[MCQ] Internet of Everything

Module 1

1. Which language is preferred for IoT analytics ?
a. C ++
b. Python
c. HTML
d. PHP
Answer:- b. Python

2. ……..Is a cluster Management Technology and one of the key features in second generation Hadoop
a. value
b. cloud
c. yarn
d. hbase
Answer:- c. yarn

3. IOT provides platform where different devices can communicate store and retrieve data through ……..language
a. many
b. only 2
c. 1 common
d. any
Answer:- c. 1 common

4. Which of the following sensor is non contact type sensor that detects the presence of an object
a. temperature sensor
b. proximity sensor
c. pressure sensor
d. light sensor
Answer:- b. proximity sensor

5. Which of the following is an electromechanical device that will measure acceleration forces
a. pressure sensor
b. accelerometer
c. proximity sensor
d. IR sensor
Answer:- b. accelerometer

6.Which sensor is a component in smartphones notebooks and other mobile devices
a. IR sensor
b. pressure sensor 1 2
c. light sensor
d. ultrasonic sensor
Answer:-b. pressure sensor

7. Which of the following device is also called as a photodetector
a. IR sensor
b. pressure sensor
c. light sensor 1 3
d. ultrasonic sensor
Answer:-c. light sensor

8. Which of the following sensor is a type of sensor that detects physical touch or proximity
a. touch sensor 1 1
b. proximity sensor
c. light sensor
d. ultrasonic sensor
Answer:-a. touch sensor

9. The colour sensor detects the colour of the surface usually in …….scale
a. black and white
b. RGB 1 2
c. black
d. can not be determine
Answer:-b. RGB

10. The amount of water present in surrounding air is measured by which sensor
a. flow and level sensor
b. tilt sensor
c. humidity sensor 1 3
d. colour sensor
Answer:-c. humidity sensor

11. ……. are physical or behavioral human characteristics which can be used to digitally identify a person to grant access to systems devices or data
a. actuator
b. biometric 1 2
c. barcode
d. R code
Answer:-b. biometric

12 Which of the following is a cluster Management Technology and one of the key feature in second generation Hadoop
a. Veracity
b. cloud
c. yarn 1 3
d. h base
Answer:-c. yarn

13. Which of the following is an open source data warehouse system for caring and analysing large data sets store in Hadoop file
a. spark
b. hive 1 2
c. pig
d. yarn
Answer:-b. hive

14. Z wave operates on the low frequency speed
a. 908.42 band 1 1
b. 250 band
c. 1080 band
d. 1024.00 band
Answer:-a. 908.42 band

15. NFC is a limited to a distance of approximately …… While bluetooth can reach over 30 feet
a. 4cm
b. 4m
c. 1m
d. 1ft
Answer:-a. 4cm

16. In Which year, the term “Internet of things” was coined?
A. 1998
B. 1999
C. 2000
D. 2001
Answer: B
Explanation: The term Internet of things was coined in 1999,

17. The term “Internet of things” was coined by?
A. Kevin Ashton
B. Guido van Rossum
C. IBM
D. Ross Ihaka
Answer: A
Explanation: The term Internet of things was coined by Kevin Ashton of Procter & Gamble, later MIT Auto-ID Center, in 1999, though he prefers the phrase Internet for things.

18. The number of elements in the Open IoT Architecture?
A. 5 elements
B. 6 elements
C. 7 elements
D. 8 elements
Answer: C
Explanation: The 7 main elements are : sensor middleware (X-GSN), cloud data storage, scheduler, service delivery and utility manager, request definition, request presentation, configuration and monitoring.

19. In SOA, Service is termed as __________
A. Software service
B. Network service
C. Business service
D. Developer service
Answer: C
Explanation: Services are termed as business services. They are self-contained and logical.

20. API enables services portability between ____________
A. Systems
B. Devices
C. Networks
D. Services
Answer: A
Explanation: API enables services portability between sysyems, I.e., service may be allocated to end-systems or servers, with possible relocation and replication throughout its lifecycle.

21. IoT stands for?
A. Introduction of Things
B. Internet of Things
C. Internet of Tracking
D. Interaction of Things
Answer: B
Explanation: IoT stands for Internet of Things, which means accessing and controlling daily usable equipments and devices using Internet.

22. Which of the following is true about IoT?
A. The term Things in the Internet of Things refers to anything and everything in day to day life
B. IoT has greater transparency, control, and performance.
C. Both A and B
D. None of the above
Answer: C
Explanation: Both A and B is true statements.

