IOT-MCQ
1. What is the java extension file in IoT?
a) .jar
b) .c
c) .exe
d) .py
View Answer
Answer: a
Explanation: Java IDE to run the example in any computer or build .jar file with all the dependencies
included and launch it any computer or devices that you want to use as the MQTT client with a
command similar to the following line.
2. Do we run our program in the same computer where we have written?
a) True
b) False
c) May or may not
d) Cannot be determined
View Answer
Answer: c
Explanation: In case you don’t run the example in the same computer in which you are running the
MQTT server, remember to change the value for the mqttServerHost string in the main method of the
Main class.
3. Publish command message is sent from _________
a) Only publisher to broker
b) Only broker to publisher
c) Publisher to broker and broker to publisher
d) Server to client
View Answer
Answer: c
Explanation: The public command message is sent from a publisher to a broker or from a broker to a
subscriber, to publish information on a specified topic or topics.
4. The message is sent to the input queue of a message flow that contains a _________
a) Subscriber
b) Server
c) Publication node
d) Client
View Answer
Answer: d
Explanation: Message is sent to the input queue of a message flow that contains a publishing node.
Authority to put a message into the queue and to publish on the specified topic.
5. Does user has authority for all topics.
a) True
b) False
View Answer
Answer: b
Explanation: If the user has no authority on topic a warning response will come which indicates which
are not published, if not those topics are published.
6. ROSTOPIC uses _________ at the command line for representing the content of the message.
a) YAML_syntax
b) rostopic bw
c) rostopic delay
d) rostopic echo
View Answer
Answer: a
Explanation: ROSTOPIC uses YAML_syntax at the command line for representing the content of the
message. For information on how to use this YAML syntax for commands like rostopic pub.
7. Which command displays the band width?
a) rostopic hz
b) rostopic delay
c) rostopic echo
d) rostopic bw
View Answer
Answer: d
Explanation: Rostopic bw displays the bandwidth. The bandwidth reported is the received bandwidth. If
there are network connectivity issues or rostopic cannot keep up with the publisher.
8. rostopic delay will provide delay for ___________
a) Topics which has header
b) Topics which has tail
c) Topics which has tail and head
d) To all topics
View Answer
Answer: a
Explanation: Rostopic delay display the delay for topic which has header. Rostopic is implemented in
python.
9. Which command displays messages published to a topic?
a) rostopic bw
b) rostopic delay
c) rostopic echo
d) rostopic hz
View Answer
Answer: c
Explanation: Rostopic echo displays messages published to a topic. Rostopic is implemented in python.
10. Which command finds out the topic?
a) rostopic bw
b) rostopic delay
c) rostopic echo
d) rostopic find
View Answer
Answer: d
Explanation: Rostopic find, finds topics by type. Rostopic is implemented in python. ROSTOPIC uses
YAML_syntax at the command line
This set of IOT Questions and Answers for Entrance exams focuses on “Publishing Messages to the
Cloud”.
1. Publishing messages is handled through ________ Class.
a) Client()
b) Server()
c) Publish()
d) Batch()
View Answer
Answer: a
Explanation: Publishing message is handled through the client class(aliased as google-cloud-pubsubpublisherclient).
2. client() class provides ________ to create topics.
a) Software
b) Classes
c) Methods
d) Batch
View Answer
Answer: c
Explanation: client() class provides the method to create topics. publish() method publishes messages to
pub/sub. Publishing message is handled through the client class.
3. ________ method publishes messages to pub/sub.
a) Client()
b) Publish()
c) Server()
d) Batch()
View Answer
Answer: b
Explanation: While client() provides method to create topics, publish() method publishes messages to
pub/sub.
4. How many arguments are accepted by publish()?
a) 5 arguments
b) 3 arguments
c) 1 argument
d) 2 arguments
View Answer
Answer: d
Explanation: This method accepts two positional arguments: the topic to publish to, and the body of the
message.
5. Does publish() method accepts arbitrary arguments.
a) True
b) False
View Answer
Answer: a
Explanation: Publish() method also accepts arbitrary keyword arguments, which are passed along as
attributes of the message.
6. The topic in the publish method is in which form?
a) Binomial form
b) Canonical form
c) Nominal form
d) Message form
View Answer
Answer: b
Explanation: The topic is passed along as a string; all topics have the canonical form of
projects/{project_name}/topic/{topic_name}.
7. The message in pub/sub is an opaque blob of ________
a) Bits
b) Bytes
c) Word
d) Nibble
View Answer
Answer: b
Explanation: The message in pub/sub is an opaque blob of bytes, and as such, you must send a bytes
object in python 3.
8. ________ error will show if we try to send text string instead of bytes.
a) TypeError
b) Error
c) Linker error
d) Compiler error
View Answer
Answer: a
Explanation: If we send a text string the method will raise TypeError. TypeError will show if we try to
send text string instead of bytes.
9. What do we call string in python 2?
a) Str
b) Unicode
c) Strs
d) Unicades
View Answer
Answer: b
Explanation: In python 2 the text string is called as str, and in python 2 it is called as unicode.
10. When you publish a message ________ is automatically created?
a) Client
b) Server
c) Batch
d) Server
View Answer
Answer: c
Explanation: Whenever we publish a message, a batch is automatically created. This way, if you publish
a large volume of messages, it reduces the number of requests made to the server.
11. When the batch is created, it begins a countdown that publishes the batch once sufficient time has
elapsed.
a) True
b) False
View Answer
Answer: a
Explanation: When the batch is created, it begins a countdown that publishes the batch once sufficient
time has elapsed.
12. What is the time elapsed after a batch is created?
a) 0.5 seconds
b) 0.05 seconds
c) 1.5 seconds
d) 1 second
View Answer
Answer: b
Explanation: When the batch is created, it begins a countdown that publishes the batch once sufficient
time has elapsed by default it is 0.05 seconds.
13. Every call to publish() will return a class that conforms to the __________ interface.
a) Batch
b) Client
c) Server
d) Future
View Answer
Answer: d
Explanation: Every call to publish() will return a class that conforms to the future interface. You can use
this to ensure that the publish.
IOT Questions and Answers – Cloud – Powerful Smart Mobile Devices
« PrevNext »
This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Cloud – Powerful Smart Mobile
Devices”.
1. IaaS stands for __________
a) Infrastructure as a Service
b) Infrastructure as a Software
c) Internet as a Service
d) Internet as a Software
View Answer
Answer: a
Explanation: Cloud Computing delivers infrastructure, platform, and software that are provided as
services on the usage based payment to end users. These services are Infrastructure as a Service (IaaS).
2. Mobile cloud computing at its simplest refers to an __________
a) Intervention
b) Internet
c) Infrastructure
d) Intervention & Internet
View Answer
Answer: c
Explanation: Mobile cloud computing at its simplest refers to an infrastructure where both data storage
and the data processing happen outside of the mobile devices.
3. Mobile Cloud applications move the __________ Power and __________ away from mobile phone
and into cloud.
a) Computing and internet
b) Data storage and computing
c) Computing and data storage
d) Internet and computing
View Answer
Answer: c
Explanation: Mobile cloud applications move the computing power and data storage away from mobile
phones and into the cloud, bringing applications and mobile computing to not just smart phone users
but a much broader range of mobile subscribers.
4. SaaS stands for __________
a) Service as a Smartphone
b) Service as a software
c) Smartphone as a service
d) Software as a Service
View Answer
Answer: d
Explanation: Cloud computing delivers infrastructure, platform, and software that are provided as
services on the usage based payment to end users. These services are Software as a Service (SaaS).
5. __________ reduces the development and running cost of mobile applications on smartphone
devices.
a) Infrastructure
b) Productive business
c) Software
d) Services
View Answer
Answer: b
Explanation: It is a productive business choice that transfers data from smartphone devices to powerful
and centralized computer platform located in the cloud. Thus reducing the development and running
cost of mobile applications on smartphone devices.
6. PaaS stands as __________
a) Platform as a Software
b) Photo as a service
c) Platform as a Service
d) Photo as a Software
View Answer
Answer: c
Explanation: Cloud Computing delivers infrastructure, platform, and software that are provided as
services on the usage based payment to end users. These services are Platform as a Service (PaaS).
7. The architecture of MCC is such that various mobile devices are connected to their respective mobile
networks via __________
a) Software
b) Satellite
c) Access point
d) Base Station
View Answer
Answer: d
Explanation: The architecture of MCC is such that various mobile devices are connected to their
respective mobile networks via base station.
8. MCC stands for Mobile Cloud Computation.
a) True
b) False
View Answer
Answer: a
Explanation: The advancement in cloud computing is leading to an excessive growth of mobile devices
that can become powerful means for information access and mobile applications. Introducing a latent
technology called Mobile Cloud Computing.
9. __________ is the minimum value which an application shall exceed to be offloaded.
a) Static value
b) Critical value
c) Threshold value
d) Dynamic value
View Answer
Answer: c
Explanation: Threshold value is the minimum value which an application shall exceed to be offloaded.
The threshold value can be measured in terms of processing time, energy consumption and memory
usage.
10. Offloading decision depends upon __________ to be offloaded.
a) Size of application
b) Threshold value
c) Critical value
d) Dynamic value
View Answer
Answer: a
Explanation: Offloading decision depends upon the size of application to be offloaded. It saves energy
for a code compilation, if size of the code is large.
11. The part of the code which involves complex computations and requires more time to execute is
referred to as __________
a) Static session
b) Threshold session
c) Dynamic session
d) Critical session
View Answer
Answer: d
Explanation: The part of the code which involves complex computations and requires more time to
execute is referred to as critical session. The module of the application if falls under the critical section
then it is offloaded.
12. In __________ offloading application is partitioned during development.
a) Static offloading
b) Dynamic offloading
c) Threshold offloading
d) Critical offloading
View Answer
Answer: a
Explanation: In static offloading application is partitioned during development. In static environment,
parameters such as data size and execution time which acts as a deciding factor for offloading are
known beforehand.
13. __________ network environment means changing connection status.
a) Static offloading
b) Dynamic offloading
c) Threshold offloading
d) Critical offloading
View Answer
Answer: b
Explanation: Dynamic network environment means changing connection status and bandwidth that
affect the process of offloading.
14. __________ is defined as delay between the offloading and final result.
a) Latency rate
b) Network Bandwidth
c) Heterogeneity
d) Migration Cost
View Answer
Answer: a
Explanation: Latency rate is defined as delay between the offloading of an application on the cloud and
final results to be retracted back to the smartphone.
15. _____________ Depends upon the amount of the code being offloaded.
a) Latency rate
b) Network Bandwidth
c) Heterogeneity
d) Migration Cost
View Answer
Answer: b
Explanation: Bandwidth Utilization depends on the amount of the code being offloaded. If large amount
of data is to be offloaded to the cloud then it ultimately increases the latency rate which in turn affects
the efficiency.
1. QoE stands for _________
a) Quality of Energy
b) Quality of Experience
c) Quality of Envelop
d) Quality of Encryption
View Answer
Answer: b
Explanation: If the light weight query engine returns a poor result, then the user may have to issue my
query redundantly to the cloud based query processing engine with the hope of getting a better result.
