Download as xls, pdf, or txt
Download as xls, pdf, or txt
You are on page 1of 21

1

(a)
(b)
(c)
(d)
2
(a)
(b)
(c)
(d)
3
(a)
(b)
(c)
(d)
4
(a)
(b)
(c)
(d)
5
(a)
(b)
(c)
(d)
6
(a)
(b)
(c)
(d)
7
(a)
(b)
(c)
(d)
8
(a)
(b)
(c)
(d)
9
(a)
(b)
(c)
(d)
10
(a)
(b)
(c)
(d)
11
(a)
(b)
(c)
(d)
12
(a)
(b)
(c)
(d)
13
(a)
(b)
(c)
(d)
14
(a)
(b)
(c)
(d)
15
(a)
(b)
(c)
(d)
16
(a)
(b)
(c)
(d)
17
(a)
(b)
(c)
(d)
18
(a)
(b)
(c)
(d)
19
(a)
(b)
(c)
(d)
20
(a)
(b)
(c)
(d)
21
(a)
(b)
(c)
(d)
22
(a)
(b)
(c)
(d)
23
(a)
(b)
(c)
(d)
24
(a)
(b)
(c)
(d)
25
(a)
(b)
(c)
(d)
26
(a)
(b)
(c)
(d)
27
(a)
(b)
(c)
(d)
28
(a)
(b)
(c)
(d)
29
(a)
(b)
(c)
(d)
30
(a)
(b)
(c)
(d)
31
(a)
(b)
(c)
(d)
32
(a)
(b)
(c)
(d)
33
(a)
(b)
(c)
(d)
34
(a)
(b)
(c)
(d)
35
(a)
(b)
(c)
(d)
36
(a)
(b)
(c)
(d)
37
(a)
(b)
(c)
(d)
38
(a)
(b)
(c)
(d)
39
(a)
(b)
(c)
(d)
40
(a)
(b)
(c)
(d)
41
(a)
(b)
(c)
(d)
42
(a)
(b)
(c)
(d)
43
(a)
(b)
(c)
(d)
44
(a)
(b)
(c)
(d)
45
(a)
(b)
(c)
(d)
46
(a)
(b)
(c)
(d)
47
(a)
(b)
(c)
(d)
48
(a)
(b)
(c)
(d)
49
(a)
(b)
(c)
(d)
50
(a)
(b)
(c)
(d)
d 51
(a)
(b)
(c)
(d)
b 52
(a)
(b)
(c)
(d)
c 53
(a)
(b)
(c)
(d)
d 54
(a)
(b)
(c)
(d)
a 55
(a)
(b)
(c)
(d)
56
(a)
(b)
(c)
(d)
57
(a)
(b)
(c)
(d)
58
(a)
(b)
(c)
(d)
59
(a)
(b)
(c)
(d)
60
(a)
(b)
(c)
(d)
61
(a)
(b)
(c)
(d)
62
(a)
(b)
(c)
(d)
63
(a)
(b)
(c)
(d)
64
(a)
(b)
(c)
(d)
65
(a)
(b)
(c)
(d)
66
(a)
(b)
(c)
(d)
67
(a)
(b)
(c)
(d)
68
(a)
(b)
(c)
(d)
69
(a)
(b)
(c)
(d)
70
(a)
(b)
(c)
(d)
71
(a)
(b)
(c)
(d)
72
(a)
(b)
(c)
(d)
73
(a)
(b)
(c)
(d)
74
(a)
(b)
(c)
(d)
75

