The sensed data communicated ___________________. A. Cloud-based servers/storage. B. I/O interfaces. C. Internet connectivity. D. None of the above

1 Answer

Answer :

A. Cloud-based servers/storage. 

Related questions

Description : The collection of data is achieved with ________ changes. A. Intelligence B. Connectivity C. Dynamic Nature D. Enormous Scale

Last Answer : C. Dynamic Nature 

Description :  ________ in IoT as one of the key characteristics, devices have different hardware platforms and networks. A. Sensors B. Heterogeneity C. Security D. Connectivity

Last Answer : B. Heterogeneity 

Description : The number of devices that need to be managed and that communicate with each other will be much larger. A. Intelligence B. Connectivity C. Dynamic Nature D. Enormous Scale

Last Answer : D. Enormous Scale 

Description :  ________ empowers IoT by bringing together everyday objects. A. Intelligence B. Connectivity C. Dynamic Nature D. Enormous Scale

Last Answer : B. Connectivity 

Description : Which characteristics involve the facility the thing to respond in an intelligent way to a particular situation? A. Intelligence B. Connectivity C. Dynamic Nature D. Enormous Scale 

Last Answer : A. Intelligence 

Description : ____________ refers to establish a proper connection between all the things of IOT. A. Connectivity B. Analyzing C. Sensing D. Active Engagement

Last Answer : A. Connectivity 

Description : ____ is a transformative computing paradigm that involves delivering applications and services over the internet. A. WSN B. Cloud Computing C. Big Data D. None of above

Last Answer : B. Cloud Computing 

Description : The process of collecting, organizing and collecting large sets of data called as A. WSN B. Cloud Computing C. Big Data D. None of above

Last Answer : C. Big Data 

Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. false, 3. true

Description : Which of the following is (are) example(s) of embedded system for data communication? USB Mass Storage device A. Network router B. Digital camera C. Music player D. All of these E. None of these

Last Answer : B. Digital camera 

Description : What do you mean by cloud in cloud computing? A. Data exchanged among grid nodes. B. Provides tools to monitor and distribute the number of licenses. C. Provides logical view of data. D. Set of hardware, software, network, storage, services and interfaces.

Last Answer : Set of hardware, software, network, storage, services and interfaces.

Description : Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned

Last Answer : All of the mentioned

Description : .Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned

Last Answer : All of the mentioned

Description : Interconnection of Internet and computing devices embedded in everyday objects, enabling them to send and receive data is called_____________ A. Internet of Things B. Network Interconnection C. Object Determination D. None of these 

Last Answer : A. Internet of Things 

Description :  _________ is a cloud computing service model in which hardware is virtualized in the cloud. A. IaaS B. CaaS C. PaaS D. None of the mentioned

Last Answer : A. IaaS 

Description :  _________ as a Service is a cloud computing infrastructure that creates a development environment upon which applications may be build. A. Infrastructure B. Service C. Platform D. All of the mentioned

Last Answer : C. Platform 

Description : Benefit of cloud computing services A. Fast B. Anywhere access C. Higher utilization D. All of the above

Last Answer : D. All of the above 

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.

Last Answer : Illegal access to private data stored by applications in the cloud.

Description : Which of the following is an (are) example(s) of an embedded system for signal processing? A. Apple iPOD (media player device) B. SanDisk USB mass storage device C. Both (A) and (B) D. None of these

Last Answer : D. None of these 

Description : MQTT is: a. Based on client-server architecture b. Based on publish-subscribe architecture c. Based on both of the above d. Based on none of the above

Last Answer : b. Based on publish-subscribe architecture

Description :  ___ is an open source electronic platform based on easy to used hardware and software. A. Arduino B. Uno C. Raspberry Pi D. Node

Last Answer : A. Arduino 

Description : Zigbee specification are based on ______. A. 802.3 B. 802.11 C. 802.16 D. 802.15.4

Last Answer : D. 802.15.4 

Description : Security based connection is provided by which layer? A. Application layer B. Transport layer C. Session layer D. Network layer

Last Answer : D. Network layer 

Description : MQTT is: A. Based on client-server architecture B. Based on publish-subscribe architecture C. Based on both of the above D. Based on none of the above

Last Answer : B. Based on publish-subscribe architecture 

Description : CoAP is specialized in ___________ A. Internet applications B. Device applications C. Wireless applications D. Wired applications