This may hurt the overall Quality of Experience.
2. The RAE learns the _________ algorithm to learn the most cost effective policy.
a) Logistic Regression
b) Device/cloud algorithm
c) QoE algorithm
d) Anatomous algorithm
View Answer
Answer: a
Explanation: The RAE learns the logistic regression algorithm to learn the most cost effective policy for
distributing the task among devices and cloud, given the resource state.
3. _________ is the weighted sum of resource state, network, and cpu.
a) Logistic Regression
b) Cloud
c) Device
d) Cost function
View Answer
Answer: d
Explanation: The cost function is the weighted sum of resource state, network, and CPU usage.
4. The policy obtained by running logistic regression is enforced by _________ module.
a) Device/cloud section
b) Only device
c) Only Cloud
d) Cost function
View Answer
Answer: a
Explanation: The policy obtained by running logistic regression is enforced by Device/cloud section
module, based on the expected cost value for a given task.
5. The mechanism of the RAE is _________ which can be deployed on each device and cloud.
a) QoE
b) Logistic regression
c) Anatomous agent
d) Device/cloud
View Answer
Answer: c
Explanation: The mechanism of the RAE is anatomous agent, which can be deployed on each device and
cloud.
6. OAD stands for ___________
a) Optimal Application Distribution
b) Orientational Application Distribution
c) Orientation Application Development
d) Optimal Application Development
View Answer
Answer: a
Explanation: The exponential growth of cloud service offering in the last year has increased the number
of alternative for engineering and re-engineering applications to be partially or completely run in a cloud
environment.
7. _________ enables the application developer to enhance the application design.
a) Cloud Blueprint
b) TOSCA standard
c) Both Cloud blueprint and TOSCA standard
d) Utility function
View Answer
Answer: c
Explanation: TOSCA standard and Cloud Blueprint enable the application developer to enhance the
application design by providing the means to model which cloud offering is used to host which parts of
the application stack.
8. _________ process must support the analysis and evaluation of the application topology.
a) Support of different Migration types
b) Enrichment of Topology specification
c) Management and Configuration
d) Top-down and bottom-up
View Answer
Answer: d
Explanation: Top-down and bottom-up application evaluation process must support the analysis and
evaluation of the application topology alternatives both based on previous knowledge and empirical
analysis, and during the application productive phase.
9. _________ process has to support the definition of application topologies in various formats.
a) Top-down and bottom-up
b) Enrichment of Topology specification
c) Management and Configuration
d) Support of different Migration types
View Answer
Answer: b
Explanation: Enrichment of Topology specification process has to support the definition of application
topologies in various formats such as TOSCA or Blueprints and must consider non-functional aspects
specified as extension of the previous formats.
10. Any tool providing _________ process must provide management and configuration for cloud
services.
a) Top-down and bottom-up
b) Enrichment of Topology specification
c) Management and Configuration
d) Support of different Migration types
View Answer
Answer: c
Explanation: Any tool providing Management and Configuration process must provide management and
configuration for cloud services from different providers covering all cloud service and delivery models.
11. In order to re- distribute an application _________ process has to support all cloud native and non
cloud native applications.
a) Top-down and bottom-up
b) Enrichment of Topology specification
c) Management and Configuration
d) Support of different Migration types
View Answer
Answer: d
Explanation: In order to re- distribute an application support of different migration types process has to
support all cloud native and non cloud native application types identified.
12. _________ process must support the characterization of different adaptation actions.
a) Characterization of adaptation strategies
b) Independence of Architectural Paradigm
c) Support and reaction to application resources
d) Support of hardware
View Answer
Answer: a
Explanation: Characterization of adaptation strategies process must support the characterization of
different adaptation actions that can be used during run time for a given application.
13. In _________ the application to be re directional is based on 3-layered architecture.
a) Characterization of adaptation strategies
b) Independence of Architectural Paradigm
c) Support and reaction to application resources
d) Support of hardware
View Answer
Answer: b
Explanation: In Independence of Architectural Paradigm the application to be re directional is based on
3-layered architecture, must be supported.
14. As the workload of an application is subjected to fluctuation over time _________ process must
support the identification.
a) Characterization of adaptation strategies
b) Independence of Architectural Paradigm
c) Support and reaction to application resources
d) Support of hardware
View Answer
Answer: c
Explanation: s the workload of an application is subjected to fluctuation over time support and reaction
to application resources demand evolution process must support the identification.
15. _________ process must consider such characteristics for optimizing the overall application
performance.
a) Characterization of adaptation strategies
b) Independence of Architectural Paradigm
c) Support and reaction to application resources
d) Support of hardware
View Answer
Answer: d
Explanation: Support of hardware, software, application characteristics process must consider such
characteristics for optimizing the overall application performance.
This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Cloud – Privacy Protection
Solution”.
1. Privacy protection solution was proposed with KP-ABE and CP-ABE.
a) True
b) False
View Answer
Answer: a
Explanation: The hybrid privacy protection solution was proposed with KP-ABE and CP-ABE. This way
chosen different way to encrypt the privacy information based on user attributions according to cloud
service business type.
2. _________ consumers investing in general data protection needs in multiple dimensions.
a) Normal
b) Business
c) Office
d) Third Party
View Answer
Answer: b
Explanation: Business consumers investing in general data protection needs in multiple dimensions.
First, the type of device they need to support determines one continuum to potential solutions from
desktop through to mobile phones. Second, the location of the data determines another axis for
consideration, either on the device or stored in the cloud.
3. Software that address the data protection is divided into _________ Segments.
a) 1 segment
b) 2 segments
c) 4 segments
d) 3 segments
View Answer
Answer: d
Explanation: Because of the two factors, it’s possible to divide software that addresses data protection
into three segments:
Cloud privacy protection
Endpoint protection
Mobile device management.
4. _________ segment contributing to protection of data on device.
a) Endpoint Protection
b) Cloud Privacy Protection
c) Mobile Device Management
d) Cloud
View Answer
Answer: a
Explanation: The oldest segment contributing to protection of data on device is End Point Protection.
EPP also indicates protection for device integrity, including protection against malware, etc.,
5. _________ segment indicates protection for device integrity.
a) Endpoint Protection
b) Cloud Privacy Protection
c) Mobile Device Management
d) Cloud
View Answer
Answer: a
Explanation: The oldest segment contributing to protection of data on device is End Point Protection.
EPP also indicates protection for device integrity, including protection against malware, etc.,
6. EPP approach favours _________ data into the device.
a) UnLocking
b) Locking
c) Blocking
d) Unblocking
View Answer
Answer: b
Explanation: For data protection, End Point Protection approach favour locking data into the device
through full disk encryption port control, auditing and restriction of data prior to release from the device
and other similar mechanisms.
7. End Point Protection primarily focused around deployment on _________
a) Laptops
b) Desktops
c) Both laptops and desktops
d) Phones
View Answer
Answer: c
Explanation: End Point Protection primarily focused around deployment on desktops and laptops
although some endpoint protection exists for mobile devices. In these cases, EPP overlaps with MDD.
8. _________ is concerned with management of mobile.
a) Endpoint Protection
b) Cloud Privacy Protection
c) Mobile Device Management
d) Cloud
View Answer
Answer: c
Explanation: Mobile Device Management is primarily concerned with management of mobile devices.
Solution often consists of configuration, network, and services management on mobile devices.
9. Is mobile device management similar to that of end point protection with respect to locking?
a) True
b) False
View Answer
Answer: a
Explanation: For data protection, mobile device management, in similar fashion to end point protection
favors locking data on the devices so that it cant be compromised.
10. How MDM will achieve locking mechanism?
a) Wrapping
b) Controlling
c) Both wrapping and controlling
d) Encryption
View Answer
Answer: c
Explanation: Mobile device management achieves this by wrapping and controlling access by all
applications on the device.
11. MDM is focused on _________
a) Laptops
b) Tablets
c) Both phones and tablets
d) Phones
View Answer
Answer: c
Explanation: MDM id focused on mobile devices, including mobile phones and tablets. As the line
between less distinct, mobile device management will overlap capabilities with end point protection.
12. _________ complicates _________ and _________
a) MDM, EPP and CPP
b) EPP, CPP and MDM
c) MDM, CPP and EPP
d) CPP, EPP and MDM
View Answer
Answer: d
Explanation: The new cloud privacy protection segment complicates end point protection and mobile
device management. It embraces the inevitable movement of data off device across all the devices of an
enterprise.
13. _________ enables the use of cloud sync and storage.
a) Inevitable movement of data
b) Encryption
c) Wrapping
d) Controlling
View Answer
Answer: a
Explanation: The inevitable movement of data off device across all the devices of an enterprise. This
enables the use of cloud sync and storage by desktops and laptops beyond the device boundary where
EPP provides protection.
14. It enables _________ use of mobile devices without requiring the lockdown of data.
a) own-device
b) controlling
c) sharing of data
d) bring-your-own-device
View Answer
Answer: d
Explanation: It enables bring-your-own-device use of mobile devices without requiring the lockdown of
data through MDM.
15. CPP embraces sharing of data between ____________
a) Devices
b) Users
c) Both devices and users
d) Cloud and Devices
View Answer
Answer: c
Explanation: Cloud privacy protection embraces sharing of data between devices and users. This sharing
means that data must transmit through intermediaries and be protected while doing so.
IOT Questions and Answers – Communication with IOT Devices with Voice Commands
« PrevNext »
This set of IOT Questions and Answers for Campus interviews focuses on “Communication with IOT
Devices with Voice Commands”.
1. _____________ reduces the adoption and learning curve for the end user.
a) Intuitive
b) IoT
c) Commands
d) Devices
View Answer
Answer: a
Explanation: Intuitive reduces the adoption and learning curve for the end user while, at the same time,
create q unique bond between the product and its owner.
2. Most common application for voice control application are ___________
a) Home security
b) Family health monitoring
c) Home security and health monitoring
d) Business
View Answer
Answer: c
Explanation: The most common application for voice control technology will be home security, personal
and family health monitoring, and family monitoring(whether remote or local).
3. _________ either built into smoke alarm and thermostat or in the form of small plug – in.
a) Microphones
b) Loudspeaker
c) Microphone and loudspeaker
d) Mic
View Answer
Answer: a
Explanation: Environmental microphones either built into smoke alarms and thermostat or in the form
of small plug in modules such as an electric air freshener.
4. Voice recognition software and virtual assistant programs offer for ________ and _________
a) Communication
b) Communication and Entertainment
c) Entertainment
d) Communication and Software
View Answer
Answer: b
Explanation: Many big companies offer voice recognition software and virtual assistant programs for
their communication and entertainment products that talk to users and respond to a list of commands.
5. Voice control doesn’t provide the level of __________
a) Amplitude control
b) Sound control
c) Voice control
d) Frequency control
View Answer
Answer: d
Explanation: Voice control doesn’t provide the level of voice control monitoring that analysts see as the
wave of the near future.