23. IoT is an advanced automation and analytics system which deals with?
A. sensor, networking
B. electronic
C. cloud messaging
D. All of the above
Answer: D
Explanation: All of the above statements true statements.

24. Which of the following is not an advantage of IoT?
A. Improved Customer Engagement
B. Security
C. Reduced Waste
D. Enhanced Data Collection
Answer: B
Explanation: Security : IoT creates an ecosystem of constantly connected devices communicating over networks. The system offers little control despite any security measures. This leaves users exposed to various kinds of attackers.

25. Active Engagement Features of IOT means?
A. IoT makes the connected technology, product, or services to active engagement between each other.
B. It makes the complete failure of the system.
C. IoT makes things smart and enhances life through the use of data.
D. None of the above
Answer: A
Explanation: Active Engagement : Much of today’s interaction with connected technology happens through passive engagement. IoT introduces a new paradigm for active content, product, or service engagement.

26. One of the main characteristics of Linked Stream Data is Live Streaming.
A. TRUE
B. FALSE
C. Can be true or false
D. None of the above
Answer: A
Explanation: Most of the data on the web is from sensing devices. To facilitate the integration of data from sensed devices and other sources, both sensor stream source and data are being enriched with schematic descriptions, creating Linked Stream Data. It shows the live data depending on our application.

27. The SOA architecture is divided into how many layers?
A. 5 layers
B. 6 layers
C. 7 layers
D. 2 layers
Answer: D
Explanation: The first which has direct relevance to the business as it carries out business functions. The second layer is the technical layer which talks about managing computer resources like a database, web server etc.

28. What happens when service providers change their operating system and communication protocols?
A. Inoperability and complexity arises
B. Only complexity arises
C. Only Inoperability arises
D. Nothing arises
Answer: A
Explanation: Complexity arises when service providers change their operating system and communication protocols, which results in inoperability. Service providers use standard protocols and conventional interfaces to facilitate information among diverse services.

29. Ubiquitous service provision depends on _________
A. QoS
B. Management
C. Interoperability
D. Routing
Answer: C
Explanation: Ubiquitous service provision depends on interoperability, not only for provisioning of a standard QoS controlled IP bearer, but also for cross domain naming, security, mobility, multicast, including fair compensation for utility provisioning.

30. API architecture not only includes critical elements but also caters for _________
A. System
B. Devices
C. Network
D. Multi homing
Answer: D
Explanation: API architecture not only includes critical elements but also caters for multi homing, mobile networks with dynamic membership, and third party persistent storage based on indirection

31. How many main components IoT mainly consists of?
A. 2
B. 3
C. 4
D. 5
Answer: C
Explanation: IoT architecture technology mainly consists of four major components: Sensors/Devices, Gateways and Networks, Cloud/Management Service Layer and Application Layer.

32. _______ are the devices that are able to emit, accept and process data over the network.
A. Sensors
B. Gateways
C. Edge IT
D. Data Acquisition
Answer: A
Explanation: Sensors or Actuators are the devices that are able to emit, accept and process data over the network.

33. ________ in the IoT Architecture is the hardware and software gateways that analyze and pre-process the data before transferring it to the cloud.
A. Data center
B. Edge IT
C. Gateways
D. Data Acquisition
Answer: C
Explanation: Edge IT: Edge in the IoT Architecture is the hardware and software gateways that analyze and pre-process the data before transferring it to the cloud.

34. Which of the following is false?
A. APIs are glue
B. SOA components not loosely coupled
C. Kapua also provides a core integration framework.
D. None of the above
Answer: B
Explanation: They are loosely coupled. That means every service is self-contained and exists alone logically.

35. Global Sensor Network is built for _________.
A. Increasing cost and increasing time for development
B. Reducing cost and increasing time for development
C. Reducing cost and time for development
D. Increasing cost and decreasing time for development
Answer: C
Explanation: GSN is developed on the observation that most of the requirements for the application development sensor network are same. Having each sensor network development using its own custom software not only increases the cost but also takes time for development and deployment.

