best response c. The lowest temperature at which the sensor operates d. The highest temperature the sensor can withstand Answer: (b) Justification: Please refer to Slide 4 of Lecture 2 of Week 6 6. What happens to the resistance of a gas sensor when it detects Volatile Organic Compounds ( VOCs)? a. The resistance remains constant b. The resistance changes from its baseline resistance c. The resistance increases only d. The resistance decreases only Answer: (b) Justification: Please refer to Slide 9 of Lecture 2 of Week 6 7. What are the typical requirements for industrial communication? a. High duty-cycle, high latency, high jitter b. Real-time, very low duty-cycle, very low latency, very low jitter c. Manual data processing, high latency, low duty-cycle d. High duty-cycle, low latency, high jitter Answer: (b) Justification: Please refer to Slide 2 of Lecture 3 of Week 6 8. What is the range of data transmission rate for EtherCat? a. 10 Mbps b. 100 Mbps c. 1 Gbps d. 200 Mbps Answer: (d) Justification: Please refer to Slide 11 of Lecture 3 of Week 6 9. Which topology is the EtherNet/IP standard based on? a. Universal Serial Bus topology b. Active star topology c. Passive bus topology d. Hybrid ring topology Answer: (b) Justification: Please refer to Slide 15 of Lecture 3 of Week 6 10. Which Profibus variant handles communication between PCs and Programmable Logic Controllers? a. Profibus DP b. Profibus PA c. Profibus FMS d. Profibus MBP Answer: (c) Justification: Please refer to Slide 4 of Lecture 4 of Week 6 11. Which Profibus variant is suitable for hazardous environments? a. Profibus DP b. Profibus PA c. Profibus FMS d. Profibus MBP Answer: (b) Justification: Please refer to Slide 4 of Lecture 4 of Week 6 12. Which network topology does the Interbus use? a. Active Ring Topology b. Bus Topology c. Mesh Topology d. Star Topology Answer: (a) Justification: Please refer to Slide 8 of Lecture 4 of Week 6 13. What is the latency supported by Tactile Internet? a. < 1 ms round trip latency b. 10-20 ms round trip latency c. 50-100 ms round trip latency d. 200-500 ms round trip latency Answer: (a) Justification: Please refer to Slide 15 of Lecture 5 of Week 6 14. Which frequency band does the 5G NR use for high-band communication? a. 24 GHz d. 10-20 GHz Answer: (c) Justification: Please refer to Slide 7 of Lecture 5 of Week 6 15. What are the three components of the Modbus architecture? a. Modbus Node, Modbus Junction, Modbus Branch b. Modbus Client, Modbus Router, Modbus Server c. Modbus Publisher, Modbus Broker, Modbus Subscribers d. Modbus Master, Modbus Gateway, Modbus Slaves Answer: (d) Justification: Please refer to Page 87 of the book Introduction to Industrial Internet of Things and Industry 4.0 by S Misra, C Roy, A Mukherjee by CRC Press 1. _________ stands for L in LPWAN. Fill in the blanks a. Low b. Less c. Light d. Level Answer: (a) Justification: Please refer to Slide 3 of Lecture 1 of Week 7 2. In which of the following radio bands does the SIGFOX radio link operate? a. Licensed ISM radio bands b. Unlicensed ISM radio bands c. Licensed GPS radio bands d. Unlicensed GPS radio bands Answer: (b) Justification: Please refer to Slide 5 of Lecture 1 of Week 7 3. The wireless throughput achieved by SIGFOX is up to ___________ bits per second. Fill in the blanks. a. 10 b. 100 c. 1000 d. 10000 Answer: (b) Justification: Please refer to Slide 5 of Lecture 1 of Week 7 4. Which IEEE standard is the physical and MAC layer of Zigbee based on? a. IEEE 802.11 b. IEEE 802.15.20 c. IEEE 802.15.4 d. IEEE 802.3 Answer: (c) Justification: Please refer to Slide 5 of Lecture 2 of Week 7 5. “Zigbee’s communication ranges typically vary between 10-100 meters depending on the device variant.” State true or false. a. True b. False Answer: (a) Justification: Please refer to Slide 5 of Lecture 2 of Week 7 6. Which of the following is a product by Digi? a. XBee b. Jbee c. Xigbee d. Jigbee Answer: (a) Justification: Please refer to Slide 7 of Lecture 2 of Week 7 7. What is the full form of CPS that seamlessly monitors and controls the physical processes by integrating computational and physical components? a. Cyber Physical Systems b. Cyber Practical Systems c. Computer Physical Systems d. Cyber Physical Store Answer: (a) Justification: Please refer to Slide 4 of Lecture 3 of Week 7 8. Which of the following is/are true about rule-based engines in the context of Complex Event Processing? a. Extract causal and temporal patterns using predefined rules b. Handles multiple data streams and correlates them to provide meaningful output c. Can process data in near real-time d. All of the above Answer: (d) Justification: Please refer to Slide 5 of Lecture 3 of Week 7 9. Which of the following is false about middleware in the context of IIoT processing? a. It is the software layer between the infrastructure layer and the application layer b. It provides services according to device functionality c. It does not support for heterogeneity, security d. Many middleware solutions are based on service-oriented architecture Answer: (c) Justification: Please refer to Slide 7 of Lecture 3 of Week 7 10. The SWAMP project developed IoT-based methods and approaches for smart water management in the precision irrigation domain. Which of the following services can be rendered by Smart Water Management Platform? a. Entirely replicable services b. Fully customizable services c. Application-specific services d. All of the above Answer: (d) Justification: Please refer to Slide 4 of Lecture 4 of Week 7 11. “The objectives of Vineyard Health Monitoring is to increase the yield and quality of grapes with optimal water use.” State true or false. c. True d. False Answer: (a) Justification: Please refer to Slide 9 of Lecture 4 of Week 7 12. SmartSantander is an IoT-based smart city deployment platform for large-scale applications. What does AAA stand for in its architecture layer? a. Authentication, Authorization, and Accounting b. Automation, Application, and Accounting c. Automation, Authorization, and Accounting d. Authentication, Application, and Accounting Answer: (a) Justification: Please refer to Slide 12 of Lecture 4 of Week 7 13. “Open Loop Control is never used to control decisions independent of process variables in Industrial Control Systems.” State true or false. a. True b. False Answer: (b) Justification: Please refer to Slide 4 of Lecture 5 of Week 7 14. ____________ is a type of Industrial Control Systems. Fill in the blanks. a. Programmable Local Controllers b. Distributed Command Systems c. Supervisory Control and Data Acquisition d. Distinct Control Systems Answer: (c) Justification: Please refer to Slide 5 of Lecture 5 of Week 7 15. Which of the following is not a component of Supervisory Control and Data Acquisition? a. Remote Telemetry Units b. Remote Telephonic Units c. SCADA master units d. Human-Machine Interface Answer: (b) Justification: Please refer to Slide 8 of Lecture 5 of Week 7 1. Which of the following statements is TRUE about unsupervised methods? a. They require labeled data to function. b. They find structure in the input data on their own. c. They are always more accurate than supervised methods. d. They are not at all useful for clustering tasks. Answer: (b) Justification: Please refer to Slide 8 of Lecture 1 of Week 8 2. “Deployment of IIoT analytics typically consists of three steps - i) train a (predictive) analytics model, ii) test and validate the model on previously unseen data, and iii) deploy the model to make predictions on real (streaming) data.” State True or False. a. True b. False Answer: (a) Justification: Please refer to Slide 11 of Lecture 1 of Week 8 3. ___________ requires fine-tuning a trained model. This approach requires less amount of data. Therefore, the time required for processing and computation may be reduced from hours to minutes and from weeks to days. Fill in the blanks. a. Transfer Learning b. Decision Tree c. Regression d. Naïve Bayes Answer: (a) Justification: Please refer to the book: Introduction to Industry 4.0 and Industrial Internet of Things, chapter no.-13, page no.-268 4. Which of the following is false about Reinforcement Learning? a. There is an external supervisor to guide the agent. b. There is a reward function which acts as feedback to the agent. c. It builds a knowledge graph from the constant feedback of the corresponding actions. d. None of the above Answer: (a) Justification: Please refer to Slide 15-16 of Lecture 2 of Week 8 5. Which of the following machine learning techniques is used to identify similar groups of data, coined as clustering? a. Supervised b. Unsupervised c. Classification d. Regression Answer: (b) Justification: Please refer to Slide 8 of Lecture 2 of Week 8 6. In ___________, one data point may belong to more than one cluster. Fill in the blanks. a. K-Means b. Fuzzy c-Means c. Naïve Bayes d. Decision Tree Answer: (b) Justification: Please refer to Slide 9 of Lecture 2 of Week 8 7. “Machine learning is a subset of deep learning which can learn automatically by finding the features of the object on its own.” State True or False. a. True b. False Answer: (b) Justification: Please refer to Slide 3 of Lecture 3 of Week 8 8. When does a deep learning model typically provide better