Professional Documents
Culture Documents
WIRELESS SENSOR NETWORKS (WSN)
WIRELESS SENSOR NETWORKS (WSN)
WIRELESS SENSOR NETWORKS (WSN)
SUCCESS
+ S
5 7 ON
2 TI RS
ES WE
QU NS
A
USEFUL FOR
4STUDENTS 4
□ □TEACHERS 4
□PARENTS 4□KIDS 4
□QUIZ TEST
□EXAM 4
4 □TRIVIA TEST 4
□COMPETITIVE EXAM 4
□OTHERS
Preface:
This book has undergone rigorous scrutiny to ensure its accuracy. I eagerly invite constructive
feedback on its content. Feel free to reach out to me via Facebook at https://www.facebook.
com/narayanchangder. Additionally, you can access all of my books on Google Play Books at
https://play.google.com/store/books/author?id=Narayan+Changder.
NARAYAN CHANGDER
This E-book is dedicated to the loving memory of my mother:
NARAYAN CHANGDER
may have found their way into this PDF
booklet.
Due care has been taken to ensure that
the information provided in this book
is correct. Author is not responsible
for any errors, omissions or damage
arising out of use of this information.
nt
Importa inter-
s , s e ar ch the de
er to inclu -
i t h t h e answ w a n t
w u au
atisfied . If yo ontact
If not s rrect answers klet, please c t s:
p
net for
co
i n t h is boo F a c e b ook ht
estions on
tact him arayanchangd
er/
new qu a n c o n n
ou c om/
thor. Y acebook.c
. f
//www
CRUCIAL INFORMATION: PLEASE READ BEFORE
CONTINUING:
NARAYAN CHANGDER
7. The money raised from creating the sales of
the book will help to ensure that I’m able to
produce similar books like this at a compara-
ble price.
8. YOU CAN DOWNLOAD 4000+ FREE PRACTICE
SET PDF EBOOK ON VARIOUS SUBJECTS (NURS-
ERY to UNIVERSITY LEVEL) FROM GOOGLE
DRIVE LINK https://drive.google.com/
drive/u/1/folders/19TbUXltOSN5S7FV3sL
PRACTICE BOOK» NOT FOR SALE
Contents
NARAYAN CHANGDER
1.1 WIRELESS SENSOR NETWORKS
1. An attack does not disrupt the operation 4. How to save energy in wireless sensor
of the network networks?
A. Active A. It only takes two jumps to reach the
B. passive sink.
C. both B. Global knowledge of networking is not
required.
D. none of them
C. Grouping-A competitive mechanism.
2. What is meant by hosting? (3-6)
D. Multi-hop routing protocol.
A. A service that allows individuals and
organisations to make their website avail- 5. Events are communication packets that are
able onthe world wide web passed between consecutive layers within
B. A service that creates websites for , or between the across nodes.
companies
A. Two nodes, same layers
C. A service that transmits data in a net-
work B. One node, same layers
1. B 2. A 3. C 4. C 5. B 6. B 7. A 7. B 7. C
1.1 WIRELESS SENSOR NETWORKS 3
7. Which of these are the objectives of net- 12. What is the new phase in M-SPIN
work security?
A. Error Discovery
8. What is not included in the main function 13. Following are the types of routing on
of WSN is? MANET, except:
A. Raw data processing in networks A. Proactive Routing
B. Transport of actual information
B. Hybrid Routing
C. Sampling physical phenomena
C. HyperActive Routing
D. Sensor hardware programming
D. Reactive Routing
9. Which one of the following is the Absolute
sensor 14. Carrier Sense Multiple Access (CSMA) is
A. Thermistor based on medium called
B. Thermocouple A. Listen and talk
C. Both Thermistor and Thermocouple B. Listen before sending
D. None of these
C. Sense before transmit
10. The following are the components that ex-
D. Sense before Collision
ist in each node in WSN
A. controller 15. What is the main objective of the Wireless
B. memory Sensor Network?
C. to eat A. To understand the consist of WSN pro-
D. sensors/actuators tocol and algorithms
E. a, b, d eat B. To analyze the performance and effi-
ciency of different WSN protocols and al-
11. What is the main principle of a Wireless gorithms
Sensor Network?