6. The advanced security and smart system first monitor and then interacts with human.
a) True
b) False
View Answer
Answer: a
Explanation: The advanced security and smart system first monitor and then interacts with human users
to fulfil their daily needs – turning on lights, adjusting thermostat, reporting intruders and identifying
residents or employees based on certain biological signs.
7. How many types of voice communications are there in IoT environment?
a) 2 types
b) 4 types
c) 3 types
d) 5 types
View Answer
Answer: c
Explanation: There are 3 key types of voice communication in IoT environment:
1. Bi-directional voice communication
2. Mono-directional voice communication
3. Voice recognition.
8. _________ is particularly appealing when the human’s hands or eye are otherwise occupied.
a) Voice recognition
b) Sound recognition
c) Amplitude recognition
d) Frequency recognition
View Answer
Answer: a
Explanation: Voice recognition is particularly appealing when the human’s hands or eye are otherwise
occupied. For example, it may not only convenient but also a legal requirement to use verbal
commands.
9. Voice telephony is an efficient means of __________ with machines that can listen.
a) Mono-directional voice communication
b) Bi-directional voice communication
c) Voice recognition
d) Both bi directional and mono directional
View Answer
Answer: b
Explanation: Voice telephony is an efficient means of Bi-directional voice communication with machine
that can listen, and respond without the need for complex commands.
10. ________ could potentially challenge the need of touch screen on many devices.
a) Voice recognition
b) Voice telephony
c) Voice Integration
d) Intuitive
View Answer
Answer: c
Explanation: Voice Integration could potentially challenge the need for a touch screen on many devices,
as it reduces the cost for devices that will be dormant for majority of the time.
11. ________ Will reduces the cost of the devices.
a) Intuitive
b) Voice telephony
c) Voice recognition
d) Voice Integration
View Answer
Answer: d
Explanation: Voice Integration could potentially challenge the need for a touch screen on many devices,
as it reduces the cost for devices that will be dormant for majority of the time.
12. How the voice is transferred to our phone?
a) Internet
b) Bluetooth
c) Sharing applications
d) Zigbee
View Answer
Answer: a
Explanation: In car, consumer electronics and entertainment devices are all using Bluetooth to transfer
our words to our phone or a gateway, which connects to the cloud.
13. Is there any limit for connecting devices though voice.
a) False
b) True
View Answer
Answer: b
Explanation: There are a virtually limitless number of applications for voice-controlled, IoT-connected
devices.
14. Microphones usually have ___________
a) Amplitude filter
b) Noise filter
c) Round filter
d) Frequency filter
View Answer
Answer: c
Explanation: Microphones usually have a fuzzy covering or a round filter known in the industry as pop
filter. They are designed to block out distortion from breath and wind.
15. _________ are well integrated antennas for long range communication.
a) BC241
b) BC154
c) BC144
d) BC118
View Answer
Answer: d
Explanation: To enable the connectivity, BC118, BC127, BC188 modules work with Bluetooth or WiFi
devices, this has long range communication.
To practice all areas of IOT for Campus Interviews, here is complete set of 1000+ Multiple Choice
Questions and Answers.
pdated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - IOT Questions and Answers – Cloud – Privacy Protection Solution
This set of IOT online test focuses on “Communication with IOT Devices with Thoughts”.
1. API’s are the inter connector.
a) True
b) False
View Answer
Answer: a
Explanation: API’s are inter connectors which provide the interface between the global network and the
things.
2. Without ___________ IoT devices can easily lead to catastrophe.
a) Software
b) Management system
c) Cloud
d) Devices
View Answer
Answer: b
Explanation: API’s are the fundamental enabler of the Internet of Things but without management
system, IoT devices can easily lead to catastrophe.
3. Management is set of _________
a) Technologies
b) Processes
c) Devices
d) Technologies and Processes
View Answer
Answer: d
Explanation: Management is a set of technologies and processes fpr creating, managing, securing,
analyzing and scaling the API’s from IoT connected devices.
4. Does the API allow the devices to talk.
a) True
b) False
View Answer
Answer: a
Explanation: The API’s allow devices to talk to each other in a consistent and structured way that makes
it really easy to get them to communicate.
5. API management system creates __________ identity.
a) Secure
b) Friendly
c) Robust
d) Secure and friendly
View Answer
Answer: d
Explanation: API management system creates a secure user friendly identity. It ensures secure
connection to devices across mobile and IoT environment.
6. Web applications support ___________ API.
a) RESTful
b) RESful
c) Class
d) Lua
View Answer
Answer: a
Explanation: Most web applications support RESTful API which relay in HTTP method. The open source
swagger framework helps to design and maintain API’s.
7. _________ helps in design and maintain of API.
a) Lua
b) Open source swagger
c) HTTP
d) Lua and HTTP
View Answer
Answer: b
Explanation: Most web applications support RESTful API which relay in HTTP method. The open source
swagger framework helps to design and maintain API’s.
8. WiFi uses how much frequency?
a) 2.2GHz
b) 3GHz
c) 3.5GHz
d) 2.4GHz
View Answer
Answer: d
Explanation: WiFi is a local wireless technology that uses 2.4GHz ultra high frequency or 5 GHz super
high frequency radio waves.
9. Bluetooth will transmit the data over the frequency band _________
a) 2.4 to 2.7 GHz
b) 2.4 to 3 GHz
c) 2.4 to 2.485 GHz
d) 2.4 to 2.6 GHz
View Answer
Answer: c
Explanation: Bluetooth technology allows for personal data networks. It transmits data over the
frequency band between 2.4 and 2.485 GHz.
10. Bluetooth operates at short distances.
a) True
b) False
View Answer
Answer: a
Explanation: Bluetooth operates over short distances than WiFi and requires less power to operate. We
can pair devices like phone, smart watches, headsets, speakers, etc.,.
11. Bluetooth will drain battery life.
a) True
b) False
View Answer
Answer: a
Explanation: Even with limited range, early Bluetooth implementations were a big drain on battery life.
12. Which bluetooth version enables low energy?
a) Bluetooth 3.0
b) Bluetooth 4.0
c) Bluetooth 2.0
d) Bluetooth 1.0
View Answer
Answer: c
Explanation: With the development of bluetooth 4.0 became the ability to implement low energy
features that conserve power more effectively.
13. __________ is the brainchild of ARM.
a) Zigbee
b) WiFi
c) Bluetooth
d) Thread
View Answer
Answer: d
Explanation: The brainchild of an alliance between Nest, Samsung, ARM and a few other companies is
Thread. Thread aims to anticipate the needs of the Internet pf Things.
14. Thread would be able to support __________ devices.
a) 256 Devices
b) 300 Devices
c) 125 Devices
d) 250 Devices
View Answer
Answer: d
Explanation: Based on the current specification, thread would be able to support a network of up to 250
devices. Every house could be its own network, meaning your home could have up to 250 integrated
devices interacting with you on a daily basis.
15. Thread would allow _________ networks.
a) Mesh
b) Node
c) Mesh and node
d) Either mesh or node
View Answer
Answer: a
Explanation: Thread would allow for mesh networks. All those devices would be capable of relaying
data. Thread hopes to avoid the Zigbee problem.
This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Communication with IOT
Devices with Smart Phones”.
1. BAN stands for ________
a) Body Area Network
b) Brain Area Network
c) Body Android Network
d) Brain Android Network
View Answer
Answer: a
Explanation: With the rise of wearable, such as Android Wear or he Apple Watch your smart phone
increasingly plays and additional role. This new role can be considered as the brain of your Body area
network.
2. BAN gives _________
a) Communication
b) Storage
c) Network connectivity
d) Communication and storage
View Answer
Answer: d
Explanation: With the rise of wearable, such as Android Wear or he Apple Watch your smart phone
increasingly plays and additional role. This new role can be considered as the brain of your Body area
network, given the storage and communication capabilities of the smart phone.
3. NFC stands for ________
a) Near Fast Communication
b) Near Field Communication
c) Near Field Customer
d) Near Field Connection
View Answer
Answer: b
Explanation: Near Field Communication smart phones can function not only as sensors but also as
actuators, that is, trigger actions or control other things, including TV’s or cars.
4. Phones act as actuators too.
a) True
b) False
View Answer
Answer: a
Explanation: Smart phones can function not only as sensors but also as actuators, that is, trigger actions
or control other things, including TV’s or cars.
5. AI refers to ____________
a) Electronic environment
b) Devices
c) Applications
d) Electronic environment and devices
View Answer
Answer: d
Explanation: AI refers to “electronic environment and devices that are sensitive and responsive to
people’s presence and activities”.
6. AI is considered as embedded.
a) True
b) False
View Answer
Answer: a
Explanation: AI is considered as “embedded” because the devices used are seamlessly embedded within
people’s environment.
7. AI is also named as __________
a) Context aware
b) Personalized
c) Adaptive
d) Context aware, personalized, and adaptive
View Answer
Answer: d
Explanation: AI is considered as “context aware” because these devices are used to know people’s
situation and context conditions, “personalized” because they can be customized to the needs of users,
“adaptive” because it changes depending on the user’s needs.
8. Smart phones can be used in IoT setup with _________ application categories.
a) 2 Applications
b) 3 Applications
c) 4 Applications
d) 5 Applications
View Answer
Answer: c
Explanation: Smartphones can be used in IoT setup along with four application categories:
–> Personal IoT
–> Group IoT
–> Community IoT
–> Industrial IoT.
9. Which category finds an increase in applications targeting health and fitness?
a) Personal IoT
b) Group IoT
c) Community IoT
d) Industrial IoT
View Answer
Answer: a
Explanation: Personal IoT where we find an increasing number of applications targeting health and
fitness, and helping to solve everyday problems.
10. Which category is used in the context of connected cars?
a) Personal IoT
b) Group IoT
c) Community IoT
d) Industrial IoT
View Answer
Answer: b
Explanation: Group IoT where smartphones can be used in the context of connected cars to check the
system status, or in smart homes.
11. Which category could be used by citizens to contribute to a smart city?
a) Personal IoT
b) Group IoT
c) Community IoT
d) Industrial IoT
View Answer
Answer: c
Explanation: Community IoT where could sourcing applications could be used by citizens to contribute
to a smart city.
12. Which category is used for business to consumer process?
a) Personal IoT
b) Group IoT
c) Community IoT
d) Industrial IoT
View Answer
Answer: d
Explanation: Industrial IoT where smartphones are used for business to consumer purposes such as
sending customized services and vouchers in real time.
13. Future application of IoT through phones includes viewing data and controlling sensors anywhere.
a) True
b) False
View Answer
Answer: a
Explanation: Future application of IoT through phones includes viewing data and controlling sensors
anywhere.
14. Authors proposed 4 layer model named __________
a) K-Businesscare
b) K-Healthcare
c) Health-care
d) Business-care
View Answer
Answer: b
Explanation: Authors proposed a four layer model named “k-Healthcare” which is considered a
comprehensive platform for accessing patient’s health data using the smartphones and applications.
