Internet of Things (IOT) Multiple Choice Questions PDF
Document Details
Uploaded by HotClarity
Tags
Summary
This document is a collection of multiple-choice questions about the Internet of Things (IoT). The questions cover various aspects of IoT, including hardware, software, and communication protocols.
Full Transcript
Internet of Things (IOT) Multiple choice questions: 51. The Buffer over run could be reduced using: a. Data integrity b. Byte orientation c. Flow control d. Traffic control 52. MAC addresses is used in the form of ________. a. IP addresses b. Network address c. Burned in address d. Har...
Internet of Things (IOT) Multiple choice questions: 51. The Buffer over run could be reduced using: a. Data integrity b. Byte orientation c. Flow control d. Traffic control 52. MAC addresses is used in the form of ________. a. IP addresses b. Network address c. Burned in address d. Hardware address 53. What is true about Arduino Codes? A. Setup ( is a startup function B. Loop ( is executed repeatedly C. Also known as sketches- D. All of these 54. The statements that are TRUE about ‘Arduino.h’ header file are ? A. Avrdude software uploads the hex file. B. Gives access to all of Ardunio’s core functionality. C. #include D. All of these 55. Stochastic control system has? A. Feedback with unknown actions random B. Positive Feedback with unknown random actions C. Negative Feedback with unknown random actions D. All of these 56.The keyword ‘PROGMEM’ is a variable modifier of PROGMEM utility. Which header file contains it? A. avr/pspace. B. h Bavr/pgmspace.h C.avr/pmspace.h D.avr/progmem.h 57. An IOT device may need interfaces for: A.Sensors B. audio/video C. Internet connectivity D. All of these 58. The differences in an open-loop and a closed-loop system are based on: A. Feedback B. Stability C. Complexity D. All of these 59. The way we dress is an example of communication. A. Verbal- B. Nonverbal C. Written-feferer D. Spoken 60. The loT supports. IoT A. Cloud computing B. Block-chain Technolgy C. Data Analytics D. All of these 61. MQ135 Sensor is. =A. Al detector- B. Gas Sensor- C. Monitors Air Pollution D.(B) and (C) 62. Choose the correct option of C program having array: int main( { int xyz (4) = [10, 20, 30, 40]; printf (“%d”, xyz (1)); } A. 0 B) Compile error C. 10 D. 20 63. In a sentence, subject communicates about and predicate talks about, A. predicate, sentence B. sentence, verb C. sentence, subject D. Predicate, subject 64. Humidity sensor is related to: A. DHT11 B. Hygrometer C. Parts Per or Million Relative Humidity (D) All of these- 65. Communication with oneself is called. A. Interpersonal B. Intrapersonal C. Impersonal D. Formal 66. LCD displays the text form of data whenEN line shows____ and RS line___? A. 0 to 1 transitions & High B 1 to 0 transitions & High C. 0 to 1 transitions & Low D.1 to 0 transitions & Low 67. Arduino can be programmed using following languages: A. Python B. C++ C) Both (A) and (B) D. None of the above 68. Which macro confirms “Hello friend”, be stored in the Flash memory? A Serial.Print (F (“Hello Friend”)); B. Serial.Print (A (“Hello Friend”)); C. Serial.Print (C (“Hello Friend”)); D. Serial.Print (N (“Hello Friend”)); 69. An IoT protocols does not include: A. Network/Internet protocol layer B. Link layer protocol C. Application layer Protocol D.Session layer protocol 70. The difference in if-Else and switch case statement is: if-Else A. If-Else enforces binary search If-Else B. Switch-case enforces linear search C. Multiple statements can be used for numerous decisions inside If-Else D. Multiple statements can be used for numerous decisions inside switch case. 71. Sketches in Arduino are saved with the extension A. exe B. ino C.. ide D.. doc 72. An IoT device connects with other interfaces using connections which are _: A. wired B. wired and wireless C. wireless D. None of these 73. What is WOT and its usage in the loT? A. Wireless of Things & increase time complexity B. Wireless of Things & reduce security C. Web of Things & interoperability improves D. Web of Things & increment in cost 74. Which document that can be used as an evident in legal cases? A. Notice B. Minutes of a meeting C. Agenda D.Memo 75. Which one is not a microcontroller in Embedded Ecosystem? A. PIC B. 8086 C. ARM D. 8051 76. The communication technologies used for loT is/are: A. Bluetooth B. Zigbee C. WIMAX D. All of these 77. What is true about sending and receving the Serial TTL Signals: A. At least one serial port is there- B. Communicates on digital input, 0 (Rx) and 1 C. UART or USART D. All of these 78. What is ESP8266 used in loT applications? A. Low-cost Wi-Fi module B. Microprocessor on a chip C. In-build HTTP software D. High-cost Wi-Fi module 79. The speed of DC motor is controlled by Arduino using A. PCM B. PPM C.PWM D.QAM 80. Microprocessors have following components embedded in them: A. RAM B. Memory C. ROM D. None of these 81. Which feature defines loT? A.Local network B. Non-changing conditions C. Self-configuring D. Non-interoperable protocol 82. A constant variable can be declared as ? A. Only in variable declaration area B. After main (-main ) C. const number int D. #define number 