C. To distribute sensors ad hoc for data
A. Using a network of sensors to transmit
collection
data through cables
B. Collecting data from the environment D. To communicate using point-to-point
using a network of sensors and transmit- communication
ting it through radio signals
16. Wireless Network is
C. Using a network of sensors to collect
data from the environment and transmit- A. The network uses cables
ting it through satellite communication B. Wireless network
D. Collecting data from the environment
C. The network uses UTP cable
using a network of sensors and transmit-
ting it wirelessly D. The network uses cross cables
17. What is cloud computing? (1-4) 22. Contiki is designed to run on types of
hardware devices that are severely con-
A. Storing large amounts of data on a sin-
strained in
gle computer
A. Memory
B. Using the internet to store and access
data and programs remotely B. Power
C. Storing hard copies of data as a C. Processing power
backup D. All the above
NARAYAN CHANGDER
D. Using the internet to communicate 23. A sensor is a device used to detect the
with other users presence of other objects around it by
changing non-electrical quantities into elec-
18. What does TDMA stand for in the context
trical quantities.
of MAC protocols for wireless sensor net-
works? A. Correct
A. Time Division Multiplexing Access B. Salah
B. Total Data Management Algorithm 24. What is the concept of Web Censorship?
C. Transmission Data Modulation Array A. A concept that integrates various
maps and web-based real time sensor
D. Time Division Multiple Access
data
19. What are the classes of nodes in cooja sim- B. Instagram content filtering concept
ulator C. Concept of finding the best path
A. Emulated nodes D. Concept that integrates web services.
B. Cooja nodes
25. What is the main function of “nMAP”?
C. all of this above A. Describes the spatial and temporal dis-
D. none of this tribution of censored attributes in the
physical world
20. what are the requirements need for net- B. Represents the spatial and temporal
work security? behavior of system properties such as
A. confidentially residual energy and network connections
B. integrity C. Integrate user map and network map
C. all of this above D. Maximize reusability of concepts and
techniques
D. none of this
26. What are the key components of node ar-
21. How much data can a typical frame con- chitecture and network architecture in a
tain? wireless sensor network?
A. 2243 pixels A. Sensor, processor, memory,
transceiver, power supply, sink, base sta-
B. 768 bits
tion, gateway
C. 500 bytes
B. Keyboard, mouse, monitor, printer,
D. 1500 kilobytes scanner
D. More devices can be added any time. D. Compatibility with virtual reality tech-
nology
28. An active attack attempts to alter or de-
stroy the data being exchanged in the net- 34. algorithms, which use the same key for en-
work, thereby disrupting the normal func- cryption and decryption is called
tioning of the network A. symmetric key
A. Active B. Asymmetric key
B. passive C. both
C. both
D. none of them
D. none of them
35. BLE is introduced with Bluetooth 4.0
29. Which one of the IEEE 802 committees is
tasked with the development of securitys- A. True
tandards? B. False
A. 802.10
36. Here are the types of AdHoc networks ex-
B. 802.16 cept:
C. 802.15 A. CAFE
D. 802.11 B. WANET
30. Digital signatures schemes are also based C. MANET
on public key encryption. D. VANET
A. true
37. What are the components of a typical sen-
B. false
sor node in a WSN?
31. Expand ARAN? A. Sensors, limited computation, and
A. authenticated routing for adhoc net- wireless communication
works B. High power consumption, global ID,
B. authorized routing for adhoc netwoks and extensive computation
27. D 28. A 29. D 30. A 31. A 32. C 33. B 34. A 35. A 36. A 37. A
1.1 WIRELESS SENSOR NETWORKS 6
NARAYAN CHANGDER
B. Rime Network Stack
44. Encrypting messages through movement
C. Lime Network Stack of each letter a certain number of places
D. Rin Supreme Stack to the left in the alphabet
A. Cipher
39. A security protocol for ad hoc wireless net-
works should satisfy the following require- B. Key
ments. C. Policies
A. Confidentiality D. Strong Passwords
B. Integrity 45. Trying to access data by going through
C. Availability lists of possible passwords is called
D. All of them A. A Brute Force attack
B. Phishing
40. It help prevent attackers from monitoring
or recording traffic between resources and C. Blagging
computers. D. DOS attack
A. Data Encryption 46. Which of the following is/are essential
B. Firewall components of a sensor node?
C. Antivirus A. Sensing unit
D. none of above B. Processing unit
C. Transmitting unit
41. What is included in the quality of a Map-
D. All of the mentioned
based World Model (MWM)?