accuracy? a. When the amount of data is very limited b. When the amount of data is huge c. When data is unavailable d. All of the above Answer: (b) Justification: Please refer to Slide 6 of Lecture 3 of Week 8 9. Which of the following can be achieved by deploying cloud in IIoT? a. High computational speed for data monitoring and analytics b. Scalable and secure services c. Storage of huge amounts of data d. All of the above Answer: (d) Justification: Please refer to Slide 5 of Lecture 4 of Week 8 10. Which of the following services can NOT be provided by utilizing cloud computing? a. Software-as-a-Service b. Platform-as-a-Service c. Pivot-as-a-Service d. Infrastructure-as-a-Service Answer: (c) Justification: Please refer to Slide 8-10 of Lecture 4 of Week 8 11. Which of the following is rendered by a Consumer IoT cloud platform? a. A large number of data points b. Modest security c. Return on investment (ROI) sensitive d. Quality of Service Answer: (b) Justification: Please refer to Slide 15 of Lecture 4 of Week 8 12. MindSphere is the cloud-based, open IoT operating system. Which of the following features are supported by the MindSphere? a. Security supports b. Procurement and distribution c. Automated exploitation of performance and intelligence d. All of the above Answer: (d) Justification: Please refer to Slide 21 of Lecture 4 of Week 8 13. Which of the following is not a C3 IoT Platform tool? a. Ex Machina b. Data Explorer c. Data Science Notebook d. Type Developer Answer: (d) Justification: Please refer to Slide 4 of Lecture 5 of Week 8 14. “Cashify is an Industrial IoT platform that facilitates real-time monitoring and low-cost solutions.” State true or false. a. True b. False Answer: (b) Justification: Please refer to Slide 12 of Lecture 5 of Week 8 15. Which of the following statements is false about fog computing? a. An added layer between the edge and the cloud layer b. A complete replacement of Cloud c. Distributed at one level, centralized on the other d. Intelligent in providing services like filtering, aggregation, and translation Answer: (b) Justification: Please refer to Slide 23 of Lecture 5 of Week 8 1. Why is fog computing important for IIoT applications? a. To decrease the cloud storage capacity b. To provision immediate action and quick response to time-sensitive data c. To eliminate local data processing d. To eliminate the need for provisioning data security Answer: (b) Justification: Please refer to Slide 2 of Lecture 1 of Week 9 2. Which of the following IIoT solutions can be rendered using Fog? a. Virtualization b. Automation c. Communication d. All of the above Answer: (d) Justification: Please refer to Slide 14 of Lecture 1 of Week 9 3. Which of the following is not a fog platform provider? a. FogHorn b. DHT11 c. Crosser d. Sonm Answer: (b) Justification: Please refer to Slide 18 of Lecture 1 of Week 9 4. “Reserve words in R programming language have special meanings and can be used as variable names and function names.” State True or False. a. True b. False Answer: (b) Justification: Please refer to Slide 5 of Lecture 2 of Week 9 5. Which of the following methods is the correct format for declaring a variable in the R programming language? a. A=10 b. A->10 c. #A=>10 d. A:=10 Answer: (a) Justification: Please refer to Slide 6 of Lecture 2 of Week 9 6. __________ syntax is used by Julia programming language to print in the console. Fill in the blanks. a. println() b. printfx() c. p() d. printx() Answer: (a) Justification: Please refer to Slide 19 of Lecture 2 of Week 9 7. ____________ is the data type available in the R programming language. Fill in the blanks. a. TRUE b. else c. Integer d. break Answer: (c) Justification: Please refer to Slide 12 of Lecture 2 of Week 9 8. Which of the following syntax is used to load the package in R programming language? a. library() b. load() c. package() d. import() Answer: (a) Justification: Please refer to Slide 15 of Lecture 2 of Week 9 9. Which of the following statements is false about the Julia programming language? a. Open source b. Distributed computation and parallelism possible c. Does not efficiently support Unicode d. Call c functions directly Answer: (c) Justification: Please refer to Slide 18 of Lecture 2 of Week 9 10. Which of the following file systems is derived from the open-source codes of Google File System? a. HDFS b. FAT c. NTFS d. UDF Answer: (a) Justification: Please refer to Slide 12 of Lecture 3 of Week 9 11. “Hadoop is an open-source implementation for Google File System and MapReduce.” State True or False. a. True b. False Answer: (a) Justification: Please refer to Slide 16 of Lecture 