15. __________ layer is the communication layer that connects the IoT devices with WAN.
a) Internet layer
b) Application layer
c) Sensor layer
d) Network layer
View Answer
Answer: d
Explanation: The network layer is the communication layer that connects the IoT devices with WAN
using different protocols such as 802.16 for 3G.
This set of IOT Question Bank focuses on “Scheduling Process and IOT Services Lifecycle”.
1. __________ performs two functions toward the delivery of the services.
a) Global Scheduler
b) Local Scheduler
c) Device Scheduler
d) IoT Scheduler
View Answer
Answer: a
Explanation: The global Scheduler component is the main and first entry point for service request
submitted to the cloud platform. It performs two functions toward the delivery of the services, selection
of the sensor and reservation for the needed resources.
2. ___________ manages the metadata of the IoT services.
a) Power
b) Controller
c) Scheduler
d) Package
View Answer
Answer: c
Explanation: Scheduler manages the metadata of the IoT services, signature of the service, sensors used
to deliver, and execution parameters.
3. Global scheduler keeps the track of and control the life cycle of IoT services.
a) True
b) False
View Answer
Answer: a
Explanation: Global scheduler keeps the track of and control the life cycle of IoT services. In particular,
the lifecycle management services are supported by the scheduler.
4. ___________ service discovers the virtual sensors ability.
a) Register
b) Resource Discovery
c) Unregister
d) Suspend
View Answer
Answer: b
Explanation: Resource recover service discovers the virtual sensors ability. It therefore provides the
resources that match the requirements of the given request for the IoT service.
5. ___________ Service is responsible for establishing the requested service with in the cloud database.
a) Suspend
b) Resource Discovery
c) Unregister
d) Register
View Answer
Answer: d
Explanation: Register service is responsible for establishing the requested service with in the cloud
database. To this end, it initially identifies and logs all the sensors which are pertinent and or needed for
delivering the requested IoT service.
6. For which service the resources allocated for the services are released?
a) Register
b) Resource Discovery
c) Unregister
d) Suspend
View Answer
Answer: c
Explanation: In the scope of the unregister functionality for a given IoT service, the resources allocated
for the services are released.
7. _________ service is deactivated and therefore its operation is ceased.
a) Register
b) Resource Discovery
c) Unregister
d) Suspend
View Answer
Answer: d
Explanation: As part of suspend functionality, the service is deactivated and therefore its operation is
ceased. However, as part of the suspension the platform does not release the resources associated with
the services.
8. _________ service enables the previously suspended services.
a) Enable from suspension
b) Enable
c) Update
d) Registered service status
View Answer
Answer: a
Explanation: Enable from suspension service enables the previously suspended services. The data
structures holding the service’s meta data in the cloud are appropriately updated.
9. ________ service allows the enablement of an unregistered service.
a) Enable from suspension
b) Enable
c) Update
d) Registered service status
View Answer
Answer: b
Explanation: Enable service allows the enablement of an unregistered service. In practice this
functionality registers the service once again in the platform, through identifying and storing the
required sensors.
10. Which service permits the changes to the IoT services?
a) Enable from suspension
b) Enable
c) Update
d) Registered service status
View Answer
Answer: c
Explanation: Update service permits changes to the IoT services. In particular, it allows for the updating
of the service’s lifecycle metadata according to the requested changes.
11. Which service provides the lifecycle status of a given IoT service?
a) Enable from suspension
b) Enable
c) Update
d) Registered service status
View Answer
Answer: d
Explanation: Registered service status service provides the lifecycle status of a given IoT service. Detailed
information about IoT service is provided.
12. _________ service checks periodically all the enables services.
a) Service updated resources
b) Get service
c) Get available services
d) Update
View Answer
Answer: a
Explanation: Service update resources checks periodically all the enabled services, and identifies those
using mobile sensors.
13. _________ service retrieves the description of the registered service.
a) Service updated resources
b) Get service
c) Get available services
d) Update
View Answer
Answer: b
Explanation: Get service retrieves the description of the registered service, that is, the SPARQL
description in the case of the OpenIoT open source implementation.
14. Which service returns a list of registered services that are associated with a particular user?
a) Service updated resources
b) Get service
c) Get available services
d) Update
View Answer
Answer: c
Explanation: Get available services return a list of registered services that are associated with a
particular user. The various IoT services are registered and established by users of the platform.
15. Which service enables the user to periodically invoke an already defined IoT service?
a) Service updated resources
b) Get service
c) Get available services
d) Poll for the report
View Answer
Answer: d
Explanation: Poll for the report service enables the user to periodically invoke an already defined IoT
service within specified time intervals.
This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Resource Management”.
1. What is the popular method of organizing wireless network topologies?
a) Software
b) Synchronization
c) Network
d) Cluster
View Answer
Answer: d
Explanation: Clustering is a popular method of organising wireless network topologies, in which a few
nodes, the cluster heads are elected as representing to route the traffic originated in the entire network.
2. _________ will enable the humans to access, control and manage the operation.
a) IoT
b) Bigdata
c) Network
d) Communication
View Answer
Answer: a
Explanation: IoT enables the humans to access, control and manage the operations and data of the
objects working under different information systems of their surroundings.
3. In _________ the embedded devices and objects working under IoT are resource constrained.
a) Health
b) Industry
c) Home
d) Information system
View Answer
Answer: d
Explanation: In the information system the embedded devices and objects working under IoT
implementation are resource constrained.
4. What type of networks is interacting under IoT?
a) Heterogeneous only
b) Homogeneous Only
c) Both hetero and homogeneous
d) Neither hetero nor Homo
View Answer
Answer: a
Explanation: Due to the huge number of heterogeneous network elements interacting and working
under IoT based information systems, there is an enormous need for resource management for the
smooth running of IoT operations.
5. Managing of resources can be done by implementing ________
a) Protocols
b) Algorithms
c) Networks
d) Protocols and algorithms
View Answer
Answer: d
Explanation: Managing of resources by implementing protocols, algorithms or techniques is required to
enhance the scalability, reliability and stability in the operations of IoT across different domains of
technology.
6. This section is to solicit the efforts and ongoing research work in the domain of _______
a) Information Management
b) Resource Management
c) Industrial Management
d) Network Management
View Answer
Answer: b
Explanation: The motivation of this section is to solicit the efforts and ongoing research work in the
domain of resource management in IoT.
7. Resource management will elaborate the key aspects of _________
a) Industrial management
b) Energy management
c) Network management
d) Information management
View Answer
Answer: c
Explanation: Resource management will elaborate the key aspects of energy management,
communication protocols and future applications of IoT for information systems.
8. Resource management includes ___________
a) IoT Devices
b) IoT Cloud
c) IoT Networks
d) IoT Web
View Answer
Answer: b
Explanation: Resource management includes IoT Cloud, IoT based industrial and home environment and
integration of IoT concept in upcoming technologies of Cyber Physical System, Ambient living and Fog
Computing.
9. What is the role of communication protocol in IoT?
a) Smart cities
b) Cyber physical system
c) Mac layer issue
d) Managing energy
View Answer
Answer: c
Explanation: Role of communication protocol in IoT :
–> Multimedia communication
–> QoS in communication protocol
–> Mac layer issues
–> Secure communication in D2D.
10. Which of the following is the future application of IoT?
a) Role of green IoT system
b) QoS in communication
c) Secure communication
d) Multimedia communication
View Answer
Answer: a
Explanation: Future applications of IoT:
–> IoT based information system for Ambient living
–> Cyber Physical System in IoT
–> Role of Green IoT system
–> Fog computing.
11. The object of IoT will be empowered by ___________
a) Network
b) Cloud
c) Devices
d) Connectivity
View Answer
Answer: c
Explanation: The objects of the Internet of Things will be empowered by embedded devices whose
constrained resources will need to be managed efficiently.
12. The embedded devices will form _______ network.
a) ATM
b) Ethernet
c) FDDI
d) Ad-hoc
View Answer
Answer: d
Explanation: It is envisioned that these devices will be able to form ad-hoc network, and that the
connection from these networks to the Internet of Things infrastructure will not always be possible.
13. _______ are used to overcome the challenges of managing the resources of the IoT.
a) Clustering
b) Software agents
c) Synchronization techniques
d) Cluster, Software agent, and Synchronization techniques
View Answer
Answer: d
Explanation: The use of Cluster, Software agent, and Synchronization techniques in order to overcome
the challenges of managing the resources of the Internet of Things objects.
14. Which will reduce the energy expenditure?
a) Clustering
b) Software agents
c) Synchronization techniques
d) Cluster, Software agent, and Synchronization techniques
View Answer
Answer: a
Explanation: Clustering will be beneficial to reduce the energy expenditure and improve the scalability
and robustness of the object networks.
15. Synchronization techniques will be necessary to address the various challenges of harmonising.
a) False
b) True
View Answer
Answer: b
Explanation: Synchronization techniques will be necessary to address the various challenges of
harmonising plenty of copies of object data with potentially partially disconnected Internet of Things
architecture components.
This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Handling Actuator Request”.
1. ____________ enables production-ready feature to the spring boot application.
a) Actuators
b) Endpoint
c) Boot
d) Hyper media
View Answer
Answer: a
Explanation: Actuators enable production ready features to a spring boot application without having to
actually implement these things yourself.
2. __________ should be added to start the existing actuators in boot.
a) spring-boot-actuator
b) sprint-actuator-boot
c) boot-spring-actuator
d) actuator-spring-boot
View Answer
Answer: a
Explanation: To start using the existing actuators in boot we will just need to add the spring-bootactuator dependency.
3. __________ allows us to monitor the application.
a) Actuators
b) Endpoints
c) Boot
d) Hypermedia
View Answer
Answers: b
Explanation: Endpoints allow you to monitor the application and, in some cases, interact with it as well.
The boot comes with many built-in endpoints and, like pretty much anything in spring.
4. Which endpoints are sensitive?
a) /health
b) /info
c) /metric
d) /trace
View Answer
Answer: c
Explanation: Most endpoints are sensitive ie., meaning they are not fully public. While a handful is not:
/health and /metric.
5. Which endpoint shows application health information?
a) /health
b) /info
c) /metric
d) /trace
View Answer
Answer: a
Explanation: /health shows application health information (a simple ‘status’ when accessed over an
unauthenticated connection or full message details when authenticated). It is not sensitive by default.
6. __________ endpoint displays arbitrary application information.
a) /health
b) /info
c) /metric
d) /trace
View Answer
Answer: b
Explanation: Endpoints allow you to monitor the application and, in some cases, interact with it as well.
/info endpoint displays arbitrary application information. Not sensitive by default.
7. Which endpoint shows metric information for the current application?
a) /health
b) /info
c) /metric
d) /trace
View Answer
Answer: c
Explanation: Endpoints allow you to monitor the application and, in some cases, interact with it as well.
/metric shows metric information for the current application. It is also sensitive by default.
8. Which endpoint displays trace information?
a) /health
b) /info
c) /metric
d) /trace
View Answer
Answer: d
Explanation: Endpoints allow you to monitor the application and, in some cases, interact with it as well.