Module 2

1.Which of the following is not an application of RFID
a. Product Tracking
b. Libraries
c. Shipping
d. Communication between two computers
Answer: d

2.Whic RFID tags are costly ?
a. Semi Passive
b. Active Tags
c. Passive Tags
d. Both Passive and Semi Passive
Answer: b

3.In which RFID tag signal is always available
a. Semi Passive
b. Active Tags
c. Passive Tags
d. Both Passive and Semi Passive
Answer: b

4.The tag usually consists of an ……
a. Integrated Circuit
b. An antenna
c. Both Integrated circuit and an Antenna
d. Integrated antenna
Answer: c

5.RFID tag get the information from the tag using …..
a. Communication lines
b. RF waves
c. Bluetooth
d. Network
Answer: b

6.Tag antenna of High Frequency RFID system is ….
a. Small
b. Large
c. Medium
d. Extra Large
Answer: a

7.Which of the following is not a part of the RFID tag
a. Antenna Coil
b. Memory and Processor
c. Detector Diode
d. ALU
Answer: d

8.A RFID system with single antenna is called as …
a. Bistatic
b. Bipolar
c. Monostatic
d. Bipolar
Answer: c

9. RFID Tag uses ….. modulation technique
a. Amplitude shift keying
b. Frequency shift keying
c. Phase shift keying
d. Amplitude and Phase shift keying
Answer: a

10. RFID system has a high reliability under ………… conditions
a. Controlled
b. Uncontrolled
c. Free space conditions
d. Dynamic
Answer: a

11.Multiple RFID readers working in the space can avoid collision by
a. Using a technique called as listen-before-Talk
b. Using ALOHA technique
c. Using Slotted ALOH
d. Using CSM
Answer: a

12. Which of the following is not correct for RFID systems
a. RFID systems can be easily disrupted
b. RFID Reader Collision issues
c. RFID Tag Collision
d. RFID has no security and privacy issues
Answer: d

13. Can we remove the RFID tags ?
a. Yes its because they are very small and can break
b. No , they can be removed easily
c. It depends on the size of the RFID tag
d. Some RFID tags can be removed and some cannot
Answer: d

14.Can RFID tags be read without our knowledge ?
a. Yes
b. No
c. Depends which RFID tags we use
d. Yes but we can avoid it with certain kind of RFID
Answer: a

15.RFID stands for
a. Radio-Frequency Indication
b. Radio-Frequency Identification
c. Radio-Frequency Interconnection
d. Radio-Frequency Internet
Answer: b

16. The information on read-only chips be changed.
a. Can
b. Cannot
c. Sometimes can
d. never
Answer: b

17. RFID tag is has following advantage
a. It can detect objects from distance
b. Its cheaper to setup
c. It does not need any reader
d. Need clear line of site
Answer: a

18. Which of the following is not an application of RFID
a. Product Tracking
b. Libraries
c. Shipping
d. Communication between two computers
Answer: d

19. What is the minimum working current internally in the RFID Module?
a) 12 mA
b) 13 mA
c) 10 mA
d) 1 mA
Answer: b
Explanation: The internal working current inside the RFID Module ranges between 13 mA and 26 mA approximately. If there is a power surge in any portion of the module, it can mean that there is a faulty component which can be dangerous for the entire module as a whole.

20. Till what voltage are the logic pins on the RFID Module resistant to?
a) 5V
b) 3.3V
c) 2V
d) 12V
Answer: a
Explanation: The logic pins on the RFID Module are resistant up to 5V despite having an operational range of 2.5V to 3.3V. This means that one does not need to connect any logic level converter circuit in between the RFID Module and any other Arduino Microcontrollers which work on 5V.

21. What is the use of the RFID Module?
a) Object Identification
b) To provide 3G Connectivity
c) To measure temperature
d) To measure Wi-Fi strength
Answer: a
Explanation: The RFID Module is primarily used for object identification and tracking. It’s abbreviation stands for Radio Frequency Identification Module. It’s working is mostly wireless and uses electromagnetic fields.

22. What is the role of the MISO pin in the RFID Module?
a) Master In Slave Out
b) Manage Internal Slave Output
c) Master Internal Search Optimization
d) Manage Input Slave Op
Answer: a
Explanation: The RFID Module’s MISO pin acts as Master In Slave Out while the SPI Interface is activated, and as a serial clock when I2C Interface is enabled. However, when UART Mode is activated, it assumes the role of the Serial Data Output Pin.

23. Is there an SDA pin on the RFID Module?
a) Yes
b) No
Answer: a
Explanation: The RFID Module has an SDA/SS/Rx Pin which, when the SPI Interface is enabled acts as a signal pin, when the I2C Interface is enabled acts as a Serial Data Pin, and in case of UART Mode Activation acts as a Serial Data Input pin.

24. What will happen if we supply a voltage of 25V to the Vcc of the RFID Module?
a) Damage is caused
b) Module will shut down
c) Module will not respond for the time the voltage is applied
d) Module will function normally
Answer: a
Explanation: The RFID Modules are mostly built to work on a voltage of approximately 3.3V. Any voltage lower than that and the board will not be able to power on, but however any voltage significantly above that and the board may suffer permanent damage.

