MQTT is better than HTTP for sending and receiving data.
A. True
B. False

1 Answer

Answer :

A. True

Related questions

Description : MQTT is _________ protocol. a) Machine to Machine b) Internet of Things c) Machine to Machine and Internet of Things d) Machine things

Last Answer : c) Machine to Machine and Internet of Things

Description : MQTT is better than HTTP for sending and receiving data. A. True B. False

Last Answer : A. True 

Description : Which protocol is lightweight? A. MQTT B. HTTP C. CoAP D. SPI

Last Answer : A. MQTT

Description : Which protocol is lightweight? a) MQTT b) HTTP c) CoAP

Last Answer : a) MQTT

Description : Which protocol has a quality of service? A. XMPP B. HTTP C. CoAP D. MQTT

Last Answer :  A. XMPP  

Description : Which protocol is lightweight? A. MQTT B. HTTP C. CoAP D. SPI

Last Answer :  A. MQTT 

Description : ___________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP resources. A. HTTP B. COAP C. WebSocket D. MQTT

Last Answer : A. HTTP 

Description : ADSL gives: a) Faster downloading speeds (receiving) than uploading speeds (sending) b) Slower downloading speeds (receiving) than uploading speeds (sending) c) Same downloading speeds (receiving) as uploading speeds (sending) d) None of These

Last Answer : a) Faster downloading speeds (receiving) than uploading speeds (sending)

Description : Have you ever said something to someone if they were sending and receiving texts while you were trying to have a conversation with them?

Last Answer : I tell them when they’re done we can resume our conversation and walk away. They got miffed, but didn’t do it again.

Description : What is the etiquette on sending thank you cards for receiving sympathy cards for the death of a loved one?

Last Answer : You can usually get away with none, maybe a thanks at the funeral. Most people send mass cards, and in all cases the recipients know that you know that their thoughts are with you. Am really sorry for your loss.

Description : Identify the software that helps you in sending and receiving an E_mail: (a) MS_Office (b) Internet Explorer -Technology

Last Answer : (c) MS-Outlook is preferred E-mail client which is used for sending or receiving an E-mail.

Description : E_mail is the process of sending and receiving messages ………… . -Technology

Last Answer : E-mail is the process of sending and receiving messageselectronically.

Description : If sending end voltage is Vs at no-load in a transmission line then receiving end voltage is if ABCD parameters of line is given a) Vs b) Vs/A c) 0 d) Infinity

Last Answer : Ans: Vs/A

Description : The power transmitted will be maximum when (a) corona losses are minimum (b) reactance is high (c) sending end voltage is more (d) receiving end voltage is more

Last Answer : (c) sending end voltage is more

Description : The sending end and receiving end voltages of a three-phase transmission line are 10 kV/ph and 9.5 kV/ph, respectively. If the resistance drop is 150 V/ph and receiving end power factor is 0.8, the sending end power factor is (A) 0.745 lagging (B) 0.775 lagging (C) 0.8 lagging (D) 0.85 lagging

Last Answer : Vscos¢s-Vrcos¢r=IR

Description : For a short line if the receiving end voltage is equal to the sending end voltage under loaded conditions: a) the sending end power factor is unity b) the receiving -end power factor is unity c) the sending-end power factor is leading d) the receiving end power factor is leading

Last Answer : For a short line if the receiving end voltage is equal to the sending end voltage under loaded conditions: the receiving end power factor is leading

Description : Determine the transformer tap ratios when the receiving end voltage is equal to the sending end voltage, the high voltage line operates at 220 kV and transmit 80 MW at 0.8 pf and the impedance of the line is (40+j140)ohm. Assume tstr=1.0  (A) 0.8 (B) 0.9 (C) 0.7 (D) 0.6 

Last Answer : 0.9 explanation given vs=vr convert in to phase voltage because impedence is always in phase line 220/root 3 then divided by reactive part that is 140 127.01/140=0.9 ans

Description : MQTT is: A. Based on client-server architecture B. Based on publish-subscribe architecture C. Based on both of the above D. Based on none of the above

Last Answer : B. Based on publish-subscribe architecture

Description : MQTT is _________ protocol. A. Machine to Machine B. Internet of Things C. Machine to Machine and Internet of Things D. Machine Things

Last Answer : C. Machine to Machine and Internet of Things

Description : MQTT stands for _____________ A. MQ Telemetry Things B. MQ Transport Telemetry C. MQ Transport Things D. MQ Telemetry Transport

Last Answer : D. MQ Telemetry Transport

Description : MQTT stands for _____________ a) MQ Telemetry Things b) MQ Transport Telemetry c) MQ Transport Things d) MQ Telemetry Transport

Last Answer : d) MQ Telemetry Transport

Description : ____ is a data-centric middleware standard for device-to-device and machine-to-machine communication. A. Data Distribution Serviced (DDS) B. Advance Message Queuing Protocol (AMQP) C. Extensible Messaging and Presence Protocol (XMPP) D. Message Queue Telemetry Transport (MQTT)

Last Answer : A. Data Distribution Serviced (DDS) 