35 83. loT promotes the creation of IoT terminal industry __ A. Devices B. Network C. Clusters D. Things 84. Reading is an art to bring in knowledge. A. Encodes B. Translates. C. Decodes D. None of these 85. Paralanguage is a part of meta- communication that deals with non-verbal communication. Also known as…? Paralanguage A. Poetry B. Prosody C. Haptics D. Vocalic 86. In Microcontrollers, external access used for: A. Power supply B. Latches C. Memory Interfacing D. Peripherals 87. Keyboard pins while interfacing can cause interrupt called as: A. Timer Interrupt B.Software Interrupt C. External Hardware Interrupt D. Interfacing Interrupt 88. What is the basic function of the spring in a control valve ? A. Characterize flow B) Oppose the diaphragm to position the valve according to signal pressure C. Close the valve if air failure occurs. D. Open the valve if air failure occurs. 89. lot devices are threats vulnerable to attacks and One of them is Cryptanalysis attack that means: A. By recovering Information the encryption inforamtion B. Inject malicious codes C.Find ciphertext to break the encryption D. Tamper with the hardware 90. Choose the correct-option to access the 4th element of the array: int z; int *pz; pz = 2; A.”(z+3) B. 2 C.pz D. *(*pz+3) 91. The enduring feature that describes an individual’s behavior and attitude is called A. Education B. Personality Traits C. Financial Status D. Job Profile 92. The major characteristics on which OSI and TCP/IP differs: A. OSI model is independent generic protocol & TCP/IP is communication protocol B.In OSI model, Transport layer guarantees. the delivery C.(A) and (B) – (A) और(B) D.TCP/IP model consists of 7 layers TCP/IP 93. The future loT trust infrastructures are based on___ technology for business- critical interaction between devices without direct human interaction. A. XML B. B..Net C.Blockchain D. D. All of the Above 94. Main components of IoT based system are: IoT A. Sensors B. Actuators C. Microcontrollers D. All of the above 95. How many PWM pins does the Arduino Uno have? A1 B.2 C.4 D. 6 96. What is the Optiboot bootloader in the Arduino IDE? Arduino IDE A. Default bootloader B. ATmega328p C. Both (A) and (B) D. Take 1024 bytes for initiating 97. In a function, an array is passed by: A.Address relocation- B. Call by value C. Function arguments- (D) Call by reference 98. The language of memos should be and to understand. A. Indirect, personal B. Direct, concise C. Lucid, easy D. Concise,difficult 99. An array index, xyz [] starts with A. 0 B.-1 C.1 D. 2 100. IR Sensors are used in: A. GPS Tracking B. Moisture sensing C.) Object detection D. Analog signals 101. What is the full form of IANA? A. Internal Assessment Numerical Access B. Internet Association Numbers Authority C. International Aid For Network Automation D. Internet Assigned Numbers Authority Answer:- D 102. IoT stands for: A. Internet of Tech B. Incorporation of Things C. Internet of Things D. Incorporation of Technology Answer:- C 103. Which of the following can not be considered an IoT device? A. Smartwatch B. Andriod Phone C. Laptop D. Tubelight Answer:- D 104. Which is not an IoT platform? A. Xiaomi Cloud B. GoogleCloud C. Myntra D. AWS(Amazon Web Services) Answer:- C Explanation: AWS, Google Cloud, and Xiaomi Cloud deliver cloud computing IoT services. But Myntra is an e-commerce website that supplies goods. 105.Which of the following can not be considered an IoT device? A. Smartwatch B. Andriod Phone C. Laptop D. Tubelight Answer:- D 106. IoT is based on ______ technology. A. Hardware B. Software C. None D. Both of these Answer:- D 107. What is the standard form of RFID? A. Radio Frequency Identification B. Radio Waves Frequency Identification C. Radio Frequency InterDependent D. Radio Wave Frequency Independent Answer:- A 108. What is considered the standard length for a MAC Address? A. 8 bits B. 32 bits C. 48 bits D. None of these Answer:- C 109. What “bit” represents the address bit in the control register? A. MML B. ML C. MX D. MM Answer:- C 110. What is mandatory for an IP Packet to contain? A. Destination IP Address B. Source IP Address C. Both of these D. None of these Answer:- C Explanation: Each IP Packet must contain source and destination IP addresses. 111. At which level does the router operate in the OSI reference model? A. Data Link B. Network C. Physical D. None of these Answer:- B 112. What is an IoT network? A. a collection of networked devices B. a collection of Interconnected devices C. a collection of signalled devices D. None of the above Answer:- B Explanation: IoT is a massive network of devices that are connected with each other. These devices collect and transmit data to each other. 