A. The ability to replace the physical 47. External attacks are carried out by nodes
world completely that do not belong to the network
B. The ability to reflect both the physical A. true
world and the network world B. false
C. Limitations in understanding situa- 48. Identify the features of TinyOS
tions and events in the real world
A. Completely non-blocking
D. Ability to reduce efficiency in the use
B. Programs are built out of software
of network resources
components
42. What is one of the challenges in designing C. Tasks are non-preemptive and run in
a WSN? FIFO order
A. Homogeneity of devices D. all the above
38. B 39. D 40. A 41. B 42. B 43. B 44. A 45. A 46. D 47. A 48. D
1.1 WIRELESS SENSOR NETWORKS 7
D. Energy is required in every small or 64. The power source can be classified into
large operation in any type of application. three categories, there are the three cat-
egories, except
59. Real-time scheduling allocates resources
to so that they can be finished early. A. Replenishable power resource
A. Less urgent tasks B. Non-Replenishable power source
B. More urgent tasks C. Regenerative power source
NARAYAN CHANGDER
A. Application 65. Feature of contiki are multitasking kernel,
B. Presentation screensaver
C. Data Link A. true
D. Physical B. false
61. What is the main idea behind the Rumor 66. The abbreviation “WSN” in the context of
Routing protocol? wireless sensor networks is:
A. Creating floods between events and A. Wireless Service Network
query floods
B. Wired Sensor Node
B. Using a centralized data naming
C. Web Security Notification
scheme
D. Wireless Sensor Network
C. Forming clusters to minimize energy
dissipation 67. Wireless Sensor Network consists of 3
D. Maintaining multiple paths between components including
source and destination A. software
62. How can the use of sleep scheduling help B. gateways
in improving energy efficiency in WSN?
C. protocol
A. By reducing the number of nodes in the
D. user
network
B. By using higher power consumption 68. Which of these is a benefit of cloud com-
modes for longer periods of time puting? (3-6)
C. By allowing nodes to enter low-power A. It can reduce costs for a company as
sleep modes when not in use, reducing they do not need to buy additional hard-
overall energy consumption. ware tostore data
D. By increasing the data transmission B. It is the cheapest option for a company
rate between nodes to store their data as they do not need to
pay forcloud computing
63. Components that function as an energy
source for the WSN system as a whole C. Data can be accessed anywhere as an
internet connect is not needed to access
A. Transceiver
dataand software stored in cloud comput-
B. Power source ing
C. Microcontroller D. Data will always be more secure in a
D. Power Supplay cloud computing system
69. What are some common problems in wire- 74. Which of these are Ad Hoc networks?
less networks?
79. Identify the sensor which are used in 84. Network Security provides authentication
smartphone and access control for resources.
A. Proximity sensor A. True
B. Gyro sensor B. False
C. Both a and b 85. What are the main components of a sensor
D. None of these node?
A. sensor, receiver, battery, processor
NARAYAN CHANGDER
80. Which one of the following is not a compo-
nent of sensor node B. sensor, microcontroller, transceiver,
power source
A. Microcontroller
C. actuator, circuit board, modem, solar
B. Transistor panel
C. External memory D. camera, memory, antenna, display
D. Power Source
86. On-Demand Routing Protocol examples
81. How can physical layer attacks affect the are follows, except
functioning of wireless sensor networks? A. AODV
A. By improving the transmission of B. DSR
data and communication between sensor C. TORA
nodes
D. LAR
B. By increasing the security of the sen-
sor nodes E. CGSR
C. By reducing the power consumption of 87. What is meant by “autonomy” in the con-
sensor nodes text of Wireless Sensor Network (WSN)
D. By disrupting the transmission of deployment?
data and communication between sensor A. Deployment of sensor nodes by users
nodes B. Automatic deployment of mobile nodes
based on objective function
82. What does OUI stand for?
C. Manual deployment of static nodes
A. organizationally unique identifier
D. Node deployment based on low-level
B. organization unicorn identity design
C. ominous ubiquitous inquiry
88. What does NIC stand for?
D. oreos under igloos
A. Network Interface Card
83. The medium access control (MAC) is a sub- B. Network Interconnect Card
layer Of
C. Network Interchange Card
A. data link layer
D. Network Integrated Card
B. network layer
89. TinyOS provides for common abstrac-
C. physical layer
tions such as packet communication, rout-
D. application layer ing, sensing, actuation and storage.
C. Low-powered WSN 105. What are the potential risks of not hav-
D. none of above ing fault tolerance in ad hoc wireless sen-
sor networks?