25. Which frequency does the RFID Module operate in?
a) 12.98 MHz
b) 14.67 MHz
c) 19.56 MHz
d) 13.56 MHz
Answer: d
Explanation: The RFID Module operates in the 13.56 MHz frequency since it is the universal unregulated frequency for all scientific and medical research purposes. It was set as the standard international frequency to be followed by all, since it does not interfere significantly with the environment.

26. What is the maximum data rate of the RFID Module?
a) 11 Mbps
b) 1 Kbps
c) 10 Mbps
d) 11 Gbps
Answer: c
Explanation: The maximum data rate of any given device is the ability of that given device to transfer as many bits of information from one location to another in unit time. Here, the maximum data rate of the RFID Module is 10 Mbps, which means that the module can transfer a maximum of 10 Megabytes of data in 1 second.

27. What is the maximum read range of the RFID Module?
a) 2 cm
b) 1 cm
c) 10 cm
d) 5 cm
Answer: d
Explanation: The maximum read range of an RFID Module is the maximum distance in space that the receiver module can read the signal sent by the transmitter module. In order for proper working of the module during operation, it is advised that both the modules are kept within the read range for accurate performance.

28. Is there an interrupt pin on the RFID Module?
a) Yes
b) No
Answer: a
Explanation: There is an interrupt pin on the RFID Module which keeps the module alert to incoming connection requests from any RFID transmitter that approaches its maximum read range so that it can throw a subsequent software interrupt in order for the new transmitter to function in sync with the receiver.

Module 3

1. …………………….are considered as the most fertile field as far as the applications of RFID is concerned
a. Household
b. Production
c. Supply chain management and logistics
d. Agriculture
Answer: c

2. ………….type of RFID tag has a battery.
a. Passive
b. Semi-passive
c. Active
d. Inlays
Answer: c

3. The clothing stores uses RFID tags because ……….
a. To track the movement of clothes in the store
b. To allow the clothes to pass through doors without keys
c. To keep track of inventory and to prevent clothes from being stolen
d. To track the cost of each item of clothing
Answer: c

4. In Pure ALOH is two times the frame transmission time.
a. The exploitation time
b. The calculated time
c. The linear time
d. The vulnerability time
Answer: d

5. In pure ALOH is the solution for a collision.
a. Retransmitting after random delay
b. Continues Retransmitting
c. Do not retransmit
d. Retransmitting after fixed delay
Answer: a

6. The advantage of Pure ALOHA algorithm is ………
a. Availability
b. confidentiality
c. efficiency
d. Simplicity
Answer: d

7. In Slotted Aloha, Probability of successful transmission of data packet=
a. G x e-2G
b. G x e
c. G x e-G
d. G x e-3G
Answer: c

8. The query tree protocol (QT) is……….protocols.
a. Progamme
b. network
c. Memoryless
d. Memory
Answer: c

9. Transponder are known as
a. Tag
b. Reader
c. Transimmiter
d. Aactuator
Answer: a

10. Interrogators are known as
a. Tag
b. Reader
c. Transimmiter
d. Aactuator
Answer: b

11. the full form of FSA is ………
a. Framed single Aloha
b. Framed Slotted Aloha
c. Face Site Align
d. Framed Slotted Antenna
Answer: b

12. ……..In an RFID is responsible for transmitting and receiving radio waves for smooth communication
a. tag
b. reader
c. antenna
d. circuit
Answer: c

13. MQTTs Protocol is
a. Machine to Machine
b. Internet of things
c. Machine to Machine and Internet of things
d. Machine things
Answer: c

Module 4

1. Which protocols are used for routing?
a. BGP
b. AODV & DSR
c. Distance vector
d. OSPF
Answer: b

2. _this is a WSN in which nodes are mobile and can change location based on their own or due to environmental changes.
a. Sensor network
b. Mobile sensor network
c. Adhoc network
d. Local area network
Answer: b

3. …….protocol also contributes in successfully operating & networking nodes.
a. TCP/IP
b. Preamble sampling
c. UDP
d. HTTP
Answer: b

4. MAC is designed for , hence known as an energy efficient protocol.
a. Fast processing
b. Communication
c. Sensing accurately
d. Powe supply coordination
Answer: d

5. 6LoWPAN is a ___________ layer protocol.
a. Physical
b. Network
c. Transport
d. Application
Answer: b