76

77

78

79

80
81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102
103

104

105

106
Which of the following is the Characteristics of IoT?
Software
Unique Identity
System
Client
What is not a part of IoT functional Block
Cloud
Communication
Services
Devices
Which of the application comes under Retail IoT?
Machine Diagnosis
Inventory Management
Smart grids
Shipment monitoring
M2M Network Domain Consists of?
Device Identity
Application
Connectivity Interface
Edge Computing
Which layer is called a port layer in the OSI model?
Session
Application
Presentation
Transport
Router operates at ________ Layer of OSI reference model?
Layer 2 (Data Link)
Layer 1 (Physical)
Layer 3 (Network)
Layer 4 (Transport)
Which is not the part of M2M Communication Framework?
Enables Connecting devices to IoTs
Device Hive
Ecosystem
Web-based Management Software
What is the Data rate of LR-WPAN(802.15.4)
10Mb/s to 40 Gb/s
40kb/s to 250kb/s
60Ghz
1.5 Mb/s to 1 Gb/s
An IoT system comprises of a number of functional blocks that provide the system the capabilities for
Identification
Client
Software
System
Which Characteristic of IoT best defines the following condition “IoT devices fetches the latest software upgrades”
Dynamic and Self Adapting
Unique Identity
Self-Configuring
Interoperable communication Protocol
How many layers are present in modified-OSI model for IoT/M2M?
one-layer
two-layer
three-layer
Six-layer
What is true for gateways in IoT?
To process the data captured by the sensors and process them so as to extract the valuable data from the enormous amou
Routing the processed data and sending it to proper locations for its (data) proper utilization.
To collect data from its surroundings or give out data to its surrounding.
Responsible for securing the data – that is performing encryption and decryption of data.
WiFi is defined by which IEEE standards?
IEEE 802.11
IEEE 802.3
IEEE 802.5
IEEE 802.4
WPA is a security mechanism in
WiFi
Cloud
Bluetooth
Ethernet
Which one of these is not LPWAN technologies
Sigfox
WiFi
NB-IoT
LoRa
COAP features are
W3C defined CoAP web objects
A specialized web Transfer protocol used for CoRE using ROLL network
Has a large message Header and does not spport Resource Directory
Object or resource use COAP-TLS and TCP protocols for sending request or response
SOAP features are
Dot net support for internet application development
It is a architectural style
Object exchange could be through HTTP request/response when HTTP binding is specified
Less secure
UDP
Internet Layer Protocol
Transport Layer Protocol for COAP client for communication IoT sensor Data
Packetizes Data stack of application layer
Acknowledged Data Flow
URI and content type support is which protocol feature?
CoAP
HTTP
UDP
SPI
In MQTT which is the fastest QoS Level and most unreliable transfer mode.
QoS 0
QoS 1
QoS 2
QoS 3
MQTT is having
Large code footprint
High power consumption
High Bandwidth
Small code footprint
LWM2M light weight means data transfer is
Upto 100s of bytes
1000s of bytes
In Kilobytes
In Megabytes
802.15.4 Network devices are nodes having
High speed, low power, mesh network
Low speed, low power, mesh network
Low speed, low power, point to point network
High speed ,High Power, mesh network
UDP is a
Half Duplex, connectionless
Full Duplex, connectionless
Full Duplex, connection oriented
Half Duplex, connection oriented
When the node with the DHCP client computer leaves the subnet,it sends
DHCPRELEASE
DHCPDISCOVER
DHCPOFFER
DHCPPACK
The header length of IPv6 datagram is
10 bytes
25bytes
30 bytes
40 bytes
COAP relies on________protocol for Data transmission
TCP
UDP
SMTP
FTP
Main Characteristics for LTE-M are
Low receiver Bandwidth of 1.4Mhtz,Low Data Rate(200kps),Half Duplex Mode,eDRx
Low receiver Bandwidth of 20Mhtz,Low Data Rate(200kps),Half Duplex Mode,eDRx
Low receiver Bandwidth of 1.4Mhtz,Low Data Rate( 1Mbps),Half Duplex Mode,eDRx
Low receiver Bandwidth of 1.4Mhtz,Low Data Rate(200kps),Full Duplex Mode,eDRx
LoRaWAN has the following features
Ultra narrowband Modulation,Data Rate 100bps(868 Mhtz),Payload 12 bytes
Chirp Spread Spectrum Modulation,Data Rate 250bps(868 Mhtz),Payload 59-230 bytes
DSSS Modulation,Data Rate 100bps(868 Mhtz),Payload 12 bytes
Ultra narrowband Modulation,Data Rate 100bps(868 Mhtz),Payload 59-230 bytes
Which of the following is not a MQTT method?
connect
disconnect
Subscribe
classify
What of the following is the not a step of IoT design methodology?
Service Specification
Operational View Specification
Block Diagram
Functional View Specification
What is not done in the Domain Model Specification?
Virtual Entities
Define Physical Entities
Integrate Devices
Resources and Services in the IoT system
What is done in the Service Specification?
From Process specifications and information model ,states and attributes are obtained, which are in turn assigned a servic
System purpose, behavior and requirements
Define the structure of all the information in IoT System
Resources and Services in the IoT system
Entities and Objects in the domain of IoT system are the part of
Application Development
Process Specification
Domain Model Specification
Functional View Specification
________ are software components on the IoT device for accessing, processing, and storing sensor information connected
Analysis Component
Web services
Resources
Controller Service
________ defines the services in the IoT System,these services either change the state or attribute values or retrieve curr
Information Model Specification
Process Specification