100. Which one of the following is the direct A. Increased data security
sensors
B. Enhanced network stability
A. Thermocouple
C. Improved communication reliability
B. Fiber optic displacement sensor
D. Potential risks include data loss, net-
NARAYAN CHANGDER
C. Both of them
work partitioning, and unreliable commu-
D. None of these nication.
101. What is meant by Transmitter? 106. Sensor Network is
A. Tools for moving and filtering informa- A. Heterogeneous system consisting of
tion tiny sensors
B. Ways to connect Source and Destina- B. Homogeneous system used in wire-
tion less
C. Signal receiving device from the Trans- C. Very important for security
mission System
D. All of the mentioned
D. Origin/sender of data
E. Purpose of sending data 107. What contains 4 pairs of wires that can
transmit and receive data?
102. Ad-hoc network to connect each computer A. UTP
using network topology
B. Physical layer
A. Three
C. Auxillary cables
B. Star
D. Coaxial cables
C. Mesh
D. Bus 108. A is used to separate a local network
from the outside world.
103. How would you describe the challenges
A. firewall
in wireless sensor networks to a friend?
B. antivirus
A. Energy efficiency, data security, net-
work scalability, and communication reli- C. gateway
ability D. none of them
B. Size of the sensors
109. Firewall is a software which works
C. Number of sensors in the network closely with a router program and filters
D. Color of the sensors A. true
104. Pick the Ad Hoc Network example. B. false
A. Tethering and personal hotspots. 110. Which of the following elements is most
B. Open WiFi likely to be an issue for Ping flood?
C. Personal Area Networks A. Confidentiality
D. Bluetooth B. Integrity
C. Availability C. Hybrid
D. Non-repudiation. D. Firmware
120. Which Bluetooth protocol performs link 125. Contiki OS is developed for
setup, authentication, link configuration, A. Internet of Things (IoT)
and the discovery of other Bluetooth de-
vices? B. Big Data
NARAYAN CHANGDER
D. SAY
be delivered to sensor or a st of sensors
121. In the context of mobile wireless net- A. true
works, what is the most appropriate ab-
B. false
breviation for mWSN?
A. Mobile Wireless Sensor Network 127. Why is self-organization considered a
key aspect of Wireless Sensor Networks
B. Managed Wireless Sensor Network
(WSN)?
C. Mobile Wireless Signal Network
A. Because it produces low scale
D. Mobile Wireless Service Network
B. Because it limits adaptability
122. allows the system to fall into low- C. Because it increases adaptability to
power sleep mode when no interesting changing conditions
events need to be processed.
D. Because it limits scalability
A. Event-driven exemption
128. are small amounts of information
B. Event-driven execution
used by the cryptographic algorithms.
C. Event-driven encapsulation
A. plaintext
D. Event-driven encryption
B. cipher text
123. Why is security important in ad hoc wire- C. Keys
less sensor networks?
D. none of them
A. To make the network slower and less
efficient 129. The following is an example of an appli-
cation in a wireless sensor network
B. To allow easy access for hackers and
unauthorized users A. Transportation
C. To protect sensitive data and prevent B. Agricultural sector
unauthorized access or tampering. C. a, b, c benar
D. To increase the risk of data breaches D. Environmental sensing
and security threats
130. One category of information that has
124. What is one of the future applications of a collection of information from different
wireless sensor networks? sensor nodes but no redundancy is called?
A. Controlling electrical devices in homes A. Atomic information
B. Monitoring weather patterns B. Replicated atomic information
C. Detecting earthquakes C. Combined information
D. Tracking space missions D. Separate information
141. What is the main objective of Wireless C. They are designed for different pur-
Sensor Network (WSN) as an event ser- poses.
vice? D. They both require a central control unit
A. Tracking Targets
146. What are the key design principles of the
B. Detecting Events gMAP approach?
C. Both of them A. Increase communication speed
D. There is no right answer B. Leveraging node mobility to transport
NARAYAN CHANGDER
messages and gather information in a
142. What are the potential consequences of delay-tolerant manner
a network layer attack in wireless sensor
networks? C. Reduces node mobility to save power
D. Schedule real-time message delivery
A. Data interception, unauthorized ac-
cess, and network congestion 147. How can application development for
B. Hardware failure, software corruption, wireless sensor networks contribute to
and data encryption solving real-world problems?
