Description : The collection of data is achieved with ________ changes. A. Intelligence B. Connectivity C. Dynamic Nature D. Enormous Scale
Last Answer : C. Dynamic Nature
Description : ________ in IoT as one of the key characteristics, devices have different hardware platforms and networks. A. Sensors B. Heterogeneity C. Security D. Connectivity
Last Answer : B. Heterogeneity
Description : The number of devices that need to be managed and that communicate with each other will be much larger. A. Intelligence B. Connectivity C. Dynamic Nature D. Enormous Scale
Last Answer : D. Enormous Scale
Description : ________ empowers IoT by bringing together everyday objects. A. Intelligence B. Connectivity C. Dynamic Nature D. Enormous Scale
Last Answer : B. Connectivity
Description : Which characteristics involve the facility the thing to respond in an intelligent way to a particular situation? A. Intelligence B. Connectivity C. Dynamic Nature D. Enormous Scale
Last Answer : A. Intelligence
Description : ____________ refers to establish a proper connection between all the things of IOT. A. Connectivity B. Analyzing C. Sensing D. Active Engagement
Last Answer : A. Connectivity
Description : ____ is a transformative computing paradigm that involves delivering applications and services over the internet. A. WSN B. Cloud Computing C. Big Data D. None of above
Last Answer : B. Cloud Computing
Description : The process of collecting, organizing and collecting large sets of data called as A. WSN B. Cloud Computing C. Big Data D. None of above
Last Answer : C. Big Data
Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : A. 1. True, 2. false, 3. true
Description : Which of the following is (are) example(s) of embedded system for data communication? USB Mass Storage device A. Network router B. Digital camera C. Music player D. All of these E. None of these
Last Answer : B. Digital camera
Description : What do you mean by cloud in cloud computing? A. Data exchanged among grid nodes. B. Provides tools to monitor and distribute the number of licenses. C. Provides logical view of data. D. Set of hardware, software, network, storage, services and interfaces.
Last Answer : Set of hardware, software, network, storage, services and interfaces.
Description : Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned
Last Answer : All of the mentioned
Description : .Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned
Description : Interconnection of Internet and computing devices embedded in everyday objects, enabling them to send and receive data is called_____________ A. Internet of Things B. Network Interconnection C. Object Determination D. None of these
Last Answer : A. Internet of Things
Description : _________ is a cloud computing service model in which hardware is virtualized in the cloud. A. IaaS B. CaaS C. PaaS D. None of the mentioned
Last Answer : A. IaaS
Description : _________ as a Service is a cloud computing infrastructure that creates a development environment upon which applications may be build. A. Infrastructure B. Service C. Platform D. All of the mentioned
Last Answer : C. Platform
Description : Benefit of cloud computing services A. Fast B. Anywhere access C. Higher utilization D. All of the above
Last Answer : D. All of the above
Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.
Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic
Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.
Last Answer : Illegal access to private data stored by applications in the cloud.
Description : Which of the following is an (are) example(s) of an embedded system for signal processing? A. Apple iPOD (media player device) B. SanDisk USB mass storage device C. Both (A) and (B) D. None of these
Last Answer : D. None of these
Description : MQTT is: a. Based on client-server architecture b. Based on publish-subscribe architecture c. Based on both of the above d. Based on none of the above
Last Answer : b. Based on publish-subscribe architecture
Description : ___ is an open source electronic platform based on easy to used hardware and software. A. Arduino B. Uno C. Raspberry Pi D. Node
Last Answer : A. Arduino
Description : Zigbee specification are based on ______. A. 802.3 B. 802.11 C. 802.16 D. 802.15.4
Last Answer : D. 802.15.4
Description : Security based connection is provided by which layer? A. Application layer B. Transport layer C. Session layer D. Network layer
Last Answer : D. Network layer
Description : MQTT is: A. Based on client-server architecture B. Based on publish-subscribe architecture C. Based on both of the above D. Based on none of the above
Last Answer : B. Based on publish-subscribe architecture
