🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

1. How Does the Internet of Things (IoT) Work? 2. What are the main IoT visions? Explain the component for each one? 3. What is NFC Technology for the Internet of Things (IoT)? In which IoT-layer it founded? 4. What are the main challenges of the Internet of Things implementation? 5. What is a “T...

1. How Does the Internet of Things (IoT) Work? 2. What are the main IoT visions? Explain the component for each one? 3. What is NFC Technology for the Internet of Things (IoT)? In which IoT-layer it founded? 4. What are the main challenges of the Internet of Things implementation? 5. What is a “Thing” in the context of the Internet of Things (IoT)? 6. What are the fundamental components of IoT? 7. Can you list out the applications that are working on the Internet of Things? Explain that shortly? 8. What do you think the Internet of Things can completely replace the human mind and take its own decisions? No, I completely disagree with this caption. Internet of Things cannot completely replace the human mind when it comes to decisions, the way it is built is to give us the probability of something on statistical data and provide an option for the individual so that more accurate decisions can be taken but not to an extent where the human mind is replaced with the robots. 9. What is the importance of the Middleware in IoT? 10. What is the interoperability mean? List its levels? 11. Explain and draw the Security levels over IoT layers? 12. List out the IoT Attack Taxonomy Based on Architecture, briefly? 13. What impacts will the Sybil Attack have? And which we can found it? 14. List the attacks founded in network layer? 15. Explain briefly the attacks behavior over Application scenarios? 16. List the difference between Data confidentiality and Authentication as security requirements in IoT-environment? 17. Discuss the difference between Fog and Edge computing? 18. What is Blockchain Technology? 19. What are smart contracts in Blockchain? 20. List the Benefits behind combining IoT and Blockchain? 21. What is the difference between Permissionless and Permission Blockchain? 22. List the Blockchain Technology Component? 23. Compare between centralize and distributed ledgers? 24. What is the difference between PoW & PoS? 25. What is the impact of the Internet of Things have on Healthcare sector? 26. List mostly used medical sensors types in Healthcare-IoT? 27. List briefly the Healthcare Applications? 28. List out the challenges in health-IoT environment? Which one is not an element of IoT 1. People 2. Process 3. Security 4. Things What risks and challenges should be considered in the IoT? 1. Privacy and Security 2. Energy consumption 3. Network congestion 4. All of the above What is IIoT? 1. Information Internet of Things 2. Industrial Internet of Things 3. Innovative Internet of Things 4. None of the above Who invented the term the Internet of Things? 1. Bill Gates 2. Kevin Ashton 3. Steve Jobs 4. McDonald The huge number of devices connected to the Internet of Things have to communicate automatically, not via humans. What is this called? 1. Bot to Bot (B2B) 2. Machine to Machine (M2M) 3. InterCloud 4. Skynet What is the size of IPv6 addressed? 1. 32 bits 2. 64 bits 3. 128 bits 4. 256 bits _________________ is being used by Internet of Things 1. Radio Identification technology 2. Satellite 3. Cable 4. Broadband An important component of IoT that helps in sensing the environmental condition and perform an action is the _________ 1. Sensor 2. Switch 3. Wifi connectivity 4. User Interface ______________one of IoT security requirements 1. Interoperability 2. Data integrity 3. Vulnerabilities 4. Sybil Attack Smart home technology is targeted to make our life more? 1. Convenient 2. comfortable 3. save energy 4. All of the above ____________ is accomplished by flooding the victim with requests, thereby generating a large amount of network traffic 1. Sinkhole Attack 2. Replay Attack 3. Tag Cloning 4. DoS Attack _______________one of major attack in application layer 1. Man-in-the-Middle Attack 2. Sybil Attack 3. Phishing Attack 4. Eavesdropping The core ideas behind blockchain technology emerged in the late___________ 1. 1991 2. 1980 3. 2009 4. 1998 The users in Blockchain network called__________ 1. Participators 2. Farmers 3. Miners 4. Peoples _______________an individual system within a blockchain network 1. Miner 2. Block 3. Term 4. Node _____________networks are decentralized ledger platforms open to anyone publishing blocks, without needing permission from any authority. 1. Permissionless Blockchain 2. Publishing node 3. Permission Blockchain 4. All of the above _______________ is a splitting strategy that distributes computing and storage workloads across a P2P network 1. Bitcoin 2. Address Derivation 3. Sharding 4. None of the above A consortium blockchain is a partly private blockchain solution without a single owner organisation and usually called_____________ 1. Public Blockchain 2. federated Blockchain 3. Private Blockchain 4. All the above A smart home is defined as _________ 1. A house that works on automation 2. A house that is safe and secure 3. A house that has sufficient food and drinks 4. A house that works on automation that is safe and secure

Use Quizgecko on...
Browser
Browser