/trace displace trace information by default the; last few HTTP requests.
9. How many customizing properties are available?
a) 2 Properties
b) 3 Properties
c) 4 Properties
d) 5 Properties
View Answer
Answer: b
Explanation: Each endpoint can be customized with properties using the following format:
endpoint.[endpoint name].[property to customize]. Three properties are:
1. Id
2. Enabled
3. Sensitive.
10. Using which customized endpoint will be accessed over HTTP?
a) Id and enabled
b) Enabled
c) Sensitive
d) Id
View Answer
Answer: d
Explanation: Each endpoint can be customized with properties using the following format:
endpoint.[endpoint name].[property to customize].
Id – by which this endpoint will be accessed over HTTP.
11. Enabled customization endpoint will be enabled only during __________
a) True cases only
b) False cases only
c) Either True or false cases
d) True and false cases
View Answer
Answer: a
Explanation: Each endpoint can be customized with properties using the following format:
endpoint.[endpoint name].[property to customize].
Enabled – if true then it can be accessed otherwise not.
12. Enabled customization endpoint will be sensitive only during ________
a) True and false cases
b) False cases only
c) Either True or false cases
d) True cases only
View Answer
Answer: d
Explanation: Each endpoint can be customized with properties using the following format:
endpoint.[endpoint name].[property to customize].
Sensitive – if true then need the authorization to show crucial information over HTTP.
13. Health information is collected from all the beans implementing Health Indicator interface.
a) True
b) False
View Answer
Answer: a
Explanation: Health information is collected from all the beans implementing Health Indicator interface
configured in your application context.
14. Which endpoint is gathered and publishes information about OS?
a) /health
b) /info
c) /metric
d) /trace
View Answer
Answer: c
Explanation: The metric endpoint is one of the most important endpoint as I gathers and publishes
information about OS, JVM and Application level metric.
15. Command to create new endpoint?
a) Endpoint_T
b) Endpoint<T>
c) Endpoint-T
d) Endpoint-t
View Answer
Answer: b
Explanation: Besides using the existing endpoint provided by spring boot we can create a new endpoint.
We need to have endpoint implementation implement the endpoint<T>.
This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Handling Sensor Request”.
1. HelloWeb is an example of ____________ server.
a) HTTP
b) MQTP
c) SMTP
d) CoAP
View Answer
Answer: a
Explanation: HelloWeb is an example of an HTTP server, but it does not use any sensors or actuators.
2. ________ will show how to handle GET request to a sensor resources.
a) Monitor
b) VoltageMonitor
c) Voltage
d) Voltage-Monitor
View Answer
Answer: c
Explanation: VoltageMonitor, shows how to handle GET request to a sensor resource, more specially
one that represent some voltage.
3. Can we use any web browser as client.
a) True
b) False
View Answer
Answer: a
Explanation: You can use any web browser as a client to inspect the current voltage. After all, a web
browser is basically an engine for initiating GET request.
4. An HTTP server manages ____________
a) Websites
b) Devices
c) Resources
d) Sensors
View Answer
Answer: c
Explanation: An HTTP server manages resources. In this example, a resource is provided that has the
meaning, “actual voltage value, as measured by a sensor attached to the board”.
5. A resource that contains an actual value is called as ________
a) Potential variable
b) Measured variable
c) Resource variable
d) Physical variable
View Answer
Answer: b
Explanation: A resource that contains an actual value is called a measured variable. A measured variable
changes its value over time, depending on a physical process.
6. When the user turns the potentiometer’s knob, the value is changed.
a) True
b) False
View Answer
Answer: a
Explanation: When the user physically turns the potentiometer’s knob, the measured variable changes
its value accordingly. This means that subsequent GET request to the same resource may yield different
responses.
7. A resource with measured variable will reflect ________
a) Potential phenomenon
b) Resource phenomenon
c) Measured phenomenon
d) Physical phenomenon
View Answer
Answer: d
Explanation: A resource with measured variable will reflect a physical phenomenon as it currently is. The
resource is updated with new sensor values from time to time.
8. What should an URL contain?
a) ASCII values
b) Digits
c) Characters
d) ASCII values, digits, and characters
View Answer
Answer: d
Explanation: You can use any URL as long you use ASCII letters, digits, and Characters. For example, the
URL /root/sensor/analog/I would look like:
http://192.168.5.100/root/sensor/analog/1.
9. For reading the current voltage ________ library class is used.
a) Digital sensor
b) Analog sensor
c) Actuator
d) Potential sensor
View Answer
Answer: a
Explanation: For reading the current voltage, library class Analog Sensor that wraps an analog input port
in an object that provides the method HandleGet.
10. Variable voltage Sensor is an instance of Analog Sensor.
a) True
b) False
View Answer
Answer: a
Explanation: For reading the current voltage, library class Analog Sensor that wraps an analog input port
in an object that provides the method HandleGet.
Variable voltage Sensor is an instance of Analog Sensor, initialized with pinA1.
11. Which property makes it possible for the analog sensor object to convert the integer input?
a) MinValue
b) MaxValue
c) Either MinValue or MaxValue
d) Both MinValue and MaxValue
View Answer
Answer: d
Explanation: Properties MinValue and MaxValue make it possible for the analog sensor object to convert
the integer input of the analog input port to a value in the given range.
12. What is the range of analog input port?
a) 0 to 3
b) 0 to 3.3
c) 0 to 4
d) 0 to 4.5
View Answer
Answer: b
Explanation: Properties MinValue and MaxValue make it possible for the analog sensor object to convert
the integer input of the analog input port to a value in the given range, in this case it is between 0.0 to
3.3.
13. ________ is used to provide an object of type MeasuredVariable.
a) HandleRequest
b) RequetHandle
c) Handle_Request
d) Handle-Request
View Answer
Answer: a
Explanation: In the WebServer initialization, We use the request handler HandleRequest provided by an
object of type MeasuredVariable. A MeasuredVariable object has a property FromSensor.
14. When a client makes a GET request for /voltage/actual, the request is passed to ________
a) MeasuredVariable
b) HandleRequest
c) Measured Variable’s HandleRequest
d) HandleRequest’s MeasuredVariable
View Answer
Answer: c
Explanation: When a client makes a GET request for /voltage/actual, the request is passed to Measured
Variable’s HandleRequest method. When this happens, the MeasuredVariable object first calls
FromSensor.
15. Delegate properties must be compatible with the delegate types they represent.
a) True
b) False
View Answer
Answer: a
Explanation: FromSensor is a property to which you can assign a method I.e., a C#delegate property.
Delegate properties must be compatible with the delegate types they represent.
This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Multithreading”.
1. _______ makes it possible for two or more activities to execute in parallel on a single processor.
a) Multithreading
b) Threading
c) SingleThreading
d) Both Multithreading and SingleThreading
View Answer
Answer: a
Explanation: MultiThreading makes it possible for two or more activities to execute in parallel on a
single processor.
2. In ______ an object of type Thread in the namespace System.Threading represents and controls one
thread.
a) . PY
b) .SAP
c) .NET
d) .EXE
View Answer
Answer: c
Explanation: In .NET, an object of type Thread in the namespace System.Threading represents and
controls one thread. Its constructor takes a parameterless method as a parameter.
3. The method will be executed once the thread’s ______ method is called.
a) EventBegin
b) EventStart
c) Begin
d) Start
View Answer
Answer: d
Explanation: In .NET, an object of type Thread in the namespace System.Threading represents and
controls one thread. Its constructor takes a parameter less method as a parameter. The method will be
executed once the threads Start method is called.
4. Command to make thread sleep?
a) Thread.Sleep
b) Thread_Sleep
c) ThreadSleep
d) Thread_sleep
View Answer
Answer: a
Explanation: A particular thread of the application can be blocked forever by calling
Thread.Sleep(Timeout.Infinite).
5. An instance of class Buffer provides a threadsafe way of communication between ________
a) Actors
b) Objects
c) Locking
d) Buffer
View Answer
Answer: b
Explanation: An instance of class Buffer provides a threadsafe way of communication between actors. A
buffer instance basically acts as a variable whose current value can be read and written.
6. _______ method puts zero into the buffer.
a) HandlePut(object o)
b) HandletGet(object o)
c) HandletGet()
d) HandletPut()
View Answer
Answer: a
Explanation: void HandlePut(object o) method puts 0 into buffer. The new value in the buffer replaces
the old one.
7. HandlePut(object o) performs what?
a) Fixing values
b) Locking
c) Changing values
d) Unlocking
View Answer
Answer: d
Explanation: void HandlePut(object o) method puts 0 into buffer. The new value in the buffer replaces
the old one. The method performs the necessary locking to enable safe use of the buffer from multi
threads.
8. In HandlePut(object o), o represents?
a) Null
b) Zero
c) Empty
d) Origin
View Answer
Answer: a
Explanation: void HandlePut(object o) method puts 0 into buffer. The new value in the buffer replaces
the old one. The method performs the necessary locking to enable safe use of the buffer from multi
threads. Object o may be NULL.
9. What is HandleGet() method function?
a) Current buffer state, with changing
b) Current buffer state, without changing
c) Previous buffer state, with changing
d) Previous buffer state, without changing
View Answer
Answer: b
Explanation: This method gets the current buffer state, without changing it. The method performs the
necessary locking to enable safe of the buffer from multiple threads.
10. What is the result for HandleGet()?
a) Null
b) Zero
c) Empty
d) Origin
View Answer
Answer: a
Explanation: This method gets the current buffer state, without changing it. The method performs the
necessary locking to enable safe of the buffer from multiple threads. The result may be null.
11. Multithreading is a mechanism for splitting up a program into several parallel activities called
_________
a) Methods
b) Objects
c) Classes
d) Threads
View Answer
Answer: c
Explanation: Multithreading is a mechanism for splitting up a program into several parallel activities
called threads. Multithreading makes it possible for two or more activities to execute in parallel on a
single processor.
12. Each thread is a single stream of execution.
a) False
b) True
View Answer
Answer: a
Explanation: Multithreading is a mechanism for splitting up a program into several parallel activities
called threads. Each thread is a single stream of execution, yet they all share the same resources.
13. Multithreading on a single processor is possible with the help of _________
a) Threader
b) Scheduler
c) Method
d) Divider
View Answer
Answer: b
Explanation: Multithreading on a single processor is possible with the help of scheduler, which briefly
stops the currently execution thread of an application after each time slice.
14. Scheduler switch threads in ________
a) Multilevel queue scheduling
b) Priority Scheduling
c) Round robin fashion
d) Multilevel feedback queue scheduling
View Answer
Answer: c
Explanation: It switches among threads in a round robin fashion so that every thread gets its fair share
of processing time.
15. What is the switching speed?
a) 60 times per second
b) 50 times per second
c) 55 times per second
d) 66 times per second
View Answer
Answer: b
Explanation: Switching among threads occurs so frequently -50 times per second that all threads appear
to run in parallel.