Description : CoAP is specialized in ___________ A. Internet applications B. Device applications C. Wireless applications D. Wired applications
Last Answer : A. Internet applications
Description : MQTT is _________ protocol. A. Machine to Machine B. Internet of Things C. Machine to Machine and Internet of Things D. Machine Things
Last Answer : C. Machine to Machine and Internet of Things
Description : IIOT stands for A. Information Internet of Things B. Industrial Internet of Things C. Inovative Internet of Things D. None of above
Last Answer : B. Industrial Internet of Things
Description : _____ devices may support a number of interoperable communication protocols and communicate with other device and also with infrastructure. A. Artificial Intelligence B. Machine Learning C. Internet of Things D. None of above
Last Answer : C. Internet of Things
Description : _____________ is a computing concept that describes the idea of everyday physical objects being connected to the internet. A. IOT (Internet of Things) B. MQTT C. COAP D. SPI
Last Answer : A. IOT (Internet of Things)
Description : The huge numbers of devices connected to the Internet of Things have to communicate automatically, not via humans, what is this called? A. Bot to Bot(B2B) B. Machine to Machine(M2M) C. InterCloud D. Skynet
Last Answer : B. Machine to Machine(M2M)
Description : Term "the Internet of things" was coined by A. Edward L. Schneider B. Kevin Ashton C. John H. D. Charles Anthony
Last Answer : B. Kevin Ashton
Description : _____________ consists of servers, storage devices, network, cloud management software, deployment software, and platform virtualization. A. Computing Planning B. Cloud infrastructure C. Cloud Computing Technologies D. Cloud Computing Architecture
Last Answer : Cloud infrastructure
Description : Which is the part of Data Link Layer: a. LLC b. MAC c. Both a and b d. None of these
Last Answer : c. Both a and b
Description : Which one out of these is not a data link layer technology: a. Bluetooth b. UART c. WIFI d. HTTP
Last Answer : d. HTTP
Description : Properties of IoT devices. A. Sense B. Send and receive data C. Both A and B D. None of above
Last Answer : C. Both A and B
Description : ____ is a data-centric middleware standard for device-to-device and machine-to-machine communication. A. Data Distribution Serviced (DDS) B. Advance Message Queuing Protocol (AMQP) C. Extensible Messaging and Presence Protocol (XMPP) D. Message Queue Telemetry Transport (MQTT)
Last Answer : A. Data Distribution Serviced (DDS)
Description : Transport layer receives data in the form of? A. Packets B. Byte streams C. Bits stream D. both packet and Byte stream
Last Answer : B. Byte streams
Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes
Last Answer : A. Checksum
Description : Data in network layer is transferred in the form of ____________ A. Layers B. Packets C. Bytes D. Bits
Last Answer : B. Packets
Description : XMPP creates _________ identity. A. Device B. Email C. Message D. Data
Last Answer : A. Device
Description : MQTT is better than HTTP for sending and receiving data. A. True B. False
Last Answer : A. True
Description : Which one out of these is not a data link layer technology? A. Bluetooth B. UART C. Wi-Fi D. HTTP
Last Answer : D. HTTP
Description : ______________ is useful for time-sensitive application that have very small data units to exchange and do not want the overhead of connection setup. A. TCP B. UDP C. Transport layer D. None of the above.
Last Answer : B. UDP
Description : IEEE 802.11 standards provide data rates ______________ A. 10 Gbit/s. B. 1 Gbit/s C. 1 Mb/s to up to 6.75 Gb/s D. 250 Kb/s
Last Answer : C. 1 Mb/s to up to 6.75 Gb/s
Description : The ___ protocols define how the applications interface with the lower layer protocol to send the data over the network. A. Application layer B. Transport layer C. Network layer D. Link layer
Last Answer : A. Application layer
Description : _____________ layer protocols determine how the data is physically sent over the network’s physical layer or medium. A. Application layer B. Transport layer C. Network layer D. Link layer
Last Answer : D. Link layer
Description : Harvard architecture allows: A. Separate program and data memory B. Pipe-ling C. Complex architecture D. All of the mentioned
Last Answer : D. All of the mentioned
Description : Which architecture provides separate buses for program and data memory? A. Harvard architecture B. Von Neumann architecture C. None of the mentioned D. All of the mentioned
Last Answer : A. Harvard architecture
Description : A digital multi meter is an example of an embedded system for A. Data communication B. Monitoring C. Control D. All of these E. None of these
Last Answer : B. Monitoring