3 of Week 9 12. Which of the following is not a property of Data Center Networks? a. Rigid b. Secure c. Reliable d. Scalable Answer: (a) Justification: Please refer to Slide 4 of Lecture 4 of Week 9 13. Which of the following represent(s) data center network topologies? a. Three-tier DCN b. BCube c. Dcell d. All of the above Answer: (d) Justification: Please refer to Slide 7 of Lecture 4 of Week 9 14. “In Software Defined Networking (SDN), forwarding devices forward an incoming traffic based on the control logic defined by the SDN controller.” State True or False. a. True b. False Answer: (a) Justification: Please refer to Slide 6 of Lecture 5 of Week 9 15. A _____________ consists of single or multiple public, community, or public fog nodes, which are logically combined to provide services to multiple organizations. Fill in the blank. a. Private fog node b. Community fog node c. Public fog node d. Hybrid fog node Answer: (d) Justification: Please refer to the book: Introduction to Internet of Things, chapter no.-11, page no.-259 1. Network monitoring, management, and optimization are performed at the ___________ of the SDIIoT architecture. Fill in the blanks. a. Data plane b. Application plane c. Control plane d. User plane Answer: (c) Justification: Please refer to Slide 4 of Lecture 1 of Week 10 2. S stands for __________ in SCADA. Fill in the blanks. a. Supervisory b. Satisfactory c. Superficial d. Suspended Answer: (a) Justification: Please refer to Slide 13 of Lecture 1 of Week 10 3. Which of the following statements is false about Software-Defined 6TiSCH? a. Slicing mechanism is proposed in Layer-256 b. Slicing mechanism isolates the control overhead c. Allows deterministic and low-latency SDN controller communication d. Advantages of SDN is utilized, while minimizing the associated control overhead Answer: (a) Justification: Please refer to Slide 9 of Lecture 1 of Week 10 4. Which of the following is/are involved in IIoT risk management? a. Avoiding risks b. Mitigating risks c. Accepting risks d. All of the above Answer: (d) Justification: Please refer to Slide 8 of Lecture 2 of Week 10 5. ___________ stands for T in the STRIDE Threat Model of IoT security architecture. Fill in the blanks. a. Tampering b. Temporary c. Time d. Tolerance Answer: (a) Justification: Please refer to Slide 10 of Lecture 2 of Week 10 6. Which of the following is not an IIoT Attack Vector in the Application Layer? a. Data spoofing b. SQL injection c. Replay attack d. Misrouting Answer: (d) Justification: Please refer to Slide 12 of Lecture 2 of Week 10 7. _____________ includes trust requirements to devices and ensure trust compatibility with other components. Fill in the blanks. a. Hardware developer b. Software developers c. Front-end engineer d. Web designer Answer: (a) Justification: Please refer to Slide 20 of Lecture 2 of Week 10 8. Which of the following is mandatory for ensuring the security of the entire system in IIoT? a. Increase in network latency b. Data protection c. Reducing network throughput d. Open source software Answer: (b) Justification: Please refer to Slide 2 of Lecture 3 of Week 10 9. Which of the following is/are provisioned by cloud security? a. Data Privacy b. Access Control c. Identity Management d. All of the above Answer: (d) Justification: Please refer to Slide 10 of Lecture 3 of Week 10 10. Which of the following is NOT a feature of a smart factory? a. Continuous real-time data b. Maximized manual intervention c. Live metrics for quick decision d. Flexibility and adaptability Answer: (b) Justification: Please refer to Slide 5 of Lecture 4 of Week 10 11. “DeWalt is a tool manufacturer which launched the Construction Internet of Things initiative.” State True or False. a. True b. False Answer: (a) Justification: Please refer to Slide 9 of Lecture 4 of Week 10 12. Which of the following statements is/are incorrect about ABB -YuMi? a. It is a power and robotics firm b. It operates across only one continent c. It monitors robots via connected sensors d. All of the above Answer: (b) Justification: Please refer to Slide 10 of Lecture 4 of Week 10 13. “Maersk is a container shipping company that tracks assets and fuel consumption using sensors and uses IoT for preserving refrigerated containers.” State True or False. a. True b. False Answer: (a) Justification: Please refer to Slide 18 of Lecture 4 of Week 10 14. How does the application of IoT help in the food industry? a. By monitoring equipment performance b. By detecting anomaly in production line c. Both (a) and (b) d. Neither (a) nor (b) Answer: (c) Justification: Please refer to Slide 4-5 of Lecture 5 of Week 10 15. “SDN increases the complexity of the traditional networks by introducing a centralized control structure through the separation of the control plane from the data plane.” State True or False. a. True b. False Answer: (b) Justification: Please refer to the book: Introduction to Internet of Things, chapter no.