This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Designing for Emerging
Technology”.
1. IIoT stands for __________
a) Industrial Internet of Things
b) Internet Internet of Things
c) Intelligence Internet of Things
d) Internal Internet of Things
View Answer
Answer: a
Explanation: Industrial IoT is the subset of IoT that associates itself with connected manufacturing
operations to design and craft products and services.
2. IIoT is sophisticated.
a) True
b) False
View Answer
Answer: a
Explanation: Using IIoT, the previous labor intensive, time consuming technique can be substituted with
vibrant, sophisticated, and automated mechanisms.
3. What does design provide?
a) Technology
b) Ecosystem
c) Technology and ecosystem
d) Digital revolution
View Answer
Answer: c
Explanation: Design not only provides the framework for how technology works and how it’s used but
also places it in a broader context that includes the total ecosystem with which it interacts and the
possibility of unintended consequences.
4. Which possibility ensures load balancing and peak levelling of energy consumption?
a) Transportation and logistics
b) Energy and utilities
c) Automotive
d) Connected supply chain
View Answer
Answer: b
Explanation: Energy and utilities: A network of smart grids, smart meters and devices continuously
communicate with each other to ensure load balancing and peak levelling of energy consumption, down
to the device level.
5. Which possibility automatically communicates with other vehicles?
a) Transportation and logistics
b) Energy and utilities
c) Automotive
d) Connected supply chain
View Answer
Answer: c
Explanation: Automotive: Within the automotive space, the connected car concept is a game changer.
New models continuously generate data when in operation.
6. Which possibility connects the production line to suppliers?
a) Transportation and logistics
b) Energy and utilities
c) Automotive
d) Connected supply chain
View Answer
Answer: d
Explanation: Connected supply chain: By connecting the production line to suppliers, all stakeholders
can understand interdependencies, the flow of material and process cycle times.
7. Which possibility provides inter connectivity between shop floor and top floor?
a) Transportation and logistics
b) Energy and utilities
c) Plant control flow operation
d) Connected supply chain
View Answer
Answer: c
Explanation: Plant control flow operation: The IoT data network provides inter connectivity between
shop floor and top floor, which enables the automation of specific process and reduces the human
intervention required to address issues.
8. Which possibility is the highest contributor to cost overhead for manufacturing facilities?
a) Transportation and logistics
b) Energy and utilities
c) Plant control flow operation
d) Energy management and resource optimization
View Answer
Answer: d
Explanation: Energy management and resource optimization: Energy is among the highest contributor to
cost overhead for manufacturing facilities.
This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Taking Control of Gesture
Interactions”.
1. __________ Uses voice to control the devices.
a) Google Home
b) Apple HomePod
c) Both Google Home and Apple HomePod
d) Google Sheets
View Answer
Answer: c
Explanation: Google Home, or Apple HomePod, takes in the user’s voice to control the devices. Like,
with the help of voice all the parts of our home can be done.
2. Do we have problems using screen in smartphones.
a) True
b) False
View Answer
Answer: a
Explanation: This can be the user’s smartphone screen, but some devices, like smartwatches, have
screens of their own. The problem in the latter case is that these screens can be tiny and hard to use
effectively. Neither voice control nor smartphone control offer adequate solutions to this problem.
3. What should be the frequency of the soil for hand gesturing functions?
a) 50 GHz
b) 60 GHz
c) 35 GHz
d) 40 GHz
View Answer
Answer: b
Explanation: Soil uses high frequency 60GHz radar to sense fine hand gestures that can be mapped to
certain functions.
4. What is the gesture that can be produced by tapping index finger to the tip of your thumb?
a) Pressing a virtual button
b) Twisting a virtual dial
c) Pressing a virtual button and Twisting a virtual dial
d) Neither Twisting a virtual dial nor Pressing a virtual button
View Answer
Answer: a
Explanation: Example of soil intuitive virtual tools, by tapping your index finger to the tip of your thumb,
you can simulate pressing a virtual button.
5. What is the gesture that can be produced by rubbing your index finger against your thumb?
a) Pressing a virtual button
b) Twisting a virtual dial
c) Pressing a virtual button and Twisting a virtual dial
d) Neither Twisting a virtual dial nor Pressing a virtual button
View Answer
Answer: b
Explanation: Example of soil intuitive virtual tools, you can rub your index finger against your thumb to
simulate twisting a virtual dial.
6. Using gestures to interact with augmented applications _________
a) Providing movement
b) Modifying a virtual menu
c) Changing the direction
d) Navigating a virtual menu
View Answer
Answer: d
Explanation: Using it to control smartwatches, one could readily imagine using gestures to interact with
augmented or virtual reality applications, such as navigating a virtual menu.
7. Soli has ______
a) Small form factor
b) High power
c) High form factor
d) Medium power
View Answer
Answer: a
Explanation: Soil has small form factor, and low power, soil is practically custom made for IoT devices.
With the help of soli gesture functions can be performed.
8. Does smart phone use soli.
a) True
b) False
View Answer
Answer: a
Explanation: Smart home devices may also be a natural fit for soli- perhaps you could turn a light on or
off by flicking your fingers at it.
9. RFID stands for ________
a) Radio Frequency Industry
b) Random Frequency Identification
c) Radio Flow Industry
d) Radio Frequency Identification
View Answer
Answer: d
Explanation: In the early years of IoT, RFID (Radio Frequency Identification) and sensor technologies
were the focus. The concept has grown enormously during the last decade.
10. IoT describes where Internet provides _________
a) Network
b) Things
c) Architecture
d) Objects
View Answer
Answer: b
Explanation: IoT describes a system where Internet enabled “things” in the physical world equipped with
sensors, actuators and capable of interacting with the environment are connected to the internet for
monitoring and control of the physical “things”.
11. Is our technology out of sync.
a) True
b) False
View Answer
Answer: a
Explanation: Today’s technology can sometimes feel like it’s out of sync with our senses as we peer at
small screens, flick and pinch fingers across smooth surfaces, and read tweets “written” by programmer
created bots.
12. Do we have H2M communication.
a) True
b) False
View Answer
Answer: a
Explanation: As people and companies prepare to adapt to the internet of things, with its ever winding
focus on machine to machine communication, it’s a good time to ask where people will fit in. H2MHuman to Machine communication conversation can be done with gestures.
13. Is gesture technology important.
a) False
b) True
View Answer
Answer: b
Explanation: Gesture technology is important because when it is implemented correctly, it becomes
something we barely think about. It can make basic interactions with everyday objects simple and
intuitive.
14. _________ Is experimenting to turn human body in to sort of antenna.
a) Sony
b) Samsung
c) Ericcson
d) Lenovo
View Answer
Answer: c
Explanation: Ericcson is experimenting with a product it calls the connected paper to turn the human
body into a sort of antenna.
15. Which company is trying to develop hand gestures into virtual controls?
a) Mahindra
b) Microsoft
c) Qualcomm
d) Google
View Answer
Answer: d
Explanation: Google’s project soli, which turns hand gestures into virtual controls – without the need for
a virtual reality headset. Instead of a tiny sensor that fits onto a chip tracks at high speed and accuracy
not just big arm waving gestures but also sub mm hand movement, using .radar
This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Designing Material Behavior”.
1. Each object represents _________ in virtual network.
a) Thing
b) Device
c) Node
d) Small object
View Answer
Answer: c
Explanation: Each object represents a node in a virtual network, continuously transmission a large
volume of data itself and its surroundings – we call these digital footprints a code halo.
2. Continuous transmission of data is called as ____________
a) Ac-halloc
b) Code halo
c) Halo code
d) Halloc-ac
View Answer
Answer: b
Explanation: Each object represents a node in a virtual network, continuously transmission a large
volume of data itself and its surroundings – we call these digital footprints a code halo.
3. BoT stands for ___________
a) Base of Things
b) Built of Things
c) Benefits of Things
d) Business of Things
View Answer
Answer: a
Explanation: According to Gartner, “the installed base of things will grow to 26 billion units in 2020, a
near 30 fold increase from 0.9 billion units in 2009.”
4. An informed manufacturing organization contains __________ elements.
a) 4 elements
b) 3 elements
c) 5 elements
d) 6 elements
View Answer
Answer: a
Explanation: An informed manufacturing organization contains four elements:
Informed products
Processes
People and
Infrastructure.
5. The manufacturing elements provide _________ manufacturing processes.
a) Automated
b) Intelligent
c) Streamlined
d) Automated, Intelligent, and Streamlined
View Answer
Answer: d
Explanation: An informed manufacturing organization contains four elements: Informed products,
Processes, People and Infrastructure. These essential elements of manufacturing are converging like
never before, creating a more automated, intelligent, and streamlined manufacturing process.
6. Informed _________ will enable machines to take autonomous action.
a) Product
b) People
c) Processes
d) Infrastructure
View Answer
Answer: a
Explanation: Advanced sensors, controls, and software applications work together to obtain and share
real time information as finished goods make their way down the production line. Informed product will
enable machines to take autonomous action.
7. Informed __________ will provide intelligent design, operation as well as safety.
a) Product
b) People
c) Processes
d) Infrastructure
View Answer
Answer: b
Explanation: Informed people will people will provide intelligent design, operations and maintenance, as
well as higher quality service and safety.
8. Informed _______ lead to flexible and adaptable supply chain.
a) Product
b) People
c) Processes
d) Infrastructure
View Answer
Answer: c
Explanation: By emphasizing bi directional information sharing across the global manufacturing value
chain from supplier to customer-Informed process lead to flexible and adaptable supply chain.
9. Informed _________ will better manage complexities and enable more efficient manufacturing of
goods.
a) Product
b) People
c) Processes
d) Infrastructure
View Answer
Answer: d
Explanation: Using smart infrastructure components that interface with mobile devices, products and
people, informed infrastructure will better manage complexities and enable more efficient
manufacturing of goods.
10. Which possibility is based on combination of materials and information flow?
a) Automotive
b) Energy and utilities
c) Transportation and logistics
d) Connected supply chain
View Answer
Answer: c
Explanation: Transportation and Logistics: Logistics and distribution networks are based on a
combination of materials and information flow between various supply chain participants.
This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Collaborative Robotics”.
1. Collaborative robots are easily integrated into existing production environment. With __________
articulation points.
a) 4
b) 5
c) 6
d) 3
View Answer
Answer: c
Explanation: Our three different Collaborative robots are easily integrated into existing production
environment. 6 articulation points and a wide scope of flexibility.
2. The collaborative robot arms are designed to mimic the range of motion of a ________
a) Network
b) Machine arm
c) Device
d) Human arm
View Answer
Answer: d
Explanation: The collaborative robot arms are designed to mimic the range of motion of a human arm.
3. In co – robot co represents?
a) Coordinative
b) Collaborative
c) Computer
d) Control
View Answer
Answer: b
Explanation: A cobot or co-robot is a robot intended to physically interact with humans in a shared
workspace.