Domain Model Specification
Service Specification
Which Systems are suitable for modeling low cost & low-complexity solutions where the data involved is not big?
IoT level 2
IoT level 5
IoT level 4
IoT level 1
Which system is suitable for solutions where the data involved are big and the analysis requirements are computationally
IoT level 2
IoT level 0
IoT level 1
IoT level 3
Which system contains local and cloud-based observer nodes, which can subscribe to and receive information collected in
IoT level 2
IoT level 4
IoT level 1
IoT level 3
System has multiple independent end nodes that perform sensing and/or actuation & send data to the cloud is
IoT level 6
IoT level 4
IoT level 3
IoT level 2
Which system are suitable for solutions based on wireless sensor networks, in which the data involved is big and the analy
IoT level 3
IoT level 1
IoT level 4
IoT level 5
____________adds more details to the virtual entities by defining their attributes and relations.
Programming Model
Information Model
Architectural Model
Component Model
What is the final step of the IoT design methodology?
Application Development
Operational View Specification
Purpose & Requirements Specification
Domain Model Specification
________ adds more details to the virtual Entities by defining their attributes.
Information Model
Process Specification
Domain Model
Functional View Specification
Sensors & Actuators are connected to _______ in the Home Automation Case Study?
8051
Raspberry Pi
Node MCU
Atmega32
Services in IoT handle
Device Monitoring
Authentication
Sensing
Actuation
________ are software components on the IoT device for accessing, processing, and storing sensor information connected
Analysis Component
Web services
Resources
Controller Service
_________ serve as a link between the IoT device, application, database and analysis components
Values
Web services
Database
Device
The ________ is responsible for analyzing the IoT data and generate results in a form which are easy for the user to under
Analysis Component
Application
Database
Controller Service
________ allow users to view the system status and view the processed data
Applications
Device
Database
Web Services
Which system is suitable for solutions where the data involved are big and the analysis requirements are computationally
IoT level 2
IoT level 0
IoT level 1
IoT level 3
Which system contains local and cloud-based observer nodes, which can subscribe to and receive information collected in
IoT level 2
IoT level 4
IoT level 1
IoT level 3
Which system is suitable for solutions where multiple nodes are required, the data involved is big and the analysis require
IoT level 2
IoT level 0
IoT level 4
IoT level 1
Which system are suitable for solutions based on wireless sensor networks, in which the data involved is big and the analy
IoT level 3
IoT level 1
IoT level 4
IoT level 5
System has multiple independent end nodes that perform sensing and/or actuation & send data to the cloud is
IoT level 6
IoT level 4
IoT level 3
IoT level 2
________refers to computing using resources at computing environment of web services over the internet.
Edge Computing
Distributed Computing
Web Computing
Grid Computing
______ is meant for data storage, data security and protection.
Data center
Service Center
Server Center
Main Center
One popular method of organizing data is a ________,which is a collection of a data.
Database
Data Computing
Data Analysis
Data Compression
As per the ACID rule, data after the transaction remains constant is known as ______.
Atomicity
Consistency
Isolation
Durability
Transforming and storing that data in a appropriate format or structure is known as _______.
Extract
Transform
Load
Compress
The ______ cloud model is provisioned by educational institutions, industries, govt. institutions or business and is open fo
Public Cloud
Private Cloud
Community Cloud
Hybrid Cloud
Architecture reference model for the business intelligence and business processes at ACMPS is consist of ____ Layers
2
4
7
5
Distributed Business Process System should possess_______ which means enterprise BI is unaware of where the BP’S are
Location dependence
Location Independence
Location oriented
Location related
_______________offers a highly scalable and reliable hosted queue for storing messages as they travel between distinct c
Amazon RDS
Amazon SQS
Amazon S3
Amazon EC2
With______________(NoSQL Database service)IoT system Developers can store any amount of Data and serve any level o
Amazon Dyanamo DB
Amazon RDS
Amazon S3
Nimbits
_____________is an open source framework which stores and processes Big data.
Linux
Spring MVC
Hadoop
Primefaces
The valid, useful and relevant data can be categorized as _________ in IOT data storage.
Data alone, Data along with result, Result only
Data valid, Data invalid, Data final
Data with tags, Data without tags, Data filtered
Data , Data standby, Data process
Data can be organized as a ___________.
Objects, Files, database, data store
Template, Model, Structure
Hard disk, memory, pen drive
Cloud, space, architecture
In OLTP types , the execution of a series transactions without user interaction is Known as_____.
Batch transaction processing
Streaming transaction processing
Interactive transaction processing
Complex event processing
Storm from Twitter, S4 from Yahoo is an example of__________.
Batch transaction processing
Streaming transaction processing
Interactive transaction processing
Complex event processing
Data stores, servers, data centres and network is made availaible to user or developer of applications on Demand