6. 6LoWPAN is specially designed for ____ devices where communication overhead should be less.
a. High power devices
b. Large size devices
c. Lower powered devices
d. Low weight devices
Answer: c

7. 6LoWPAN works over frequency range of __________ & has data transfer rate .
a. 2.4GHz & 250Kbps
b. 900MHz & 250Kbps
c. 8.5 GHz & 600Kbps
d. 8.5GHz & 250kbps
Answer: a

8.IPv6 header required mechanism to save energy with IPv6 & LoWPAN.
a. Encryption
b. Decryption
c. Extraction
d. Compression
Answer: d

9. MQTT stands for _____
a. Message query telemetry transport
b. Message queue telemetry transport
c. Modified query telemetry transport
d. Modified queue telemetry transport
Answer: b

10. MQTT protocol used in ______ layer.
a. Physical
b. Lata link
c. Application
d. Network
Answer: c

11. MQTT was first developed & deployed by .
a. Microsoft
b. IBM
c. APPLE
d. Google
Answer: b

12. MQTT uses ____ model of communication.
a. Publish subscribe
b. Request response
c. Public response
d. Public request
Answer: a

13. In the communication model used by MQTT who handles the queues which manages the topics.
a. Publisher
b. Client
c. Server
d. Broker
Answer: d

14. MQTT works on the top of ________ which maintains the reliability of message & no data loss.
a. UDP
b. TCP
c. HTTP
d. BGP
Answer: b

15. COAP is web transfer protocol and follows _______ model.
a. Request Response
b. Query response
c. Request subscribes
d. Publish subscribe
Answer: a

16. This is one of the characteristics of REST based API.
a. Code on demand
b. Scalability
c. Reliability
d. Productivity
Answer: a

17. Most of REST API works over ________ protocol by using delivery methods offered by it.
a. TCP
b. UDP
c. HTTP
d. SMTP
Answer: c

18. Which layer is responsible for traffic management and converting data into appropriate form
a. transport layer
b. network layer
c. application layer
d. physical layer
Answer: c

19. HART stands for
a. Highway Addressable Remote Transducer
b. High Addressable Remote Transducer
c. High Application Remote Transducer
d. Highway Application Remote Transducer
Answer: a

20. CoAP is a specialized ________ protocol
a. Web Transfer
b. Power
c. Application
d. Resource
Answer: a

21. MQTT is mainly used for __________
a) M2M communication
b) Device communication
c) Internet communication
d) Wireless communication
Answer: a
Explanation: MQTT is a public messaging protocol designed for lightweight M2M communication. It was originally developed by IBM and is now an open standard.

22. Which is an open standard?
a) CoAP
b) MQTT
c) XMPP
d) HTTP
Answer: b
Explanation: IoT needs standard protocols. Two of the most promising for small devices are MQTT and CoAP. Both ate standard protocols.

23. MQTT is _________ oriented.
a) Data
b) Message
c) Network
d) Device
Answer: b
Explanation: MQTT is message oriented. Every message is a discrete chunk of data, opaque to the broker
MQTT is message oriented. Every message is a discrete chunk of data, opaque to the broker.

24. Who created MQTT?
a) Robert Cailliau
b) Tim Berners-Lee
c) Andy Stanford-Clark
d) Vint Cerf
Answer: c
Explanation: MQTT is created by Andy Stanford-Clark in It was originally developed by IBM and is now an open standard.

25. Does MQTT support security.
a) True
b) False
Answer: a
Explanation: Yes, You can pass a user name and password with an MQTT packet in V3.1 of the protocol.

26. Standard ports of MQTT are __________
a) I2C
b) SSL
c) USART
d) TCP/IP
Answer: d
Explanation: Standard ports of MQTT are TCP/IP. TCP/IP port 1883 is reserved with IANA for use with MQTT.

27. Full form of MQTT _____
a) Message Queuing Telemetry Transport
b) Message Queuing Telegram Transport
c) Message Queue Telegram Transport
d) Message Queue Telemetry Transport
Answer: a
Explanation: MQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol that provides resource-constrained network clients with a simple way to distribute telemetry information.

28. What are the key components of a M2M system?
a) Vortex DDS
b) Smart Homes
c) Sensors and Wi-Fi
d) Protocols
Answer: c
Explanation: Following are the key components of a M2M system.Sensors
RFID (Radio Frequency Identification)
Wi-Fi
Autonomic Computing.