113. Full form of MQTT? A. Message Queue Telemetry Transport B. Messanger Queue Telemetry Transport C. Message Queuery Telemetry Transport D. None of these Answer:- A 114. Full-Form of VNC: A. Virtual network of computers B. Very network of computers C. Virtual network for communication D. Virtual network computing Answer:- D 115. What is the java extension file used in IoT? A..jar B..obj C..cpp D..exe Answer:-A 116. Which one out of these is not a Data Link Layer Technology? A. Bluetooth B. Wifi C. HTTP D. Mobile Hotspot Answer:- C 117. What is the standard form of LLN? A. Lower Lossy Network B. Low Power Lossy Network C. Lossy Low Power Network D. Low Lossy Powered Network Answer:- B 118. What type of interface is used by fingerprint sensors to collect data? A. IPI interface B. UART interface C. I2P interface D. None Answer:- B 119. How many wires does the SPI protocol use? A. 3 B. 4 C. 2 D. More than 4 Answer:- B 120. Which of the following things is mandatory for the IoT gateway to provide? A. Simple and secure installation B. Data network and storage C. Software Security D. Protocol abstraction Answer:- D Explanation: An IoT gateway must provide a few things like Protocol abstraction, Computing, I/O performance, and Integration communication capability to enhance the security of the user. 121. In which of the following way, data is associated with an IoT device: A. Internet B. Network connection C. Cables D. Cloud Answer:- D 122. Full form of HART: A. Highway Address Remote Transmitter B. Highway Addressable Remote Transducer C. Highway Addressable Router Transmitter D. Highway Address Remote Transmitter Answer:- B 123. Full form of LPWAN: A. Low Power Wide Area Network B. Lower Power Wide Area of Network C. Low Protocol Wide Area of Network D. Long Protocol Wider Area Network Answer:- A 124. What do API systems enable? A. Networks service portability is allowed by API B. Systems service portability is allowed by API C. Device service portability is allowed by API D. All of these Answer:- B Explanation: API systems enable the portability of Systems Service. 125. What do RETful API systems allow the user? A. to enhance security B. to modify communication capability C. to control electronic components D. All of these Answer:- C 126. In IoT, does the _____ layer help in end-to-end communication? A. security B. transport C. data communication D. logical Answer:- B Explanation: The transport layer is used to provide end-to-end communication in IoT. 127. LTE stands for: A. Long Terminal evolution B. Lower Terminal evolution C. Long Term evolution D. None Answer:- C 128. Many-Valued Logic is formed because of: A. binary logic B. Hexa logic C. fuzzy logic D. All of these Answer:- C 129. The collection of ____ that connects several devices is called the bus. A. network B. lines C. cables D. None of these Answer:- B Explanation: A collection of lines that connects several devices is called bus. 130. ____ is a security mechanism used in WiFi. A. WPA B. HTTP C. MLA D. None of these Answer:- A 131. The main purpose of the web of things(WoT) in IoT is: A. to increase the cost B. to improve security C. to improve the usability and interoperability D. All of these Answer:- C Explanation: Web of things(WoT) is used to improve the usability and interoperability of IoT. 132. The storage is _____ in IoT. A. limited B. unlimited C. not available D. All of these Answer:- A Explanation: The storage in IoT is very limited. 33. At what rate can NFC transmit data? A. 424 Kbps B. 1106 Kbps C. 216 Kbps D. All of these Answer:- D Explanation: The NFC can transfer data at any speed of either 212, 1106, or 424 Kbps. 134. The standard form of ICT is: A. Inter Connected Technology B. International Connection Technology C. Inter Communication Technology D. Information and Communication Technology Answer:- D 135. Which of the following uses Java Language? A. GSN B. MMQT C. GAN D. None of these Answer:- A Explanation: GSN(Global Sensor Network) uses Java as it is more portable than other languages like C++, Python, etc. 136. Domain Name System is used to: A. provide system security B. enhance network communication C. increase data and speed D. obtain IP Address Answer:- D 137. The standard form of CGI is: A. Common Gateway of Interest B. Common Gate Interfere C. Common Gateway Interdependent D. None Answer:- D Explanation: CGI stands for Common Gateway Interface. 138. Which of the following is not a short-range wireless network? A. Bluetooth B. VPN C. Wifi D. Hotspot Answer:- B Explanation: Those wireless networks having a short-range like Bluetooth and Wifi are called short-range wireless networks. These are suitable for working in the local environment. 139. A _____ is the component that executes a program in an IoT system. A. micro converter B. microcontroller C. microsensor D. None Answer:- B Explanation: A Microcontroller is a component that executes a program in an IoT system. It consists of a command unit, storage memory, timers, etc., that are used to handle the execution of a program. 140. Which of the following is not LPWAN Technologies? A. LORA B. SIGFOX C. NB-IoT D. Bluetooth Answer:- D 141. With two-factor Authentication, which attack can be users vulnerable to? A. Ransome ware Attack B. Man-in-the-middle attack C. Cross Attack D. Radiant Attack Answer:- B Explanation: Users may be vulnerable to a man-in-the-middle attack even after two- factor authentication. 142. Which one out of these is in a format which is not readable by the user? A. Encryption B. Passwords C..text D. None of these Answer:- A Explanation: Encryption is converting data into a specific form that is unreadable to any other user.