IaaS
QaaS
SaaS
DaaS
Nimbits 3.8.10 includes _________ .
File Database
Operational database
Event Database
H2 Database
______________ devices have its own power Source.
Passive
Event
Real Device
Active
Web Application Messaging Protocol (WAMP) is a subprotocol of ___________ which provides Publish subscribe and Rem
REST
COAP
Websocket
SOAP
What is the Ethernet/LAN cable used in RPi?
(a) Cat5 (b) Cat5e (c) Cat6 (d) RJ45
What are the parameters that are default values?
(a) Port_Name and Bits (b) Speed and Port_Names c) Speed and Parity (d) Stop bit and Flow Control
What is the command used for easy using of GNU screen?
(a)  $useradd -G {dialout} your_name (b) Screen Port_Name115200 (c) Minicom -b 115200 -o -D Port_Name (d) Prompt> #
In wireless sensor network, a node which is unable to perform an operation because of power failure and environmental e
(a)   Normal node (b) selfish node (c) failed node (d) badly failed node
 What of the following is a scheme for re-establishing the connectivity in the presence of dumb nodes in a wireless sensor
(a)   INTSEM (b) CoRD (c) SMAC (d) DutyCon
HART protocol was designed for
(a)Home automation networking (b) Network smart field devices (c) Vehicular networking (d) Automobile
A raspberry pi has
(a)An inbuilt OS on the board itself (b) An OS on memory card (c) No OS (d) A microcontroller with OS
How to create a socket:
(a)s = socket.socket (SocketFamily, SocketType, Protocol=0) (b) s = socket (SocketFamily, SocketType, Protocol=0) (c) s = so
def sensordata():
GPIO.setmode(GPIO.BOARD)
GPIO.setwarnings(False)
sensor = Adafruit_DHT.AM2302
humidity, temperature = Adafruit_DHT.read_retry(sensor,17)
return(humidity, temperature)
What does this function retrun
(a)Retruns 0 (b) Humidity (c) Temperature (d) humidity and temperature
What is the full form of INTSEM
Interrupt theoretic self‐management (b) Information theoretic server‐management (c) Interrup theoretic server‐managem
Nodes that can also send false routing messages which are a threat to the integrity of the network.
(a)   Normal node (b) selfish node (c) failed node (d) badly failed node
Nodes that aim to deliberately disrupt the correct operation of the routing protocol, denying network service if possible.
(a)   Malicious node (b) selfish node (c) failed node (d) badly failed node
CoRD and CoRAD are two popular schemes that re‐establish the connectivity between
(a)   Dumb nodes and other system (b) Dumb nodes and malicious nodes (c) Dumb nodes and failed node (d) badly fai
What is the full form for WBAN
(a) Wireless bulk area networks (b) Wired body area networks(c) Wireless body area networks (d) Wireless broad area net
Nodes that are typified by their unwillingness to cooperate, as the protocol requires whenever there is a personal cost.
(a)   Malicious node (b) selfish node (c) failed node (d) badly failed node
Connected vehicles are not capable of
(a) Communicating with other devices within the vehicle (b) Communicating with other similar vehicles (c) Commun
Variance is
(a) absolute deviations from the mean (b) expectation of the squared deviation from its mean (c) a measure that is used
Statistical methods of activity recognition are generally used on
(a) Videos (b) Images (c) Gif (d) Scalar sensor data
ANOVA is best applied where
(a) exact 2 populations or samples are meant to be compared (b) exact 3 populations or samples are exact 2 populations
The types of ANOVA are
(a)   2 (b) 3 (c) 4 (d) 5
 Which of the following statements is true
(a)   Precision is directly related to standard error (b) Precision is not related to standard error (c) Precision is inversely rel
IoT based remote healthcare monitoring is typically most useful for
(a)People in urban areas (b) people with easy access to healthcare (c) people without easy access to healthcare (d) peop
What security concerns are there with a smart home?
(a) that it might not recognize you or let you in (b) that it could be hacked into (c) that it may release radioactive waves in
Some smart home features may raise ________ questions about invading privacy.
(a) nonsensical (b) moot (c) ethical (d) spritual
RFID systems consist of
(a)RFID tags 0 (b) RFID antennas (c) RFID readers. (d) RFID tags, RFID antennas and RFID readers.
What does design provide?
(a)  Ecosystem (b) Technology (c) Technology and ecosystem (d) Digital revolution
Which possibility ensures load balancing and peak levelling of energy consumption?
(a)   Transportation and logistics (b) Energy and utilities (c) Automotive (d) Connected supply chain
Which possibility automatically communicates with other vehicles?
Transportation and logistics (b) Energy and utilities (c) Automotive (d) Connected supply chain
Which possibility connects the production line to suppliers?
(a)Transportation and logistics (b) Energy and utilities (c) Automotive (d) Connected supply chain
Which possibility is the highest contributor to cost overhead for manufacturing facilities?
(a) Transportation and logistics (b) Energy and utilities (c) Plant control flow operation (d) Energy management and resour
Which possibility ensures load balancing and peak levelling of energy consumption?
(a)Transportation and logistics (b) Energy and utilities (c) Automotive (d) Connected supply chain

“These are sample MCQs to indicate pattern, may or may not appear in examination”
ketType, Protocol=0)

th non-connected vehicles

(d) mean deviation

ons or samples are meant to be compared (d) more than 3 populations or samples are meant to be compared

You might also like