29. Request field is present in which message format?
a) Request message
b) Response message
c) Both request and response
d) Neither request nor response
Answer: a
Explanation: The request message consists of a request line(e.g., GET /image/logo.png HTTP/1.1, which requests a resource called /image/logo.png from the server).

30. URI and content type support is which protocol feature?
a) SPI
b) UDP
c) HTTP
d) CoAP
Answer: d
Explanation: CoAP needs to consider optimizing length of datagram and satisfying REST protocol to support URI. It also needs to provide dependable communication based on UDP protocol.

31. CoAP is specialized in ___________
a) Internet applications
b) Device applications
c) Wireless applications
d) Wired applications
Answer: a
Explanation: Constrained Application Protocol (CoAP) is a specialized Internet Application Protocol for constrained devices, as defined in RFC 7228.

32. CoAP is designed for use between devices on the same constrained network.
a) True
b) False
Answer: a
Explanation: CoAP is designed for use between devices on the same constrained network (e.g., low-power, lossy networks), between devices and general nodes on the internet, and between devices on different constrained networks both joined by an internet.

33. Which layer is CoAP?
a) Control layer
b) Transport layer
c) Service layer
d) Application layer
Answer: c
Explanation: In intelligent network and cellular network, service layer is a conceptual layer within a network service provider architecture. CoAP is a service layer protocol that is intended for use in resource-constrained internet devices, such as wireless sensor network nodes.

34. CoAP provides which of the following requirements?
a) Multicast support and simplicity
b) Low overhead and multicast support
c) Simplicity and low overhead
d) Multicast support, Low over head, and simplicity
Answer: d
Explanation: Multicast, low overhead, and simplicity are extremely important for Internet of Things (IoT) and Machine-to-Machine (M2M) devices, which tend to be deeply embedded and have much less memory and power supply than traditional internet devices have.

35. The core of the protocol is specified in _________
a) RFC 7254
b) RFC 7252
c) RFC 7452
d) RFC 7524
Answer: b
Explanation: The core of the protocol is specified in RFC 7252, important extensions are in various of the standardization process.

36. Do CoAP has memory?
a) True
b) False
Answer: a
Explanation: The nodes have 8-bit microcontrollers with small amount of ROM and RAM, while constrained network such as IPv6 over Low-power Wireless Personal Area Network often high packet error rates and a typical throughput of 10s of kbit/s.

37. CoAP does not provide any security.
a) True
b) False
Answer: b
Explanation: The Internet of Things cannot spread as long as it can be exploited by hackers willy-nilly. CoAP does not just pay lip service to security, it actually provides strong security. CoAP’s default choice of DTLS parameters is equivalent to 3072-bit RSA keys, yet still runs fine on the smallest nodes.

38. What is the RAM and ROM size in CoAP?
a) 100 KiB of RAM and 10 KiB of ROM
b) 10 KiB of RAM and 100 KiB of ROM
c) 10 KiB of RAM and 250 KiB of ROM
d) 250 KiB of RAM and 10 KiB of ROM
Answer: b
Explanation: The Internet of Things will need billions of nodes, many of which will need to be inexpensive. CoAP has been designed to work on microcontrollers with as low as 10 KiB of RAM and 100 KiB of ROM (code space).

39. CoAP feels very much like HTTP.
a) True
b) False
Answer: a
Explanation: From a developer point of view, CoAP feels very much like HTTP. Obtaining a value from a sensor is not much different from obtaining a value from a Web API.

40. Which is an open standard?
a) HTTP
b) MQTT
c) XMPP
d) CoAP
Answer: d
Explanation: IoT needs standard protocols. Two of the most promising for small devices are MQTT and CoAP. Both ate standard protocols.

41. Will CoAP connects to the internet.
a) True
b) False
Answer: a
Explanation: CoAP is one of the latest application layer protocol developed by IETF for smart devices to connect to the Internet.

42. HART stands for_________
a) Highway Addressable Remote Transducer
b) High Addressable Remote Transducer
c) High Application Remote Transducer
d) Highway Application Remote Transducer
Answer: a
Explanation: IoT PHY/MAC Layers involve all the common wireless communication technology, such as IEEE 802.11 series, 802.15, HART.

43. LTP stands for _________
a) Lean Transducer Protocol
b) Lean Transport Protocol
c) Layer Transport Protocol
d) Layer Transducer Protocol
Answer: b
Explanation: IETF has developed several lightweight protocols e.g., CoAP, Embedded Binary HTTP, Lean Transport Protocol.

44. CoAP is a specialized _________ protocol.
a) Web Transfer
b) Power
c) Application
d) Resource
Answer: a
Explanation: The CoAP is a specialized web transfer protocol for use with constrained nodes and constrained networks.

