Professional Documents
Culture Documents
Internet of Things Prime
Internet of Things Prime
me/fresco_milestone ( @fresco_milestone )
Answer : True
Answer : True
Answer : True
Answer : True
Which of the following option(s) are security method(s) used to prevent access of sensitive
information from unauthorized users.
Answer : Both
Arduino board can read sensor values through the analog I/O pins.
Answer : True
Join our channel if you haven’t joined yet https://t.me/fresco_milestone ( @fresco_milestone )
Answer : Transducers
Answer : passive
Answer : Protocol
Answer : True
Set2:
Devices which store energy in the form of voltage or current are known as ____________
____________ is a specialized web transfer protocol for use with constrained nodes and networks in
IoT.
Join our channel if you haven’t joined yet https://t.me/fresco_milestone ( @fresco_milestone )
Answer : CoAP
In a IoT architecture, the ____________ layer collects data from the environment
Answer : Perception
Answer : True
Arduino is a microcontroller.
Answer : False