-15, page no.-316 1. IIoT-enabled healthcare infrastructure can facilitate the monitoring of patient’s health conditions remotely. State true or false. a. True b. False Answer: (a) Justification: Please refer to Slide 8 of Lecture 1 of Week 11 2. __________ develops continuous glucose monitoring devices. Fill in the blanks. a. Dexcom b. iHealth BP5 c. Kinsa smart thermometer d. ADAMM Intelligent Asthma Monitoring device Answer: (a) Justification: Please refer to Slide 10 of Lecture 1 of Week 11 3. __________ is an example of a wireless ECG monitoring device. Fill in the blanks. a. QardioCore b. Dexcom c. iHealth BP 5 d. Kinsa smart thermometer Answer: (a) Justification: Please refer to Slide 9 of Lecture 1 of Week 11 4. “ADAMM Intelligent Asthma Monitoring device predicts pre symptoms of asthma attack from the body temperature, cough rate, heart rate.” State true or false. a. True b. False Answer: (a) Justification: Please refer to Slide 15 of Lecture 1 of Week 11 5. Which of the following represents the benefits of the digital power plant? a. Decreased efficiency b. Increased cost c. Improvement in performance d. Increase in energy requirement Answer: (c) Justification: Please refer to Slide 4 of Lecture 2 of Week 11 6. ___________ is a communication network that covers in-home IoT devices using Zigbee and 6LowPan. Fill in the blanks. a. Home area network b. Neighborhood area network c. Field area network d. Wide area network Answer: (a) Justification: Please refer to Slide 7 of Lecture 2 of Week 11 7. Which of the following statements is incorrect about Barcodes? a. Barcodes are printed on paper and plastic, which makes them vulnerable b. Barcodes need to be in the Line of Sight of the readers c. Multiple barcodes can be read at a time d. Barcodes cannot contain any added information Answer: (c) Justification: Please refer to Slide 13 of Lecture 3 of Week 11 8. Which of the following options is false about the Semi-Passive tags? a. Has an onboard battery to power the IC b. Does not have any active transmitter c. Relies on backscattering d. Depends on signals from the reader for power Answer: (d) Justification: Please refer to Slide 12 of Lecture 3 of Week 11 9. Which of the following problem(s) can be eliminated by using RFID tags? a. Data inconsistency b. Human errors c. Data scattering d. All of the above Answer: (d) Justification: Please refer to Slide 19 of Lecture 3 of Week 11 10. What is/are the necessity/necessities to render software security? a. Prevent stealing of valuable information b. Prevent corrupt behavior of software c. Provide protection from Denial of Service (DoS) attacks d. All of the above Answer: (d) Justification: Please refer to Slide 5 of Lecture 4 of Week 11 11. Which of the following options is false about the integrity of software security? a. Assurance of an uncorrupted data b. Correct functioning even under malicious attack c. Ignore consistency, accuracy, and trustworthiness of data over its entire life cycle d. Assurance that data is not altered by unauthorized people Answer: (c) Justification: Please refer to Slide 7 of Lecture 4 of Week 11 12. “Network Security does not maintain usability and integrity of network and data.” State true or false. a. True b. False Answer: (b) Justification: Please refer to Slide 11 of Lecture 4 of Week 11 13. What does VPN stand for? a. Virtual Private Network b. Virtual Public Network c. Versatile Private Network d. Versatile Public Network Answer: (a) Justification: Please refer to Slide 15 of Lecture 4 of Week 11 14. Which of the following can be achieved by applying IoT in Facility Management? a. Monitor alarms, smoke detectors, and other life safety systems remotely b. Real-time information about emergency c. Efficient supply management d. All of the above Answer: (d) Justification: Please refer to Slide 15 of Lecture 5 of Week 11 15. Active RFID tags are classified as _____________ and __________. Fill in the blanks. a. Transponders, beacons b. Transponders, eigen c. Transmitter, eigen d. None of the above Answer: (a) Justification: Please refer to the book: Introduction to Industry 4.0 and Industrial Internet of Things, chapter no.-15, page no.