45. URI and content type support is which protocol feature?
a) Http
b) UDP
c) CoAP
d) SPI
Answer: c
Explanation: CoAP needs to consider optimizing length of datagram and satisfying REST protocol to support URI. It also needs to provide dependable communication based on UDP protocol.

46. Which is an open standard?
a. HTTP
b. MQTT
c. XMPP
d. CoAP
Answer: d

47. CoAP is specialized in
a. Internet applications
b. Device applications
c. Wireless applications
d. Wired applications
Answer: a

48. _______ is a network of devices connected to internet where in these devices communicate with each others to assign tasks on meet specific requirement
a. Server
b. Cloud
c. IOT
d. Internet
Answer: c

Module 5

1. How many bits are there for IPv6 address
a. 64 bits
b. 128 bits
c. 32 bits
d. 256 bits
Answer: b

2. What is size of IP version number in IPv6
a. 4 bits
b. 8 bits
c. 6 bits
d. 10 bits
Answer: a

3. Hop limit field size in IPv6 is
a. 4 bits
b. 10 bits
c. 6 bits
d. 8 bits
Answer: d

4. What is use of flow label field in IPv6
a. identifies sequence of packet
b. identifies flow of packet
c. identifies label of packet
d. identifies version of packet
Answer: a

5. URI stand as
a. universal resource identifier
b. unique resource identifier
c. uniform resource identifier
d. union resource identifier
Answer: c

6. URI consists of
a. UNN and UN
b. URN and URL
c. URN and UNN
d. URL and UN
Answer: b

7. URL is combination of
a. name and address
b. address and location
c. access method and location
d. name and access method
Answer: d

8. IPv6 provides an address which is
a. object-oriented mechanism
b. stateless mechanism
c. object-specific mechanism
d. stateful mechanism
Answer: b

9. IPv6 compressed version called as
a. 6LoWPAN
b. 6IPWPAN
c. 6IPWPAN
d. 6IPvLoWPAN
Answer: a

10. IPv6 offers how many unique addresses
a. 2222
b. 2120
c. 2128
d. 2111
Answer: c

Module 6

1. Which of the following is a column-oriented database that runs on top of HDFS
a. Hive
b. Sqoop
c. HBase
d. Flume
Answer: c

2. Which command is used to show all the Hadoop daemons that are running on the machine
a. distcp
b. jps
c. fsck
d. fsk
Answer: b

3. Hadoop is a framework that works with a variety of related tools. Common cohorts include:
a. MapReduce, Hive and HBase
b. MapReduce, MySQL and Google Apps
c. MapReduce, Hummer and Iguan
d. MapReduce, Heron and Trumpet
Answer: a

4. Distributed cache can cache files
a. Jar Files
b. Read-only text files
c. Archives
d. Jar Files, Read-only text files , archives
Answer: d

5. The total number of partitioner is equal to
a. The number of reducer
b. The number of mapper
c. The number of combiner
d. No of mapper reducer
Answer: a

6. Which of the following Hadoop config files is used to define the heap size?
a. hdfs-site.xml
b. core-site.xml
c. hadoop-env.sh
d. mapred-site.xml
Answer: c

7. Which of the following feature you will use submit jars, static files for MapReduce job during runtime
a. Distributed cache
b. Speculative execution
c. Data locality
d. Erasure coding
Answer: a

8. Which of the following method used to set the output directory
a. FileOutputFormat.setOutputgetpath()
b. OutputFormat.setOutputpath()
c. FileOutputFormat.setOutputpath()
d. OutputFormat.setOutputgetpath()
Answer: c

9. Which of the following must be set true enable diskbalnecr in hdfs-site.xml
a. dfs.balancer.enabled
b. dfs.disk.balancer.enabled
c. dfs.diskbalancer.enabled
d. dfs.disk.balancer.enabled
Answer: d

10. Which among the following is configuration files in Hadoop
a. core-site.xml, yarn-site.xml
b. hdfs-site.xml, core-site.xml
c. yarn-site.xml, hdfs-site.xml
d. core-site.xml, yarn-site.xml, hdfs-site.xml
Answer: d

11. Which of the following is used for large inter/intra-cluster copying
a. fsck
b. distch
c. DistCp
d. dtutil
Answer: c

12. Hadoop uses hadoop
a. Troubleshooting
b. Performance reporting purpose
c. Monitoring
d. Trobleshooting and Monitoring
Answer: c