4. A cobots as an apparatus and method for interaction between ________ and ________
a) person and computer
b) Device and computer
c) Device and human
d) Human and
View Answer
Answer: a
Explanation: A cobots as an apparatus and method for direct physical interaction between a person and
a general purpose manipulator controlled by a computer.
5. The cobots assured human safety by having no internal source of ________
a) General motors
b) Safe equipment
c) Industrial material
d) Motive power
View Answer
Answer: d
Explanation: The first cobots assured human safety by having no internal source of motive power. It is a
natural agent, used to impact motion to machinery such as engine.
6. Motive power was provided by the human worker.
a) True
b) False
View Answer
Answer: a
Explanation: The first cobots assured human safety by having no internal source of motive power.
Motive power was provided by the human worker.
7. Cobots function was to allow computer control of motion by ________
a) Motors
b) Human worker
c) Payload
d) Power
View Answer
Answer: c
Explanation: Cobots function was to allow computer control of motion, by redirecting or steering a
payload, in a cooperative way with human worker. Later cobots provided limited amounts of motive
power as well.
8. IAD stands for ________
a) Intelligent Assist Device
b) Industrial Assist Device
c) International Assist Device
d) Informative Assist Device
View Answer
Answer: a
Explanation: The general motors team used the term Intelligent Assist Device as an alternative to cobot,
especially in the context of industrial material handling and automotive assembly operations.
9. Cobots is also called as _______
a) ICD
b) IBD
c) IMD
d) IAD
View Answer
Answer: d
Explanation: The general motors team used the term Intelligent Assist Device as an alternative to cobot,
especially in the context of industrial material handling and automotive assembly operations.
10. BAXTER is which type of robot?
a) Humanoid robot
b) Industrial robot
c) Hospital robot
d) Workspace robot
View Answer
Answer: b
Explanation: Universal robots released its first cobot, in 2008. Rethink Robotics released an industrial
cobot, Baxter, in 2012.
11. ________ is the simplest method of collaborative robots and is used in applications when human
interaction with robot is less.
a) Self monitored stop
b) Speed and separation monitoring
c) Power and force limiting
d) Hand guiding
View Answer
Answer: a
Explanation: Self monitored stop is the simplest method of collaborative robots and is used in
applications when human interaction with robot is less.
12. Which type of collaborative robot installation also traditional industrial robots?
a) Self monitored stop
b) Speed and separation monitoring
c) Power and force limiting
d) Hand guiding
View Answer
Answer: b
Explanation: This type of collaborative robot installation also uses traditional industrial robots, but it is
more suited for environments where employees will be frequently interacting with the robot.
13. _________ robots are the most collaborative of the types.
a) Self monitored stop
b) Speed and separation monitoring
c) Power and force limiting
d) Hand guiding
View Answer
Answer: c
Explanation: Power and force limiting robots are the most collaborative of the types mentioned and
they are the only ones that can truly work alongside humans without any additional safety devices and
process interruption.
14. __________ robot allows a programmer to teach robot paths and positions.
a) Self monitored stop
b) Speed and separation monitoring
c) Power and force limiting
d) Hand guiding
View Answer
Answer: d
Explanation: Hand Guiding is a collaborative feature that some robots have. It allows a programmer to
teach robot paths and positions simply by moving the robot their hand to the desired positions.
15. All collaborative robot applications should follow ISO 10218.
a) True
b) False
View Answer
Answer: a
Explanation: All collaborative robot applications should follow ISO 10218. However, not all processes are
applicable to collaborative robots, which is why a risk assessment needs to be done.
This set of IOT Questions and Answers for Aptitude test focuses on “Neuroscience and Cosmology”.
1. ________ are the general feature of our brain’s perception.
a) Strobes
b) Constant
c) Research
d) Interact
View Answer
Answer: a
Explanation: Evidence gathered from the finding of a landmark Australian Italian collaboration suggests
that oscillations or strobes are a general feature of our brains perception.
2. Perception and attention are intrinsically rhythmic in nature.
a) True
b) False
View Answer
Answer: a
Explanation: According to the study conducted by researchers from the university of Sydney and Italian
universities, Perception and attention are intrinsically rhythmic in nature.
3. ________ oscillates as one ear peaks in perception before the other takes a turn.
a) Oscillations
b) Auditory decision making
c) Auditory perception
d) Auditory perception and oscillations
View Answer
Answer: c
Explanation: Auditory perception oscillates as one ear peaks in perception before the other ear takes a
turn. This is essential for accurately locating events in the environment.
4. ________ oscillates.
a) Auditory perception
b) Auditory decision making
c) Oscillations
d) Auditory perception and oscillations
View Answer
Answer: b
Explanation: Current Biology, the researches emphasized three key findings from their study:
Auditory decision making also oscillates.
5. ________ occur in all perception, not just vision.
a) Auditory perception
b) Auditory decision making
c) Oscillations
d) Auditory perception and oscillations
View Answer
Answer: c
Explanation: Current Biology, the researches emphasized three key findings from their study:
Oscillations occur in all perceptions, not just vision.
6. Human eye perception is cyclical.
a) True
b) False
View Answer
Answer: a
Explanation: While it has been known for years that human eye perception is cyclical, this is the first
time that our auditory perception has been proven to be the same.
7. The researches demonstrated that the sensitivity of detecting weak sound is ________
a) Constant
b) Not constant
c) Fluctuating
d) Sinusoidal
View Answer
Answer: b
Explanation: The researches demonstrated that the sensitivity of detecting weak sound is not constant.
Instead, its strobing, or it fluctuates rhythmically over time.
8. The auditory cycles happen at the rate of around ________
a) 7 per second
b) 5 per second
c) 6 per second
d) 8 per second
View Answer
Answer: c
Explanation: The auditory cycles happen at the rate of around six per second. While we might deem this
a fact, it’s quite slow as far as neuroscience is concerned.
9. Is auditory cycles slow than neuroscience.
a) True
b) False
View Answer
Answer: a
Explanation: The auditory cycles happen at the rate of around six per second. While we might deem this
a fact, it’s quite slow as far as neuroscience is concerned.
10. Brain oscillations happen at the rate of around ________
a) 150 times per second
b) 100 times per second
c) 125 times per second
d) 250 times per second
View Answer
Answer: b
Explanation: The auditory cycles happen at the rate of around six per second. While we might deem this
a fact, it’s quite slow as far as neuroscience is concerned. The human brain oscillations might happen up
to 100 times per second.
11. Human decision making is at the rate of ________
a) One-third of a second
b) One-fourth of a second
c) One-tenth of a second
d) One-sixth of a second
View Answer
Answer: d
Explanation: Human makes a decision at the rate of about One-sixth of a second, which is in line with
these auditory oscillations.
12. A variation of oscillation is said to be found between ________
a) Two eyes
b) Only one ear
c) Only one eye
d) Two ears
View Answer
Answer: d
Explanation: A variation of oscillation is said to be found between the two ears, with one ear showing
peak sensitivity after the other.
13. ________ to attention could help bind together relevant information at regular time points.
a) Strobing Approach
b) Oscillation
c) Both strobing and oscillations
d) Neither strobing nor oscillations
View Answer
Answer: a
Explanation: Strobing Approach to attention could help bind together relevant information at regular
time points and allow new groupings of information to reassemble at other moments.
14. ICT stands for ____________
a) Internet Communication Technology
b) Industrial Communication Technology
c) Information Communication Technology
d) Information Connect Technology
View Answer
Answer: c
Explanation: It discusses scope of Big Data Analysis, Information Communication Technology and
Ambient Intelligence.
15. AI stands for ____________
a) Artificial Intelligence
b) Ambient Intelligence
c) Application Intelligence
d) Ambient Internet
View Answer
Answer: b
Explanation: It discusses scope of Big Data Analysis, Information Communication Technology and
Ambient Intelligence.
To practice all areas of IOT for Aptitude test, here is complete set of 1000+ Multiple Choice Questions
and Answers.
pdated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - IOT Questions and Answers – Collaborative Robotics
» Next - IOT Questions and Answers – Toy Designs
Categories IOT MCQs
Post navigation
IOT Questions and Answers – Collaborative Robotics
IOT Questions and Answers – Toy Designs
Recommended Posts:
Privacy Policy
C# Programming Examples on Events
Information Technology Questions and Answers
Artificial Intelligence Questions and Answers
Artificial Intelligence Questions and Answers – Perception
Artificial Intelligence Questions and Answers – Facts – 3
Clinical Science Questions and Answers – General Anaesthesia
Best Reference Books – M.Tech – Production Engineering and System Technology
Artificial Intelligence Questions & Answers – Communication
IOT Questions and Answers – HTTP Protocol
Computer Fundamentals Questions and Answers – Processor & Its Types
Best Reference Books – M.Tech – Master of Engineering Management
Artificial Intelligence Questions & Answers – Image Perception
Artificial Intelligence Questions and Answers – Artificial Intelligence Agents
Digital Signal Processing Questions and Answers – Round Off Effects in Digital Filters
Digital Image Processing Questions and Answers – Elements of Visual Perception
Human Physiology Questions and Answers – Neural Control and Coordination – Hind Brain
Best Reference Books – Computational Neuroscience
Best Reference Books – Endocrinology and Neuroscience
Best Reference Books – Educational Neuroscience
IOT Questions and Answers – Toy Designs
« PrevNext »
This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Toy Designs”.
1. ________ device, perhaps in the form of doll or toy.
a) Anthropomorphic
b) Devil toy
c) Chunky
d) Teddy
View Answer
Answer: a
Explanation: Anthropomorphic device, perhaps in the form of doll or toy, may be configured to control
one or more media devices.
2. The anthropomorphic device may aim its gaze at the source of ________
a) Interpreter
b) Media device
c) Social cue
d) Transmitter
View Answer
Answer: c
Explanation: Upon reception or a detection of a social cue, such as movement or spoken word or phase,
the anthropomorphic device may aim its gaze at the source of the social cue.
3. The anthropomorphic device may transmit the media device command to ________
a) Social cue
b) Media device
c) Interpreter
d) Transmitter
View Answer
Answer: b
Explanation: In response to receiving a voice command, the anthropomorphic device may interpret the
voice command and map it to a media device command. Then, the device may transmit the media
command to a media device.
4. The toy includes ________
a) Microphone
b) Camera
c) Speaker
d) Microphone, camera, and speaker
View Answer
Answer: d
Explanation: The toys, which include microphones, cameras, speakers and motors, have some people
pointing at teddy, the super computer toy.
5. The privacy concerns are ________ when devices have the capacity to record conversations and log
activity.
a) Clear
b) Not clear
c) Fluctuating
d) Constant
View Answer
Answer: a
Explanation: The privacy concerns are clear when devices have the capacity to record conversations and
log activity.
6. When we hear about IoT, we think of our ________
a) Microphone
b) Speaker
c) Thermostat
d) Transmitter
View Answer
Answer: c
Explanation: Usually when you hear about the Internet of Things, you think about it in terms of your
thermostat.
7. Sensible objects first game is called Fabulous Beast.
a) True
b) False
View Answer
Answer: a
Explanation: Sensible objects first game is called Fabulous Beast. A multi-player balancing game that
fleetwood describes as a cross between Jenga and collectible card pokemon.