Description : hich one out of these is not a data link layer technology:- a) Bluetooth b) UART c) WiFi d) HTTP

Last Answer : d) HTTP

Description : A term related to sending data to a satellite is _____: a) down link b) modulate c) demodulate d) up link e) interrelate

Last Answer : d) up link

Description : MQTT is: a. Based on client-server architecture b. Based on publish-subscribe architecture c. Based on both of the above d. Based on none of the above

Last Answer : b. Based on publish-subscribe architecture

Description : MQTT is: A. Based on client-server architecture B. Based on publish-subscribe architecture C. Based on both of the above D. Based on none of the above

Last Answer : B. Based on publish-subscribe architecture 

Description : MQTT is _________ protocol. A. Machine to Machine B. Internet of Things C. Machine to Machine and Internet of Things D. Machine Things

Last Answer : C. Machine to Machine and Internet of Things 

Description : MQTT stands for _____________ A. MQ Telemetry Things B. MQ Transport Telemetry C. MQ Transport Things D. MQ Telemetry Transport

Last Answer : D. MQ Telemetry Transport 

Description : ______ consists of communication protocols for electronic devices, typically a mobile device and a standard device. A. RFID B. MQTT C. NFC D. None of above

Last Answer : C. NFC 

Description : _____________ is a computing concept that describes the idea of everyday physical objects being connected to the internet. A. IOT (Internet of Things) B. MQTT C. COAP D. SPI

Last Answer : A. IOT (Internet of Things) 

Description : The W3C is the chief standards body for: a) HTTP b) HTML c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which of the following is not a internet protocol: a) STP b) HTTP c) FTP d) None of These

Last Answer : a) STP

Description : ............. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie

Last Answer : C) cookie

Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP

Last Answer : A) Telnet

Description : HTTP expands? A. Hyper Text Transfer Protocol B. Hyper Terminal Transfer Protocol C. Hyper Text Terminal Protoco

Last Answer : A. Hyper Text Transfer Protocol

Description : . What does HTTP do? A. Enables network resources and reduces perception of latency B. Reduces perception of latency and allows multiple concurrency exchange C. Allows multiple concurrent ... D. Enables network resources and reduces perception of latency and Allows multiple concurrent exchange.

Last Answer : D. Enables network resources and reduces perception of latency and Allows multiple concurrent exchange.

Description : . Which attack is an HTTP attack which allows attackers to access restricted directories and execute commands outside the web servers root directory? a. XSS attack b. Path Traversal attack c. MITM attack d. SQL Injection attack

Last Answer : d. SQL Injection attack

Description : What protocol is the Active Directory database based on? a. LDAP b. TCP c. SQL d. HTTP

Last Answer : d. HTTP

Description : _________ allows us to control electronic components a) RETful API b) RESTful API c) HTTP

Last Answer : a) RETful API

Description : Which among the following standard protocols is the most widely used by the Internet ? (1) HTTP (2) TCP/IP (3) SMTP (4) SLIP

Last Answer : TCP/IP

Description : Correct expansion of the term ‘http’ in Internet address is (1) higher text transfer protocol (2) higher transfer text protocol (3) hybrid text transfer protocol (4) hypertext transfer protocol

Last Answer : hypertext transfer protocol

Description : Who proposes data management using HTTP ?

Last Answer : Tim Barnes Ltd. offers data management using HTTP.

Description : HTTP is ________ protocol. a) application layer b) transport layer c) network layer d) data link layer

Last Answer : a) application layer

Description : Which one out of these is not a data link layer technology: a. Bluetooth b. UART c. WIFI d. HTTP

Last Answer : d. HTTP

Description : Which one out of these is not a data link layer technology? A. Bluetooth B. UART C. Wi-Fi D. HTTP

Last Answer : D. HTTP 

Description : The national agency mandated to control, analyse and disseminate Suspicious Transaction Reports(STR), Cash Transaction Reports and counterfeit currency reports to various investigative agencies of the country after ... (IB) D. Central Bureau of Investigation(CBI) E. Central Intelligence Unit(CIU)

Last Answer : B. Financial Intelligence Unit(FIU) Explanation: The FIU is the national agency mandated to collect, analyse and disseminate Suspicious Transaction Reports (STRs), Cash Transaction Reports ... country after receiving it from banks and other financial intermediaries under a stipulated mechanism.

Description : Avalanche photodiode receivers candetect hits of transmitted databy receiving A. 100 photons B. 200 photons C. 300 photons D. 400 photons E. None of the above

Last Answer : 200 photons

Description : The process of a computer receiving information form a server on the Internet is known as a) Pulling b) Pushing c) Downloading d) Transfering e) None of these

Last Answer : c) Downloading

Description : The process of a computer receiving information from a server via Internet is known as:  (A) Uploading (B) Retrieving (C) Downloading (D) All of the above

Last Answer : The process of a computer receiving information from a server via Internet is known as: Downloading 

Description : The output unit coverts the data entered by the user into computer understandable form. a) True b) False

Last Answer : Answer: b Explanation: The Output unit is responsible for converting the computer obtained data into user understandable format. The Input Unit is responsible for converting the data in computer understandable format