-297 1. How does the usage of IoT benefit the Oil and Gas industries? a. Decrease production efficiency b. Save cost and time c. Diminish work safety d. Reduce Production Answer: (b) Justification: Please refer to Slide 9 of Lecture 1 of Week 12 2. Which of the following can be achieved by performing predictive maintenance using IoT in the chemical industry? a. Increased equipment breakdown b. Improve quality by efficient IoT analytics programs c. Deteriorating service d. None of the above Answer: (b) Justification: Please refer to Slide 12 of Lecture 1 of Week 12 3. How does the use of IoT help in the Chemical Industry? a. By significantly increasing the energy expenses b. By maximizing supply chain risk c. By impairing Quality and equipment management d. By improving logistics Answer: (d) Justification: Please refer to Slide 11 of Lecture 1 of Week 12 4. Which of the following is true about second-generation UAVs? a. Transformable designs with 360°gimbals, high-quality video or higher-value instrumentation, and improved piloting modes. b. Transformable designs, 1080 HD video or higher value instrumentation, three-axis gimbals, improved safety modes, and autopilot modes. c. Static design, fixing camera mount, still photography, video recording, and manual steering control d. Enhanced intelligent piloting models and full autonomy, full airspace awareness, auto action (takeoff, land, and mission execution) Answer: (c) Justification: Please refer to Slide 4 of Lecture 2 of Week 12 5. How does IoT help in condition-based monitoring in the chemical industry? a. By predicting quality by continuous monitoring b. By performing water, nutrients, and pesticide analysis c. By adjusting the amount of required material d. All of the above Answer: (d) Justification: Please refer to Slide 13 of Lecture 1 of Week 12 6. How do IoT sensors benefit the pharmaceutical industry in terms of monitoring? a. By increasing the production cost b. By increasing the overall wastage c. By rendering real-time monitoring d. By increasing manual inspections Answer: (c) Justification: Please refer to Slide 18 of Lecture 1 of Week 12 7. Which of the following statements is false about the application of UAVs in Industry? a. UAVs gather integration of the measurements using IoT sensors b. Always communicates indirectly to an industrial control system such as the SCADA c. UAVs are capable of taking aerial imagery, visual imagery, thermal imagery, and also radio-frequency imagery of factory stations and substations d. UAVs have an end-to-end connection via wireless, from user to controller Answer: (b) Justification: Please refer to Slide 3 of Lecture 2 of Week 12 8. “IoT applications in construction sites help in inspecting structures by taking continuous complex readings instead of employing lots of workers and heavy software.” State True or False. a. True b. False Answer: (a) Justification: Please refer to Slide 8 of Lecture 2 of Week 12 9. What are the benefits that can be achieved by the application of UAVs in agriculture? a. Decrease effective yields b. Save time by helping farmers in scouting their crops c. Ineffective use of seed, fertilizer, water d. None of the above Answer: (b) Justification: Please refer to Slide 6 of Lecture 2 of Week 12 10. Which of the following is not an application of UAVs in Construction Sites? a. Monitoring job sites b. A quick survey of required job areas c. Transportation of heavy weight and bulky construction materials d. Inspecting structures Answer: (c) Justification: Please refer to Slide 8 of Lecture 2 of Week 12 11. What is/are the application(s) of UAVs in Forestry? a. Forest management b. 3D mapping of carbon storage in the forest c. Resist deforestation and increase security d. All of the above Answer: (d) Justification: Please refer to Slide 19 of Lecture 2 of Week 12 12. “By the application of UAVs, it is possible to detect leakage of oil and gas pipelines, oil spill detection and damage assessment.” State True or False. a. True b. False Answer: (a) Justification: Please refer to Slide 15 of Lecture 2 of Week 12 13. “UAV-based light displays are less expensive than traditional firework displays and can be reused.” State True or False. a. True b. False Answer: (a) Justification: Please refer to Slide 20 of Lecture 2 of Week 12 14. Which of the following cannot be achieved by using UAVs in mining? a. Identify misfire and wall damage b. Site exploration c. Automated underground tunnel construction d. Manage stockpiles Answer: (c) Justification: Please refer to Slide 10 of Lecture 2 of Week 12 15. “Case studies provide in-depth knowledge and clarity of concepts regarding the research topic.” State True or False. a. True b. False Answer: (a) Justification: Please refer to Slide 2 of Lecture 3 of Week 12