8. Hello Barbie does what?
a) Moves its hands
b) Raises its Eyebrow
c) Moves its legs
d) Moves its head
View Answer
Answer: b
Explanation: Barbie went through hard times as Mattel released Hello Barbie, a cloud connected doll
that raised eyebrows amongst parents who were uncomfortable with Barbie listening to children.
9. Does the HelloBarbie connected to cloud?
a) True
b) False
View Answer
Answer: a
Explanation: Barbie went through hard times as Mattel released Hello Barbie, a cloud connected doll
that raised eyebrows amongst parents who were uncomfortable with Barbie listening to children.
10. Using ________ toy will keep interaction between toy and child.
a) Device
b) Motor
c) Driver
d) Engine
View Answer
Answer: d
Explanation: Using a dialogue engine to utilize some of the most advanced language processing
algorithms available driving the personalization of our platform, and keeping the interaction going
between toy and child.
11. With set of sensors and app children can do ________
a) Feed
b) Bathe
c) Hatch
d) Feed, bathe and hatch
View Answer
Answer: d
Explanation: Peppered with his own set of sensors and app children can virtual feed, bathe, and hatch
the toy, providing yet another variant of how physical toys and connectivity can merge.
12. ________ introduces children to the concept of computer programming.
a) Lightbot
b) Brain Development
c) Healthy and activity
d) Privacy
View Answer
Answer: a
Explanation: Lightbot introduces children to the concept of computer programming through fun
interactive puzzles.
13. Using what the time can and should be used for encouraging education and imagination.
a) Lightbot
b) Brain Development
c) Healthy and activity
d) Privacy
View Answer
Answer: b
Explanation: The connected toy should not abuse this already concerning trend, but capitalize on the
value it produces. With this children’s should improve education and imagination.
14. By using which of the following the floor of the child plays area turn into an interactive game?
a) Lightbot
b) Brain Development
c) Healthy and activity
d) Privacy
View Answer
Answer: c
Explanation: Lumo’s Interactive Projector turns the floor of your child play area into an interactive game
that encourages running, jumping and all sorts of physical activities, which makes the child healthy and
active.
15. ________ the connected toy will warrant significant effort from manufactures.
a) Lightbot
b) Brain Development
c) Healthy and activity
d) Privacy and safety
View Answer
Answer: d
Explanation: Safety and privacy surrounding the connected toy will warrant significant effort from
manufacturers and parents alike.
1. Which characteristics involve the facility the thing to respond in an intelligent way to a particular
situation?
a) Intelligence
b) Connectivity
c) Dynamic Nature
d) Enormous Scale
View Answer
Answer: a
Explanation: IoT comes with the combination of algorithms and computation, software and hardware
that makes it smart. Ambient Intelligence in IoT enhances its capabilities which facilitate the things to
respond in an intelligent way to a particular situation.
2. ________ empowers IoT by bringing together everyday objects.
a) Intelligence
b) Connectivity
c) Dynamic Nature
d) Enormous Scale
View Answer
Answer: b
Explanation: Connectivity empowers IoT by bringing together everyday objects. Connectivity of these
objects is pivotal because simple object level interactions contribute towards collective intelligence in
IoT network.
3. The collection of data is achieved with ________ changes.
a) Intelligence
b) Connectivity
c) Dynamic Nature
d) Enormous Scale
View Answer
Answer: c
Explanation: The primary activity of Internet of Things is to collect data from its environment, this os
achieved with the dynamic changes that take place around the devices.
4. The number of devices that need to be managed and that communicate with each other will be much
larger.
a) Intelligence
b) Connectivity
c) Dynamic Nature
d) Enormous Scale
View Answer
Answer: d
Explanation: The number of devices that need to be managed and that communicate with each other
will be much larger than the devices connected to the current internet.
5. ________ Provide the means to create capability that reflects true awareness of the physical world
and people.
a) Sensors
b) Heterogeneity
c) Security
d) Connectivity
View Answer
Answer: a
Explanation: Sensing technologies provide the means to create capability that reflects true awareness of
the physical world and people in it. The sensing information is simply the analogue input from the
physical world.
6. ________ in IoT as one of the key characteristics, devices have different hardware platforms and
networks.
a) Sensors
b) Heterogeneity
c) Security
d) Connectivity
View Answer
Answer: b
Explanation: Heterogeneity in IoT as one of the key characteristics, devices have different hardware
platforms and networks. And can interact with other devices or services platforms through different
networks.
7. IoT devices are naturally vulnerable to ________ threats.
a) Sensors
b) Heterogeneity
c) Security
d) Connectivity
View Answer
Answer: c
Explanation: IoT devices are naturally vulnerable to security threats. There is a high level of transparency
and privacy issues with IoT.
8. Which challenge comes under IoT devices, reliable bidirectional signaling.
a) Signaling
b) Security
c) Presence detection
d) Power consumption
View Answer
Answer: a
Explanation: With connected IoT devices, reliable bidirectional signaling is essential for collecting and
routing data between devices.
9. Which challenge comes under securing the information?
a) Signaling
b) Security
c) Presence detection
d) Power consumption
View Answer
Answer: b
Explanation: Security is a huge umbrella, but it’s paramount in Internet of Things connectivity.
10. ________ gives an exact, up to the second state of all devices on a network.
a) Signaling
b) Security
c) Presence detection
d) Power consumption
View Answer
Answer: c
Explanation: Its important to immediately know when an IoT device drops off the network and goes
offline and when comes online back. Presence detection of IoT devices gives an exact, up to the second
state of all devices on a network.
11. Which challenge comes when we use many devices on the same network?
a) Signaling
b) Security
c) Presence detection
d) Power consumption
View Answer
Answer: d
Explanation: You need minimal battery drain and low power consumption. You can’t afford to use up
100% of an IoT devices small and expensive embedded CPU power.
12. ________ a cellular network is expensive, especially with many IoT devices.
a) Signaling
b) Security
c) Bandwidth
d) Power consumption
View Answer
Answer: c
Explanation: In addition to power and CPU, bandwidth consumption is another challenge for IoT
connectivity. Bandwidth on a cellular is expensive, especially with many IoT devices.
13. Which of the following issues are considered in IoT?
a) Security Issue
b) Reliablity Issue
c) Standard Issue
d) All issues
View Answer
Answer: d
Explanation: We should be very careful while building IoT as it has the following issues:
Security Issue
Reliablity Issue
Standard Issue.
14. SBC stands for?
a) Standard Building Center
b) Smart Business Center
c) Standard Business Center
d) Smart Building Center
View Answer
Answer: b
Explanation: One of the key subsystems from point of view of security of the complex IoT system is a
smart business center system.
15. IoT is a paradigm that involves ubiquitous presence in the environment.
a) True
b) False
View Answer
Answer: a
Explanation: IoT is a paradigm that involves ubiquitous presence in the environment of different things
that are using wireless and wire networks.
IOT Questions and Answers – Addressing Reliability
« Prev
This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Addressing Reliability”.
1. There are efficiency gains from ________ all sorts of equipment.
a) Implementation
b) Analogous
c) Evolution
d) Digitization
View Answer
Answer: d
Explanation: There are efficiency gains from digitization of all sorts of equipment and measures that
used to be analog and disconnected.
2. Business values can be Daunting Proposition to figure out how to best harness all this data.
a) True
b) False
View Answer
Answer: a
Explanation: Across every industry, organization is looking at ways they can derive business value from
IoT. While some benefits will be relative clear cut, it can be a Daunting Proposition to figure out how to
best harness all this data.
3. The availability of ________ is the cloud services provider who will host video and data for end users.
a) Devices
b) Memory
c) Security system
d) Objects
View Answer
Answer: c
Explanation: The availability of cloud based security is the cloud services provider who will host video
and data for end users, as providers are solely responsible for ensuring the availability and reliability of
this data.
4. SLA stands for ____________
a) Service Level Agreement
b) Security Level Agreement
c) System Local Area
d) Service Local Area
View Answer
Answer: a
Explanation: Not all cloud service providers service level agreement offer that level of guarantee.
5. A provider which produces 99 percent uptime ________
a) Security issues
b) Network Issues
c) Programming issue
d) Memory issue
View Answer
Answer: b
Explanation: Among the exceptions that release a provider from providing 99 percent uptime are
network issues not within their direct control, client negligence, “acts of god,” scheduling maintenance
and more.
6. With physical security, the stakes are incredibly ________
a) Very high
b) Low
c) Very low
d) High
View Answer
Answer: d
Explanation: With physical security, the stakes are incredibly high, so even if you are working with a
limited budget, cloud services are not an area where you should shop for a bargain.
7. Issue with connecting to data stored have anything to do with data centers.
a) True
b) False
View Answer
Answer: a
Explanation: The reality is that any issues with connecting to data stored in the cloud rarely have
anything to do with the service provider’s data center.
8. The most likely culprit is ________
a) Things
b) Network
c) Device
d) Internet connectivity
View Answer
Answer: d
Explanation: The most likely culprit is internet connectivity, leaving end users unable to access their
hosted data or even perform management functions.
9. ________ are designed to protect data and servers.
a) Physical walls
b) Logical firewalls
c) Both Physical and logical
d) Neither physical nor logical
View Answer
Answer: c
Explanation: Physical and logical firewalls measure are designed to protect data and the servers where it
is stored from theft. Sabotage and damage caused by natural disasters.
10. Communication between ________ and ________ is encrypted for security.
a) Cloud and device
b) End user and data center
c) Network and device
d) Cloud and Network
View Answer
Answer: b
Explanation: Communication between end user sites and data centre is encrypted according to industry
standards to further improve system security.
11. Undertaking the intervention over an extended period of time would enhance the change of gaining
access.
a) True
b) False
View Answer
Answer: a
Explanation: Undertaking the intervention over an extended period of time would enhance the change
of gaining access to revelation about the thinking of biology teachers.
12. ________ phase starts with the construction of spanning tree for ordinary routing information.
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection
View Answer
Answer: a
Explanation: Initialization phase starts with the construction of spanning tree for ordinary routing
information. A level corresponds to the hop distance of the node from the sink and data will be
transmitted.
13. In which phase packets are forwarded hop by hop to get closer to the sink?
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection
View Answer
Answer: b
Explanation: Packets are forwarded hop by hop to get closer to the sink. Intermediate nodes keep the
packetId in their buffer during Tcol corresponding to the maximum delay allowed to transmit.
14. ________ is achieved using over hearing mechanism.
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection
View Answer
Answer: d
Explanation: The lost message detection is achieved by over hearing mechanism. Upon sensing the
channel, if node A does not hear node B transmitting the packet packetId to its next hop, it becomes
aware that the packet has been lost and that are transmission is required.
15. What is the last step in algorithm for reliable data transfer?
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection
View Answer
Answer: c
Explanation: Once a packet is detected, the AJIA mechanism relies on its routing metric to choose the
best next hop for the packet re transmission.