13. Which of the following is used to provide multiple outputs to Hadoop?
a. MultipleOutputFormat
b. MultipleOutputs class
c. FileOutputFormat
d. DBInputFormat
Answer: b

14. An example of a distributed real-time computation system for processing large volumes of high-velocity data.
a) Kafk
b) Storm
c) Lucene
d) BigTop
Answer: b

15. Storm integrates with via Apache Slider.
a) Scheduler
b) YARN
c) Compaction
d) Priemptive scheduler
Answer: c

16. For Apache users, Storm utilizes the same ODBC interface.
a) cTakes
b) Hive
c) Pig
d) Oozie
Answer: b

17. Mark the wrong statement.
a) Storm is difficult and can be used with only Jav
b) Storm is fast: a benchmark clocked it at over a million tuples processed per second per node
c) Storm is scalable, fault-tolerant, guarantees your data will be processed
d) Storm is slow: a benchmark clocked it at over a million tuples processed per second per node
Answer: a

18. Storm is benchmarked as processing one million___________byte messages per second per node.
a) 10
b) 50
c) 100
d) 200
Answer: c

19. Apache Storm added open source, stream data processing to________Data Platform.
a) Clouder
b) Hortonworks
c) Local Clouder
d) MapR
Answer: b

20. node distributes code across the cluster.
a) Zookeeper
b) Nimbus
c) Supervisor
d) Supervisor and Nimbus
Answer: b

21. What Bigdata collects?
a) Human generated data
b) Sensor data
c) Machine generated data
d) Device data
Answer: a
Explanation: Bigdata analyses large amounts of mostly human generated data to support longer duration.

22. What IoT collects?
a) Human generated data
b) Sensor data
c) Machine generated data
d) Device data
Answer: c
Explanation: IoT is aggregating and compressing massive amounts of low latency/ low duration/high volume machine generated data coming from a wide variety of sensor to support real time use cases such as operational.

23. Which requires data stream management?
a) Bigdata
b) IoT
c) Bigdata & IoT
d) Device data
Answer: b
Explanation: In order for one to claim that they can deliver IoT analytic solutions requires big data, but IoT analytics must also include: Stream data management and Edge analytics.

24. Which requires Edge analytics?
a) Bigdata
b) IoT
c) Bigdata & IoT
d) Device data
Answer: b
Explanation: In order for one to claim that they can deliver IoT analytic solutions requires big data, but IoT analytics must also include : Stream data management and Edge analytics.

25. The IoT operates at ___________ scale.
a) Machine
b) Human
c) Device
d) Sensor
Answer: a
Explanation: The IoT operates at machine scale, by dealing with machine to machine generated data. This machine generated data creates discrete observations at very high signal rates.

26. One way to see observations addressing IoT analytics is?
a) 4-Tier Analytics
b) 2-Tier Analytics
c) 1-Tier Analytics
d) 3-Tier Analytics
Answer: d
Explanation: One way that we see observation addressing the IoT analytics needs is via a 3-Tier Analytics.

27. Which tier Performs individual wind turbine real time performance?
a) 3-Tier Analytics
b) 2-Tier Analytics
c) 1-Tier Analytics
d) 4-Tier Analytics
Answer: c
Explanation: Tier-1 performs individual wind turbine real time performance analytics and optimization.

28. Which tier performs predicts maintenance?
a) 3-Tier Analytics
b) 2-Tier Analytics
c) 1-Tier Analytics
d) 4-Tier Analytics
Answer: b
Explanation: Tier 2 optimizes performance and predicts maintenance needs across the wind turbines in the same wind farm.

29. Which tier is data lake enabled core analytics platform?
a) 4-Tier Analytics
b) 2-Tier Analytics
c) 1-Tier Analytics
d) 3-Tier Analytics
Answer: d
Explanation: Tier-3 is the data lake enabled core analytics platform. The tier 3 core analytics platform includes analytics engines, data sets and data management services that enable access to the data.

30. For supporting real time edge analytics, we need to provide detailed data.
a) True
b) False
Answer: a
Explanation: To support real time edge analytics, we need to provide detailed data that can flag observations of concern, but then doesn’t overwhelm the ability to get meaningful data back to the core for more broad based strategic analysis.

Prepare For Your Placements: https://lastmomenttuitions.com/courses/placement-preparation/

/ Youtube Channel: https://www.youtube.com/channel/UCGFNZxMqKLsqWERX_N2f08Q

Follow For Latest Updates, Study Tips & More Content!

/lastmomenttuition

Last Moment Tuitions

lastmomentdost