C. Firewall breach, server overload, and A. By increasing the cost of data collec-
software malfunction tion
D. Physical damage, power outage, and B. By making it harder to access real-
data loss world data
C. By causing more environmental dam-
143. What are some strategies for implement- age
ing fault tolerance in ad hoc wireless sen-
D. By enabling the collection, analysis,
sor networks?
and action based on data from the phys-
A. Static routing protocols ical world.
B. Data encryption 148. How do sensor nodes communicate in a
C. Single point of failure wireless sensor network?
D. Redundancy, error detection and cor- A. Infrared signals
rection, and dynamic routing protocols B. Bluetooth signals
144. Which phase of the LEACH protocol in- C. Ethernet cables
volves the selection of cluster heads? D. Radio frequency signals
A. Set-up phase 149. What problem can occur through using
B. Stabilization phase cloud computing? (3-6)
C. Both set-up and stabilization phases A. There can be privacy and security is-
sues
D. Neither set-up nor stabilization phase
B. More hardware needs to be added to
145. In what ways are wireless sensor net- a company network to store data
works different from ad hoc networks?
C. Only a small amount of data can be
A. They have the same range of coverage stored
B. They use the same type of communica- D. Only a small amount of software can
tion protocols be stored
154. What are three lack of this simple ap- 160. The advantages of a network topology
proach cause to be lacking as a protocol using a wireless router are
for sensor network A. Cheaper
A. Resource Blindness B. Simpler
B. Implosion C. More complicated
C. Overlap D. More expensive
D. none of above
161. Tossim is which is mostly deployed,
155. Interfaces are and contain both designed for testing WSN Protocols
A. Bidirectional, commands and events A. Discrete event simulator
B. Unidirectional, commands and events B. Dynamic event simulator
NARAYAN CHANGDER
D. Reliability, high cost, and low coverage
171. which type of authentication is least se- A. Exploiting vulnerabilities in the commu-
cure nication between sensor nodes and the
data link layer protocols
NARAYAN CHANGDER
B. Energy conservation-A big challenge. C. Unlimited storage capacity
C. Distributed Energy-Efficient Clustering D. Reduced node failure rate
Algorithms.
187. Which one of the following is not the fea-
D. Multi-hop routing protocol. tures of WSN
182. What are sets of clearly defined rules, A. In WSN the data moves from many
regulations, standards, and procedures nodes to the Gateway
that enable hardware and software de-
B. No unique id is used in the network
velopers to make devices and applica-
tions that function properly at a particular C. Unique id is used in the network
layer?
D. None of these
A. Protocol
B. TCP/IP 188. Name one example of an application that
can be developed for a wireless sensor net-
C. Networks work.
D. Interconnection
A. Online shopping app
183. How to extend the life of the network? B. Environmental monitoring
A. Grouping consumes a lot of energy. C. Video streaming service
B. Cluster head failure is a problem.
D. Social media platform
C. Shortest path routing.
D. Better combination of DEEC Clustering 189. WSN concept is the network of devices
and Multi hop. that connected together in order to share
and gather information
184. What does “MWM” mean?
A. True
A. Multi-World Model
B. False
B. Map World Model
C. Map-based World Model 190. The process of distributing keys to all in-
terested parties before the start of com-
D. Multi-User World Model
munication is called
185. Path planning in the gMAP approach in- A. key transport
volves the following steps, except:
B. key predistribution
A. Find the appropriate breakpoint
C. key arbitration
B. Reduce Overlap in communication
range D. key agreement
NARAYAN CHANGDER
A. Temperature monitoring for automatic
A. The amount of time data takes to travel
AC settings
from the source to the destination
B. Providing automatic on and off times
B. The maximum rate that data can be
for wood carving machines
transferred at
C. Wireless network settings at 20% C. The number of errors that are found in
D. Automatic shutdown of water irriga- a data packet after transmission
tion D. The route a packet takes when it is be-
ing transmitted
203. What is layer 3 of the OSI model?
208. TinyOS is designed to support re-
A. Transport
quired by the networked sensors
B. Network A. concurrency intensive operations
C. Data Link B. Nonconcurrency intensive operations
D. Physical C. Both a and b
A. A network of spatially distributed sen- 209. Block delivery problem, a finite data
sors that communicate wirelessly blocking comprising multiple packets must
be delivered to sensor or a st of sensors
B. A network of sensors that communi-
cate through carrier pigeons A. True
NARAYAN CHANGDER
B. Wireless time or battery replacements.
B. To prolong the network lifetime and
223. To strengthen the signal by receiving a
reduce the need for frequent battery re-
signal from a network segment and then
placements.
retransmitting it with the same strength
as the original signal on a different cable C. To increase the network lifetime and
segment, you can use require more frequent battery replace-
ments.