Last Answer : A. Internet applications 

Description : MQTT is _________ protocol. A. Machine to Machine B. Internet of Things C. Machine to Machine and Internet of Things D. Machine Things

Last Answer : C. Machine to Machine and Internet of Things 

Description : IIOT stands for A. Information Internet of Things B. Industrial Internet of Things C. Inovative Internet of Things D. None of above

Last Answer : B. Industrial Internet of Things 

Description : _____ devices may support a number of interoperable communication protocols and communicate with other device and also with infrastructure. A. Artificial Intelligence B. Machine Learning C. Internet of Things D. None of above

Last Answer : C. Internet of Things 

Description : _____________ is a computing concept that describes the idea of everyday physical objects being connected to the internet. A. IOT (Internet of Things) B. MQTT C. COAP D. SPI

Last Answer : A. IOT (Internet of Things) 

Description : The huge numbers of devices connected to the Internet of Things have to communicate automatically, not via humans, what is this called? A. Bot to Bot(B2B) B. Machine to Machine(M2M) C. InterCloud D. Skynet 

Last Answer : B. Machine to Machine(M2M) 

Description : Term "the Internet of things" was coined by A. Edward L. Schneider B. Kevin Ashton C. John H. D. Charles Anthony

Last Answer : B. Kevin Ashton 

Description : _____________ consists of servers, storage devices, network, cloud management software, deployment software, and platform virtualization. A. Computing Planning B. Cloud infrastructure C. Cloud Computing Technologies D. Cloud Computing Architecture

Last Answer : Cloud infrastructure

Description : Which is the part of Data Link Layer: a. LLC b. MAC c. Both a and b d. None of these

Last Answer : c. Both a and b

Description : Which one out of these is not a data link layer technology: a. Bluetooth b. UART c. WIFI d. HTTP

Last Answer : d. HTTP

Description : Properties of IoT devices. A. Sense B. Send and receive data C. Both A and B D. None of above

Last Answer : C. Both A and B  

Description : ____ is a data-centric middleware standard for device-to-device and machine-to-machine communication. A. Data Distribution Serviced (DDS) B. Advance Message Queuing Protocol (AMQP) C. Extensible Messaging and Presence Protocol (XMPP) D. Message Queue Telemetry Transport (MQTT)

Last Answer : A. Data Distribution Serviced (DDS) 

Description : Transport layer receives data in the form of? A. Packets B. Byte streams C. Bits stream D. both packet and Byte stream

Last Answer : B. Byte streams 

Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes

Last Answer : A. Checksum 

Description : Data in network layer is transferred in the form of ____________ A. Layers B. Packets C. Bytes D. Bits

Last Answer : B. Packets 

Description : XMPP creates _________ identity. A. Device B. Email C. Message D. Data

Last Answer : A. Device 

Description : MQTT is better than HTTP for sending and receiving data. A. True B. False

Last Answer : A. True 

Description : Which one out of these is not a data link layer technology? A. Bluetooth B. UART C. Wi-Fi D. HTTP

Last Answer : D. HTTP 

Description : ______________ is useful for time-sensitive application that have very small data units to exchange and do not want the overhead of connection setup. A. TCP B. UDP C. Transport layer D. None of the above.

Last Answer : B. UDP 

Description : IEEE 802.11 standards provide data rates ______________ A. 10 Gbit/s. B. 1 Gbit/s C. 1 Mb/s to up to 6.75 Gb/s D. 250 Kb/s

Last Answer : C. 1 Mb/s to up to 6.75 Gb/s 

Description : The ___ protocols define how the applications interface with the lower layer protocol to send the data over the network. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : A. Application layer 

Description : _____________ layer protocols determine how the data is physically sent over the network’s physical layer or medium. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : D. Link layer 

Description : Harvard architecture allows: A. Separate program and data memory B. Pipe-ling C. Complex architecture D. All of the mentioned

Last Answer : D. All of the mentioned 

Description : Which architecture provides separate buses for program and data memory? A. Harvard architecture B. Von Neumann architecture C. None of the mentioned D. All of the mentioned

Last Answer : A. Harvard architecture 

Description : A digital multi meter is an example of an embedded system for A. Data communication B. Monitoring C. Control D. All of these E. None of these

Last Answer : B. Monitoring