A. base transceiver
D. To decrease the network lifetime and
B. bridge increase the need for frequent battery re-
C. repeater placements.
D. mobile center 229. What is layer 2 of the OSI model?
E. Network Interface Card (NIC) A. Transport
224. IEEE 802.15.3 is faster than IEEE 802.15. B. Network
A. True C. Data Link
D. Physical
B. False
230. Explain the concept of node-level simula-
225. Which multiple access technique is used
tors.
by IEEE 802.11 standard for wireless
LAN? A. Node-level simulators simulate the be-
havior and interactions of individual nodes
A. CDMA in a network.
B. CSMA/CA B. Node-level simulators simulate the
C. Aloha movement of celestial bodies in space.
D. Non of the mentioned C. Node-level simulators simulate the
weather patterns in a specific area.
226. The full form of SSL is
D. Node-level simulators simulate the be-
A. Serial Session Layer havior of individual animals in a forest.
B. Secure Socket Layer 231. security protocol for ad hoc wireless is a
C. Session Secure Layer very challenging because of
D. Series Socket Layer A. shared broadcast radio channel
B. insecure operatingenvironment
227. A compromised node may leak confiden-
tial or important information to unautho- C. lack of central authority
rized nodes in the network is called D. All of them
232. Select the drawbacks of an Ad Hoc Net- C. By providing simulation tools and mod-
work els for performance analysis.
B. multi access control 241. Which one of the following is not the
C. media account control properties of leach protocol
243. internal attacks are more severe and dif- 248. A wireless access mode that has clients
ficult to detect when compared to external communicate with each other without the
attacks user of a wireless access point.
A. true A. decentralized LAN
B. false B. ad-hoc mode
C. wireless mesh
244. An algorithm in encryption is called
D. none of above
NARAYAN CHANGDER
249. Sending requests to a single server using
hijacked machines is an example of [1-
3]
A. Phishing
A. Algorithm B. DDOS
B. Procedure C. Worm
C. Cipher D. Virus
D. Module 250. What are the advantages of using energy
harvesting techniques in WSN?
245. The sensor that requires the external
power source for their functioning A. No impact on the lifespan of sensor
nodes
A. Resistive
B. Making the network less sustainable
B. Piezo electric crystal
C. Increasing the cost of sensor nodes
C. Both resistive and pieso electric crys- D. Prolonging the lifespan of sensor
tal nodes, reducing the need for battery re-
D. None placement, and making the network more
sustainable
246. Which technology is used in wireless sen-
sor networks? 251. Which of these is a benefit of virtual net-
work? (6-9)
A. Embedded systems
A. They have a higher level of security
B. Artificial intelligence than other remote connections
C. Virtual reality B. There is no need for any hardware to
D. Blockchain connect a computer to a network
C. There is no need for any software to
247. a malicious node tries to consume/waste connect a computer to a network
away resources of other nodes present in
the network. D. They stop any errors occurring in the
transmission of data in a network
A. Byzantine attack
252. What is one way to ensure security in an
B. Information disclosure
ad hoc wireless sensor network?
C. Blackhole attack
A. Leave the network open and unse-
D. Resource consumption attack cured
B. Share all network information publicly 257. What is layer 6 of the OSI model?
C. Use encryption and authentication pro- A. Spooky
B. the source node at all times A. Data sent to a device in a constant flow
when on the internet
C. neighbor nodes only at all times
B. Throwing your tablet into a river.
D. every node at all times
C. Ad Hoc networks communicating to ea-
254. What are the three computational ab- chother.
stractions
D. 5 computers or more connected to a
A. Commands, control, communication traditional network.
B. Commands, events, tasks
259. Most key agreement schemes are based
C. Control, communication, tasks on asymmetric key algorithms
D. Control, capacity, tasks A. YES
255. Which is not a cause for undesired energy B. NO
wastage in WSNs?
260. Symmetric key algorithms donot rely on
A. Sensing of events
the presence of the shared key at both the
B. Idle listening sender and receiver.
C. Overhearing in case of densely de- A. true
ployed sensor networks
B. false
D. Collision of transmitted frames
261. Components that function as additional
256. The data sent by the source node should
memory for the WSN system
reach the destination node as it was sent
or unaltered is called A. Transceiver
A. Confidentiality B. Power source
B. Integrity C. Microcontroller
C. Availability D. Sensor
D. Non-repudiation E. Eksternal memory